Sign In

معلومات عن...

بكالوريوس الأمن السيبراني (مسار الحوسبة الجنائية)​

 

​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​نبذة عامة عن البرنامج

مدة برنامج بكالوريوس العلوم في الأمن السيبراني في جامعة دار الحكمة أربع سنوات تدرس خلالها الطالبات 133 ساعة معتمدة للتخرج. ويٌعد البرنامج الطالبات للتعامل مع فيروسات الكمبيوتر والبرامج الضارة وعمليات الاحتيال ولحماية الخصوصية الشخصية والبيانات التنظيمية من الهجمات والاختراقات اللاأخلاقية ومجرمي الإنترنت من خلال وضع سياسات وضوابط للأخلاقيات وإدارة المخاطر. وتتعلم الطالبات كيفية إنشاء وتشغيل وتحليل واختراق أنظمة وشبكات الكمبيوتر لضمان أمنهن. تم تصميم المنهج بمساعدة خبراء وأرباب عمل في مجال الأمن السيبراني وفقاً للمعايير الحديثة لمجلس الاعتماد الأكاديمي الدولي للهندسة والتكنولوجيا (ِABET) وإرشادات جمعية آلات الحوسبة (ACM) ومعهد مهندسي الكهرباء والإلكترونيّات (IEEE) لبرامج الأمن السيبراني. كما توفر المناهج الدراسية لطالبات البرنامج فرصة الحصول على شهادات مهنية دولية معتمدة مما يُثري سِيَرَهنَّ الذاتية. 


رسالة مدير البرنامج

 ​تم إنشاء قسم الأمن السيبراني كأحد أقسام كلية هندسة الحوسبة والمعلوماتية في جامعة دار الحكمة في العام الأكاديمي 2018/2019​

يقدم قسم الأمن السيبراني برنامج بكالوريوس العلوم في الأمن السيبراني، مدته أربع سنوات ويتطلب 133 ساعة دراسية معتمدة للتخرج. يهدف البرنامج إلى إعداد الطلاب للتعامل مع الفيروسات والبرمجيات الخبيثة والاحتيال الإلكتروني، وحماية الخصوصية الشخصية وبيانات المنظمات من المتسللين والمجرمين الإلكترونيين من خلال وضع السياسات والضوابط المتعلقة بالأخلاقيات وإدارة المخاطر. يتعلم الطلاب كيفية إنشاء وتشغيل وتحليل واختراق أنظمة وشبكات الكمبيوتر لضمان أمنها. تخرجت الدفعة الأولى من البرنامج في العام الأكاديمي 2021/2022. 

تم تصميم منهج برنامج بكالوريوس العلوم في الأمن السيبراني بمساهمة من خبراء الأمن السيبراني ليتوافق مع معايير الاعتماد الأكاديمي الحديثة لـ ABET وإرشادات ACM/IEEE لبرامج الأمن السيبراني. يتضمن البرنامج العديد من الشهادات المعترف بها في الصناعة، والتي تم دمجها في المنهج لدعم السير الذاتية للطلاب.



رسالة البرنامج

إعداد رائدات أعمال وقائدات في مجال الأمن السيبراني مزودات بالمعرفة والمهارات التقنية بمعايير دولية.​​

أهداف البرنامج

  • ​تأهيل خريجات متخصصات ومتميزات في الأمن السيبراني لتلبية متطلبات الدولة في هذا المجال.
  • استخدام أفضل استراتيجيات التدريس، والأساليب البديلة، والبرامج المتوفرة، لتلبية احتياجات السوق الحالية والمستقبلية ولتلبية اختلافات التعلم لدى الطالبات.​
  • تشجيع المشاركة المجتمعيّة.​
  • تشجيع البحث العلمي في مجال الأمن السيبراني.
  • ​المساهمة في الاستدامة المالية.

مميزات البرنامج في جامعة دار الحكمة

  • تم تصميم المنهج بمساعدة خبراء وأرباب عمل في مجال الأمن السيبراني وفقاً للمعايير الحديثة لمجلس الاعتماد الأكاديمي الدولي للهندسة والتكنولوجيا (ِABET) وإرشادات جمعية آلات الحوسبة (ACM) ومعهد مهندسي الكهرباء والإلكترونيّات (IEEE) لبرامج الأمن السيبراني.
  • توفر المناهج الدراسية لطالبات البرنامج فرصة الحصول على شهادات مهنية دولية معتمدة مما يُثري سِيَرَهنَّ الذاتية.
  • يحتوي البرنامج على معامل افتراضية مجهزة بأحدث وأقوى أدوات الاختراق الأخلاقي والحوسبة الجنائية الرقمية.
  • حصلت على شراكات مع منظمات دولية رفيعة المستوى في مجال الأمن السيبراني مثل Cisco، والمجلس الدولي لمستشاري التجارة الإلكترونية، المعروف أيضاً باسم EC-Council، ومجلس التقييم والشهادات المهنية (PECB).
  • جميع أعضاء هيئة التدريس في البرنامج معتمدون في مجال الأمن السيبراني من قبل منظمات دولية مثل EC-Council و PECB. ​
  • ​يؤهل البرنامج طالباته لاجتياز اختبارات الشهادات المهنية في الأمن السيبراني من منظمات مثل EC-Council و CompTia و​ Cisco و PECB.

