{"id":15280,"date":"2025-11-18T12:10:43","date_gmt":"2025-11-18T12:10:43","guid":{"rendered":"https:\/\/wellspringuniversity.edu.ng\/?page_id=15280"},"modified":"2025-11-18T13:47:40","modified_gmt":"2025-11-18T13:47:40","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/wellspringuniversity.edu.ng\/index.php\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15280\" class=\"elementor elementor-15280\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-676b31c elementor-section-boxed elementor-section-height-default elementor-section-height-default qodef-elementor-content-no\" data-id=\"676b31c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-f05d739\" data-id=\"f05d739\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fb486ad elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"fb486ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t<p class=\"qodef-m-subtitle\" style=\"margin-bottom: 8px\">Defend the Digital World<\/p>\n\t\t<h3 class=\"qodef-m-title\" >\n\t\t\t\t\tCyber Security\t\t\t<\/h3>\n\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e75c9b8 elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"e75c9b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t\t\t<p class=\"qodef-m-text\" style=\"margin-top: 15px;font-size: 21px;line-height: 30px;color: #6D6D6D\">In today&#039;s interconnected society, the demand for skilled Cyber Security professionals is at an all-time high. The B.Sc. Cyber Security programme at Wellspring University, housed within the College of Science and Computing, is meticulously designed to equip you with the advanced technical knowledge and practical skills needed to become a key player in protecting digital assets from evolving cyber threats.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0193b5 elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"f0193b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t<p class=\"qodef-m-subtitle\" style=\"margin-bottom: 8px\">Join Us<\/p>\n\t\t\t<p class=\"qodef-m-text\" style=\"margin-top: 15px;font-size: 21px;line-height: 30px;color: #6D6D6D\">Join us to learn how to defend critical information systems and embark on a rewarding career at the forefront of digital defense.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2e857a elementor-widget elementor-widget-image\" data-id=\"d2e857a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"992\" height=\"497\" src=\"https:\/\/wellspringuniversity.edu.ng\/wp-content\/uploads\/2025\/11\/cyber-security-1.webp\" class=\"attachment-large size-large wp-image-15319\" alt=\"\" srcset=\"https:\/\/wellspringuniversity.edu.ng\/wp-content\/uploads\/2025\/11\/cyber-security-1.webp 992w, https:\/\/wellspringuniversity.edu.ng\/wp-content\/uploads\/2025\/11\/cyber-security-1-300x150.webp 300w, https:\/\/wellspringuniversity.edu.ng\/wp-content\/uploads\/2025\/11\/cyber-security-1-768x385.webp 768w\" sizes=\"(max-width: 992px) 100vw, 992px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f730f17 elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"f730f17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t\t<h5 class=\"qodef-m-title\" >\n\t\t\t\t\t\ud83d\ude80 Programme Overview\t\t\t<\/h5>\n\t\t<p class=\"qodef-m-text\" style=\"margin-top: 15px;font-size: 21px;line-height: 30px;color: #6D6D6D\">Our four-year, full-time undergraduate programme provides a robust and practical foundation in all aspects of cybersecurity. You will not only learn the theoretical concepts but also gain hands-on experience in securing computer systems, networks, and data.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-544ec8d elementor-widget elementor-widget-text-editor\" data-id=\"544ec8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5><b>Key Highlights:<\/b><\/h5><ul><li data-path-to-node=\"7,0,0\"><b><span style=\"color: #800000;\">Duration<\/span>:<\/b> <b>4 Years<\/b> (Full-Time)<\/li><li data-path-to-node=\"7,0,0\"><b><span style=\"color: #800000;\">Department<\/span>:<\/b> Cyber Security (under the College of Science and Computing)<\/li><li data-path-to-node=\"7,0,0\"><b><span style=\"color: #800000;\">Focus<\/span>:<\/b> Blends foundational computer science knowledge with specialized courses in cybersecurity, digital forensics, and network security.<\/li><li data-path-to-node=\"7,0,0\"><b><span style=\"color: #800000;\">Practical Learning<\/span>:<\/b> Emphasis on hands-on experience, ethical hacking, and real-world problem-solving.