Overview
Pokhara Lincoln International College offers a Bachelor of Computer Science in Network Technology and Cybersecurity, a comprehensive and dynamic four-year academic program designed to provide students with an in-depth understanding of two critical domains in information technology: network technology and cybersecurity.
In an age where the digital world is increasingly interconnected and cyber threats are more prevalent than ever, this program equips students with the knowledge and skills necessary to navigate this complex landscape.
Over four years, students will embark on an educational journey that combines theoretical foundations with practical applications, fostering a holistic approach to addressing the challenges and opportunities in network technology and cybersecurity.
This program covers a broad spectrum of subjects, including network design, implementation, and administration, ensuring that students gain a deep appreciation for the architecture and management of complex computer networks.
Simultaneously, they will delve into the intricate world of cybersecurity, exploring topics such as Cisco Routing and Switching Techniques, penetration testing and data encryption technology, cryptography, ethical hacking, vulnerability assessment, and risk management. Hands-on labs and real-world projects are integral to the curriculum, allowing students to apply their knowledge in practical scenarios and develop the problem-solving skills essential for success in these fields.
Career Opportunity of BCS
A Bachelor of Computer Science in Network Technology and Cybersecurity opens the door to a wide range of lucrative and in-demand career opportunities in the rapidly growing fields of IT and cybersecurity.
Graduates can pursue roles as network administrators, where they manage and optimize the connectivity and performance of computer networks. They can also become cybersecurity analysts responsible for safeguarding organizations from cyber threats by monitoring systems, detecting vulnerabilities, and implementing protective measures.
Additionally, ethical hacking and penetration testing careers offer exciting prospects for proactively identifying and addressing security weaknesses. With the increasing importance of data protection and privacy, professionals in this field are highly sought after across industries, making it an excellent choice for those seeking a rewarding and dynamic career path.
Course Structure
|
|
|
|
|||||
S.N. |
Module Name |
Module Code |
Credit Hours |
Classification |
||||
|
SEMESTER 1 YEAR 1 |
|
|
|||||
1. |
Business English |
ENG 111 |
3 |
|
||||
2. |
Computer Network |
CNW112 |
4 |
|
||||
3. |
C Programming |
PRGM 126 |
4 |
|
||||
4. |
Discrete Mathematics |
DSM114 |
4 |
|
||||
5. |
Basic Computer Architecture |
BCA116 |
4 |
|
||||
|
Credit |
19 |
|
|||||
|
SEMESTER 2 YEAR 1 |
|
|
|||||
1. |
Advance Computer Architecture |
ACA121 |
4 |
Core |
||||
2. |
Advance Computer Network |
ACNW122 |
4 |
Concentration |
||||
3. |
Security in Computing |
SCT115 |
4 |
Core |
||||
4. |
Python |
PYN 124 |
4 |
Core |
||||
5. |
Operating System |
ECM123 |
3 |
Free |
||||
|
Credit |
19 |
|
|||||
|
SEMESTER 3 YEAR 2 |
|
|
|||||
1. |
Software Engineering (Including SAD Portion) |
BIT 244 |
4 |
Core |
||||
2. |
E-Commerce |
ECM133 |
3 |
Free |
||||
3. |
Digital Logic |
BIT 126 |
4 |
Core |
||||
4. |
Windows Server 2016 |
WDS125 |
4 |
Concentration |
||||
5. |
Cyber Security Law & Policy |
CSLPA 232 |
3 |
Core |
||||
|
Credit |
18 |
|
|||||
|
SEMESTER 4 YEAR 2 |
|
|
|||||
1. |
Technopreneurship |
TCP231 |
3 |
Core |
||||
2. |
Web Designing |
WBD113 |
3 |
Core |
||||
3. |
Wireless Communications |
WLC234 |
4 |
Core |
||||
4. |
Ethical Hacking |
EHG235 |
4 |
Concentration |
||||
5. |
Database Management System |
DMS236 |
4 |
Free |
||||
|
Credit |
18 |
|
|||||
|
SEMESTER 5 YEAR 3 |
|
|
|||||
1. |
Linux Administration |
LNXA243 |
4 |
Core |
||||
2. |
Leadership & Human Relations |
LSHR244 |
2 |
Core |
||||
3. |
Artificial Intelligence |
AFI353 |
4 |
Concentration |
||||
4. |
Digital Forensics |
DFS232 |
4 |
Concentration |
||||
5. |
Cryptography |
MWCM351 |
3 |
Concentration |
||||
|
Credit |
17 |
|
|||||
|
SEMESTER 6 YEAR 3 |
|
|
|||||
1. |
Industrial Management |
MWS362 |
3 |
Core |
||||
2. |
Software Project Management |
SPM246 |
3 |
Core |
||||
3. |
Data Structure & Algorithm |
DSA233 |
4 |
Concentration |
||||
4. |
Information Security Management System |
ISMS352 |
3 |
Concentration |
||||
5. |
Advanced Routing Technology |
ART354 |
4 |
Core |
||||
|
Credit |
17 |
|
|||||
|
SEMESTER 7 YEAR 4 |
|
|
|||||
1 |
Advanced Switching Technology |
AST361 |
3 |
Core |
||||
2 |
System Software & Administration |
CSA356
|
3 |
Core |
||||
3 |
Final Year Project |
BCS473 |
6 |
Concentration |
||||
4 |
Cloud Computing |
|
CCM363
|
|
Core |
|||
|
|
Credit |
16 |
|
||||
|
|
SEMESTER 8 YEAR 4 |
|
|
||||
1 |
Industrial Training |
|
IDT366 |
6 |
Core |
|||
|
|
Credit |
|
6 |
|
|||
|
|
|
|
|
||||
|
|
Total Credit Hours |
130 |
|