Program Overview
Program Vision
To become a leading local and regional cybersecurity program.
University mission
إعداد خريج مؤهل ومزود بالمعرفة النظرية والعملية في الأمن السيبراني بما يتوافق والمعايير والاعتمادات العالمية وتحقيقاً لاحتياجات سوق العمل المحلية والإقليمية ويدعم خدمة مجتمعة ويشجع البحث العلمي.
Course Plan
- Program: Cyber Security
- Program duration: four years
Program Goals
- Providing students with knowledge and skills in the field of cybersecurity.
- Distinguished contribution to providing the local and regional community with highly qualified professional graduates.
- Promote the spirit of teamwork to understand the needs of society while adhering to the professional and ethical framework.
- Developing students’ skills in scientific research, problem solving and continuous self-learning.
- Meeting the needs of the labor market in the field of cybersecurity.
- Provide students with secure principles and practices to maintain operations in the presence of data security risks and threats.
Program Features
يعَد برنامج الأمن السيبراني من التخصصات الحديثة والتي تجمع بين حقليين رئيسيين في مجال تقنية المعلومات، وهما: الشبكات وأمن المعلومات (الامن السيبراني). حيث يركز مجال الشبكات على بناء الشبكات الحاسوبية ويركز مجال أمن المعلومات على حماية البيانات بجميع اشكالها على هذه الشبكات. ويتكامل المجالين معا لتحقيق مبادئ الامن السيبراني الثلاث، وهي سرية البيانات وضمان سلامتها والوصول اليها (Confidentiality & Integrity & Availability).
تواكب خطة البرنامج آخر التطورات والاحتياجات في سوق العمل في الشبكات والأمن السيبراني وانترنت الاشياء والحوسبة السحابية. حيث يهدف البرنامج لتزويد الطلبة بالمعرفة والمهارات العلمية والعملية اللازمة من خلال التركيز على المهارات الأساسية في مجال الشبكات والامن السيبراني، والذي من شأنه تأهيل خريجين قادرين على النجاح والابداع ورفد سوق العمل بالكفاءات بمختلف قطاعاته.
Career Opportunities
- Information Security Management.
- Cyber Security Analyst.
- Cyber Forensic Security Inspector.
- Systems Security Officer.
- Security Penetration Testing Specialist.
- Cyber Security Consultant.
- Cyber Security Engineer.
- Network monitor and designer.
- Malware Analyst.
Laboratories and workshops
– معمل الشبكات
– معمل الحاسوب
Course Plan
First: University Requirements (25 Credit Hours) | |||
Pre-Requisites | CH | Code | Course |
– | 1 | BUST01 | Skills of Holy Quran Recitation and Tajweed |
– | 4 | BUST02 | English Language (1) |
– | 4 | BUST03 | Arabic Language |
– | 1 | BUST04 | Leadership Skills Development |
– | 4 | BUST05 | Islamic Culture |
BUST02 | 4 | BUST06 | English Language (2) |
– | 1 | BUST07 | Communication Skills |
– | 1 | BUST08 | Critical Thinking |
– | 3 | BUST09 | Computer Skills |
– | 2 | BUST10 | Research Methodology |
Second: Faculty Requirements (42 Credit Hours) | |||
Pre-Requisites | CH | Code | Course |
– | 3 | CIT01 | Principles of Mathematics |
CIT01 | 3 | CIT02 | Calculus |
CIT02 | 3 | CIT03 | Probability and Statistics |
– | 3 | CIT04 | Computing Fundamentals |
CIT04 | 3 | CIT05 | Principles of Programming |
CIT05 | 3 | CIT06 | Computer Programming |
CIT06 | 3 | CIT07 | Data Structures and Algorithms |
CIT04 | 3 | CIT08 | Introduction to Web Design |
CIT05 | 3 | CIT09 | Introduction to Database |
CIT06 | 3 | CIT10 | Object Oriented Programming |
CIT07 | 3 | CIT11 | Principles of Operating Systems |
BUST10 and 70% of the Total CH | 6 | CIT12 | Graduation Project |
– | 3 | CIT13 | Industrial Training |
Third: Program Requirements A. Program Compulsory Requirements (68 Credit Hours) | |||
Pre-Requisites | CH | Code | Course |
CIT04 | 3 | CYS121 | Fundamentals of Cyber Security |
– | 3 | CSB251 | Principles of Data Communication and Networks |
CIT02 | 3 | MTH221 | Discrete Structures |
CYS121 | 2 | ITB323 | Computing Ethics |
CIT08 | 3 | ITB231 | Web Application Development |
CSB222 | 3 | CSB224 | Computer Architecture and Organization |
– | 3 | CSB325 | Software Engineering |
CYS121 | 3 | CYS262 | Principles of Cryptography |
CSB251, CIT11 | 3 | CSB252 | Computer Networks |
ITB231 | 3 | CYS342 | Web Security |
Con. Program Compulsory Requirements | |||
Pre-Requisites | CH | Code | Course |
CSB325 | 3 | CYS363 | Secure Software Engineering |
CIT10 | 3 | ITB332 | Visual Programming |
CSB252, CYS262 | 3 | CYS353 | Network Security |
CYS353 | 3 | CYS354 | Networks Monitoring and Documentation |
CYS342, CYS353, ITB323 | 3 | CYS343 | Network Security Management |
CYS121, CYS342 | 3 | CYS364 | Ethical Hacking |
CYS354 | 3 | CYS465 | Cloud Computing Security |
CSB252, ITB332 | 3 | CYS466 | Cybercrime Forensics Analysis |
CSB252, ITB332 | 3 | CYS467 | Mobile and Wireless Computing Security |
CYS343 | 3 | CYS444 | Risks Management Security |
CIT07 | 3 | CS321 | Fundamentals of Artificial Intelligence |
CIT02 | 3 | BEL002 | Linear Algebra |
CIT09 | 3 | CYS361 | Database Management and Security |
B. Program Elective Requirements (9 Credit Hours) | |||
Pre-Requisites | CH | Code | Course |
– | 3 | CYSE321 | Advanced Computer Forensics |
– | 3 | CYSE322 | Advanced Digital Investigation |
CIT03 | 3 | CYSE323 | Information Theory and Coding |
CSB252 | 3 | CYSE324 | Servers and Networks Management Services |
ITB231 | 3 | ITE325 | Security of Internet of Things |
CYS121 | 3 | CYSE325 | Selected Topics in Cyber Security |
CYS121 | 3 | CYSE326 | Security of E-commerce |
– | 3 | CYSE327 | Reverse Engineering |
CIT11 | 3 | CYSE328 | Security of Distributed Computing |
CYS121 | 3 | CYSE329 | Current Trends in Cyber Security |
CYS121 | 3 | CYSE330 | Cyber Warfare |
CYS262, CSB252 | 3 | CYSE331 | Network Security Protocols Design |
Contact Us