School of Computing and Technology | Wisconsin International University College, Ghana

School of Computing and Technology | Wisconsin International University College, Ghana
Skip to content
Staff Directory
&
Other Undergraduate Programs
BSC COMPUTING AND ACTUARIAL SCIENCE - (Accra and Kumasi)
OVERVIEW
Rationale for the Programme
The programme provides academic opportunities and experiential learning to undergraduate students to acquire knowledge, leadership, team building skills and attitudes to function as IT and business managers. It exposes graduates to global and ethical issues in IT and Management. The programme meets the demand for higher academic training at the undergraduate level for the Management and IT industry.
KEY CONTENTS OF THE PROGRAMME
COURSES OFFERED INCLUDE:
Principles of Programming
Discrete Mathematics
Data Communications & Computer Networks
Financial Accounting I
Financial Accounting II
Microeconomics
Object Oriented Program. With Java
Macroeconomics
Programming in C++
Business Intelligence Systems
Computer Applications
Business Mathematics and Statistics I
Business Mathematics and Statistics II
Business Law I
Business Law II
Principles of Business Finance
Research Methods
Business Economics
Principles of Marketing
Systems Analysis and Design
Cost and Management Accounting
Fundamentals of Entrepreneurship
Website Design Techniques
Developing Database Systems with MYSQL
Database Management Systems
Mobile Application Entrepreneurship
Object-Oriented Programming (Visual Basic. NET)
Advanced Database Development with Oracle
Professional Ethics & Legal Issues in ICT
Strategic Management
E-Commerce
Knowledge-Based Information Systems
Big Data and Analytics
Project Work
Organisational Behaviour
Operations Management
Human Resource Management
Project Management
Cloud Computing
Information Security and IT Governance
ELIGIBILITY
WASSCE & SSSCE:
Candidates must have six credits (A1-C6) in English, Mathematics and Integrated Science (Biology or Agricultural Science for Nigerian applicants) or Social Studies, and three elective subjects, making an aggregate of no more than 36. For SSSCE, candidates must have six credits (A-D) in the three Core Subjects and three electives, making an aggregate of no more than 24.
Mature Students
Candidates must be at least 25 years old and must write and pass an entrance examination in English, Mathematics, IT, and General Business. They may also be required to attend an interview.
Others:
Applicants with GCE, ICGSE, GBCE, ABCE, Baccalaureate, Professional Courses (ICA, ACCA, CIM, etc), and HND, among others may contact us for levels of placement.
Local and International Fee Payment Options
BSC. MANAGEMENT WITH INFORMATION TECHNOLOGY - (Accra and Kumasi)
OVERVIEW
The Bachelor of Science in Management with Information Technology programme provides graduates with knowledge, skills and competencies to analyse and solve problems across various business and IT functions within an organisation. Students learn through a variety of methods including lectures and discussion, case studies, small group work, simulations, field work and mini projects.
Study Options
Regular
Evening
Weekend
Courses offered include
Programming with Java
Systems Analysis and Design
Human Resource Management
Company Law
Practical Accounting Software
Career Options
Information Systems Manager
Database Administrator
Programmer/Software Engineer
Systems Analyst/Engineer
IT Systems Support Officer
Network Administrator
Business Intelligence Officer
Games Designer
ELIGIBILITY
WASSCE & SSSCE:
Candidates must have six credits (A1-C6) in English, Mathematics and Integrated Science (Biology or Agricultural Science for Nigerian applicants) or Social Studies, and three elective subjects, making an aggregate of no more than 36. For SSSCE, candidates must have six credits (A-D) in the three Core Subjects and three electives, making an aggregate of no more than 24.
Mature Students
Candidates must be at least 25 years old and must write and pass an entrance examination in English, Mathematics, IT, and General Business. They may also be required to attend an interview.
