Diploma in Cybersecurity & Digital Forensics (N94)

Why CSF?

  • Be the first to explore and specialise in AI for Cybersecurity or Cloud Security 
  • Get a head start with internships of up to one year at renowned organisations
  • Learn in an industry-driven curriculum that is specially curated with leading industry partners such as EC-Council, CompTIA, Cisco Systems, Palo Alto Networks, RSA, Group-IB, Darktrace and Red Hat
  • Boost your portfolio with up to 8 industry recognised certifications such as Security+, Certified Ethical Hacker, Computer Hacking Forensic Investigator, Cisco Certified Network Associate and Certified Cloud Security Engineer

About CSF

You are a digital warrior raring to join the fight against cybercrime. Play a crucial role in helping companies to keep their data, networks and systems safe with the Diploma in Cybersecurity & Digital Forensics (CSF).

With our broad-based curriculum, you will be equipped with a strong foundation in core CSF competencies. Build on those skillsets with a choice of electives that will give you an edge when you pursue further studies or a career in the sector. 

Gain in-demand CSF skills that every organisation will need. You will be trained in core skills such as Windows & Linux server security, cybersecurity operations & threat intelligence, network security, digital forensics, malware analysis, ethical hacking, and web application pen-testing – practical skills that can be applied across diverse industries. Stay updated with exposure to the latest technologies that will keep you relevant at the forefront of the cybercrime battle.

Get groomed for a career in the future economy with specialisations in AI for Cybersecurity or Cloud Security. With the AI for Cybersecurity specialisation, you will get in-depth training in Machine & Deep Learning Applications for Cybersecurity, and AI Tools & Techniques for Cybersecurity. Deepen your cloud computing competencies with the Cloud Security specialisation, which features electives on Cloud Security Tools & Techniques and Cloud Native Security. 

Or you could choose the General Track to learn the latest and emerging skills such as mobile and web applications development, data science, blockchain, quantum computing, mobile forensics, and secure software development, among many others.
With options of either a six-month or one-year internship at leading organisations such as CSA, CSIT, A*STAR, DSTA, Singtel, PwC, Ensign, Oracle, NTT, and ST Engineering rangi, you will be well-placed to embark on your cybersecurity career. 

In addition, you can pursue industry-recognised certifications, such as Security+, Certified Ethical Hacker, Computer Hacking Forensic Investigator, Cisco Certified Network Associate, Certified Cloud Security Engineer, Certified SOC Analyst, Red Hat Certified System Administrator and Certified Engineer, AWS Certified Cloud Practitioner, and Palo Alto Networks Certified Network Security Administrator.

CSF’s experiential learning pedagogy means that you will be immersed in realistic cybersecurity settings that simulate the industry environment. As part of your learning journey, you will get trained to use industry-recognised platforms and tools such as Cisco’s Networking Academy, EC-Council’s CodeRed & CyberQ, EnCase, Cellebrite, RSA’s Archer Suite, and many more. You can work with our partners on real-world projects such as bug hunting, penetration testing, cyber threat intelligence, and attend masterclasses by cybersecurity professionals. You will also have opportunities to compete in Capture the Flag competitions to sharpen your cybersecurity skills.

Inspiring Portfolio

Winning at WorldSkills Singapore

CSF students Jason Chua and Lim Kai Xian clinched the gold medal in Cyber Security at WorldSkills Singapore (WSS) 2021. They put their skills to the test in digital forensic investigations, malware analysis, and secure IT system and network configurations. As the winners of WSS, they represented Singapore in the Cyber Security team event at the WorldSkills Competition 2022.

WorldSkills Champions

Further Studies

You can receive advanced standing when you apply for related degree programmes at universities both locally and abroad. These include: 

Singapore 

  • National University of Singapore 
  • Nanyang Technological University 
  • Singapore Institute of Technology 
  • Singapore Management University 
  • Singapore University of Technology and Design 

Australia 

  • University of New South Wales 
  • Monash University United States 
  • Johns Hopkins University 

You can also look forward to pursuing cybersecurity-related specialist diploma courses at local polytechnics.

