Course image CYS202 Principles of Operating Systems 2026/04 Venantius Kumar Sevamalai
2025 - 2026

Student Self-Enrolment key: serimuka

 

An Operating system is an essential part of any computer system. This is an introductory course in operating systems. The course focuses on the process and thread management, including CPU scheduling, synchronization and deadlock handling. The second section is related to the computer's storage management,  including memory management, the concepts and implementaons of virtual memory, as well as the file system. In the device management section, the input and output systems and external storage structure are presented. Students will be able to learn the working principles of operating systems and understand various resource management strategies in operating systems.

 

Course image CYS102 Calculus 2026/04 Saras Krishnan
2025 - 2026

This course is to train students to gain proficiency in calculus computations. Topics covered include: functions, limits, continuity, derivative, mean value theorem for derivative, indefinite integral, definite integral, fundamental theorem of calculus, applications of derivatives, maximum and minimum, rate of change, mean value theorem for integrals, applications of integrals, area, volume, techniques of integration, improper integrals. Students will be able to handle calculus techniques required in relevant courses of specialization.

Course image CYS101 Introduction to Cyber Security 2026/04 Dilshani
2025 - 2026

This course introduces students to the fundamentals of cybersecurity, including policies, security management, operations, and technical issues. Students will learn the basics of secure networks, software, and communication technologies, as well as the role of management, planning, and improvement strategies. By the end, students will be able to identify and assess vulnerabilities, and manage security risks using industry-standard policies and controls.

Course image SWE402 Data Mining 2026/04 Teo Bee Guan - CYS Group
2025 - 2026

Advances in data generation and collection are producing a deluge of data sets in commerce and a variety of scientific disciplines. Data analysis techniques are becoming more important. This course introduces fundamental concepts and algorithms of data mining techniques and programming tools for students to apply, implement and evaluate data mining techniques to solve problems.

Course image CYS404 Big Data Analytics 2026/04 Teo Bee Guan
2025 - 2026

We look at the details of Hadoop, Storm and related tools that provide SQL-like access to unstructured data: Pig and Hive. We analyze so-called NoSQL storage solutions like HBase, Cassandra, and Oracle NoSQL, for their critical features: speed of reads and writes, data consistency, and ability to scale to extreme volumes. We will introduce the VM technique used in the data centres. We will also investigate the data deduplication and NVM techniques to reduce the data volume and speed up processing. A large section of the course is devoted to the methods of statistical analysis and case studies. We work with Open Source frameworks and other statistical tools. A part of the course is devoted to the public Cloud as a resource for big data analytics.

Course image CYS302 Network Attack and Defence Technology 2026/04 Wei Chuen Yau
2025 - 2026

This course discusses common network attacks and defence technologies. It covers in-depth methodologies, techniques, and tools to identify vulnerabilities, exploit, and assess security risk to networks, systems, and applications. Various defence strategies and mechanisms for mitigating the security attacks are covered as well. Completion of this course will help the students to learn about methodologies and hands-on practices of conducting penetration tests. Students will also learn to identify existing solutions for security protections.

Course image CYS201 Modern Cryptography 2026/04 Iftekhar Salam & Yau Wei-Chuen
2025 - 2026

This course introduces fundamental concepts in both classical and modern cryptography. It covers conventional cryptographic systems, essential mathematical foundations, and modern cryptographic primitives, including block ciphers, stream ciphers, hash functions, key management, public-key cryptography, and digital signatures. Additionally, the course provides an overview of public key infrastructure (PKI) and emerging areas such as lightweight and quantum cryptography. By the end of the course, students will have a solid understanding of cryptographic principles and algorithms, and will be able to select and implement appropriate industry-standard techniques to meet various information security requirements.

Course image DMT212 Human-Computer Interaction (CYS) 2026/04 Ili Farhana Md Mahtar
2025 - 2026
Every Tuesday | 8am-11am | A4#G01
 
This course covers the introduction, knowledge, and skills of Human-Computer Interaction (HCI). The course teaches students to design and develop user interfaces based on the principles and guidelines in the HCI area. Student develops a prototype to determine the usability of the system and performs evaluation by performing using HCI methods and use support tools. By the end of this course, students are able to gain a deep understanding of the interaction between user and computer as well as to implement a user-centered design approach for the best results.
Course image CYS402 Biometrics 2026/04 Tiong-Sik Ng
2025 - 2026

Course Summary:

Biometrics has emerged as a specialized field in criminal forensics, public safety surveillance, user authentication and identification. Expansion of biometric modalities are ranged from fingerprint, face and other traits to multimodal biometric traits. Objectives of this course include scientific foundations needed for the design, implementation, and evaluation of biometric identification systems.

Lecturer: Ng Tiong Sik

Course Timeline:

  1. Introduction
  2. Fingerprint Recognition
  3. Face Recognition
  4. Iris Recognition
  5. Case Study
  6. Multimodal Biometrics
Course image CYS308 Cryptanalysis 2026/04 Tiong-Sik Ng
2025 - 2026

Course Summary:

Cryptanalysis is an essential part of cryptology. It is the study of analyzing crypto-systems to understand how they work and to determine any weaknesses in cryptographic algorithms that may leak information. This course focuses on basic mathematics involving cryptanalysis, basic theory and history of cryptanalysis, and typical cryptanalysis techniques for classical cryptography, symmetric cryptography, and public-key cryptography. 
Through the teaching and practice of this course, students will have a deeper understanding of the principles of some attack techniques that are commonly used for the security analysis. It lays the foundation of basic knowledge and implementation experience for students to engage in research and engineering related to cryptography and network security in the future.