سمات الخريج

  • التفكير النقدي وحل المشكلات
  • القدرة على التصميم
  • مهارات الاتصال
  • الاحترافية والكفاءة الأخلاقية
  • القيادة والعمل الجماعي
  • التعلم مدى الحياة
  • القدرة على البحث
  • معرفة معمقة بالأمن السيبراني وسعة الأفق الفكري​


​​​​​​​​​​​​​​​​​​متطلبات القبول​



​​​​​ البرنامج​​
​​اختبار التوفر​​ ​
(للتخصص مباشرة)
شهادة الثانوية
العامة
اختبار التحصيلي
متطلبات القبول
الاضافية
بكالوريوسالعلوم في الأمن السيبراني
الأمن السيبراني
(الحوسبة الجنائية)
​​
​400-500
او ما يعادله بإختبار SAT 900
(500 math, 400 English)
​85%
​70%
شهادة الثانوية العامة
في المسار العلمي

​ للمزيد من المعلومات يرجى الضغط ​هنا​



​​​​​​​​​​​مخرجات التعلم

​ ​​بنهاية دراسة البرنامج يتوقع من الطالبة أن تكون قادرة​ على:

​المعرفة

  • تحليل مشاكل الحوسبة المعقدة وتطبيق مبادئ الحوسبة وغيرها من التخصصات ذات الصلة لإيجاد الحلول.

المهارات

  • تصميم وتنفيذ وتقييم الحلول القائمة على الحوسبة لتلبية مجموعة معينة من متطلبات الحوسبة في سياق تخصص البرنامج.
  • التواصل بشكل فعال في مجموعة متنوعة من السياقات المهنية.
  • تطبيق المبادئ والممارسات الأمنية للحفاظ على العمليات الجارية في ظل وجود مخاطر وتهديدات.

القيم

  • التعرف على المسؤوليات المهنية وإصدار أحكام مستنيرة في ممارسات الحوسبة بالاستناد إلى المبادئ الأخلاقية والقانونية.
  • العمل بفعالية كعضوات أو كقائدات فريق يشاركن في الأنشطة الملائمة لتخصص البرنامج.

​​
​​

​الخ​طة الدراسية​​



​​

الخ​طة الدراسية​​​ للعام الأكاديمي 2025 - 2026


Year One

Semester – Fall

Semester – Spring

Course Code

Course Title

Credit Hours

Course Code

Course Title

Credit Hours

STAT 2301

Statistics

3

COMM 1302

Communication Skills II

3

COMM 1301

Communication Skills I

3

BBBF 1101

Basic Body and Brain Fitness

1

ARAB XXXX

Arabic Studies

3

ISLS XXXX

Islamic Studies

3

MATH 1304

Calculus I

0

BSCS 1350

Introduction to Programming

3

BSCS 1360

Computer Ethics and Society

3

BSCS 1321

Digital Logic Concepts

3

 

 

0

BSCY 1310

Fundamentals of Cybersecurity

3

 

 

0

 

 

0

 

 

0

 

 

0

Total Credit Hours

15

Total Credit Hours

16

 

Year Two

Semester – Fall

Semester – Spring

Course Code

Course Title

Credit Hours

Course Code

Course Title

Credit Hours

BSCS 2330

Discrete Structures

3

BSCS 2375

Networking and Data Communication

3

BSCS 2320

Computer Architecture and Organization

3

BSCS 2370

Operating Systems

3

BSCS 2355

Object Oriented Programming

3

BSCS 2310

Analysis of Algorithms

3

BSCS 2351

Fundamental Data Structures

3

BSIS 2340

IS Project Management

3

BSCY 2311

Basic Cryptography Concepts

3

BSCY 2320

Secure Software Development

3

 

 

0

 

 

0

 

 

0

 

 

0

 

 

0

 

 

0

Total Credit Hours

15

Total Credit Hours

15

 

Year Tree

Semester – Fall

Semester – Spring

Course Code

Course Title

Credit Hours

Course Code

Course Title

Credit Hours

XXXX XXXX

Free Electives

3

XXXXXXXX

Research Methods

3

BSCS 3345

Human Computer Interaction

3

BSIS 3320

Database Management Systems

3

BSCS 3380

Artificial Intelligence

3

BSCY 3393

Internship

3

BSCS 3365

Software Engineering

3

BSCY 3350

Managing Systems Security

3

BSCY 3330

System Components Security

3

BSCY 3360

Human Privacy and Security

3

BSCY 3340

Networks and Connections Security

3

BSCY 3307

Computer Forensics Investigations

3

 

 

0

 

 

0

 

 

0

 

 

0

Total Credit Hours

18

Total Credit Hours

18

 

Year Four

Semester – Fall

Semester – Spring

Course Code

Course Title

Credit Hours

Course Code

Course Title

Credit Hours

ENTR 3301

Entrepreneurship and Design Thinking

3

GELE 3301

Leadership and Emotional Intelligence

3

ISLS XXXX

Islamic Studies

3

ARAB XXXX

Arabic Studies

3

BSCY 4312

 