Seh Xin Ru

Seh Xin Ru
Information Security & Forensics* graduate, Class of 2016

A Smart Nation Scholarship recipient, Xin Ru graduated with a Bachelor of Computing in Information Security from NUS

Taufiq Mohammed, Ngee Ann Poly Information Security & Forensics graduate

Taufiq Mohammed
Information Security & Forensics* graduate, Class of 2022

Taufiq received the Public Service Commission Scholarship (Engineering) to pursue Computer Science at NUS.

*Renamed the Diploma in Cybersecurity & Digital Forensics

Careers

There is a global shortage of IT cybersecurity professionals, and the Singapore Government has launched a masterplan to grow Singapore’s own pool of professionals to address this deficiency. With our course skills mapped to the ICT Skills Framework - Cybersecurity Track, you can look forward to pursuing a career in the following roles: 

  • Associate Security Analyst / Engineer 
  • Cyber Risk Analyst 
  • Forensic Investigator 
  • Security Engineer / Executive 
  • Security Operations Analyst
  • Vulnerability Assessment and Penetration Testing Analyst

Entry Requirements

AGGREGATE TYPE ELR2B2-C

To be eligible for consideration, candidates must have the following GCE ‘O’ Level examination (or equivalent) results.

Subject'O' Level Grade
English Language1-7
Mathematics (Elementary/Additional)1-6
Any two other subjects1-6

You must also have sat for one subject listed in the 2nd group of relevant subjects for the ELR2B2-C Aggregate Type listed here (  33KB). This subject will be used for ELR2B2-C aggregate computation.

For students with other qualifications, please refer to the NP website for the entry requirements and admissions exercise period.

Candidates with severe vision deficiency should not apply for the course.

What You Will Learn

Programming I (5 Credit Units) 

This module introduces the fundamentals of programming and how to develop programs using appropriate problem-solving techniques in a modular style. In this practice-oriented module, students are taught how to apply problem-solving skills using a top-down structured programming methodology and given ample practice in translating solutions into computer programs, then test and debug the programs. Topics include data types, variables, expressions, statements, selection structures, loops, simple computation and algorithms, functions and the use of libraries. Students will also practise the use of pseudocode, best practices of programming, debugging techniques with the help of tools, development of test cases, and suitable program documentation. In addition, they will study various areas where application software plays a prominent part in helping organisations solve problems. Students will be given ample opportunity for independent and self-directed learning.  

 
Cyber Security Fundamentals (2 Credit Units) 

This module provides an overview of the various domains of cyber security. It helps develop an understanding of the importance of cyber security in today’s digital world. It aims to provide an appreciation of cyber security from an end-to-end perspective. It covers fundamental security concepts, tools and techniques in domains such as data, end-user, software, system, network, physical, organization, and digital forensics. It also helps develop knowledge and skills in identifying common cyber threats and vulnerabilities, and to apply techniques to tackle these issues.  

Data Science Fundamentals (2 Credit Units) 

This module provides an overview of Data Science, its importance in the world of data and how it affects the competitiveness of organizations. Learners will learn about the different areas within Data Science and the core pillars essential to practise in the area. Students will also be introduced to Design Thinking. Indicative topics include Introduction to Data Science, Big Data and Analytical Design Thinking. 

Design Principles (2 Credit Units) 

This module introduces students to basic elements and principles of design. Students will practice visual communication and self-branding through aesthetic use of line, shape, form, color, texture, typography, scale, contrast, rhythm and balance. Students will be trained in the usage of digital design tools and application of modern industrial practices to communicate the concepts, designs and solutions.  

Computing Mathematics (4 Credit Units) 

This module introduces the basic concepts of relations and functions, matrices and methods of statistics and their applications relevant to IT professionals. 