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26ed967 elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"26ed967\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t\t<h5 class=\"qodef-m-title\" >\n\t\t\t\t\t\ud83c\udfaf What You Will Learn\t\t\t<\/h5>\n\t\t<p class=\"qodef-m-text\" style=\"margin-top: 15px;font-size: 21px;line-height: 30px;color: #6D6D6D\">The curriculum is structured to provide comprehensive expertise, covering the full spectrum of cyber defense and security architecture.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ae4dab elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"1ae4dab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t<p class=\"qodef-m-subtitle\" style=\"margin-bottom: 8px\">Network Security:<\/p>\n\t\t<h5 class=\"qodef-m-title\" >\n\t\t\t\t\tCore Areas of Study:\t\t\t<\/h5>\n\t\t<p class=\"qodef-m-text\" style=\"margin-top: 15px;font-size: 21px;line-height: 30px;color: #6D6D6D\">Securing computer networks, understanding network protocols, and implementing firewalls and intrusion detection systems.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf939f6 elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"bf939f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t<p class=\"qodef-m-subtitle\" style=\"margin-bottom: 8px\">Cyber Crime and Digital Forensics:<\/p>\n\t\t\t<p class=\"qodef-m-text\" style=\"margin-top: 15px;font-size: 21px;line-height: 30px;color: #6D6D6D\">Investigating cyber crimes, collecting digital evidence, and understanding cyber law and countermeasures.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90d062b elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"90d062b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t<p class=\"qodef-m-subtitle\" style=\"margin-bottom: 8px\">Cryptography:<\/p>\n\t\t\t<p class=\"qodef-m-text\" style=\"margin-top: 15px;font-size: 21px;line-height: 30px;color: #6D6D6D\">Mastering cryptographic techniques for data encryption, authentication, and secure communication.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38aaf90 elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"38aaf90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t<p class=\"qodef-m-subtitle\" style=\"margin-bottom: 8px\">Systems &amp; Application Security: <\/p>\n\t\t\t<p class=\"qodef-m-text\" style=\"margin-top: 15px;font-size: 21px;line-height: 30px;color: #6D6D6D\">Developing secure applications and protecting operating systems from vulnerabilities and exploits.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a03819e elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"a03819e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t<p class=\"qodef-m-subtitle\" style=\"margin-bottom: 8px\">Vulnerability Assessment:<\/p>\n\t\t\t<p class=\"qodef-m-text\" style=\"margin-top: 15px;font-size: 21px;line-height: 30px;color: #6D6D6D\">Learning techniques for penetration testing, identifying system weaknesses, and applying corrective measures.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b451a9b elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"b451a9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t<p class=\"qodef-m-subtitle\" style=\"margin-bottom: 8px\">Information Security Governance and Risk Management: <\/p>\n\t\t\t<p class=\"qodef-m-text\" style=\"margin-top: 15px;font-size: 21px;line-height: 30px;color: #6D6D6D\">Understanding the legal, ethical, and policy frameworks for managing information security risks in an enterprise environment.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aee3566 elementor-widget elementor-widget-valiance_core_button\" data-id=\"aee3566\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a class=\"qodef-shortcode qodef-m  qodef-button qodef-layout--filled  qodef-html--link\" href=\"https:\/\/applications.wellspringuniversity.app\/home\" target=\"_self\"  style=\"background-color: #0002BF\">\n\t<span class=\"qodef-m-text\">Apply Now<\/span>\n\t<span class=\"qodef-m-icon-arrow-wrapper\">\n\t\t<span class=\"qodef-m-icon-arrow qodef-m-icon-arrow1\"><svg  xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26\" height=\"7\" viewBox=\"0 0 26 7\"><g transform=\"translate(-708.5 -168)\"><line x1=\"20\" transform=\"translate(708.5 171.5)\" fill=\"none\" stroke=\"#fff\" stroke-width=\"1\"\/><path d=\"M3.5,0,7,6H0Z\" transform=\"translate(734.5 168) rotate(90)\" fill=\"#fff\"\/><\/g><\/svg><\/span>\n\t\t<span class=\"qodef-m-icon-arrow