{"id":8366,"date":"2025-07-02T15:21:59","date_gmt":"2025-07-02T13:21:59","guid":{"rendered":"https:\/\/lbc.ac.bw\/?page_id=8366"},"modified":"2025-07-02T15:36:33","modified_gmt":"2025-07-02T13:36:33","slug":"bsc-dfc","status":"publish","type":"page","link":"https:\/\/lbc.ac.bw\/?page_id=8366","title":{"rendered":"Bachelor of Science in Digital Forensics and Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"8366\" class=\"elementor elementor-8366\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-af6b936 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"af6b936\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-44020da\" data-id=\"44020da\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-703dc8a elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"703dc8a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3>In an era where digital systems are integral to nearly every facet of society, securing digital assets and investigating cybercrimes are critical to national security, economic resilience, and personal privacy. The Bachelor of Science in Digital Forensics and Cyber Security equips students with the technical expertise, ethical grounding, and investigative skills to become leaders in this high-demand, ever-evolving field. This programme aligns with national priorities in Botswana, supports regional development goals, and meets international standards in digital security and forensics.<\/h3>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-09a9259 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"09a9259\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-34583b8\" data-id=\"34583b8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-772f300 elementor-widget elementor-widget-heading\" data-id=\"772f300\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Purpose Of Programme<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-91ff861 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"91ff861\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a577a08\" data-id=\"a577a08\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e0e21ab elementor-widget elementor-widget-text-editor\" data-id=\"e0e21ab\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-8368 alignleft\" src=\"https:\/\/lbc.ac.bw\/wp-content\/uploads\/2025\/07\/3d-internet-secuirty-badge-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/lbc.ac.bw\/wp-content\/uploads\/2025\/07\/3d-internet-secuirty-badge-300x300.jpg 300w, https:\/\/lbc.ac.bw\/wp-content\/uploads\/2025\/07\/3d-internet-secuirty-badge-1024x1024.jpg 1024w, https:\/\/lbc.ac.bw\/wp-content\/uploads\/2025\/07\/3d-internet-secuirty-badge-150x150.jpg 150w, https:\/\/lbc.ac.bw\/wp-content\/uploads\/2025\/07\/3d-internet-secuirty-badge-768x768.jpg 768w, https:\/\/lbc.ac.bw\/wp-content\/uploads\/2025\/07\/3d-internet-secuirty-badge-1536x1536.jpg 1536w, https:\/\/lbc.ac.bw\/wp-content\/uploads\/2025\/07\/3d-internet-secuirty-badge-2048x2048.jpg 2048w, https:\/\/lbc.ac.bw\/wp-content\/uploads\/2025\/07\/3d-internet-secuirty-badge-947x947.jpg 947w, https:\/\/lbc.ac.bw\/wp-content\/uploads\/2025\/07\/3d-internet-secuirty-badge-624x624.jpg 624w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif;\">The BSc in Digital Forensics and Cyber Security is designed to prepare graduates with the <\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif;\">foundational knowledge and hands-on experience to secure, protect, and investigate digital\u00a0<\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif;\">systems. Students will develop competencies in computational thinking, programming, systems\u00a0<\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif;\">management, and the techniques necessary to detect, analyze, and respond to cyber threats\u00a0<\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif;\">and digital crimes.\u00a0<\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif;\">This programme also encourages innovation, critical thinking, and entrepreneurial mindsets to\u00a0<\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif;\">drive local tech advancements and contribute to Botswana\u2019s knowledge-based economy.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e8fc000 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e8fc000\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a0c6338\" data-id=\"a0c6338\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f104fec elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f104fec\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a79eeae\" data-id=\"a79eeae\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ab7b1de elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ab7b1de\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-826b8d7\" data-id=\"826b8d7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-260ce58 elementor-widget elementor-widget-heading\" data-id=\"260ce58\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Learning Outcomes<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f8027e elementor-widget elementor-widget-text-editor\" data-id=\"2f8027e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>By the end of the Course period learners should be able to:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9fca776\" data-id=\"9fca776\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bef9ac0 elementor-widget elementor-widget-text-editor\" data-id=\"bef9ac0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li><p>Apply international standards, legal frameworks, and ethical practices in the<br \/>acquisition, preservation, analysis, and presentation of digital evidence to ensure<br \/>compliance, data integrity, and admissibility in court.<\/p><\/li><li><p>Promote and implement secure information systems and cyber defense<br \/>mechanisms to support organizational resilience, regulatory compliance, and trust in<br \/>digital infrastructure across local, national, and global environments.<\/p><\/li><li><p>Utilize digital forensics tools and investigative methodologies to identify, extract,<br \/>document, and report on cyber incidents and breaches with a focus on maintaining the<br \/>integrity and chain of custody of digital evidence.<\/p><\/li><li><p>Design and deploy cyber security strategies and architectures that protect systems,<br \/>networks, and data from unauthorized access, exploitation, or compromise using risk-<br \/>based approaches and emerging technologies.