School of Computing and Technology

OVERVIEW

Rationale for the Programme

The programme provides academic opportunities and experiential learning to undergraduate students to acquire knowledge, leadership, team building skills and attitudes to function as IT and business managers. It exposes graduates to global and ethical issues in IT and Management. The programme meets the demand for higher academic training at the undergraduate level for the Management and IT industry.

KEY CONTENTS OF THE PROGRAMME
COURSES OFFERED INCLUDE:
  • Principles of Programming
  • Discrete Mathematics
  • Data Communications & Computer Networks
  • Financial Accounting I
  • Financial Accounting II
  • Microeconomics
  • Object Oriented Program. With Java
  • Macroeconomics
  • Programming in C++
  • Business Intelligence Systems
  • Computer Applications
  • Business Mathematics and Statistics I
  • Business Mathematics and Statistics II
  • Business Law I
  • Business Law II
  • Principles of Business Finance
  • Research Methods
  • Business Economics
  • Principles of Marketing
  • Systems Analysis and Design
  • Cost and Management Accounting
  • Fundamentals of Entrepreneurship
  • Website Design Techniques
  • Developing Database Systems with MYSQL
  • Database Management Systems
  • Mobile Application Entrepreneurship
  • Object-Oriented Programming (Visual Basic. NET)
  • Advanced Database Development with Oracle
  • Professional Ethics & Legal Issues in ICT
  • Strategic Management
  • E-Commerce
  • Knowledge-Based Information Systems
  • Big Data and Analytics
  • Project Work
  • Organisational Behaviour
  • Operations Management
  • Human Resource Management
  • Project Management
  • Cloud Computing
  • Information Security and IT Governance
ELIGIBILITY

WASSCE & SSSCE:

Candidates must have six credits (A1-C6) in English, Mathematics and Integrated Science (Biology or Agricultural Science for Nigerian applicants) or Social Studies, and three elective subjects, making an aggregate of no more than 36. For SSSCE, candidates must have six credits (A-D) in the three Core Subjects and three electives, making an aggregate of no more than 24.

Mature Students

Candidates must be at least 25 years old and must write and pass an entrance examination in English, Mathematics, IT, and General Business. They may also be required to attend an interview.

Others:

Applicants with GCE, ICGSE, GBCE, ABCE, Baccalaureate, Professional Courses (ICA, ACCA, CIM, etc), and HND, among others may contact us for levels of placement.

 

Local and International Fee Payment Options

Benefits

  • Health insurance actuaries
  • Life insurance actuaries
  • Property and casualty insurance actuaries
  • Pension and retirement benefits actuaries Enterprise risk actuaries
  • Property and casualty insurance actuaries
  • Pension and retirement benefits actuaries Enterprise risk actuaries
  • Risk analyst or consultant,
  • Insurance underwriter,
  • Finance,
  • Management,
  • Statistician,
  • Education,
  • Application Analyst Managers,
  • Cyber Security Analyst Managers,
  • Data Analyst Managers,
  • Data Scientist Managers,
  • Database Administration managers,
  • Information Systems Manager,
  • IT consultant,
  • IT Technical Support Managers,
  • Applications Development Managers,
  • Network Engineers,
  • IT Sales Professional
OVERVIEW

The Bachelor of Science in Management & Computer Studies programme provides graduates with knowledge, skills and competencies to analyse and solve problems across various business and IT functions within an organisation. Students learn through a variety of methods including lectures and discussion, case studies, small group work, simulations, field work and mini projects.

Study Options

  • Regular
  • Evening
  • Weekend

Courses offered include

  • Programming with Java
  • Systems Analysis and Design
  • Human Resource Management
  • Company Law
  • Practical Accounting Software

Career Options

  • Information Systems Manager
  • Database Administrator
  • Programmer/Software Engineer
  • Systems Analyst/Engineer
  • IT Systems Support Officer
  • Network Administrator
  • Business Intelligence Officer
  • Games Designer
ELIGIBILITY

WASSCE & SSSCE:

Candidates must have six credits (A1-C6) in English, Mathematics and Integrated Science (Biology or Agricultural Science for Nigerian applicants) or Social Studies, and three elective subjects, making an aggregate of no more than 36. For SSSCE, candidates must have six credits (A-D) in the three Core Subjects and three electives, making an aggregate of no more than 24.

