Sign In

Bachelor of Cybersecurity

(Computer Forensics Track)

 

​​​ ​ ​

​​Program Overview​​


The Cybersecurity department was established as one department of the school of Engineering computing and informatics in Dar Al-Hekma university in the academic year 2018/2019.​

Message from the Program Director 

The Cybersecurity department was established as one department of the school of Engineering computing and informatics in Dar Al-Hekma university in the academic year 2018/2019.
The Cybersecurity department offers the program of Bachelor of Science in Cybersecurity which is a four-year program with 136 credit hours towards graduation. It prepares students to deal with computer viruses, malware and scams, and to protect personal privacy and organizational data from hackers and cyber criminals by setting policies and controls of ethics and risk management. Students learn how to create, operate, analyze, and penetrate computer systems and networks to ensure their security. The first batch graduated from the program was in academic year 2021/2022.
The Bachelor of Science in Cybersecurity curriculum has been designed with an input from cybersecurity experts to meet the recent ABET Accreditation Criteria and ACM/IEEE guidelines for cybersecurity programs. It includes multiple industry-recognized certifications that are built into the curriculum to support the students’ resumes.
 ​


Program Mission

Graduating professionals equipped with design thinking, leadership, and research skills in the fields of Cybersecurity to foster creativity and sustainability.

Program Goals

  • Qualify specialized ​and distinctive graduates in Cybersecurity to fulfill the requirements of the country.
  • Ensure best teaching strategies, alternative methods, and program offerings to meet current and future market needs and students learning differences.​
  • Encourage engagement with the community.
  • Promote research in cybersecurity.
  • Contribute to financial sustainability. 

Wh​​y Choose this Bachelor ​Program at Dar Al Hekma University?

  • The program has the international accreditation(ABET).
  • The curriculum of the program has been designed with input from cybersecurity experts to meet the recent ABET accreditation criteria and the ACM/IEEE guidelines for cybersecurity programs.
  • The curriculum includes multiple industry-recognized certifications that are built into it to support the students' resumes.
  • The program has virtual labs equipped with the latest and most powerful tools for ethical hacking and digital forensics.
  • It obtained partnerships with high-standard international organizations in the field like Cisco, the International Council of E-Commerce Consultants, also known as the EC-Council, and the Professional Evaluation and Certification Board  (PECB).
  • Instructors in the program are certified in cybersecurity by international organizations such as the EC-council and PECB.
  • Students will be qualified to pass professional certification exams in cybersecurity from different vendors such as the EC-council, Comp TIA, Cisco, and the PECB.


Graduate Attributes

  • Critical thinking and problem solving
  • Design ability
  • Communication skills
  • Professionalism and ethical competency
  • Leadership and teamwork
  • Long-life learning
  • Research Capability
  • Deep cybersecurity knowledge and intellectual breath​​


​​​​Admission Requirements​


​​​​​​​​​
​​​​​ Programs​​​
​​T​OEFL Score​​
(University Level)
Required ​Certificate ​Percentage​​
Tahsili​ Test Score​​​
​Othe Admission Requirement
​Bachelor Of Cybersecurity
(Computer Forensics Track)
​400-500
OR 900 in SAT
(500 math, 400 English)
​85%
​70%
​Science Track in High School


For further details about admissions, click here



​​​​​​Learning Outcomes​​


​On successful completion of this program, graduates will be able to:​

​Knowledge​

Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions. ​​

Skills

  • Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program's discipline. 
  • Communicate effectively in a variety of professional contexts. 
  • Apply security principles and practices to maintain operations in the presence of risks and threats.​

​Values

  • Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  • Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.​

​​​​​​​​​​​​​​Plan of Study​


Download​​​​​ POS AY 2024-2025 



Download​​​​​ POS AY 2025-2026 

​​​ ​

​​Plan of Study​ AY 2​025​-2026


 

