Why Study Master of Science in Cybersecurity at UNIMA
- This programme is accredited by the National Council for Higher Education (NCHE)
- You'll engage in a year-long paid work experience, and past students have had the opportunity to collaborate with esteemed organizations.
- You will be taught by experienced staff members with research and project experience in this subject area as shown in their profiles.
Teaching and learning
admission
Entry Requirements
How you're taught
Face to Face:
Traditional classroom learning which involves students and lecturer to directly interact and collaborate in real time discussions and hands on activities.
Online classes:
Some content is taught virtually and course materials, lectures, assignments, and discussions are done online mainly using moodle and google classroom.
View our learning modes
Master of Science in
CYBERSECURITY
The MSc in Cybersecurity equips graduates and professionals with the advanced skills needed to protect digital systems and respond to evolving cyber threats. The programme blends theory with practice across information security management, threat detection, incident response, and secure system design β preparing graduates for leadership roles in local and global cybersecurity environments.
Programme Structure
The programme runs over two years and four semesters. Year 1 covers core and elective coursework. Year 2 is dedicated to an independent research dissertation, with students developing their research proposal in Semester 2 of Year 1. Coursework comprises 10 modules: 8 core and 2 options.
Module |
Year 1 β Sem 1 |
Year 1 β Sem 2 |
Year 2 |
Core Modules |
|||
| Research Methodology | β | ||
| Project Management | β | ||
| Information Systems Theories | β | ||
| Business Management and Entrepreneurship | β | ||
| Digital Forensics | β | ||
| Cyber Security | β | ||
| Intrusion Detection and Firewalls | β | ||
Elective Modules (choose 2) |
|||
| Networking | β | ||
| Network Security | β | ||
| Network Management and Virtualisation | β | ||
| Neural Networks | β | ||
| Information Technology Governance | β | ||
| Database Management Systems | β | ||
| Distributed Systems | β | ||
| Systems Administration | β | ||
Module Descriptions
Core Modules
Research Methodology
Builds the skills needed to design and carry out original research in informatics. Students explore qualitative, quantitative, and mixed-methods approaches, and learn how to select and apply appropriate methods for different research contexts.
Project Management
Equips students with practical project management skills relevant to informatics. Topics include scope and time management, resource planning, budgeting, change management, organisational structures, and agile project delivery.
Information Systems Theories
Provides a grounding in IS theories from a socio-technical perspective, exploring how theory can guide research methodology and analytical discussion in complex, multi-stakeholder organisational environments.
Business Management and Entrepreneurship
Introduces key entrepreneurship concepts and management functions applicable to both new ventures and established organisations. Students apply strategic and innovative thinking to real-world business scenarios.
Digital Forensics
Introduces the tools and techniques used in digital forensic investigations, including data acquisition, preservation, analysis, and presentation of evidence. Students examine legal and ethical considerations and gain hands-on experience with forensic software.
Cyber Security
Covers both the theory and practice of securing computer systems, user data, and software in networked environments. Topics include security management, threat assessment, incident response, and organisational approaches to maintaining cyber resilience.
Intrusion Detection and Firewalls
Teaches students to detect and assess system breaches using intrusion detection systems, protocol analysers, and firewall architectures to monitor and secure network traffic.
Information Technology Risk Management
Introduces students to risk frameworks and methodologies used to identify and manage risks associated with IT adoption and use within organisations. Students examine risk from multiple organisational perspectives.
Master Thesis
Students undertake a substantial independent research project in their chosen area of specialisation, guided by a supervisor. The module covers literature review, research design, data analysis, proposal writing, and dissemination of findings through a dissertation and oral presentation.
Elective Modules (Choose 2)
Networking
Covers foundational networking concepts including network layers, devices, and IP addressing. These skills are especially relevant in developing countries like Malawi where internet infrastructure is being actively expanded.
Network Security
Examines network vulnerabilities and the threats posed by malicious software. Students explore practical security measures and technologies used to defend computer networks against attack.
Network Management and Virtualisation
Develops skills in managing and virtualising networks, with a focus on deployment and support of internet infrastructure. Particular attention is given to the challenges and opportunities of network management in developing countries.
Neural Networks
Builds skills in neural network modelling for supervised and unsupervised learning, with applications in decision-making systems, artificial intelligence, data analytics, and cybersecurity intelligence.
Information Technology Governance
Covers the governance of IT systems with a focus on security policy, risk mitigation, regulatory compliance, disaster recovery planning, and the development of strategic IT plans for organisations.
Database Management Systems
Advances studentsβ knowledge of database design, development, and enterprise-wide data management. Students evaluate different database types and modelling tools suited to large-scale organisational data needs.
Distributed Systems
Examines the fundamentals of distributed computing environments, including network concepts, operating systems, transaction management, and time coordination β with emphasis on the design requirements of distributed information systems.
Systems Administration
Provides both conceptual knowledge and hands-on experience in deploying and maintaining secure, modern computer systems β covering the technologies and techniques essential for effective systems administration.
Admission Requirements
-
A relevant bachelorβs degree with at least a strong pass from a recognised institution of higher learning in Information Systems, Computer Science, or an equivalent qualification.
-
Shortlisted candidates may be called for an interview.