Mature Students

Candidates must be at least 25 years old and must write and pass an entrance examination in English, Mathematics, IT, and General Business. They may also be required to attend an interview.

Others:

Applicants with GCE, ICGSE, GBCE, ABCE, Baccalaureate, Professional Courses (ICA, ACCA, CIM, etc), and HND, among others may contact us for levels of placement.

 

Local and International Fee Payment Options

OVERVIEW

The Bachelor of Science Information Technology degree provides graduates with the knowledge, skills and competencies they need to analyse and solve problems across all systems and IT functions within an organisation.Students learn through a variety of methods including lectures and discussion, case studies, small group work, simulations, field work and mini projects.

Study Options

  • Regular
  • Evening
  • Weekend

Career Options

  • IT consultant.
  • Cloud architect.
  • Computer forensic investigator.
  • Health IT specialist.
  • Mobile application developer.
  • Web developer.
  • Software engineer.

Courses Offered Include:

  • Programming (including C++, Java etc.)
  • Website Design and Development.
  • Systems Analysis and Design.
  • Networking and Data Communication
ELIGIBILITY

WASSCE & SSSCE:

Candidates must have six credits (A1-C6) in English, Mathematics and Integrated Science (Biology or Agricultural Science for Nigerian applicants) or Social Studies, and three elective subjects, making an aggregate of no more than 36. For SSSCE, candidates must have six credits (A-D) in the three Core Subjects and three electives, making an aggregate of no more than 24.

Mature Students

Candidates must be at least 25 years old and must write and pass an entrance examination in English, Mathematics, IT, and General Business. They may also be required to attend an interview.

Others:

Applicants with GCE, ICGSE, GBCE, ABCE, Baccalaureate, Professional Courses (ICA, ACCA, CIM, etc), and HND, among others may contact us for levels of placement.

 

Local and International Fee Payment Options

 

Benefits

  • Analytical and broadened scope of thinking
  • You have the most sought after skills in the world
  • You can solve global problems with IT
  • You will earn good money. People with IT degrees often earn more than the average income earner globally
  • Your skills are always in demand
 
Employment Prospects
  • Application Analyst Managers,
  • Applications Development Managers,
  • Business Intelligence Officer
  • Cyber Security Analyst Managers,
  • Data Analyst Managers,
  • Data Scientist Managers,
  • Database Administration managers,
  • Games Designer
  • Information Systems Manager
  • IT Consultant,
  • IT Sales Professional,
  • IT Systems Support Officer
  • IT Technical Support Managers,
  • Network Administrators
  • Network Engineers,
  • Programmers
  • Software Engineers
  • Systems Analysts
  • Systems Engineers

Graduates can be found in a wide variety of organisations, including:

  • Investment and Retail Banks;
  • Consultancy Firms;
  • Corporates;
  • Regulatory Authorities;
  • Government Institutions.
OVERVIEW

The Bachelor of Science in Cybersecurity degree equips graduates with the critical knowledge, technical skills, and strategic thinking required to protect information systems and combat cyber threats. Students gain hands-on experience through a mix of lectures, case studies, simulations, group projects, fieldwork, and mini-projects, preparing them to handle cybersecurity challenges across various industries and IT environments.

Study Options

  • Regular
  • Evening
  • Weekend

Career Options

  • Cybersecurity Analyst

  • Information Security Consultant

  • Network Security Engineer

  • Ethical Hacker / Penetration Tester

  • Security Software Developer

  • IT Auditor

  • Security Operations Centre (SOC) Analyst

Courses Offered Include:

  • Cybersecurity Fundamentals

  • Ethical Hacking and Penetration Testing

  • Network and Systems Security

  • Digital Forensics

  • Cryptography

  • Programming (including Python, C++, Java)

  • Systems Analysis and Design

  • Cloud Security

  • Website and Application Security

ELIGIBILITY

WASSCE & SSSCE:

Candidates must have six credits (A1-C6) in English, Mathematics and Integrated Science (Biology or Agricultural Science for Nigerian applicants) or Social Studies, and three elective subjects, making an aggregate of no more than 36. For SSSCE, candidates must have six credits (A-D) in the three Core Subjects and three electives, making an aggregate of no more than 24.