The main emphasis in this module is to develop students’ ability in solving quantitative problems in computing mathematics, probability and statistics. Topics covered include fundamentals of statistics and probability, discrete and continuous probability distributions. 

Fundamentals for IT Professionals I (2 Credit Units) 

This module provides a broad introduction to the field of ICT by exploring the roles, professional practice, ethical expectations and career development paths of IT professionals. Through a guided inculcation of interpersonal and teamwork skills with strong team bonding spirit, the module aims to deepen students’ commitment to the sector that the course prepares them for. In addition, students will be required to begin charting their career path in the ICT industry by considering crucial aspects such as personal preferences and aptitude, job roles and responsibilities, skills needed and further education.  

Health & Wellness^ (1 Credit Unit) 

Innovation Made Possible^ (3 Credit Units)


Programming II (4 Credit Units) 

This module builds upon the knowledge and skills acquired in Programming 1 (PRG1). It aims to provide opportunities for the students to develop medium-scale applications based on a different programming paradigm from procedural programming that students learnt in Programming I, such as Object-Oriented (OO) Programming, to allow students gain exposure to different approaches and techniques in programming. The main concepts of the programming paradigm and the development of applications with it will be taught in this module. A high-level programming language suitable to demonstrate the programming approach will be used. 

The module may also cover the concept of Abstract Data Types (ADTs) and the implementation of selected ADTs. Use of advanced ADTs especially related to data structures, may be covered. The module may also highlight fundamental system design concepts and artifacts such as class diagrams, to reinforce the understanding of the programming paradigm and to also introduce software design concepts to students, to demonstrate the relationship between software design and development. Then, the module may introduce the use of Application Protocol Interface (API) when required. 

Cryptography (4 Credit Units)  

This module covers the essential concepts of Cryptography, including Public Key Infrastructure (PKI), Digital Signature and Certificate, and the various encryption/decryption algorithms. Students will understand how Symmetric and Asymmetric (Public-Key) cryptographic techniques are used to support different security implementations, and the encryption/decryption algorithms used in these techniques. The role of Certificate Authority, how the digital certificates are generated, managed, and distributed will also be covered in detail. 

Networking Infrastructure (4 Credit Units) 

This module covers basic Local Area Networks (LAN) and Wide Area Networks (WAN) infrastructure including physical cabling system used for an enterprise network, and how hardware platforms such as switches, routers and wireless devices are deployed in typical networks. The module also introduces students to the major networking protocols such as Ethernet, routing protocols such as static routing, RIP and OSPF. Students will learn to configure switches and routers and will be taught the techniques to configure and troubleshoot LANs and WANs. 

Windows & Linux Server Security (4 Credit Units) 

This module teaches students fundamentals of Windows and Linux operating systems. It aims to teach students the application of Windows and Linux knowledge in a practical and useful manner. Students learn how to administer, configure, upgrade, and maintain Windows and Linux servers. Students also learn tools and concepts needed to efficiently build and manage a production Windows and Linux infrastructure. Students will learn about different deployment roles of Windows and Linux Servers, such as Active Directory, Domain Controller, Web Server, Email Server, DNS Server, and File Server. Techniques on server hardening and to create users, groups and define security group policies are also taught in this module. 

Client-Side Scripting (2 Credit Units)  

This module teaches skills such as HTML, CSS, and JavaScript, required to develop responsive websites and web applications. The skills acquired will help students to better understand client-side web application attacks, a prelude to developing secure web applications and web application pen testing, which are covered in the subsequent modules in this course. 

Web Application Pen-Testing (4 Credit Units) 

This module provides a thorough understanding of major web application vulnerabilities and their potential impact on people and organisations. The module teaches a repeatable web pen-testing methodology, which includes reconnaissance, mapping, discovery, and exploitation of web application vulnerabilities and flaws. Students are taught how to write a web application pen-test report. 