Lecturer Name: Ng Tiong Sik

Course Timeline:

  1. Overview of Cryptography and Cryptanalysis
  2. Cryptanalysis of Classical and Historical Ciphers
  3. Attacks against Symmetric Encryption Schemes 
  4. Attacks against Hash Functions and Message Authentication Code (MAC) Algorithms
  5. Security of Public Key Cryptosystems
  6. Analysis of Cryptographic Protocols
Course image CYS201 Modern Cryptography 2025/09 Iftekhar Salam
2025 - 2026

Cryptography is about communication in the presence of an adversary. It encompasses many problems such as encryption, authentication of the user, authentication of the message, key distribution. The field of modern cryptography provides a theoretical foundation based on which we may understand what exactly these problems are and how to deal with them. "Modern cryptography" is an introductory course on cryptographic primitives and algorithms to provide necessary security goals. This course focuses on a general introduction of classical cryptography, conventional cryptographic systems, mathematical background of cryptography, modern cryptographic primitives including block cipher, stream cipher, hash function, key management, public-key cryptography, digital signature. The course also includes a brief overview of public key infrastructure and contemporary aspects of cryptography such as lightweight cryptography and quantum cryptography. Through this course's learning, the students can obtain some basic knowledge of conventional and modern cryptography and get an in-depth understanding of the basic principles and algorithms of modern cryptography. At the end of this course, students are expected to identify and implement appropriate industry-standard cryptographic techniques to address different information security goals.

Course image CYS101 Introduction to Cyber Security 2025/09 Dilshani
2025 - 2026

This course introduces students to the fundamentals of cybersecurity, including policies, security management, operations, and technical issues. Students will learn the basics of secure networks, software, and communication technologies, as well as the role of management, planning, and improvement strategies. By the end, students will be able to identify and assess vulnerabilities, and manage security risks using industry-standard policies and controls.

Course image Probability and Statistics 2026/04 Saras Krishnan
2025 - 2026

This course introduces students to the basic concepts and the methods of probability and statistics. It covers various topics on probability and statistics, including conditional probability, random variables and distributions, expectation, typical distributions, stochastic processes, estimation, testing hypotheses, categorical data and nonparametric methods, and linear statistical models. This course allows the students to solve the basic problems encountered in various fields and to acquire the mathematical knowledge and skills to follow more advanced course.

Course image CYS404 Big Data Analytics 2025/09 Teo Bee Guan
2025 - 2026

We look at the details of Hadoop, Storm and related tools that provide SQL-like access to unstructured data: Pig and Hive. We analyze so-called NoSQL storage solutions like HBase, Cassandra, and Oracle NoSQL, for their critical features: speed of reads and writes, data consistency, and ability to scale to extreme volumes. We will introduce the VM technique used in the data centres. We will also investigate the data deduplication and NVM techniques to reduce the data volume and speed up processing. A large section of the course is devoted to the methods of statistical analysis and case studies. We work with Open Source frameworks and other statistical tools. A part of the course is devoted to the public Cloud as a resource for big data analytics.

Course image CYS302 Network Attack and Defence Technology - 2025/09 Wei Chuen Yau
2025 - 2026

This course discusses common network attacks and defence technologies. It covers in-depth methodologies, techniques, and tools to identify vulnerabilities, exploit, and assess security risk to networks, systems, and applications. Various defence strategies and mechanisms for mitigating the security attacks are covered as well. Completion of this course will help the students to learn about methodologies and hands-on practices of conducting penetration tests. Students will also learn to identify existing solutions for security protections.

Course image CYS304 Network Traffic Monitoring and Analysis 2025/09 Wei Chuen Yau
2025 - 2026

This course focuses on modern techniques and tools for collecting and analyzing network traffic workloads as traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. The students will mainly learn to examine the process of collecting and organizing network data, utilize various tools for traffic analysis, and an exposition to the graphing techniques will be given in order to cover the gap between the security specialists and the graphing specialists. 

Course image CYS401 Final Year Project 2025/09 Wei Chuen Yau
2025 - 2026

This course requires the students to produce a Final Year Project.  The supervisor will guide the student under his or her supervision in the process of completing the final year project. The students shall log their research activities accordingly and consult their respective supervisor regularly.  The students are expected to be independent in completing their final year project at the end of the course.  

Course image CYS308 Cryptanalysis 2025/09 YoongKK
2025 - 2026

Cryptanalysis is an essential part of cryptology. It is the study of analyzing crypto-systems to understand how they work and to determine any weaknesses in cryptographic algorithms that may leak information. This course focuses on basic mathematics involving cryptanalysis, basic theory and history of cryptanalysis, and typical cryptanalysis techniques for classical cryptography, symmetric cryptography, and public-key cryptography. Through the teaching and practice of this course, students will have a deeper understanding of the principles of some attack techniques that are commonly used for the security analysis. It lays the foundation of basic knowledge and implementation experience for students to engage in research and engineering related to cryptography and network security in the future.