Mature Students

Candidates must be at least 25 years old and must write and pass an entrance examination in English, Mathematics, IT, and General Business. They may also be required to attend an interview.

Others:

Applicants with GCE, ICGSE, GBCE, ABCE, Baccalaureate, Professional Courses (ICA, ACCA, CIM, etc), and HND, among others may contact us for levels of placement.

 

Local and International Fee Payment Options

 

Benefits

  • Develop strong analytical and problem-solving skills

  • Gain globally in-demand cybersecurity expertise

  • Help organizations protect critical information systems

  • Competitive earning potential in a high-growth field

  • Continuous career opportunities across industries

 
Employment Prospects
  • Cybersecurity Analyst Managers

  • Information Security Managers

  • Penetration Testers

  • Incident Response Specialists

  • IT Security Consultants

  • Risk and Compliance Officers

  • Network Security Engineers

  • SOC Analysts

  • Data Privacy Officers

  • Security Architects

  •  
Graduates can be found in a wide variety of organisations, including:
  • Banks and Financial Institutions

  • Cybersecurity Firms

  • Government and Regulatory Bodies

  • Technology Companies

  • Healthcare Institutions

  • Telecommunications Companies

  • Multinational Corporations

OVERVIEW

The Bachelor of Science Artificial Intelligence and Robotics degree provides graduates with the knowledge, skills, and competencies they need to design, develop, and deploy intelligent systems and robotic solutions across various industries. Students learn through a variety of methods, including lectures, discussions, case studies, small-group work, simulations, fieldwork, and mini-projects.

Study Options

  • Regular
  • Evening
  • Weekend

Career Options

  • AI/Machine Learning Engineer
  • Robotics Engineer
  • Data Scientist
  • Software Developer
  • Automation Specialist
  • Research Scientist (AI/Robotics)
  • Intelligent Systems Developer

Courses Offered Include:

  • Programming (including Python, C++, Java, etc.)
  • Machine Learning and Deep Learning
  • Robotics Engineering
  • Artificial Intelligence Systems
  • Computer Vision and Image Processing
  • Systems Analysis and Design
  • Data Structures and Algorithms
ELIGIBILITY

WASSCE & SSSCE:

Candidates must have six credits (A1-C6) in English, Mathematics and Integrated Science (Biology or Agricultural Science for Nigerian applicants) or Social Studies, and three elective subjects, making an aggregate of no more than 36. For SSSCE, candidates must have six credits (A-D) in the three Core Subjects and three electives, making an aggregate of no more than 24.

Mature Students

Candidates must be at least 25 years old and must write and pass an entrance examination in English, Mathematics, IT, and General Business. They may also be required to attend an interview.

Others:

Applicants with GCE, ICGSE, GBCE, ABCE, Baccalaureate, Professional Courses (ICA, ACCA, CIM, etc), and HND, among others may contact us for levels of placement.

 

Local and International Fee Payment Options

 

Benefits

  • Analytical and broadened scope of thinking
  • You have the most sought-after skills in the world
  • You can solve global problems using intelligent technologies
  • You will earn good money. AI professionals are among the highest-paid globally
  • Your skills are in high demand across multiple industries
 
Employment Prospects
  • AI Engineers
  • Robotics Engineers
  • Machine Learning Specialists
  • Data Scientists
  • Automation Engineers
  • Software Developers
  • Intelligent Systems Analysts
  • Computer Vision Specialists
  • Research Scientists
  • IT Consultants
  • Technical Support Managers
  • Systems Engineers
  • Application Developers
  • Algorithm Engineers
Graduates can be found in a wide variety of organisations, including:
  • Tech Companies