The module teaches students the pen-tester’s perspective of web applications. It trains students on building a profile of the machines that host the target web application and come up with a map of the web application's pages and features. Students are also trained in web application attack tools and interception proxies that are used to discover and exploit key web application vulnerabilities. 

Ethical Hacking (4 Credit Units) 

This module aims to develop Penetration Testers for the information security industry. They will be taught to follow a process model to locate and establish targets, find vulnerabilities, exploit the flaws to determine potential impact and business risk with the goal of helping the owner improve security practices. Students will learn the techniques intruders use to hack a system, and the steps to secure it. Students will have hands-on practice on actual pen-testing that involves reconnaissance to map out IT infrastructure, scanning vulnerable systems, and developing attack vectors to exploit loopholes in a system. Students will also be taught the necessary countermeasures to mitigate risks of exploitation though system hardening, intrusion detection and prevention. 

Network Security (4 Credit Units) 

This module provides an in-depth knowledge on network security in a defensive view. It covers various types of firewall technologies, Virtual Private Networks (VPNs), and Intrusion Detection/Prevention Systems (IDS/IPS). Students will have a chance to configure and deploy state-of-the-art networking devices in a typical computer network. Students will be taught skills to identify the internal and external threats against a network and to propose appropriate security policies that will protect an organization’s information. Students will also learn how to implement successful security policies and firewall strategies in this module. 

Malware Analysis Tools & Techniques (4 Credit Units) 

This module teaches a repeatable malware analysis methodology, which includes static analysis, code analysis, and behavioural analysis. Students are taught how to write a malware analysis report on a target malware. Students will be able to determine the malware’s indicators of compromise needed to perform incident response triage. 

This module trains students to efficiently use network and system monitoring tools to examine how malware interacts with the file system, registry, network, and other processes in an OS environment. Students are also trained to decrypt and analyse malicious script components of web pages, identify and examine the behaviour of malicious documents, and apply memory forensics techniques to analyse complex malware and rootkit infections. 

Fundamentals for IT Professionals II (2 Credit Units) 

This module gives a course-based experience in which students can engage with the local community and industry. This includes participation in community service events or in Service-Learning projects that leverages on students' discipline knowledge and skills to meet identified needs. Through iterative and guided reflection on the service experience, students gain a broader appreciation of their discipline and an enhanced sense of personal voice, empathy, and civic responsibility. Industry talks and seminars are organised to keep students up-to-date on emerging trends so as to build up their interpersonal, team and networking skills with the community and industry. 

Communication Essentials^ (3 Credit Units)

 

Digital Forensics (4 Credit Units) 

This module which encompasses industry led activities, gives an insight into the process of forensics investigation. It covers the various types of computer related crimes, techniques of gathering electronic evidence, and the recovery of deleted, damaged or encrypted data. Students will also make use of advanced forensic tools to perform forensic investigation. Besides the tools and techniques of investigation, students will be taught sound forensic investigation methodology and the proper handling of evidence. The module will also cover aspects of law and policies applicable to digital forensics.

Cybersecurity Operations & Threat Intelligence (4 Credit Units) 

The Cybersecurity Operations module covers the fundamentals of Security Operations Centre (SOC) operations and Threat Intelligence Life Cycle. Students will learn log management and correlation; Security information and event management (SIEM) deployment; cyber incident detection; and incident response; and various cyber threats and threat actors. Additionally, students will learn to manage various SOC processes, procedures, technologies, and workflows; monitor and analyse logs and alerts from a variety of different technologies across multiple platforms (IDS/IPS, end-point protection, servers, and workstations); develop threat cases (correlation rules), and create reports: plan, organize, and perform threat monitoring and analysis; and escalate incidents to appropriate teams for additional assistance. Students will also learn about threat intelligence data collection, acquisition, management, analysis, and creation of threat intelligence reports. 