Information Storage Security

3

BSCY 4390

Selected Topics

3

BSCY 4370

Organizational Risk Management and Governance

3

BSCY 4380

 

 

Societal Security and Cyber Law

3

BSCY 4391

Capstone Project

3

BSCY 4392

Capstone Project II

3

BSCY 4308

Network Forensics and Analysis

3

BSCY 4309

Mobile Forensics and Analysis

3

 

 

0

 

 

0

 

 

0

 

 

0

Total Credit Hours

18

Total Credit Hours

18



​​​​​​​الفرص الوظيفية​​​​ ​

يزود البرنامج الطالبات بالمهارات اللازمة التي تؤهلهن لمجموعة متنوعة من المسارات المهنية / الوظائف في سوق العمل بما في ذلك ، على سبيل المثال لا الحصر:


  • أخصائي في القرصنة الأخلاقية 
  • أخصائي في الأدلة الجنائية الحاسوبية 
  • ​أخصائي في تكنولوجيا المعلومات ​
  • مدير مشروع 
  • محلل الأمن السيبراني ​​
  • مسؤول أمن المعلومات ​
  • مُختبر الاختراق 
  • مُقيِّم الثغرات الأمنية 
  • محلل أمن المعلومات 
  • محقق الأدلة الجنائية الحاسوبية 
  • فني الأدلة الجنائية الحاسوبية 
  • محلل أمن أنظمة المعلومات 
  • مستشار أمن المعلومات​

​​​وصف الدورة

BCyb Course Description
CY Program (ABET 2018/2019V2-ACM/IEEE CSEC2017)

ABET: CY Program Requirements (Mathematics & Statistics) >=9CR (3 Courses)

Course Code:BSCS 2330
Course Name: Discrete Structures
Credit Hours: 3 (3,0)
Prerequisites: none
Course Description:
This course introduces important foundational mathematical models essential for the proficiency in some of the higher-level computer science courses such as networking, operating systems, intelligent systems, compilers, software engineering, cryptography, and databases. It covers the propositional and predicate logic, and proof techniques to be used for creating and understanding formal symbolic proof or mathematically rigorous argument. The course also presents the graph, probability, and set theories as well as functions and relations, Discrete probability, Recursive Algorithms, Elementary combinatorics, and Counting methods.

Course Code: MATH 1304
Course Name: Calculus I
Credit Hours: 3 (3,0)
Prerequisites: none
Course Description:
This course introduces the use of calculus in computing emphasizing computational skills, ideas, and problem solving. It provides the concepts of differentiation and integration in computing applications. It also covers real numbers, functions, continuity and limits, derivatives, curve sketching, optimization areas between curves, applications of the derivative, anti-derivatives, integrals, and areas.

Course Code: STAT 2301
Course Name: Statistics
Credit Hours: 3 (3,0)
Prerequisites: MATH 1304
Course Description:
This course gives students an introduction to basic statistical terms and methods used in applications. It introduces concrete examples handling data sets and using standard techniques for displaying and summarizing results. Other topics studied include probability, discrete and continuous random variables, normal curves, statistical inference, and hypothesis testing.

​Course Code: BSCS 1360
Course Name: Computer Ethics and Society
Credit Hours: 3 (3,0)
Prerequisites: none
Course Description:
This course addresses ethical and social issues related to the development and use of computer technology. It covers the responsibilities of computer professionals for applications and consequences of their work. It also presents computing topics within the social, political, legal, and ethical contexts, including social impact of computers and the Internet, professionalism, codes of ethics, responsible conduct, copyrights, intellectual property, and software piracy. The course also highlights different scenarios focusing on challenge areas such as privacy, reliability, and risks of complex systems.

Course Code: BSCS1321
Course Name: Digital Logic Concepts
Credit Hours: 3 (2,2)
Prerequisites: none
Course Description:
This course focuses on fundamental constructs and concepts underlying computer hardware, the structure of computers components, and digital logic. It presents number systems notions and operations including decimal, binary, octal, and hexadecimal systems. The course also covers binary arithmetic, codes, Boolean algebra, gates, Boolean expressions, Boolean switching function synthesis, iterative arrays, sequential machines, state minimization, flip/flops, sequential circuits, and simple processors.

Course Code: BSCS 2320
Course Name: Computer Architecture and Organization
Credit Hours: 3 (2,2)
Prerequisites: BSCS1321 Digital Logic Concepts
Course Description:
This course covers the principles of computer organization and instruction set architecture. It introduces the organization and architecture of the basic building blocks of computer hardware including Arithmetic Logic Unit (ALU), registers, Central Processing Unit (CPU), and memory as well as input/output processing and management. It also provides the fundamentals of translating higher level languages into assembly language and interpreting machine languages by hardware.

Course Code: BSCS 1350
Course Name: Introduction to Programming
Credit Hours: 4 (3,2)
Prerequisites: none
Course Description:
This course builds the foundation for coding experience through explaining the syntax and semantics of a higher-level language. The course covers developing programs using fundamental concepts of procedural programming including primitive data types and strings, conditional and iterative control structures, methods, and parameter passing, files and I/O streams, and arrays. It also covers the mechanics of running, testing, and debugging computer programs using proper Integrated Development Environment (IDE) with a substantial utilization of lab-based exercises.
 