  • Research Institutions

  • Manufacturing & Industrial Automation Firms

  • Healthcare and Biotech Companies

  • Financial Institutions

  • Robotics and Automation Startups

  • Government and Regulatory Agencies

Why Choose Wisconsin SCOT
  1. Hands-On Teaching And Learning
  2. World Class Cybersecurity And Digital Forensic Lab
  3. Artificial Intelligence, Internet Of Things And Robotic Lab
  4. Certified By Cyber Security Authority
  5. Certified By Data Protection Agency
  6. Certified Lecturers And Instructors
  7. EC-Council Certified Training Centre
  8. Project Base Teaching And Learning
Exclusive Laboratory Facilities
  1. Cellebrite forensic detective kits
  2. Oxygen forensic detective kits
  3. ⁠Tableau Forensic Imager TX1 & TX4
  4. Digital Microscopes
  5. Ultra Block Forensic Card Readers
  6. Faraday Black Box
  7. Faraday Bags
  8. ⁠3D printer
  9. Artificial Intelligence Devices
  10. Meta Quest Virtual Reality Devices
  11. ⁠FRED Digital Forensic System

Executive Summary: Ghana's Foremost Digital Forensic Hub

The WIUC Digital Forensic Laboratory is Ghana’s only academic-based, state-of-the-art digital forensic lab. It is equipped to support critical national security initiatives, aid financial institutions in combating cyber fraud, empower law enforcement and financial institutions with cutting-edge investigative tools and resources and provide unparalleled cyber security service.

 

Our laboratory houses a comprehensive suite of world-class tools and capabilities spanning the entire spectrum of digital forensic disciplines. This includes advanced mobile and computer device extraction and analysis, rapid incident response, in-depth malware analysis, rigorous vulnerability assessment and penetration testing.

Core Capabilities and Tool Categorisation

The WIUC Digital Forensic Laboratory categorises its extensive expertise and advanced tools into six distinct, yet interconnected, core domains. This structured approach ensures a comprehensive and systematic capability for addressing diverse digital forensic challenges across various sectors.

Computer and Device Forensics

In-depth investigations and analysis of traditional and modern computing systems.

Mobile, IoT, and Cloud Forensics

Specialised extraction and analysis from modern connected devices and remote data.

Network Forensics & Threat Intelligence

Vulnerability assessment, Incident response, proactive and reactive analysis of network activities and cyber threats.

Multimedia and Email Forensics

Authentication, analysis and enhancement of digital media and communication records.

Password Recovery and Malware Analysis

Decryption of any encrypted data, devices and reverse engineering of malicious software.

Intelligence & CDR Analysis

Strategic data interpretation for suspect tracking and crime pattern identification.

1. Computer and Device Forensics

Our laboratory provides advanced capabilities for forensic imaging and exhaustive investigation of a wide array of computing devices. This includes laptops, desktop computers, USB drives, Solid State Drives (SSDs), and various other storage media. We ensure meticulous evidence preservation, precise data recovery from damaged or deleted sources, and detailed timeline analysis to reconstruct events.

Premium and advanced key tools deployed in this domain include FTK Enterprise, Magnet AXIOM, for comprehensive software-based analysis. For hardware-level imaging, we utilize highly specialized equipment such as TX1 Imager and TD4 Duplicator, ensuring data integrity at the acquisition stage. Additionally, UFS Explorer Pro Recovery 10.11.1 and Arsenal Image Mounter support complex data recovery and mounting operations, while CyberTriage facilitates rapid triage and initial assessment of compromised systems.

2. Mobile, IoT, and Cloud Forensics

The WIUC Digital Forensic Laboratory possesses cutting-edge capabilities for the extraction, decryption, and in-depth analysis of digital evidence from a diverse range of modern devices and platforms. This includes smartphones, a variety of Internet of Things (IoT) devices, and cloud-based accounts. Furthermore, our expertise extends to highly specialised areas such as drone and airplane black box data recovery.

We are adept at analyzing data from all encrypted devices as well as recovering and analyzing deleted data that is often crucial in investigations. Our extensive toolkit comprises industry-leading solutions such as Cellebrite UFED and Cellebrite Inseyet for mobile device decryption and extraction, Oxygen Forensic Suite and MoBILedit Forensic Express for comprehensive analysis. USB Detective provides insights into USB device usage, while the Cloud Forensics module in AXIOM enables investigation of cloud-stored data. For live device isolation, we utilise Faraday BlackBox, and Camera Ballistics assists in authenticating digital imagery.