Cyber Governance, Risk, & Compliance (4 Credit Units) 

This module examines the relevant frameworks to ensure that information assets are protected within an organization. It includes the processes and policies for administering and managing a company’s IT systems that follow the compliance framework. Concepts on risk management process, risk analysis and mitigation will also be introduced. Students will learn to evaluate risks against the company’s critical assets and deploy safeguards to mitigate them. Control frameworks such as PCI (Payment Card Industry), ISO 17799/27002, and COBIT will be covered. 

Fundamentals for IT Professionals III (2 Credit Units) 

This module provides a steppingstone to the students in their IT career. Students are given an insight into the infocomm industries and are kept updated with the latest skill sets required in their IT career path. They also have the opportunity to be exposed to various institutes of higher learning to further acquire their skill sets. 

Elective Module 1# (4 Credit Units) 


 

Internship (20 Credit Units) 
- Offered to only those embarking on One-Year Internship. 

This module provides students with the opportunity to apply the knowledge and skills gained from the various modules in the course to the development of an IT solution to solve a practical problem. Students may undertake a real-life IT project in an organisation that may include problem definition, requirements analysis, design, development and testing, delivery and presentation of the solution. Through the project, students will learn and appreciate the project planning and control issues relating to IT project development. 

The following modules are offered to only those not taking Internship at Level 3.1
 
  • Elective Module 2# (4 Credit Units)
  • Elective Module 3# (4 Credit Units)
  • Elective Module 4# (4 Credit Units)
  • Elective Module 5# (4 Credit Units)
  • Project ID: Connecting the Dots (IS)^ (4 Credit Units) 

 

Internship (20 Credit Units) 
- Offered to only those on Six-Months Internship

This module provides students with the opportunity to apply the knowledge and skills gained from the various modules in the course to the development of an IT solution to solve a practical problem. Students may undertake a real-life IT project in an organisation that may include problem definition, requirements analysis, design, development and testing, delivery, and presentation of the solution. Through the project, students will learn and appreciate the project planning and control issues relating to IT project development. 

Internship II (16 Credit Units) 
- Offered to only those who successfully completed Internship module in Level 3.1 

This module allows the student to extend their internship and undergo additional IT-related on-the-job training in a real-life working environment. In the process, the student will experience working as part of a team and may be exposed to various aspects of project planning, development, testing and delivery. In addition, students will deepen their understanding of certain IT technologies, which may include (but are not limited to) cloud computing, advanced programming, mobile or web development, DevOps processes, data analytics, enterprise systems, Internet of Things, games design and development, information security or artificial intelligence. 

Project ID: Connecting the Dots (IS)^ (4 Credit Units) 
- Offered to only those taking Internship II 



Elective Modules


Specialization in AI for Cybersecurity 


Machine & Deep Learning Applications for Cybersecurity (4 Credit Units) 

This module teaches students machine learning and deep learning algorithms and their applications for cybersecurity. Students will learn how to effectively use machine learning and deep learning to detect and mitigate various cyber threats and attacks.  

AI Tools & Techniques for Cybersecurity (4 Credit Units) 

This module trains students on various cybersecurity related AI tools & techniques used by the industry. Students will learn how to setup, configure, train, execute, operate, and manage these AI tools & techniques to harden security, detect cyber-attacks, respond to cyber incidents, and restore normal operations.   

Emerging AI Trends in Cybersecurity (4 Credit Units)  

This module is designed to help students keep abreast of the latest AI developments in cybersecurity, to stay current and relevant in the fast-moving industry. To achieve this objective, the syllabus for this module will be guided by AI research and feedback from industry partners, and both seminar-style and hands-on workshop teaching approaches may be adopted depending on the nature of the topic covered. 