Course Code: BSCS 2310
Course Name: Analysis of Algorithms
Credit Hours: 3 (3,0)
Prerequisites: BSCS 2351 Fundamental Data Structures
Course Description:
This course covers methods for designing efficient and reliable algorithms for sorting, searching, and selection, using several algorithm design strategies. It emphasizes the proving of algorithm correctness using worst and average case analysis and the implementing of many common algorithms using several algorithm design techniques, including divide-and-conquer, dynamic programming, Branch-and-bound, Recursive backtracking, Brute-force algorithms, and greedy algorithms. The course also covers algorithms of advanced data structures, such as binary search trees and graph algorithms: minimum-cost spanning tree, connected components, topological sort, and shortest paths.

Course Code: BSCS 2351
Course Name: Fundamental Data Structures
Credit Hours: 4 (3,2)
Prerequisites: BSCS 1350 Introduction to Programming
Course Description:
This course covers program design, analysis, and verification as well as the study of basic data structures including arrays, linked lists, stacks, queues, trees, hash tables, and graphs. It presents the proper use of built-in data structures, their alternative implementations, and the strategies for choosing the proper structures. The course also introduces recursion techniques and algorithms used to process and traverse presented data structures such as Heap Sort and Binary Search Tree algorithms.

Course Code: BSCS 2355
Course Name: Object Oriented Programming
Credit Hours: 4 (3,2)
Prerequisites: BSCS 1350 Introduction to Programming
Course Description:
This course covers the concepts of object-oriented programming. It provides a review of the object-oriented programming paradigm with an emphasis on the definition and use of classes and objects along with encapsulation and information-hiding. The course also covers fundamental concepts of object-oriented design including inheritance and polymorphism, interfaces and overloading, exception handling, generics, and collections.
Course Code: BSCS 2370
Course Name: Operating Systems
Credit Hours: 3 (2,2)
Prerequisites: BSCS 2320 Computer Architecture and Organization
Course Description:
This course introduces several types of operating systems (OS), including networked, client- server, distributed operating systems, and their roles, purpose, and functionalities. It also focuses on operating systems design and implementation issues: system security; synchronization and communication mechanisms; process implementation, management, scheduling, and protection; virtual machines; memory organization and management, involving virtual memory; and I/O device management, secondary storage, and file systems.

Course Code:
BSCS 2375
Course Name:Networking and Data Communication
Credit Hours: 4 (3,2)
Prerequisites: BSCS 2320 Computer Architecture and Organization
Course Description:
This course focuses on fundamental concepts of data communication and networking principles. It introduces the underlying design, components, and protocols of each layer of the computer networks layered architectures: application, transport, network, datalink, and physical. It also presents techniques for transmitting information efficiently and reliably over a variety of communication media using networking protocols such as Transmission Control Protocol/Internet Protocol (TCP/IP), Ethernet, reliable transfer, flow control, and congestion control. The course covers network topologies, networks security, socket programming, networks applications, and protocols such as Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), and peer-to-peer (p2p), as well as wired and wireless Local and Wide Area Networks (LAN’s/WAN’s).

Course Code: BSCS 3345
Course Name: Human Computer Interaction
Credit Hours: 3 (2,2)
Prerequisites: BSCS 2355 Object Oriented Programming
Course Description:
This course focuses on designing, implementing, and evaluating user interfaces of computational systems to enhance the interactions with human activities. It covers user-centered design, rapid prototyping and experimentation, user interface standards, cognitive and social models that inform interaction design, Graphical User Interfaces (GUI) principles and visual design tools, as well as designing Human Computer Interaction (HCI) on webpages, business applications, mobile applications, games, and other computer applications.
 
Course Code: BSCS 3365
Course Name: Software Engineering
Credit Hours: 3 (2,2)
Prerequisites: BSCS2355 Object Oriented Programming
Course Description:
This course focuses on the fundamentals systems development using standard analysis and design techniques including waterfall, spiral, and Objet Oriented Design (OOD) methods. It covers project management techniques as well as System Development Life Cycle (SDLC) phases: problem analysis, scope definition, system requirements specification, system design and modeling, system implementation and validation, and system deployment and maintenance.

Course Code: BSIS 2340
Course Name: IS Project Management
Credit Hours: 3 (2,2)
Prerequisites: none
Course Description:
This course introduces a systematic approach for IS project management, based on the Project Manager Body of Knowledge (PMBOK) guide. It presents the initiating, planning, executing, controlling, and closing of the information systems projects in organizations. It also covers managing large projects in modern organizations, involving performing complex team-based activities that take advantage of several kinds of project management and group collaboration software tools.

Course Code: BSIS 3320
Course Name: Database Management Systems
Credit Hours: 3 (2,2)
Prerequisites: BSCS 2351 Fundamental Data Structures
Course Description:
This course introduces data and information management using relational database systems. The course presents practical experience in the development of database applications through the steps of determining and modeling the organizational information requirements using conceptual, logical, and physical data modeling techniques, and implementing these models into a relational database using an industrial-strength database management system. The course also covers database query languages including SQL, essential database administration tasks, and basic concepts of data quality and data security.