qodef-m-icon-arrow2\"><svg  xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26\" height=\"7\" viewBox=\"0 0 26 7\"><g transform=\"translate(-708.5 -168)\"><line x1=\"20\" transform=\"translate(708.5 171.5)\" fill=\"none\" stroke=\"#fff\" stroke-width=\"1\"\/><path d=\"M3.5,0,7,6H0Z\" transform=\"translate(734.5 168) rotate(90)\" fill=\"#fff\"\/><\/g><\/svg><\/span>\n\t<\/span>\n<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d81f291 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d81f291\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e538d3 elementor-widget elementor-widget-image\" data-id=\"2e538d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/wellspringuniversity.edu.ng\/wp-content\/uploads\/2025\/11\/Gemini_Generated_Image_elgbo0elgbo0elgb-1024x585.png\" class=\"attachment-large size-large wp-image-15321\" alt=\"\" srcset=\"https:\/\/wellspringuniversity.edu.ng\/wp-content\/uploads\/2025\/11\/Gemini_Generated_Image_elgbo0elgbo0elgb-1024x585.png 1024w, https:\/\/wellspringuniversity.edu.ng\/wp-content\/uploads\/2025\/11\/Gemini_Generated_Image_elgbo0elgbo0elgb-300x171.png 300w, https:\/\/wellspringuniversity.edu.ng\/wp-content\/uploads\/2025\/11\/Gemini_Generated_Image_elgbo0elgbo0elgb-768x439.png 768w, https:\/\/wellspringuniversity.edu.ng\/wp-content\/uploads\/2025\/11\/Gemini_Generated_Image_elgbo0elgbo0elgb.png 1344w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0a0158 elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"c0a0158\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t\t<h3 class=\"qodef-m-title\" >\n\t\t\t\t\t\ud83d\udcbc Career Opportunities\t\t\t<\/h3>\n\t\t<p class=\"qodef-m-text\" style=\"margin-top: 15px;font-size: 21px;line-height: 30px;color: #6D6D6D\">A B.Sc. in Cyber Security from Wellspring University opens doors to high-demand, high-growth careers in various sectors, including government, finance, technology, and corporate security.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-759e134 elementor-widget elementor-widget-text-editor\" data-id=\"759e134\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><b>Potential Career Paths Include:<\/b><\/h4><ul><li data-path-to-node=\"17,0,0\"><b>Cyber Security Analyst<\/b><\/li><li data-path-to-node=\"17,0,0\"><b>Information Security Officer<\/b><\/li><li data-path-to-node=\"17,0,0\"><b>Security Architect<\/b><\/li><li data-path-to-node=\"17,0,0\"><b>Penetration Tester (Ethical Hacker)<\/b><\/li><li data-path-to-node=\"17,0,0\"><b>Digital Forensics Examiner<\/b><\/li><li data-path-to-node=\"17,0,0\"><b>Security Consultant<\/b><\/li><li data-path-to-node=\"17,0,0\"><b>Cyber Threat Intelligence Analyst<\/b><\/li><\/ul><p data-path-to-node=\"18\"><span style=\"color: #993300;\">Graduates of the College of Science and Computing are also inducted into the <b>Computer Professionals Registration Council of Nigeria (CPN)<\/b>, enhancing your professional standing.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b186057 elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"b186057\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t\t<h5 class=\"qodef-m-title\" >\n\t\t\t\t\t\ud83d\udcdd Admission Requirements\t\t\t<\/h5>\n\t\t<p class=\"qodef-m-text\" style=\"margin-top: 15px;font-size: 21px;line-height: 30px;color: #6D6D6D\">We welcome bright, focused, and science-inclined candidates who are ready to take on the challenge of securing the digital future.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96070e9 elementor-widget elementor-widget-valiance_core_button\" data-id=\"96070e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a class=\"qodef-shortcode qodef-m  qodef-button qodef-layout--filled  qodef-html--link\" href=\"https:\/\/applications.wellspringuniversity.app\/home\" target=\"_self\"  style=\"background-color: #0002BF\">\n\t<span class=\"qodef-m-text\">Apply Now<\/span>\n\t<span class=\"qodef-m-icon-arrow-wrapper\">\n\t\t<span class=\"qodef-m-icon-arrow qodef-m-icon-arrow1\"><svg  xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26\" height=\"7\" viewBox=\"0 0 26 7\"><g transform=\"translate(-708.5 -168)\"><line x1=\"20\" transform=\"translate(708.5 171.5)\" fill=\"none\" stroke=\"#fff\" stroke-width=\"1\"\/><path d=\"M3.5,0,7,6H0Z\" transform=\"translate(734.5 168) rotate(90)\" fill=\"#fff\"\/><\/g><\/svg><\/span>\n\t\t<span class=\"qodef-m-icon-arrow qodef-m-icon-arrow2\"><svg  xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26\" height=\"7\" viewBox=\"0 