Others:
Applicants with GCE, ICGSE, GBCE, ABCE, Baccalaureate, Professional Courses (ICA, ACCA, CIM, etc), and HND, among others may contact us for levels of placement.
Local and International Fee Payment Options
BSC. INFORMATION TECHNOLOGY - (Accra and Kumasi)
OVERVIEW
The Bachelor of Science Information Technology degree provides graduates with the knowledge, skills and competencies they need to analyse and solve problems across all systems and IT functions within an organisation.Students learn through a variety of methods including lectures and discussion, case studies, small group work, simulations, field work and mini projects.
Study Options
Regular
Evening
Weekend
Career Options
IT consultant.
Cloud architect.
Computer forensic investigator.
Health IT specialist.
Mobile application developer.
Web developer.
Software engineer.
Courses Offered Include:
Programming (including C++, Java etc.)
Website Design and Development.
Systems Analysis and Design.
Networking and Data Communication
ELIGIBILITY
WASSCE & SSSCE:
Candidates must have six credits (A1-C6) in English, Mathematics and Integrated Science (Biology or Agricultural Science for Nigerian applicants) or Social Studies, and three elective subjects, making an aggregate of no more than 36. For SSSCE, candidates must have six credits (A-D) in the three Core Subjects and three electives, making an aggregate of no more than 24.
Mature Students
Candidates must be at least 25 years old and must write and pass an entrance examination in English, Mathematics, IT, and General Business. They may also be required to attend an interview.
Others:
Applicants with GCE, ICGSE, GBCE, ABCE, Baccalaureate, Professional Courses (ICA, ACCA, CIM, etc), and HND, among others may contact us for levels of placement.
Local and International Fee Payment Options
Benefits
Analytical and broadened scope of thinking
You have the most sought after skills in the world
You can solve global problems with IT
You will earn good money. People with IT degrees often earn more than the average income earner globally
Your skills are always in demand
Employment Prospects
Application Analyst Managers,
Applications Development Managers,
Business Intelligence Officer
Cyber Security Analyst Managers,
Data Analyst Managers,
Data Scientist Managers,
Database Administration managers,
Games Designer
Information Systems Manager
IT Consultant,
IT Sales Professional,
IT Systems Support Officer
IT Technical Support Managers,
Network Administrators
Network Engineers,
Programmers
Software Engineers
Systems Analysts
Systems Engineers
Graduates can be found in a wide variety of organisations, including:
Investment and Retail Banks;
Consultancy Firms;
Corporates;
Regulatory Authorities;
Government Institutions.
BSC. CYBERSECURITY - (Accra)
OVERVIEW
The
Bachelor of Science in Cybersecurity
degree equips graduates with the critical knowledge, technical skills, and strategic thinking required to protect information systems and combat cyber threats. Students gain hands-on experience through a mix of lectures, case studies, simulations, group projects, fieldwork, and mini-projects, preparing them to handle cybersecurity challenges across various industries and IT environments.
Study Options
Regular
Evening
Weekend
Career Options
Cybersecurity Analyst
Information Security Consultant
Network Security Engineer
Ethical Hacker / Penetration Tester
Security Software Developer
IT Auditor
Security Operations Centre (SOC) Analyst
Courses Offered Include:
Cybersecurity Fundamentals
Ethical Hacking and Penetration Testing
Network and Systems Security
Digital Forensics
Cryptography
Programming (including Python, C++, Java)
Systems Analysis and Design
Cloud Security
Website and Application Security
ELIGIBILITY
WASSCE & SSSCE:
Candidates must have six credits (A1-C6) in English, Mathematics and Integrated Science (Biology or Agricultural Science for Nigerian applicants) or Social Studies, and three elective subjects, making an aggregate of no more than 36. For SSSCE, candidates must have six credits (A-D) in the three Core Subjects and three electives, making an aggregate of no more than 24.
Mature Students
Candidates must be at least 25 years old and must write and pass an entrance examination in English, Mathematics, IT, and General Business. They may also be required to attend an interview.