Course Code: BSCS 3380
Course Name: Artificial Intelligence
Credit Hours: 3 (2,2)
Prerequisites: BSCS 2310 Analysis of Algorithms
Course Description:
This course introduces fundamental techniques in the field of Artificial Intelligence (AI), which studies solutions for problems that are difficult or impractical to solve with traditional methods. It covers search strategies including uninformed search, heuristics and informed search; knowledge representation and reasoning, basic machine learning methods. The course also presents current AI applications in selected areas such as game playing and natural language processing.

Course Code: BSCY 3330
Course Name: System Components Security
Credit Hours: 3 (2,2)
Prerequisites: BSCY 1310 Fundamentals of Cybersecurity
Course Description:
This course focuses on the security issues of connecting and integrating systems components and using them within larger systems. It presents security aspects of the design, fabrication, procurement, testing and analysis of systems components. The course also covers system components vulnerabilities, secure component design principles, supply chain management security, testing component security, and component reverse engineering.

Course Code: BSCY 3340
Course Name: Networks and Connections Security
Credit Hours: 3 (2,2)
Prerequisites: BSCS 2375 Networking and Data Communication
Course Description:
This course focuses on the security of the connections between software components including both physical and logical connections. It covers security issues, vulnerabilities, connection attacks, and Transmission attacks related to distributed systems including computer networks, World Wide Web (WWW), the Internet, High performance computing (HPC), and Cloud Services. The course also introduces current concepts in network protection including Network hardening, network traffic auditing services such as Intrusion Detection(ID) and Intrusion Prevention Services (IPS), firewalls, Virtual Private Networks (VPNs), Honeypots and honeynets, Network monitoring and traffic analysis, Network access control, Perimeter networks, Network policy and operational procedures development and enforcement as well as test the network by actually attempting to exploit vulnerabilities using session hijacking and man-in-the middle techniques.

Course Code: BSCY 3350
Course Name: Managing Systems Security
Credit Hours: 3 (2,2)
Prerequisites: BSCY 3330 System Components Security
Coe- requisites: BSCS 3365 Software Engineering
Course Description:
This course focuses on the security aspects concerning the holistic view of a software system as a complete unit in and of itself not only a set of connected components. It introduces ways for comprising security concerns through the system management including composing the system security policy, security in operation and usability considerations. The course also covers security issues related to System Access, System Control, System Retirement, and System Testing.
 
Course Code: BSCY 3360
Course Name: Human Privacy and Security
Credit Hours: 3 (2,2)
Prerequisites: BSCY 1310 Fundamental of Cybersecurity 
Course Description:
This course focuses on the fundamental knowledge and practices for securing the data and privacy of human beings in their professional and personal life as well as studying human behavior as it relates to cybersecurity. It covers identity management methods, physical and logical assets control, users misleading, detection and mitigation of social engineering attacks (e.g. phishing, baiting ...), and system misuse and compliance with cybersecurity rules. The course also introduces Sensitive Personal Data (SPD) concept, and social media privacy and security, and human security factors.

Course Code: BSCY 4312
Course Name: Information Storage Security
Credit Hours: 3 (2,2)
Prerequisites: BSIS 3320 Database Management Systems
Course Description:
This course focuses on knowledge and skills required to successfully architect, design, implement, monitor, and maintain information storage security solutions to protection data at rest, during processing, and in transit. It introduces principles of data security architecture and protection of information in computer systems including disk and file encryption in hardware- level versus software encryption. The course also covers data masking practices for testing, obfuscation, and for privacy and data erasure methods including overwriting, degaussing, physical destruction methods, and memory remanence as well as database security issues: access and authentication, auditing, and integration paradigms.

Course Code: BSCY 4370
Course Name: Organizational Risk Management and Governance
Credit Hours: 3 (2,2)
Prerequisites: BSCY 1310 Fundamental of Cybersecurity 
Course Description:
This course focuses on fundamental knowledge and concepts concerning the organizational risk management, governance, and security policy. It introduces risk management role in the organization and methodologies for protecting organizations from cybersecurity threats and managing risk to support the successful accomplishment of the organization’s mission. It also provides the importance, benefits, and desired outcomes of cybersecurity governance and how such a program would be implemented. The course also covers the development, implementation, and maintenance of an effective information security policy, its major types, and components as well as the role of a successful information security program.
 
Course Code: BSCY 4380
Course Name: Societal Security and Cyber Law
Credit Hours: 3 (3,0)
Prerequisites: BSCY 1310 Fundamentals of Cybersecurity 
Course Description:
This course focuses on aspects of cybersecurity that affect the entire society including cybercrime, cyber law, cyber policy, cyber ethics, privacy, and their relation to each other. It covers motives of cybercrime behavior, cyber terrorism, cybercriminal investigations, economics of cybercrime, and cyber-based intellectual property theft. The course also presents legal issues and various cyber laws: privacy laws, data security law, computer hacking laws as well as cybersecurity public policy and ethical hacking issues.