0 26 7\"><g transform=\"translate(-708.5 -168)\"><line x1=\"20\" transform=\"translate(708.5 171.5)\" fill=\"none\" stroke=\"#fff\" stroke-width=\"1\"\/><path d=\"M3.5,0,7,6H0Z\" transform=\"translate(734.5 168) rotate(90)\" fill=\"#fff\"\/><\/g><\/svg><\/span>\n\t<\/span>\n<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26e6739 elementor-widget elementor-widget-text-editor\" data-id=\"26e6739\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5><span style=\"color: #800000;\"><b>1. Unified Tertiary Matriculation Examination (UTME) Entry<\/b><\/span><\/h5><p data-path-to-node=\"23\">Candidates seeking admission into the 100-Level must satisfy the following:<\/p><ul><li data-path-to-node=\"24,0,0\"><b>O&#8217; Level Subjects:<\/b> A minimum of <b>five (5) credit passes<\/b> in not more than <b>two sittings<\/b> in the Senior Secondary School Certificate Examination (SSCE) or its equivalent (WAEC, NECO, NABTEB). These subjects <b>must<\/b> include:<ul><li data-path-to-node=\"24,0,0\"><b>English Language<\/b><\/li><li data-path-to-node=\"24,0,0\"><b>Mathematics<\/b><\/li><li data-path-to-node=\"24,0,0\"><b>Physics<\/b><\/li><li data-path-to-node=\"24,0,0\"><b>Chemistry<\/b><\/li><\/ul><\/li><li data-path-to-node=\"24,0,0\"><b>One other subject<\/b> from Biology, Agricultural Science, Economics, Geography, Computer Studies, or Further Mathematics.<\/li><li data-path-to-node=\"24,0,0\"><b>UTME Subject Combination:<\/b> English Language, Mathematics, Physics, and Chemistry.<\/li><li data-path-to-node=\"24,0,0\"><b>UTME Score:<\/b> An acceptable score in the latest UTME.<\/li><\/ul><h5><span style=\"color: #800000;\"><b>2. Direct Entry (DE) Admission<\/b><\/span><\/h5><p data-path-to-node=\"26\">Candidates with the following qualifications may be admitted into the 200-Level:<\/p><ul><li data-path-to-node=\"27,0,0\"><b>A&#8217; Level\/IJMB\/JUPEB:<\/b> A minimum of <b>two Advanced Level passes<\/b> in relevant science subjects, including <b>Mathematics<\/b> and any other science subject, in addition to the O&#8217;Level requirements.<\/li><li data-path-to-node=\"27,0,0\"><b>National Diploma (ND):<\/b> An <b>Upper Credit<\/b> pass in a relevant discipline such as Computer Science, Computer Engineering, or Software Engineering from a recognized institution, in addition to the O&#8217;Level requirements.<\/li><li data-path-to-node=\"27,0,0\"><b>Nigeria Certificate in Education (NCE):<\/b> A Credit pass in Computer Science\/Mathematics or Computer Science\/Physics, in addition to the O&#8217;Level requirements.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffed4f7 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ffed4f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d4701c elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"1d4701c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t<p class=\"qodef-m-subtitle\" style=\"margin-bottom: 8px\">Cyber Security<\/p>\n\t\t<h3 class=\"qodef-m-title\" >\n\t\t\t\t\t\ud83d\udcb0 Programme Fees (Approximate Annual Tuition)\t\t\t<\/h3>\n\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ed35ab elementor-widget elementor-widget-text-editor\" data-id=\"6ed35ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"30\">For the 2025\/2026 academic session, the estimated annual tuition fees for the B.Sc. Cyber Security programme are:<\/p><div class=\"horizontal-scroll-wrapper\"><div class=\"table-block-component\"><div class=\"table-block has-export-button\"><div class=\"table-content not-end-of-paragraph\" data-hveid=\"0\" data-ved=\"0CAAQ3ecQahgKEwiXtbKjofuQAxUAAAAAHQAAAAAQ-QE\"><table data-path-to-node=\"31\"><thead><tr><td><strong>Level<\/strong><\/td><td><strong>Annual Tuition Fee (\u20a6)<\/strong><\/td><\/tr><\/thead><tbody><tr><td data-path-to-node=\"31,1,0,0\">100-Level<\/td><td data-path-to-node=\"31,1,1,0\">641,000<\/td><\/tr><tr><td data-path-to-node=\"31,2,0,0\">200-Level<\/td><td data-path-to-node=\"31,2,1,0\">641,000<\/td><\/tr><tr><td data-path-to-node=\"31,3,0,0\">300-Level<\/td><td data-path-to-node=\"31,3,1,0\">607,500<\/td><\/tr><tr><td data-path-to-node=\"31,4,0,0\">400-Level<\/td><td data-path-to-node=\"31,4,1,0\">607,500<\/td><\/tr><\/tbody><\/table><br \/><p data-path-to-node=\"32,0,0\"><i>Please note that these figures are approximate and based on the 2025\/2026 fee schedule. They do not include other charges such as Acceptance Fees, Hostel Accommodation, Laboratory Fees, or other miscellaneous charges.