- 21 Oct, 2023
Centre for CyberSecurity and Mathematical Cryptology
we present to you the cybersecurity center with its students who were happy to be part of the program with their coordinator
Get the best post graduate programs and international certifications for Cybersecurity, cryptography and information communication without having to move abroad. You get the best of theoretical and practical knowledge in these fields that are enough to make you job ready and productive in any country in the world
See our programmesWe have regular events coming up
Studying cybersecurity offers a pathway to a fulfilling career, the ability to make a positive impact, and the opportunity to tackle the ever-evolving challenges of our digital world.
Learn once and apply everywhere. With a connected society, you will have all the information you need to be relevant anywhere in the world through your degrees and qualifications provided by us and backed by our globally recognized partners.
Our method is handson and purely focused in getting things done. You'll be learning how to explore vulnerabilities in systems, assessing system security and being able to act in case of hacks, theft and threats
Our courses are a state-of-the-art with international standars and approaches. Leaners will be exposed to content that is very valid and application in today's technological age
We have qualified tutors in the field and through our partnerships to ensure that we have the very best minds to transfer knowledge and teach all what it takes to be good in the field of cybersecurity and cryptography.
If you are looking for a life-changing experience that will equip you with the knowledge and skills you will need to meet the future with confidence, we are sure that you will find it in UBa. As a graduate or postgraduate student in UBa, you will study in modern surroundings that boast exceptionally well-equipped studios, workshops and facilities.
Visit our campusReverse Engineering, Penetration Testing, and Ethical Hacking are key practices in cybersecurity:
"Capture the Flag" (CTF) is a popular cybersecurity competition where participants solve challenges to find hidden "flags." These challenges test various skills, including cryptography, reverse engineering, web security, and network exploitation.
The "3 Pillars of Cybersecurity" emphasize the essential components needed to protect digital assets: People, Processes, and Technology. In the context of security tooling, this framework highlights the importance of equipping individuals
A practical session is an interactive learning experience where participants engage in hands-on activities to apply theoretical knowledge. It often involves real-world tasks, experiments, or simulations, allowing learners to develop practical skills
This conference aims to foster collaboration and innovation, providing a platform for the exchange of ideas that can drive meaningful change. Whether you are a researcher, a student, or a professional, this event promises to inspire and inform.
This discussion focuses on the intersection of digital transformation, cybersecurity, and the Sustainable Development Goals (SDGs), highlighting the vital role of women in STEM (Science, Technology, Engineering, and Mathematics).
Digital evidence refers to information and data of value to criminal investigations that is stored or transmitted in digital form. This includes anything from emails and text messages to data stored on computers, smartphones, and cloud services.
The 14th Matriculation Ceremony at the University of Bamenda marks a significant milestone for new students as they officially become part of the university community. This celebratory event includes formal speeches, cultural performances, and others...
Curabitur aliquet quam id dui posuere blandit. Praesent sapien massa, convallis a pellentesque nec, egestas non nisi. Donec rutrum congue leo eget malesuada. Pellentesque in ipsum id orci porta dapibus. Proin eget tortor risus. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Donec velit neque, auctor sit amet aliquam vel, ullamcorper sit amet ligula.
OverviewStay up to date with the latest info
we present to you the cybersecurity center with its students who were happy to be part of the program with their coordinator
The president of the national communication council said that they want content providers to be conscious of the fact that they are dealing with the public and that they have to moderate the information they send to social media
Google Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those circumstances where it is difficult to create an entire red teaming infrastructure. To use GRC, only a Gmail account is required
Copyright 2025 University of Bamenda