Course Code: BSCY 4390
Course Name: Selected Topics
Credit Hours: 3 (3,0)
Prerequisites: none     
Course Description:
Selected Topics course will expose students to the topics and current state-of-the-art in   advanced area not offered by other existing courses. The course explores the current and potential future impacts of new, emerging, and rapidly evolving technologies in Cybersecurity. Students will gain insights into these technologies and how society, organizations and people are coping (or not) with the resulting disruption. Overall, the course will provide a broader and deeper perspective of the emerging areas in the fields.


 


Course Code: BSCY 1310 Course Name: Fundamentals of Cybersecurity
Credit Hours: 3 (3,0)
Prerequisites: none
Course Description:
This course introduces the concepts of cybersecurity and risk management. It highlights the importance of cybersecurity and the integral role of cybersecurity professionals in the planning, developing, and performing security tasks and policies with respect to hardware, software, processes, networks and communications, data and applications, policies, and procedures. The course also provides the foundational cybersecurity risk management principles, including reducing vulnerabilities and threats, applying proper safeguards/controls, security architecture, compliance and operational security, threats and vulnerabilities attacks, incidents, and cryptography.

Course Code: BSCY 2311
Course Name: Basic Cryptography Concepts
Credit Hours: 3 (2,2)
Prerequisites: BSCY 1310 Fundamentals of Cybersecurity
Course Description:
This course introduces the essential concepts to build the base knowledge in cryptography and encryption techniques. It covers Encryption/decryption, sender authentication, data integrity, non-repudiation, and Attack classification as well as Symmetric (private key) and Asymmetric (public key) ciphers. The course also presents advanced protocols including Zero-knowledge proofs, Secret sharing, Commitment, Oblivious transfer, fully homomorphic encryption, and Secure multiparty computation.

Course Code: BSCY 2320
Course Name: Secure Software Development
Credit Hours: 3 (2,2)
Prerequisites: BSCS 1350  Introduction to Programming
Course Description:
This course focuses on fundamental principles for the implementation of security controls throughout the software development process including least privilege, open design, and abstraction concepts in the cyber context. It covers secure coding techniques and application security configuration techniques. The course also covers the roles of security requirements in the design, implementing, static and dynamic testing, configuring, and patching of software systems, as well as ethics roles, especially in development, testing and vulnerability disclosure.
 

Course Code: BSCY 4391
Course Name: Capstone Project I
Credit Hours: 3 (1,4)
Prerequisites: BSCS 3365 Software Engineering
Course Description:
This course is part of a two-part capstone project, completed in Capstone Project II. The project stresses the integration of learning from across the curriculum within the Cybersecurity field with a strong technical focus. Teams practice gained knowledge and skills, in a realistic development setting with real clients. The course covers design thinking principles and techniques, and analysis of the client’s business processes to produce a project proposal that addresses a contemporary business issue or an opportunity. Projects are completed in Capstone Project II.

Course Code: BSCY 4392
Course Name: Capstone Project II
Credit Hours: 3 (1,4)
Prerequisites: BSCY 4391 Capstone Project I
Course Description:
This course is a continuation of a two-part research project, begun in Capstone Project I. It stresses the integration of learning from across the curriculum within the Cybersecurity field in an applied capstone project with a strong technical focus. This course concentrates on the further development, information system project implementation, deployment and validation. The course emphasizes the successful demonstration of the information system in a practical environment.

Course Code: BSCY 3393
Course Name: Internship
Credit Hours: 1 (1,0,6)
Prerequisites: BSCS 3365 Software Engineering
Course Description:
This course offers the opportunity to undertake either an external work experience at an organization or on-site professional practicum relevant to the field of Cybersecurity. The Internship provides the ability to apply skills and academic knowledge acquired in a contemporary workplace situation and to receive hands-on learning, in preparation for the workforce.

​CY Program Elective Courses

Course Code: BSCY 3303
Course Name: IT Essential
Credit Hours: 3 (2,2)
Prerequisites: none
Course Description:
This course provides a comprehensive overview of computer hardware and software with an introduction to advanced concepts. It introduces the internal components of a computer, mobile devices hardware and software, as well as operating systems, networking concepts and IT security. It explains the responsibilities of an IT professional and different system tools and diagnostic software used for troubleshooting.


Course Code: BSCY 3390

Course Name: Research Methods in Cybersecurity
Credit Hours:​ 3 (3,0)
Prerequisites: none
Course Description:
The course enhances the knowledge of research methods on both practical and theoretical level, including lectures and seminars. It explains various research methods and techniques within the area of Cybersecurity (CY). It also covers planning, designing, and carrying out investigations and studies using both qualitative and quantitative methods in addition to writing up and presenting the research reports and results.

Course Code: BSCY 3301
Course Name: IT Audit and Controls
Credit Hours: 3 (3,0)
Prerequisites: BSCY 3350 Managing Systems Security
Course Description:
This course presents the essential principles of the information technology audit and control function. It defines the information controls, their kinds, and their effects on the organization and explains how to manage and audit them using concepts and techniques of information technology audits. It covers the process of creating a control structure with goals and objectives, audit of an information technology infrastructure, and systematic remediation procedures for improvements. The course also focuses on audit and control best practices, standards, and regulatory requirements governing information.