<\/p><\/li><li><p>Conduct comprehensive cyber threat assessments and vulnerability analyses<br \/>using contemporary penetration testing and malware analysis tools in alignment with<br \/>recognized cyber security frameworks.<\/p><\/li><li><p>Leverage data analytics, AI, and machine learning methods to detect anomalies,<br \/>predict security threats, and inform decision-making in dynamic cyber environments.<\/p><\/li><li><p>Apply principles of secure software development and cryptography to create<br \/>applications and systems that uphold confidentiality, integrity, availability, and non-<br \/>repudiation.<\/p><\/li><li><p>Demonstrate professional communication, collaboration, and leadership skills in<br \/>multi-disciplinary and cross-functional teams addressing complex digital forensic and<br \/>cyber security challenges.<\/p><\/li><li><p>Engage in continuous professional development and research to remain current<br \/>with evolving cyber threats, forensic technologies, and global security policies.<\/p><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0a59834 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0a59834\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3eb7b28\" data-id=\"3eb7b28\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8490af6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8490af6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a27ffe3\" data-id=\"a27ffe3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34e4842 elementor-widget elementor-widget-heading\" data-id=\"34e4842\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Enrolment Criteria<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8f1efc4\" data-id=\"8f1efc4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-be61365 elementor-widget elementor-widget-heading\" data-id=\"be61365\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Normal Entry<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e02f015 elementor-widget elementor-widget-text-editor\" data-id=\"e02f015\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li><p>BGCSE or equivalent (Best 6 subjects, 36 points and above)<\/p><\/li><li><p>A pass in at least six (6) subjects in BGCSE or IGCSE or equivalent. These<br \/>subjects must include a minimum of pass in Mathematics and in English plus a<br \/>pass in one of following science subjects -Biology, Chemistry, Physics, Additional<br \/>Mathematics.<br \/>\u25a0 OVC \/ RAC \/ SEN (Best 6 subjects, 31 points and above)<br \/>\u25a0 NCQF Level 4 in TVET (in relevant certificate IV)<br \/>\u25a0 Discontinued OVC \/ RAC \/ SEN.<\/p><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc59e8a elementor-widget elementor-widget-heading\" data-id=\"bc59e8a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Mature Entry<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-168dda3 elementor-widget elementor-widget-text-editor\" data-id=\"168dda3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li>Mature Entry is provided for candidates who meet the necessary criteria.<\/li><li>Progression \/ Reinstatements students considered based on recognition of prior<br \/>learning (RPL).<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-152df06 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"152df06\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9fbecf5\" data-id=\"9fbecf5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-38498a1 elementor-widget elementor-widget-heading\" data-id=\"38498a1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Modules Covered<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-747d89f\" data-id=\"747d89f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cd2437d elementor-widget elementor-widget-accordion\" data-id=\"cd2437d\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2151\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2151\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Semester 1<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2151\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2151\"><ul><li>Computational Thinking 1<\/li><li>Writing and CommunicationStatistics<\/li><li>Introduction to Programming<\/li><li>Conceive, Launch and Grow Start-Ups<\/li><li>Operating Systems<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2152\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2152\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Semester 2<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2152\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2152\"><ul><li>Computational Thinking 2<\/li><li>Data Structures and Algorithms<\/li><li>Computer Architecture<\/li><li>Discrete Mathematics for Computer Science<\/li><li>Computer Networks<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2153\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2153\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Semester 3<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2153\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2153\"><ul><li>Cybersecurity and Digital Forensics Fundamentals<\/li><li>Calculus<\/li><li>Linux System Administration<\/li><li>Programming for Cyber Security (Python)<\/li><li>Databases and Business Databases<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2154\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-2154\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Semester 4<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2154\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-2154\"><ul><li>Cyber Psychology<\/li><li>Industrial Cryptography<\/li><li>Digital Forensics<\/li><li>Emerging Technologies<\/li><li>Research Methodology<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2155\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-2155\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Semester 5<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2155\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-2155\"><ul><li>Ethical Hacking and Investigation Techniques<\/li><li>Internet of Things Forensics<\/li><li>Practical Mobile Forensics (iOS, Android, Windows 10)<\/li><li>Multimedia Forensics<\/li><li>Network