Year One

Semester – Fall

Semester – Spring

Course Code

Course Title

Credit Hours

Course Code

Course Title

Credit Hours

STAT 2301

Statistics

3

COMM 1302

Communication Skills II

3

COMM 1301

Communication Skills I

3

BBBF 1101

Basic Body and Brain Fitness

1

ARAB XXXX

Arabic Studies

3

ISLS XXXX

Islamic Studies

3

MATH 1304

Calculus I

0

BSCS 1350

Introduction to Programming

3

BSCS 1360

Computer Ethics and Society

3

BSCS 1321

Digital Logic Concepts

3

 

 

0

BSCY 1310

Fundamentals of Cybersecurity

3

 

 

0

 

 

0

 

 

0

 

 

0

Total Credit Hours

15

Total Credit Hours

16

 

Year Two

Semester – Fall

Semester – Spring

Course Code

Course Title

Credit Hours

Course Code

Course Title

Credit Hours

BSCS 2330

Discrete Structures

3

BSCS 2375

Networking and Data Communication

3

BSCS 2320

Computer Architecture and Organization

3

BSCS 2370

Operating Systems

3

BSCS 2355

Object Oriented Programming

3

BSCS 2310

Analysis of Algorithms

3

BSCS 2351

Fundamental Data Structures

3

BSIS 2340

IS Project Management

3

BSCY 2311

Basic Cryptography Concepts

3

BSCY 2320

Secure Software Development

3

 

 

0

 

 

0

 

 

0

 

 

0

 

 

0

 

 

0

Total Credit Hours

15

Total Credit Hours

15

 

Year Tree

Semester – Fall

Semester – Spring

Course Code

Course Title

Credit Hours

Course Code

Course Title

Credit Hours

XXXX XXXX

Free Electives

3

XXXXXXXX

Research Methods

3

BSCS 3345

Human Computer Interaction

3

BSIS 3320

Database Management Systems

3

BSCS 3380

Artificial Intelligence

3

BSCY 3393

Internship

3

BSCS 3365

Software Engineering

3

BSCY 3350

Managing Systems Security

3

BSCY 3330

System Components Security

3

BSCY 3360

Human Privacy and Security

3

BSCY 3340

Networks and Connections Security

3

BSCY 3307

Computer Forensics Investigations

3

 

 

0

 

 

0

 

 

0

 

 

0

Total Credit Hours

18

Total Credit Hours

18

 

Year Four

Semester – Fall

Semester – Spring

Course Code

Course Title

Credit Hours

Course Code

Course Title

Credit Hours

ENTR 3301

Entrepreneurship and Design Thinking

3

GELE 3301

Leadership and Emotional Intelligence

3

ISLS XXXX

Islamic Studies

3

ARAB XXXX

Arabic Studies

3

BSCY 4312

 

Information Storage Security

3

BSCY 4390

Selected Topics

3

BSCY 4370

Organizational Risk Management and Governance

3

BSCY 4380

 

 

Societal Security and Cyber Law

3

BSCY 4391

Capstone Project

3

BSCY 4392

Capstone Project II

3

BSCY 4308

Network Forensics and Analysis

3

BSCY 4309

Mobile Forensics and Analysis

3

 

 

0

 

 

0

 

 

0

 

 

0

Total Credit Hours

18

Total Credit Hours

18


​​​Career Prospects​


The program equips students with the necessary skills that qualify them for a variety of career paths/jobs in the market including, but not limited to:​​

  • Cybersecurity Specialist
  • Ethical Hacking Specialist
  • Computer Forensic Specialist
  • Information Technology Specialist
  • Project Manager
  • Cybersecurity Analyst
  • Information Security Officer
  • Penetration Tester
  • Vulnerability Assessor
  • Information Security Analyst
  • Ethical Hacker
  • Security Engineer/Architect
  • Computer Forensics Investigator
  • Computer Forensics Technician
  • Information Security Analyst
  • Information Systems Security Analyst
  • Security Consultant​​

​​​​​Course Description ​



CY Program (ABET 2018/2019V2-ACM/IEEE CSEC2017)

ABET: CY Program Requirements (Mathematics & Statistics) >=9CR (3 Courses)

Course Code:BSCS 2330
Course Name: Discrete Structures
Credit Hours: 3 (3,0)
Prerequisites: none
Course Description:
This course introduces important foundational mathematical models essential for the proficiency in some of the higher-level computer science courses such as networking, operating systems, intelligent systems, compilers, software engineering, cryptography, and databases. It covers the propositional and predicate logic, and proof techniques to be used for creating and understanding formal symbolic proof or mathematically rigorous argument. The course also presents the graph, probability, and set theories as well as functions and relations, Discrete probability, Recursive Algorithms, Elementary combinatorics, and Counting methods.