Specialization in Cloud Security 

Cloud Architecture and Technologies (4 Credit Units) 

This module gives insight into the key concepts and technologies of cloud computing which include cloud characteristics, service models (SaaS, PaaS, and IaaS), deployment models (Public cloud, Private cloud, Community cloud, and Hybrid cloud), and the features of cloud computing technologies. It also covers the cloud computing architecture, emerging trends and issues such as clouds for mobile applications, cloud portability and interoperability, scalability, manageability, and service delivery in terms of design and implementation issues. The module discusses the benefits and challenges of cloud computing, standards of cloud computing service delivery, and Service Level Agreement (SLAs) for cloud services. Hands-on activities are included to expose students to various cloud computing services offered by major cloud computing providers such as Amazon Web Services (AWS), Google App Engine (GAE), and Microsoft Windows Azure. 

Cloud Security Tools & Techniques (4 Credit Units) 

The Cloud Security module focuses on cloud security practices, technologies, frameworks, and principles. It covers topics such as cloud platform security, identity and access management, various cloud security controls, cloud data protection, penetration testing, incident handling, forensics investigation, and business continuity and disaster recovery in the cloud. 

Cloud Native Architecture Security (4 Credit Units) 

The Cloud Native Architecture module covers topics such as the transformative development of cloud security practices, embedding security into the DevOps process, the basics of cloud native architecture, cloud application lifecycle management, cloud networking and security, cluster Maintenance, and logging / monitoring of cloud applications. Students will also learn about the essential skills of managing containerized applications across multiple hosts in a dynamically scheduled, microservices-oriented cloud native environment. 


General Track 

Capstone Project (8 Credit Units) 

In this module, students are required to complete a substantial project that is the culmination of their education in the School of InfoComm Technology. The project can be a real-world problem proposed by a client, or it can be proposed by the student in pursuit of their personal interests. 

Internship II (16 Credit Units) 

This module allows the student to extend their internship and undergo additional IT-related on-the-job training in a real-life working environment. In the process, the student will experience working as part of a team and may be exposed to various aspects of project planning, development, testing and delivery. In addition, students will deepen their understanding of certain IT technologies, which may include (but are not limited to) cloud computing, advanced programming, mobile or web development, DevOps processes, data analytics, enterprise systems, Internet of Things, games design and development, information security or artificial intelligence. 

Mobile Device Security & Forensics (4 Credit Units) 

This module covers techniques and tools in the context of a forensic methodology to extract and utilise digital evidence on mobile devices. Students will learn how to use current forensic tools to preserve, acquire & examine data stored in a mobile device. The module covers basic SIM Card examination and cell phone forensics on multiple platforms such as iPhone, Android & Windows Mobile. The module takes a practice-oriented approach to performing forensics investigation on mobile phones. This module carries a co-requisite: Digital Forensics. 

Secure Software Development (4 Credit Units) 

This module provides students with the knowledge of the secure software development lifecycle. It trains students to incorporate security throughout the entire process of software development. With the knowledge gained from this module, students would be able to design, code, test and deploy software with a security mindset. 

The module begins with training students on how to identify, gather and record security requirements for a software. Students will learn secure software design, where various security frameworks, considerations and methodologies are taught. Students will understand how software vulnerabilities can be exploited and how to address the risks. Students are trained to write secure code that is resilient against critical web application attacks. Finally, students are trained in secure software testing and how to securely deploy software. 

Blockchain (4 Credit Units) 

This module will introduce students to block-chain concepts and how these are being applied using industry use cases. Students will also have hands on experience to create transactions on a block-chain to better understand the underlying concepts. Students will get a chance to develop to build their own Smart Contracts to be executed on the block-chain. 

Data Structures and Algorithms (4 Credit Units) 

This module focuses on coverage of fundamental data structures and algorithms and their implementations within the conceptual framework of abstract data types. The module also allows students to apply their implementations in developing related applications to solve real-world problems. The relationship between algorithms and programming will be emphasized, and an introduction will be given on basic performance measures and analysis about space and time complexity for software problems. 