Others:
Applicants with GCE, ICGSE, GBCE, ABCE, Baccalaureate, Professional Courses (ICA, ACCA, CIM, etc), and HND, among others may contact us for levels of placement.
Local and International Fee Payment Options
Benefits
Develop strong analytical and problem-solving skills
Gain globally in-demand cybersecurity expertise
Help organizations protect critical information systems
Competitive earning potential in a high-growth field
Continuous career opportunities across industries
Employment Prospects
Cybersecurity Analyst Managers
Information Security Managers
Penetration Testers
Incident Response Specialists
IT Security Consultants
Risk and Compliance Officers
Network Security Engineers
SOC Analysts
Data Privacy Officers
Security Architects
Graduates can be found in a wide variety of organisations, including:
Banks and Financial Institutions
Cybersecurity Firms
Government and Regulatory Bodies
Technology Companies
Healthcare Institutions
Telecommunications Companies
Multinational Corporations
BSC ARTIFICIAL INTELLIGENCE AND ROBOTICS- (Accra)
OVERVIEW
The
Bachelor of Science Artificial Intelligence and Robotics
degree provides graduates with the knowledge, skills, and competencies they need to design, develop, and deploy intelligent systems and robotic solutions across various industries. Students learn through a variety of methods, including lectures, discussions, case studies, small-group work, simulations, fieldwork, and mini-projects.
Study Options
Regular
Evening
Weekend
Career Options
AI/Machine Learning Engineer
Robotics Engineer
Data Scientist
Software Developer
Automation Specialist
Research Scientist (AI/Robotics)
Intelligent Systems Developer
Courses Offered Include:
Programming (including Python, C++, Java, etc.)
Machine Learning and Deep Learning
Robotics Engineering
Artificial Intelligence Systems
Computer Vision and Image Processing
Systems Analysis and Design
Data Structures and Algorithms
ELIGIBILITY
WASSCE & SSSCE:
Candidates must have six credits (A1-C6) in English, Mathematics and Integrated Science (Biology or Agricultural Science for Nigerian applicants) or Social Studies, and three elective subjects, making an aggregate of no more than 36. For SSSCE, candidates must have six credits (A-D) in the three Core Subjects and three electives, making an aggregate of no more than 24.
Mature Students
Candidates must be at least 25 years old and must write and pass an entrance examination in English, Mathematics, IT, and General Business. They may also be required to attend an interview.
Others:
Applicants with GCE, ICGSE, GBCE, ABCE, Baccalaureate, Professional Courses (ICA, ACCA, CIM, etc), and HND, among others may contact us for levels of placement.
Local and International Fee Payment Options
Benefits
Analytical and broadened scope of thinking
You have the most sought-after skills in the world
You can solve global problems using intelligent technologies
You will earn good money. AI professionals are among the highest-paid globally
Your skills are in high demand across multiple industries
Employment Prospects
AI Engineers
Robotics Engineers
Machine Learning Specialists
Data Scientists
Automation Engineers
Software Developers
Intelligent Systems Analysts
Computer Vision Specialists
Research Scientists
IT Consultants
Technical Support Managers
Systems Engineers
Application Developers
Algorithm Engineers
Graduates can be found in a wide variety of organisations, including:
Tech Companies
Research Institutions
Manufacturing & Industrial Automation Firms
Healthcare and Biotech Companies
Financial Institutions
Robotics and Automation Startups
Government and Regulatory Agencies
Why Choose Wisconsin SCOT
Hands-On Teaching And Learning
World Class Cybersecurity And Digital Forensic Lab
Artificial Intelligence, Internet Of Things And Robotic Lab
Certified By
Cyber Security Authority
Certified By
Data Protection Agency
Certified Lecturers And Instructors
EC-Council
Certified Training Centre
Project Base Teaching And Learning
Exclusive Laboratory Facilities
Cellebrite forensic detective kits
Oxygen forensic detective kits
⁠Tableau Forensic Imager TX1 & TX4
Digital Microscopes
Ultra Block Forensic Card Readers
Faraday Black Box
Faraday Bags
⁠3D printer
Artificial Intelligence Devices
Meta Quest Virtual Reality Devices
⁠FRED Digital Forensic System
Executive Summary: Ghana's Foremost Digital Forensic Hub
The WIUC Digital Forensic Laboratory is Ghana’s only academic-based, state-of-the-art digital forensic lab. It is equipped to support critical national security initiatives, aid financial institutions in combating cyber fraud, empower law enforcement and financial institutions with cutting-edge investigative tools and resources and provide unparalleled cyber security service.