Security<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2156\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-2156\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Optional Modules Semester 5 (Choose 1)<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2156\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-2156\"><ul><li>Cloud Computing and Security<\/li><li>Distributed Systems and High-Performance Computing<\/li><li>Business and Entrepreneurship<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2157\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-2157\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Semester 6<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2157\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-2157\"><ul><li>Wireless and Mobile Security<\/li><li>Security by Design<\/li><li>Safe E-Services<\/li><li>AI: Search Methods for Problem Solving<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2158\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-2158\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Optional Modules Semester 6 (Choose 1)<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2158\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-2158\"><ul><li>Internet Programming<\/li><li>Mobile Forensics<\/li><li>Web Application Security<\/li><li>Network Security-Firewalls, IDS, and Counter Measures<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2159\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-2159\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Semester 7<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2159\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-2159\"><ul><li>Digital Investigations<\/li><li>Cloud Security and Forensics<\/li><li>Data Analytics<\/li><li>Individual Research Project in Cyber Security \/ Digital Forensics<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-21510\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-21510\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Semester 8<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-21510\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-21510\"><ul><li>Industrial Attachment (Internship)<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0591d62 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0591d62\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8df6329\" data-id=\"8df6329\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0f20733 elementor-widget elementor-widget-heading\" data-id=\"0f20733\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Career Pathways<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a76e393 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a76e393\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-411c2a4\" data-id=\"411c2a4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-303b3d4 elementor-widget elementor-widget-text-editor\" data-id=\"303b3d4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Graduates of this programme will be equipped to pursue careers in both the public and private sectors. Possible roles include:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-53fcb21 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53fcb21\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1b5b9a6\" data-id=\"1b5b9a6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b6401d9 elementor-widget elementor-widget-text-editor\" data-id=\"b6401d9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"col-md-6\"><ul class=\"list-features\"><li><p>Cyber Security Analyst<\/p><\/li><li><p>Digital Forensics Investigator<\/p><\/li><li><p>Information Security Officer<\/p><\/li><li><p>Penetration Tester (Ethical Hacker)<\/p><\/li><li><p>Security Systems Administrator<\/p><\/li><li><p>Incident Response Analyst<\/p><\/li><li><p>Network Security Engineer<\/p><\/li><li><p>IT Auditor<\/p><\/li><li>Data Protection and Compliance Officer<\/li><\/ul><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-90f3e1b\" data-id=\"90f3e1b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-60f7843 elementor-widget elementor-widget-text-editor\" data-id=\"60f7843\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Global Prospects:<\/strong><br \/>With cyber threats transcending borders, graduates are well-positioned for global careers. The international demand for cybersecurity professionals continues to grow, especially in financial services, law enforcement, intelligence, health care, and defence sectors.<\/p><p><strong>Local Context \u2013 Botswana:<\/strong><br \/>There is an increasing need for cyber resilience across government ministries, parastatals, banks, telecoms, and emerging startups. Graduates will contribute significantly to Botswana digital transformation agenda and Vision 2036 goals.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Post Graduate Diploma in Higher Education is designed to foster a scholarly and professional approach to university teaching, assessment and curriculum design. The PGDHE will provide lecturers with the opportunity to gain an accredited qualification that is comparable to those offered at top universities globally. It will contribute to enhancing the quality of teaching and learning in the university.<\/p>\n","protected":false},"author":2,"featured_media":6157,"parent":6602,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_joinchat":[],"footnotes":""},"class_list":["post-8366","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/lbc.ac.bw\/index.php?rest_route=\/wp\/v2\/pages\/8366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lbc.ac.bw\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lbc.ac.bw\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lbc.ac.bw\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/lbc.ac.bw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8366"}],"version-history":[{"count":7,"href":"https:\/\/lbc.ac.bw\/index.php?rest_route=\/wp\/v2\/pages\/8366\/revisions"}],"predecessor-version":[{"id":8374,"href":"https:\/\/lbc.ac.bw\/index.php?rest_route=\/wp\/v2\/pages\/8366\/revisions\/8374"}],"up":[{"embeddable":true,"href":"https:\/\/lbc.ac.bw\/index.php?rest_route=\/wp\/v2\/pages\/6602"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lbc.ac.bw\/index.php?rest_route=\/wp\/v2\/media\/6157"}],"wp:attachment":[{"href":"https:\/\/lbc.ac.bw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}