Course Code: BSCY 3302
Course Name: Emerging Technologies in Cybersecurity
Credit Hours: 3 (3,0)
Prerequisites: BSCY 3350 Managing Systems Security
Course Description:
This course provides an overview of theory and practice related to contemporary topics in cybersecurity, including emerging technologies, new trends, and policies. It covers how emerging trends in cybersecurity can be analyzed and reviewed to be adopted by organizations to provide competitive advantages in the workplace. This course also evaluates how policies and procedures continue to evolve as technology changes and become more capable in the workplace.


Course Code: BSCY 4341
Course Name: Cybersecurity Operations 
Credit Hours: 3 (2,2)
Prerequisite: BSCS 2375
Course Description:
This course focuses on the understanding of cybersecurity operations network principles, roles and responsibilities as well as the related technologies, tools, regulations and frameworks available. It provides knowledge and skills to monitor, detect, investigate, analyze, and respond to security incidents. It also introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect, and analyze cybersecurity intelligence and handle incidents and report incidents as they occur. It provides a comprehensive approach to security aimed toward those on the front line of defense.


Course Code: BSCY 4342 
Course Name: Network Defender
Credit Hours: 4 (3,2)
Prerequisites: BSCY 3340
Course Description:
This course provides the knowledge on how to protect, detect, and respond to network attacks. It covers network defense fundamentals, application of network security controls, protocols, perimeter appliances, secure IDS, VPN, and firewall configuration. It also focuses on intricacies of network traffic signature, analysis, and vulnerability scanning. The course contains hands-on labs, based on major network security tools and to provide network administrators real world expertise on current network security technologies and operations


Course Code:
BSCY 3304
Course Name:
Ethical Hacking Concepts
Credit Hours: 3 (2,2)
Prerequisites: BSCY 3350 Managing Systems Security
Course Description:
This course focuses on hacking tools, techniques, exploits, and the critical activity of incident handling by adopting the viewpoint of a hacker. It introduces an entirely different way of achieving optimal information security posture in organizations through ethical hacking principle to scan, test, hack, and secure their systems.

Course Code:
BSCY 4305
Course Name:
Web Applications Ethical Hacking
Credit Hours: 3 (2,2)
Prerequisites: BSCY 3304 Ethical Hacking Concepts
Course Description:
This course focuses on inner mechanisms of web applications and how these applications can be broken, analyzed, and penetrated. It introduces all vulnerability classes pertaining to web applications, and how each vulnerability class can be discovered, attacked, and mitigated. It also covers the concepts, skills, and tools for Cross-Site Scripting (XSS) attacks, Cross-Site Request Forgery (CSRF) attacks, SQL Injection (SQLi) attacks, file inclusion attacks, command execution attacks, and many others.

Course Code:
BSCY 4306
Course Name:
Network Ethical Hacking
Credit Hours: 3 (2,2)
Prerequisites: BSCY 3304 Ethical Hacking Concepts
Course Description:
This course focuses on conducting successful penetration testing and ethical hacking for computer networks. It introduces the steps of pen testing planning, scoping, and reconnaissance. The course also covers target environment scanning tools, kinds of exploits used to compromise target machines including client-side exploits, service-side exploits, and local privilege escalation, and performing post-exploitation and pivoting as well as password cracking and attacks.
 
Course Code: BSCY 3307 Course Name: Computer Forensics Investigations
Credit Hours: 3 (2,2)
Prerequisites: BSCY 3350 Managing Systems Security
Course Description:
This course focuses on the basic computer forensics knowledge and skills needed by analysts and incident responders to identify and counter a wide range of threats within enterprise networks, including economic espionage, hacktivism, and financial crime syndicates. It introduces definitions, limits, and types of digital forensics tools and the investigatory process stages: acquisition and preservation of evidence, evidence analysis, results presentation, and evidence authentication. The course also covers the methodology for reporting, investigating, responding, and handling of computer incidents as well as collecting and analyzing data from computer systems to track user-based activity that can be used in internal investigations or civil/criminal litigation.

Course Code:
BSCY 4308
Course Name:
Network Forensics and Analysis
Credit Hours: 3 (2,2)
Prerequisites: BSCY 3307 Computer Forensics Investigations
Course Description:
This course focuses on the skills needed to mount efficient and effective post-incident response investigations. It introduces the tools, technology, and processes required to integrate network evidence sources into investigations, covering high-level NetFlow analysis, low-level pcap exploration, and ancillary network log examination. The course also covers a wide range of open source and commercial tools, and real-world scenarios to learn the underlying techniques and practices to best evaluate the most common types of network-based attacks.

Course Code:
BSCY 4309
Course Name:
Mobile Forensics and Analysis
Credit Hours: 3 (2,2)
Prerequisites: BSCY 4308 Network Forensics and Analysis
Course Description:
This course focuses on the mobile forensics knowledge and skills to perform forensic examinations on devices such as mobile phones and tablets. It introduces device file system analysis, mobile application behavior, event artifact analysis, and the identification and analysis of mobile device malware. The course also covers the needed forensic tools and custom scripts to detect, decode, decrypt, and correctly interpret evidence recovered from mobile devices.