Course Code: MATH 1304
Course Name: Calculus I
Credit Hours: 3 (3,0)
Prerequisites: none
Course Description:
This course introduces the use of calculus in computing emphasizing computational skills, ideas, and problem solving. It provides the concepts of differentiation and integration in computing applications. It also covers real numbers, functions, continuity and limits, derivatives, curve sketching, optimization areas between curves, applications of the derivative, anti-derivatives, integrals, and areas.

Course Code: STAT 2301
Course Name: Statistics
Credit Hours: 3 (3,0)
Prerequisites: MATH 1304 
Course Description:
This course gives students an introduction to basic statistical terms and methods used in applications. It introduces concrete examples handling data sets and using standard techniques for displaying and summarizing results. Other topics studied include probability, discrete and continuous random variables, normal curves, statistical inference, and hypothesis testing.

​Course Code: BSCS 1360
Course Name: Computer Ethics and Society
Credit Hours: 3 (3,0)
Prerequisites: none
Course Description:
This course addresses ethical and social issues related to the development and use of computer technology. It covers the responsibilities of computer professionals for applications and consequences of their work. It also presents computing topics within the social, political, legal, and ethical contexts, including social impact of computers and the Internet, professionalism, codes of ethics, responsible conduct, copyrights, intellectual property, and software piracy. The course also highlights different scenarios focusing on challenge areas such as privacy, reliability, and risks of complex systems.

Course Code: BSCS1321
Course Name: Digital Logic Concepts
Credit Hours: 3 (2,2)
Prerequisites: none
Course Description:
This course focuses on fundamental constructs and concepts underlying computer hardware, the structure of computers components, and digital logic. It presents number systems notions and operations including decimal, binary, octal, and hexadecimal systems. The course also covers binary arithmetic, codes, Boolean algebra, gates, Boolean expressions, Boolean switching function synthesis, iterative arrays, sequential machines, state minimization, flip/flops, sequential circuits, and simple processors.

Course Code: BSCS 2320
Course Name: Computer Architecture and Organization
Credit Hours: 3 (2,2)
Prerequisites: BSCS1321 Digital Logic Concepts
Course Description:
This course covers the principles of computer organization and instruction set architecture. It introduces the organization and architecture of the basic building blocks of computer hardware including Arithmetic Logic Unit (ALU), registers, Central Processing Unit (CPU), and memory as well as input/output processing and management. It also provides the fundamentals of translating higher level languages into assembly language and interpreting machine languages by hardware.

Course Code: BSCS 1350
Course Name: Introduction to Programming
Credit Hours: 4 (3,2)
Prerequisites: none
Course Description:
This course builds the foundation for coding experience through explaining the syntax and semantics of a higher-level language. The course covers developing programs using fundamental concepts of procedural programming including primitive data types and strings, conditional and iterative control structures, methods, and parameter passing, files and I/O streams, and arrays. It also covers the mechanics of running, testing, and debugging computer programs using proper Integrated Development Environment (IDE) with a substantial utilization of lab-based exercises.
 
Course Code: BSCS 2310
Course Name: Analysis of Algorithms
Credit Hours: 3 (3,0)
Prerequisites: BSCS 2351 Fundamental Data Structures
Course Description:
This course covers methods for designing efficient and reliable algorithms for sorting, searching, and selection, using several algorithm design strategies. It emphasizes the proving of algorithm correctness using worst and average case analysis and the implementing of many common algorithms using several algorithm design techniques, including divide-and-conquer, dynamic programming, Branch-and-bound, Recursive backtracking, Brute-force algorithms, and greedy algorithms. The course also covers algorithms of advanced data structures, such as binary search trees and graph algorithms: minimum-cost spanning tree, connected components, topological sort, and shortest paths.