Applied Analytics (4 Credit Units) 

This module provides students with an introduction to unsupervised machine learning methods such as Clustering. Students are taught how these methods are used to segment customers for targeted cross-sell, up-sell and pricing. The module also introduces students to supervised machine learning methods such as Decision Trees and how these methods are used to predict customer churn, credit risk etc. 

Open-source tools like R and/or Python will be used for data analysis and modeling. Students will also be exposed to enterprise analytics tools for interactive data visualization and data wrangling. Data from various domains (Retail, Banking & Finance, Telcos etc) will be used to provide students with an introduction to domain-specific analytics. 

Data Discovery & Visualisation (4 Credit Units) 

This module discusses the principles and techniques for creating effective visualisations based on graphic design and perceptual psychology. Using widely adopted tools and analytical programming, learners will apply these principles and techniques to create rich visualisations for analysis and presentation. Indicative topics include Principles of Visualization, Dashboard Design Techniques and Designing for an Audience. 

Emerging Trends in IT (4 Credit Units) 

The revolution in computing and communications has spurred the rapid advancement of IT in modern societies, and there is little to suggest that its proliferation will slow down in the near future. In the light of this trend, this module is designed to help students keep abreast of the latest IT developments to stay current and relevant in the fast-moving industry. To achieve this objective, the syllabus for this module will be guided by technology research and feedback from industry partners, and both seminar-style and hands-on workshop teaching approaches may be adopted depending on the nature of the topic covered. 

Back-End Development (4 Credit Units) 

This module provides students with the fundamental knowledge and skills required in back-end development. It will also cover the integration of back-end system with databases, possibly external systems as well as consuming data from web application protocol interfaces (APIs). The module will first cover the infrastructure of a web application, often supported by a back-end system, before diving into details of the basic back-end component of a web application. Students will also be introduced to different possible implementations of back-end systems, such as microservices, focusing on different components of the system. Towards the end of the module, it may also introduce to the students how their knowledge in back-end development can be applied in applications with various front-end interfaces; this allows students to flexibly apply their back-end development concepts and skills learnt in developing back-end systems of various uses. 

Students will be exposed to usage of suitable languages, tools and frameworks that will enable them to learn back-end development in practice. They will also learn how to make use of source code version control systems such as GIT or CCA to develop their applications effectively and efficiently. 

Mobile Applications Development (4 Credit Units) 

This module builds upon the programming skills and knowledge that students have acquired from the course to date, to develop software solutions on mobile platforms. It will explore the recent developments in mobile technologies and operating systems and focus on the development of applications on these emerging mobile operating systems. The module presents the techniques for mobile app development, covering mobile app architecture as well as key factors to consider, to develop effective accessible mobile software solutions. The students will have the opportunity to apply their knowledge and skills in practice to develop mobile applications in domain areas of their interest, such as entertainment, games, and healthcare. 

Infocomm Sales & Marketing Strategies (4 Credit Units) 

This module will introduce students to the concept of market segmentation and the development of sales and marketing strategies for each segment. They will acquire an understanding of industry and customer segmentation from corporate, small and medium businesses to consumers. They will also delve into the different go-to-market strategies and selling techniques required in the context of ICT (such as consultative selling, major account selling and management, territory selling and management, partner management and consumer marketing). 

Quantum Computing (4 Credit Units) 

This module introduces quantum computing. It first covers the fundamental concepts and infrastructure of quantum computing such as quantum bit (qubit), qubit gates, quantum states and operators. Various well-known algorithms for quantum computing will be introduced, such as superdense coding, oracle algorithms (Bernstein–Vazirani algorithm, Deutsch–Jozsa’s algorithm), Quantum Fourier Transform, Shor’s factorization algorithm and Grover’s algorithm. The module may also discuss issues around quantum error correction and challenges of quantum computation,  

Students may be able to gain better appreciation of the knowledge learnt through hands-on exercises running quantum algorithms and simulations. 

 

Video Showcase