Our laboratory houses a comprehensive suite of world-class tools and capabilities spanning the entire spectrum of digital forensic disciplines. This includes advanced mobile and computer device extraction and analysis, rapid incident response, in-depth malware analysis, rigorous vulnerability assessment and penetration testing.
Core Capabilities and Tool Categorisation
The WIUC Digital Forensic Laboratory categorises its extensive expertise and advanced tools into six distinct, yet interconnected, core domains. This structured approach ensures a comprehensive and systematic capability for addressing diverse digital forensic challenges across various sectors.
Computer and Device Forensics
In-depth investigations and analysis of traditional and modern computing systems.
Mobile, IoT, and Cloud Forensics
Specialised extraction and analysis from modern connected devices and remote data.
Network Forensics & Threat Intelligence
Vulnerability assessment, Incident response, proactive and reactive analysis of network activities and cyber threats.
Multimedia and Email Forensics
Authentication, analysis and enhancement of digital media and communication records.
Password Recovery and Malware Analysis
Decryption of any encrypted data, devices and reverse engineering of malicious software.
Intelligence & CDR Analysis
Strategic data interpretation for suspect tracking and crime pattern identification.
1. Computer and Device Forensics
Our laboratory provides advanced capabilities for forensic imaging and exhaustive investigation of a wide array of computing devices. This includes laptops, desktop computers, USB drives, Solid State Drives (SSDs), and various other storage media. We ensure meticulous evidence preservation, precise data recovery from damaged or deleted sources, and detailed timeline analysis to reconstruct events.
Premium and advanced key tools deployed in this domain include FTK Enterprise, Magnet AXIOM, for comprehensive software-based analysis. For hardware-level imaging, we utilize highly specialized equipment such as TX1 Imager and TD4 Duplicator, ensuring data integrity at the acquisition stage. Additionally, UFS Explorer Pro Recovery 10.11.1 and Arsenal Image Mounter support complex data recovery and mounting operations, while CyberTriage facilitates rapid triage and initial assessment of compromised systems.
2. Mobile, IoT, and Cloud Forensics
The WIUC Digital Forensic Laboratory possesses cutting-edge capabilities for the extraction, decryption, and in-depth analysis of digital evidence from a diverse range of modern devices and platforms. This includes smartphones, a variety of Internet of Things (IoT) devices, and cloud-based accounts. Furthermore, our expertise extends to highly specialised areas such as drone and airplane black box data recovery.
We are adept at analyzing data from all encrypted devices as well as recovering and analyzing deleted data that is often crucial in investigations. Our extensive toolkit comprises industry-leading solutions such as Cellebrite UFED and Cellebrite Inseyet for mobile device decryption and extraction, Oxygen Forensic Suite and MoBILedit Forensic Express for comprehensive analysis. USB Detective provides insights into USB device usage, while the Cloud Forensics module in AXIOM enables investigation of cloud-stored data. For live device isolation, we utilise Faraday BlackBox, and Camera Ballistics assists in authenticating digital imagery.
3. Network Forensics & Threat Intelligence
Our expertise in Network Forensics and Threat Intelligence allows for the capture, meticulous inspection, and comprehensive analysis of network traffic and incident footprints. This capability is critical for identifying malicious activities, understanding attack vectors, and reconstructing cyber incidents.