Course Code: BSCS 2351
Course Name: Fundamental Data Structures
Credit Hours: 4 (3,2)
Prerequisites: BSCS 1350 Introduction to Programming
Course Description:
This course covers program design, analysis, and verification as well as the study of basic data structures including arrays, linked lists, stacks, queues, trees, hash tables, and graphs. It presents the proper use of built-in data structures, their alternative implementations, and the strategies for choosing the proper structures. The course also introduces recursion techniques and algorithms used to process and traverse presented data structures such as Heap Sort and Binary Search Tree algorithms.

Course Code: BSCS 2355
Course Name: Object Oriented Programming
Credit Hours: 4 (3,2)
Prerequisites: BSCS 1350 Introduction to Programming
Course Description:
This course covers the concepts of object-oriented programming. It provides a review of the object-oriented programming paradigm with an emphasis on the definition and use of classes and objects along with encapsulation and information-hiding. The course also covers fundamental concepts of object-oriented design including inheritance and polymorphism, interfaces and overloading, exception handling, generics, and collections.
Course Code: BSCS 2370
Course Name: Operating Systems
Credit Hours: 3 (2,2)
Prerequisites: BSCS 2320 Computer Architecture and Organization
Course Description:
This course introduces several types of operating systems (OS), including networked, client- server, distributed operating systems, and their roles, purpose, and functionalities. It also focuses on operating systems design and implementation issues: system security; synchronization and communication mechanisms; process implementation, management, scheduling, and protection; virtual machines; memory organization and management, involving virtual memory; and I/O device management, secondary storage, and file systems.

Course Code:
BSCS 2375
Course Name:Networking and Data Communication
Credit Hours: 4 (3,2)
Prerequisites: BSCS 2320 Computer Architecture and Organization
Course Description:
This course focuses on fundamental concepts of data communication and networking principles. It introduces the underlying design, components, and protocols of each layer of the computer networks layered architectures: application, transport, network, datalink, and physical. It also presents techniques for transmitting information efficiently and reliably over a variety of communication media using networking protocols such as Transmission Control Protocol/Internet Protocol (TCP/IP), Ethernet, reliable transfer, flow control, and congestion control. The course covers network topologies, networks security, socket programming, networks applications, and protocols such as Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), and peer-to-peer (p2p), as well as wired and wireless Local and Wide Area Networks (LAN’s/WAN’s).

Course Code: BSCS 3345
Course Name: Human Computer Interaction
Credit Hours: 3 (2,2)
Prerequisites: BSCS 2355 Object Oriented Programming
Course Description:
This course focuses on designing, implementing, and evaluating user interfaces of computational systems to enhance the interactions with human activities. It covers user-centered design, rapid prototyping and experimentation, user interface standards, cognitive and social models that inform interaction design, Graphical User Interfaces (GUI) principles and visual design tools, as well as designing Human Computer Interaction (HCI) on webpages, business applications, mobile applications, games, and other computer applications.
 
Course Code: BSCS 3365
Course Name: Software Engineering
Credit Hours: 3 (2,2)
Prerequisites: BSCS2355 Object Oriented Programming
Course Description:
This course focuses on the fundamentals systems development using standard analysis and design techniques including waterfall, spiral, and Objet Oriented Design (OOD) methods. It covers project management techniques as well as System Development Life Cycle (SDLC) phases: problem analysis, scope definition, system requirements specification, system design and modeling, system implementation and validation, and system deployment and maintenance.

Course Code: BSIS 2340
Course Name: IS Project Management
Credit Hours: 3 (2,2)
Prerequisites: none
Course Description:
This course introduces a systematic approach for IS project management, based on the Project Manager Body of Knowledge (PMBOK) guide. It presents the initiating, planning, executing, controlling, and closing of the information systems projects in organizations. It also covers managing large projects in modern organizations, involving performing complex team-based activities that take advantage of several kinds of project management and group collaboration software tools.