 Course Code:
BSCY 3325
Course Name:
Fundamental of Threat Intelligence


 Credit Hours: 3 (2,2)
 Prerequisites: BSCY 3330 System Components Security
Course Description:
This course aims to equip cybersecurity professionals, analysts, and individuals interested in the field with the essential knowledge and skills required to identify, assess, and respond to cybersecurity threats effectively. This course covers the importance of artificial intelligence in cybersecurity field to detect emerging attacks. Threat actor, threat vectors, Advanced Persistent Threat (APT), Indicator of Compromize (IoC), and threat modeling are also presented in this course. The course also focus on threat intelligence cycle and methodology.  


Course Code:
BSCY 4326
Course Name:
Threat Collection and Analysis


Credit Hours: 3 (2,2)
Prerequisites: BSCY 3325
BSCY  3380 Fundamental of Threat Intelligence
Artificial Intelligence

Course Description:
Course description: This course highlights how artificial intelligence supports Cybersecurity to detect emerging threats. This course focus on threat collection that extract intelligence from data by implementing several advanced strategies such as dynamic honeypots. Threat analysis is also covered with tools such as data mining, clustering, deep learning, machine learning, and other artificial intelligence tools. This course focuses on practical methodologies and hands-on exercises to equip cybersecurity professionals, threat analysts, and incident responders with the expertise needed to gather and analyze threat intelligence effectively.


 Course Code:
BSCY 4327
Course Name:
Vulnerability Assessment Analysis 

 Credit Hours: 3 (2,2)
 Prerequisites: BSCY 3325 Fundamental of Threat Intelligence
Course Description:

This course equips cybersecurity professionals, system administrators, and IT personnel with the expertise needed to conduct effective vulnerability assessments and analyze the results to enhance the security posture of organization. Course Description: This course also focus on ethical hacking concept and how to assess vulnerabilities to create threat modeling. Hacking stages and methodology are also covered in this course. This course also introduce mythological approach to digital forensic with investigating and analyzing evidences using various tools that help to improve the threat intelligence process.



 Course Code:
BSCY 3355
Course Name:
Fundamentals of Operational Technology

 Credit Hours: 3 (2,2)
 Prerequisites: BSCY 3330 System Components Security 

Course Description:

Explore the foundational elements of Industrial Control Systems (ICS) in this comprehensive course. Students will delve into the core components, including the ICS model, Supervisory Control and Data Acquisition (SCADA), and key ICS protocols. Gain profound insights into the intricate landscape of potential attacks and vulnerabilities within ICS environments. Learn the art of effective risk management in the context of ICS and explore the essential standards that mold this critical field. Join us to build a solid foundation in ICS and equip yourself with the knowledge necessary for navigating the dynamic world of industrial cybersecurity


Course Code:
BSCY 4356
Course Name:
Industrial Control Systems 
Security
Credit Hours: 3 (2,2)
 Prerequisites: BSCY 3355 Fundamentals of Operational Technology


Course Description:

Embark on a comprehensive exploration of advanced Industrial Control Systems (ICS) security, emphasizing secure system architecture and design principles. This course delves into the critical aspects of safeguarding ICS environments, with a specific focus on Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). Students will gain an in-depth understanding of the pivotal role played by physical security in ICS, strategies for securing protocols, conducting vulnerability assessments, and implementing robust risk mitigation strategies. Join us in navigating the complexities of securing industrial systems and enhancing your expertise in advanced ICS security practices.

Course Code:
BSCY 4357
Course Name:
Internet of Things Security 
Credit Hours: 3 (2,2)
Prerequisites: BSCY 3355 Fundamentals of Operational Technology


Course Description:
​A comprehensive exploration of the intricacies involved in securing the Internet of Things (IoT) in this specialized course. Students will delve into the unique challenges presented by RFID, sensors, and Google's IoT ecosystem. Explore the multifaceted dimensions of device security, delve into critical network security considerations, and uncover strategies for ensuring robust data security within IoT environments. Gain a holistic understanding of pivotal aspects such as authentication, authorization, monitoring, analytics, regulatory compliance, physical security, lifecycle management, vendor risk management, and user education within the expansive landscape of IoT. Join us to unravel the complexities and emerge equipped to secure the ever-evolving world of IoT technologies.



معلومات عن البرنامج

اسم البرنامج

الأمن السيبراني


الدرجة العلمية

بكالوريوس


الساعات الدراسية المعتمدة

136


مدة البرنامج

4 سنوات


نوع الدراسة

انتظام


العدد الحالي للطلاب

133


عدد الخريجين

41


إحصائيات التوظيف

0%

الدكتور / هاشم محمد العيدروس

رئيس قسم الأمن السيبراني؛ مدير برنامج الأمن السيبراني


PhD, Cybersecurity, Universiti Utara Malaysia, Malaysia, 2017

MSc, Computer Science Engineering, Universiti Putra Malaysia, Malaysia, 2007

BSc, Electrical Engineering (Computer Science), Jordan University of Science & Technology, Jordan, 2003

للتواصل معنا
روابط أخرى
اتصل بنا

للحصول على تجربة مثالية،
يرجى تحريك جهازك إلى وضع عمودي