We conduct sophisticated internal threat hunting exercises and thorough compromise assessments to uncover hidden threats within an organisation’s network infrastructure. Our team is equipped to provide immediate and effective support for incident response during advanced persistent threats (APTs) or significant financial breaches, helping organisations mitigate damage and restore operations. Key tools in this domain include Net Analysis for deep packet inspection, CyberTriage for rapid incident assessment, and Metasploit Pro for controlled active testing and vulnerability exploitation simulations. For field operations and rapid response, we deploy FRED SR units, ensuring on-site forensic capabilities.
4. Multimedia and Email Forensics
The laboratory specialises in the authentication, enhancement, and detailed analysis of multimedia evidence and email communications. Our capabilities extend to improving the clarity of surveillance footage and digital images, often crucial for identification and evidence presentation. We also perform meticulous extraction and validation of metadata embedded within videos, audios, images, and emails, which can provide critical contextual information regarding their origin, creation, and modification history.
Our advanced toolkit for multimedia forensics includes Amped Replay, Amped Authenticate, and Amped DVRConv, which are industry standards for video and image analysis and conversion. For audio evidence, we utilise Diamond Cut Audio Forensics to enhance and authenticate recordings. Email investigations are supported by Metaspike Email Forensic Collector for comprehensive data acquisition, and Passware Kit Forensic is employed for the decryption of password-protected attachments, ensuring no piece of potential evidence remains inaccessible.
5. Password Recovery and Malware Analysis
The WIUC Digital Forensic Laboratory categorises its extensive expertise and advanced tools into six distinct, yet interconnected, core domains. This structured approach ensures a comprehensive and systematic capability for addressing diverse digital forensic challenges across various sectors.
Password Recovery
We possess the capability to perform advanced decryption techniques and brute-force attacks on encrypted evidence, allowing access to protected data that is vital for investigations. This includes recovering passwords from various file systems, encrypted containers, and applications.
The primary tool for this intensive process is Cellebrite and
Passware Kit Forensics
, renowned for its speed and effectiveness in cracking complex encryptions and recovering passwords from a wide range of sources, ensuring that no digital barrier impedes justice.
Malware Analysis
Our experts conduct comprehensive reverse engineering of malicious software discovered in compromised systems. This analysis helps in understanding the malware’s functionality, its propagation methods, and its impact on the system, which is crucial for developing effective countermeasures.
Tools like
Metasploit Pro
are used for simulating attack scenarios,
CyberTriage
for initial malware triage and identifying suspicious activities, and both
Magnet AXIOM
and
FTK
are instrumental for hashing, behavioural analysis, and deep-dive investigations into malware characteristics, helping us to trace its origins and identify its objectives.
Why Collaborate with WIUC Digital Forensic Laboratory?
The WIUC Digital Forensic Laboratory offers an unparalleled partnership opportunity, providing a secure, reliable, and advanced resource for combating cybercrime, cyber threats and enhancing cybersecurity posture. Our unique position as Ghana’s sole academic-based, state-of-the-art facility ensures a trusted and impartial service provider.
Secure Forensic Processing
Ensure secure and confidential forensic processing of sensitive insider threat cases and complex financial cybercrime incidents, adhering to strict chain-of-custody protocols.
Rapid Response Capabilities
Benefit from our real-time, rapid response capabilities for immediate fraud and data breach investigations, minimising potential financial losses and reputational damage.
Joint Training & Workshops
Engage in collaborative training programmes and workshops tailored for internal cybersecurity teams, fostering knowledge transfer and skill enhancement in digital forensics.
Trusted Analysis Partner
Partner with a trusted analysis entity that guarantees full data confidentiality and strict non-disclosure, ensuring the highest level of security for all sensitive financial information and investigations.
Apply Now
Our Partners