3. Network Forensics & Threat Intelligence

Our expertise in Network Forensics and Threat Intelligence allows for the capture, meticulous inspection, and comprehensive analysis of network traffic and incident footprints. This capability is critical for identifying malicious activities, understanding attack vectors, and reconstructing cyber incidents.

We conduct sophisticated internal threat hunting exercises and thorough compromise assessments to uncover hidden threats within an organisation’s network infrastructure. Our team is equipped to provide immediate and effective support for incident response during advanced persistent threats (APTs) or significant financial breaches, helping organisations mitigate damage and restore operations. Key tools in this domain include Net Analysis for deep packet inspection, CyberTriage for rapid incident assessment, and Metasploit Pro for controlled active testing and vulnerability exploitation simulations. For field operations and rapid response, we deploy FRED SR units, ensuring on-site forensic capabilities.

4. Multimedia and Email Forensics

The laboratory specialises in the authentication, enhancement, and detailed analysis of multimedia evidence and email communications. Our capabilities extend to improving the clarity of surveillance footage and digital images, often crucial for identification and evidence presentation. We also perform meticulous extraction and validation of metadata embedded within videos, audios, images, and emails, which can provide critical contextual information regarding their origin, creation, and modification history.

Our advanced toolkit for multimedia forensics includes Amped Replay, Amped Authenticate, and Amped DVRConv, which are industry standards for video and image analysis and conversion. For audio evidence, we utilise Diamond Cut Audio Forensics to enhance and authenticate recordings. Email investigations are supported by Metaspike Email Forensic Collector for comprehensive data acquisition, and Passware Kit Forensic is employed for the decryption of password-protected attachments, ensuring no piece of potential evidence remains inaccessible.

5. Password Recovery and Malware Analysis

The WIUC Digital Forensic Laboratory categorises its extensive expertise and advanced tools into six distinct, yet interconnected, core domains. This structured approach ensures a comprehensive and systematic capability for addressing diverse digital forensic challenges across various sectors.

Password Recovery

We possess the capability to perform advanced decryption techniques and brute-force attacks on encrypted evidence, allowing access to protected data that is vital for investigations. This includes recovering passwords from various file systems, encrypted containers, and applications.

The primary tool for this intensive process is Cellebrite and Passware Kit Forensics, renowned for its speed and effectiveness in cracking complex encryptions and recovering passwords from a wide range of sources, ensuring that no digital barrier impedes justice.

Malware Analysis

Our experts conduct comprehensive reverse engineering of malicious software discovered in compromised systems. This analysis helps in understanding the malware’s functionality, its propagation methods, and its impact on the system, which is crucial for developing effective countermeasures.

Tools like Metasploit Pro are used for simulating attack scenarios, CyberTriage for initial malware triage and identifying suspicious activities, and both Magnet AXIOM and FTK are instrumental for hashing, behavioural analysis, and deep-dive investigations into malware characteristics, helping us to trace its origins and identify its objectives.

Why Collaborate with WIUC Digital Forensic Laboratory?

The WIUC Digital Forensic Laboratory offers an unparalleled partnership opportunity, providing a secure, reliable, and advanced resource for combating cybercrime, cyber threats and enhancing cybersecurity posture. Our unique position as Ghana’s sole academic-based, state-of-the-art facility ensures a trusted and impartial service provider.

Secure Forensic Processing

Ensure secure and confidential forensic processing of sensitive insider threat cases and complex financial cybercrime incidents, adhering to strict chain-of-custody protocols.

Rapid Response Capabilities

Benefit from our real-time, rapid response capabilities for immediate fraud and data breach investigations, minimising potential financial losses and reputational damage.

Joint Training & Workshops

Engage in collaborative training programmes and workshops tailored for internal cybersecurity teams, fostering knowledge transfer and skill enhancement in digital forensics.

Trusted Analysis Partner

Partner with a trusted analysis entity that guarantees full data confidentiality and strict non-disclosure, ensuring the highest level of security for all sensitive financial information and investigations.

Our Partners