<br \/><br \/><\/i><a href=\"https:\/\/wellspringuniversity.edu.ng\/index.php\/tuition-and-fees\/\"><span style=\"color: #800000;\"><strong>Kindly click on the Tuition and Fees link for details<\/strong><\/span><\/a><\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a61897 elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"4a61897\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t<p class=\"qodef-m-subtitle\" style=\"margin-bottom: 8px\">Apply Today<\/p>\n\t\t\t<p class=\"qodef-m-text\" style=\"margin-top: 15px;font-size: 21px;line-height: 30px;color: #6D6D6D\">Your journey to becoming a cyber defender starts here. If you are passionate about technology, problem-solving, and protecting valuable information, the B.Sc. Cyber Security programme at Wellspring University is your platform for success.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5684b80 elementor-widget elementor-widget-valiance_core_button\" data-id=\"5684b80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a class=\"qodef-shortcode qodef-m  qodef-button qodef-layout--filled  qodef-html--link\" href=\"https:\/\/applications.wellspringuniversity.app\/home\" target=\"_self\"  style=\"background-color: #0002BF\">\n\t<span class=\"qodef-m-text\">Apply Now<\/span>\n\t<span class=\"qodef-m-icon-arrow-wrapper\">\n\t\t<span class=\"qodef-m-icon-arrow qodef-m-icon-arrow1\"><svg  xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26\" height=\"7\" viewBox=\"0 0 26 7\"><g transform=\"translate(-708.5 -168)\"><line x1=\"20\" transform=\"translate(708.5 171.5)\" fill=\"none\" stroke=\"#fff\" stroke-width=\"1\"\/><path d=\"M3.5,0,7,6H0Z\" transform=\"translate(734.5 168) rotate(90)\" fill=\"#fff\"\/><\/g><\/svg><\/span>\n\t\t<span class=\"qodef-m-icon-arrow qodef-m-icon-arrow2\"><svg  xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26\" height=\"7\" viewBox=\"0 0 26 7\"><g transform=\"translate(-708.5 -168)\"><line x1=\"20\" transform=\"translate(708.5 171.5)\" fill=\"none\" stroke=\"#fff\" stroke-width=\"1\"\/><path d=\"M3.5,0,7,6H0Z\" transform=\"translate(734.5 168) rotate(90)\" fill=\"#fff\"\/><\/g><\/svg><\/span>\n\t<\/span>\n<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-720e60b elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"720e60b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-dfcd395\" data-id=\"dfcd395\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3356c9f elementor-widget elementor-widget-sidebar\" data-id=\"3356c9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"sidebar.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"widget widget_valiance_core_separator\" data-area=\"shop-sidebar\"><div class=\"qodef-shortcode qodef-m  qodef-separator clear \">\n\t<div class=\"qodef-m-line\" style=\"border-color: #ffffff;width: 0px;border-bottom-width: 0px;margin-top: 0px;margin-bottom: 15px\"><\/div>\n<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77cda21 elementor-widget elementor-widget-spacer\" data-id=\"77cda21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Defend the Digital World Cyber Security In today&#039;s interconnected society, the demand for skilled Cyber Security professionals is at an all-time high. The B.Sc. Cyber Security programme at Wellspring University, housed within the College of Science and Computing, is meticulously designed to equip you with the advanced technical knowledge and practical skills needed to become [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"footnotes":""},"class_list":["post-15280","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/wellspringuniversity.edu.ng\/index.php\/wp-json\/wp\/v2\/pages\/15280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wellspringuniversity.edu.ng\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wellspringuniversity.edu.ng\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wellspringuniversity.edu.ng\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wellspringuniversity.edu.ng\/index.php\/wp-json\/wp\/v2\/comments?post=15280"}],"version-history":[{"count":22,"href":"https:\/\/wellspringuniversity.edu.ng\/index.php\/wp-json\/wp\/v2\/pages\/15280\/revisions"}],"predecessor-version":[{"id":15343,"href":"https:\/\/wellspringuniversity.edu.ng\/index.php\/wp-json\/wp\/v2\/pages\/15280\/revisions\/15343"}],"wp:attachment":[{"href":"https:\/\/wellspringuniversity.edu.ng\/index.php\/wp-json\/wp\/v2\/media?parent=15280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}