botho university

Home / Programmes / Faculty of Computing / Bachelor of Science Honours in Network Security and Computer Forensics

Bachelor of Science Honours in Network Security and Computer Forensics


Mode of Study: Campus Learning | Distance Learning

The Bachelor of Science (Honours) in Network Security and Computer Forensics is targeted at those wishing to enter the Information Technology (IT) sector as Computer Forensic Analysts, Vulnerability Security Research Engineers, Digital Forensic Examiners, Malware Media Forensic Analysts, Forensic Auditors, Network Security Specialists, Computer Crime Investigators or Security Analysts, among other things.

Programme details: The programme consists of core (required) and elective modules as detailed below. Some modules may have pre-requisites (i.e. may require the student to pass another module or set of modules first). Some modules may be co-requisite (i.e. such modules are required to be taken together). The number at the end of the module in parenthesis indicates the credit load of the module. 1 credit is equal to 10 hours of learning (guided, in-class and independent combined); therefore a 10-credit module requires on average 100 hours of learning from the student.

Core modules:

  • C5-ICO-11 Introduction to Computers (20)
  • C5-MAT-11 Mathematics for Computing (20)
  • D5-CSS-14 Communication & Study Skills (20)
  • C5-CSA-11 Computer Systems Architecture (20)
  • C5-OSH-11 Operating Systems & Hardware (20)
  • C6-IPC-11 Introduction to programming using C++ (20)
  • C6-QMD-11 Querying & Managing Database (40)
  • C6-FNS-13 Fundamentals of Network Security (20)
  • C6-MD1-11 Managing Business Desktops (20)
  • C6-IDS-13 Information and Data Security (20)
  • C6-CFD-13 Computer Forensics and Data Recovery (20)
  • C7-JAV-11 Programming using Java (20)
  • C7-PIS-11 Protocols and Internetworking standards (20)
  • C7-BIF-13 Biometric Fundamentals (20)
  • C7-NH1-11 Managing Network Hardware 1 (20)
  • C7-EHK-13 Ethical Hacking (20)
  • C7-CYL-13 Cyber Law (20)
  • C7-PPR-11 Professional Practice (60)
  • C8-NH2-11 Managing Network Hardware 2 (20)
  • C8-MAN-13 Malware Analysis (20)
  • B8-ENT-11 Essentials of Entrepreneuship (20)
  • C8-PRO-11 Project (40)

Elective modules:

  • Select one from the following:
    • C8-WNA-11 Windows Network Administration (20)
    • C8-CCI-13 Cyber Crime Investigation (20)

Recommended full-time study path (4½ years):


Year Sem Module Credits
Year 1 Sem 1 C5-ICO-11 Introduction to Computers 20
C5-MAT-11 Mathematics -1 20
D5 - CSS - 14 Communication and Study Skills 20
Sem 2 C5-CSA-11 Computer System Architecture 20
C5-OSH-11 Operating Systems & Hardware 20
C6-IPC-11 Introduction to programming using C++ 10
Year 2 Sem 3 C6-QMD-11 Querying and Managing Databases  40
C6 - FNS - 13 Fundamentals of Network Security 20
Sem 4 C6-MD1-11 Managing Business Desktops 1 20
C6 - IDS - 13 Information and Data Security 20
C6 - CFD - 13 Computer Forensics and Data Recovery 20
Year 3 Sem 5 C7-JAV-11 Programming using Java 20
C7 - PIS - 11 Protocols & Internetworking Standards 20
C7 - BIF - 13 Biometric Fundamentals 20
Sem 6 C7 - NH1 - 11 Managing Network Hardware 1 20
C7 - EHK - 13 Ethical Hacking 20
C7-CYL-13 Cyber Law 20
Year 4 Sem 7 C7-PPR-11:  Professional Practice  60
Sem 8 C8 - NH2 - 11 Managing Network Hardware 2  20
C8-MAN-13 Malware Analysis 20
 Elective –I (Select one module from below)  
C8 - WNA - 11 Windows Network Administration 20
C8-CCI-13 Cyber Crime Investigation 20
Year 5 Sem 9 C8-PRO-11: Project  40
Elective –I (Select one module from below)  
E8-ISD-17: Innovation for Sustainable Development 20
B8-ENT-11: Essentials of Entrepreneurship 20

Students will be using the dedicated Network Security and Computer Forensics lab to practice the following activities in the specified Schedule below for the two different modules.

Module 1 for Block Release: Ethical Hacking - C7-EHK-13

Day 1:

  • Gathering Information
  • Reconnaissance/Footprinting
  • Scanning Network

Day 2:

  • Gaining Access
  • Penetration Testing activities
  • Clearing Traces

Module 2 for Block Release: Computer Forensics and Data Recovery C6-CFD-13

Day 1:

  • Data Acquisition
  • Windows File System
  • Using Windows OS Data acquisition
  • Data Examination

Day 2:

  • Data Analysis
  • Understanding Linux File System
  • Email and Social media Investigation.

Admissions Criteria

1) Applicants are expected to have successfully completed secondary schooling. The typical entry requirement is BGCSE or IGCSE (in Botswana), LGCSE (in Lesotho) or other equivalent secondary school qualification. BGCSE or IGCSE (in Botswana), LGCSE (in Lesotho) candidates are required to achieve a minimum grade of ‘D’ in five subjects.

2) Applicants must have 10 points in English and Mathematics combined or 32 points in the top 5 subjects.

3) Applicants in possession of a Diploma or Higher Diploma in related field may be given exemptions based on the credit point equivalency

4) For enquiries and more information please visit our website: www.bothouniversity.com