Program Overview
The Cybersecurity program is a modern specialization that combines two main fields in the field of information technology: networks and information security (cybersecurity). The field of networks focuses on building computer networks, and the field of information security focuses on protecting data in all its forms on these networks. The two fields integrate together to achieve the three principles of cybersecurity: data confidentiality, ensuring its integrity, and accessibility (Confidentiality & Integrity & Availability).
To become a leading local and regional cybersecurity program.
Course Plan
- Program: Cyber Security
- Program duration: four years
Program Objectives and Features
Program Features
The program plan keeps pace with the latest developments and needs in the labor market in networks, cybersecurity, the Internet of Things, and cloud computing. The program aims to provide students with the necessary scientific and practical knowledge and skills by focusing on basic skills in the field of networks and cybersecurity, which will qualify graduates capable of success, innovation, and supplying the labor market with competencies in its various sectors.
Program Goals
- Providing students with knowledge and skills in the field of cybersecurity.
- Distinguished contribution to providing the local and regional community with highly qualified professional graduates.
- Promote the spirit of teamwork to understand the needs of society while adhering to the professional and ethical framework.
- Developing students’ skills in scientific research, problem solving and continuous self-learning.
- Meeting the needs of the labor market in the field of cybersecurity.
- Provide students with secure principles and practices to maintain operations in the presence of data security risks and threats.
Career Opportunities
- Information Security Management.
- Cyber Security Analyst.
- Cyber Forensic Security Inspector.
- Systems Security Officer.
- Security Penetration Testing Specialist.
- Cyber Security Consultant.
- Cyber Security Engineer.
- Network monitor and designer.
- Malware Analyst.
Course Plan
First: University Requirements (25 Credit Hours) | |||
Pre-Requisites | CH | Code | Course |
– | 1 | BUST01 | Skills of Holy Quran Recitation and Tajweed |
– | 4 | BUST02 | English Language (1) |
– | 4 | BUST03 | Arabic Language |
– | 1 | BUST04 | Leadership Skills Development |
– | 4 | BUST05 | Islamic Culture |
BUST02 | 4 | BUST06 | English Language (2) |
– | 1 | BUST07 | Communication Skills |
– | 1 | BUST08 | Critical Thinking |
– | 3 | BUST09 | Computer Skills |
– | 2 | BUST10 | Research Methodology |
Second: Faculty Requirements (42 Credit Hours) | |||
Pre-Requisites | CH | Code | Course |
– | 3 | CIT01 | Principles of Mathematics |
CIT01 | 3 | CIT02 | Calculus |
CIT02 | 3 | CIT03 | Probability and Statistics |
– | 3 | CIT04 | Computing Fundamentals |
CIT04 | 3 | CIT05 | Principles of Programming |
CIT05 | 3 | CIT06 | Computer Programming |
CIT06 | 3 | CIT07 | Data Structures and Algorithms |
CIT04 | 3 | CIT08 | Introduction to Web Design |
CIT05 | 3 | CIT09 | Introduction to Database |
CIT06 | 3 | CIT10 | Object Oriented Programming |
CIT07 | 3 | CIT11 | Principles of Operating Systems |
BUST10 and 70% of the Total CH | 6 | CIT12 | Graduation Project |
– | 3 | CIT13 | Industrial Training |
Third: Program Requirements A. Program Compulsory Requirements (68 Credit Hours) | |||
Pre-Requisites | CH | Code | Course |
CIT04 | 3 | CYS121 | Fundamentals of Cyber Security |
– | 3 | CSB251 | Principles of Data Communication and Networks |
CIT02 | 3 | MTH221 | Discrete Structures |
CYS121 | 2 | ITB323 | Computing Ethics |
CIT08 | 3 | ITB231 | Web Application Development |
CSB222 | 3 | CSB224 | Computer Architecture and Organization |
– | 3 | CSB325 | Software Engineering |
CYS121 | 3 | CYS262 | Principles of Cryptography |
CSB251, CIT11 | 3 | CSB252 | Computer Networks |
ITB231 | 3 | CYS342 | Web Security |
Con. Program Compulsory Requirements | |||
Pre-Requisites | CH | Code | Course |
CSB325 | 3 | CYS363 | Secure Software Engineering |
CIT10 | 3 | ITB332 | Visual Programming |
CSB252, CYS262 | 3 | CYS353 | Network Security |
CYS353 | 3 | CYS354 | Networks Monitoring and Documentation |
CYS342, CYS353, ITB323 | 3 | CYS343 | Network Security Management |
CYS121, CYS342 | 3 | CYS364 | Ethical Hacking |
CYS354 | 3 | CYS465 | Cloud Computing Security |
CSB252, ITB332 | 3 | CYS466 | Cybercrime Forensics Analysis |
CSB252, ITB332 | 3 | CYS467 | Mobile and Wireless Computing Security |
CYS343 | 3 | CYS444 | Risks Management Security |
CIT07 | 3 | CS321 | Fundamentals of Artificial Intelligence |
CIT02 | 3 | BEL002 | Linear Algebra |
CIT09 | 3 | CYS361 | Database Management and Security |
B. Program Elective Requirements (9 Credit Hours) | |||
Pre-Requisites | CH | Code | Course |
– | 3 | CYSE321 | Advanced Computer Forensics |
– | 3 | CYSE322 | Advanced Digital Investigation |
CIT03 | 3 | CYSE323 | Information Theory and Coding |
CSB252 | 3 | CYSE324 | Servers and Networks Management Services |
ITB231 | 3 | ITE325 | Security of Internet of Things |
CYS121 | 3 | CYSE325 | Selected Topics in Cyber Security |
CYS121 | 3 | CYSE326 | Security of E-commerce |
– | 3 | CYSE327 | Reverse Engineering |
CIT11 | 3 | CYSE328 | Security of Distributed Computing |
CYS121 | 3 | CYSE329 | Current Trends in Cyber Security |
CYS121 | 3 | CYSE330 | Cyber Warfare |
CYS262, CSB252 | 3 | CYSE331 | Network Security Protocols Design |
Contact Us