Course Code: BSIS 3320
Course Name: Database Management Systems
Credit Hours: 3 (2,2)
Prerequisites: BSCS 2351 Fundamental Data Structures
Course Description:
This course introduces data and information management using relational database systems. The course presents practical experience in the development of database applications through the steps of determining and modeling the organizational information requirements using conceptual, logical, and physical data modeling techniques, and implementing these models into a relational database using an industrial-strength database management system. The course also covers database query languages including SQL, essential database administration tasks, and basic concepts of data quality and data security.


Course Code: BSCS 3380
Course Name: Artificial Intelligence
Credit Hours: 3 (2,2)
Prerequisites: BSCS 2310 Analysis of Algorithms
Course Description:
This course introduces fundamental techniques in the field of Artificial Intelligence (AI), which studies solutions for problems that are difficult or impractical to solve with traditional methods. It covers search strategies including uninformed search, heuristics and informed search; knowledge representation and reasoning, basic machine learning methods. The course also presents current AI applications in selected areas such as game playing and natural language processing.

Course Code: BSCY 3330
Course Name: System Components Security
Credit Hours: 3 (2,2)
Prerequisites: BSCY 1310 Fundamentals of Cybersecurity
Course Description:
This course focuses on the security issues of connecting and integrating systems components and using them within larger systems. It presents security aspects of the design, fabrication, procurement, testing and analysis of systems components. The course also covers system components vulnerabilities, secure component design principles, supply chain management security, testing component security, and component reverse engineering.

Course Code: BSCY 3340
Course Name: Networks and Connections Security
Credit Hours: 3 (2,2)
Prerequisites: BSCS 2375 Networking and Data Communication
Course Description:
This course focuses on the security of the connections between software components including both physical and logical connections. It covers security issues, vulnerabilities, connection attacks, and Transmission attacks related to distributed systems including computer networks, World Wide Web (WWW), the Internet, High performance computing (HPC), and Cloud Services. The course also introduces current concepts in network protection including Network hardening, network traffic auditing services such as Intrusion Detection(ID) and Intrusion Prevention Services (IPS), firewalls, Virtual Private Networks (VPNs), Honeypots and honeynets, Network monitoring and traffic analysis, Network access control, Perimeter networks, Network policy and operational procedures development and enforcement as well as test the network by actually attempting to exploit vulnerabilities using session hijacking and man-in-the middle techniques.

Course Code: BSCY 3350
Course Name: Managing Systems Security
Credit Hours: 3 (2,2)
Prerequisites: BSCY 3330 System Components Security
Coe- requisites: BSCS 3365 Software Engineering
Course Description:
This course focuses on the security aspects concerning the holistic view of a software system as a complete unit in and of itself not only a set of connected components. It introduces ways for comprising security concerns through the system management including composing the system security policy, security in operation and usability considerations. The course also covers security issues related to System Access, System Control, System Retirement, and System Testing.
 
Course Code: BSCY 3360
Course Name: Human Privacy and Security
Credit Hours: 3 (2,2)
Prerequisites: BSCY 1310 Fundamental of Cybersecurity 
Course Description:
This course focuses on the fundamental knowledge and practices for securing the data and privacy of human beings in their professional and personal life as well as studying human behavior as it relates to cybersecurity. It covers identity management methods, physical and logical assets control, users misleading, detection and mitigation of social engineering attacks (e.g. phishing, baiting ...), and system misuse and compliance with cybersecurity rules. The course also introduces Sensitive Personal Data (SPD) concept, and social media privacy and security, and human security factors.

Course Code: BSCY 4312
Course Name: Information Storage Security
Credit Hours: 3 (2,2)
Prerequisites: BSIS 3320 Database Management Systems
Course Description:
This course focuses on knowledge and skills required to successfully architect, design, implement, monitor, and maintain information storage security solutions to protection data at rest, during processing, and in transit. It introduces principles of data security architecture and protection of information in computer systems including disk and file encryption in hardware- level versus software encryption. The course also covers data masking practices for testing, obfuscation, and for privacy and data erasure methods including overwriting, degaussing, physical destruction methods, and memory remanence as well as database security issues: access and authentication, auditing, and integration paradigms.

Course Code: BSCY 4370
Course Name: Organizational Risk Management and Governance
Credit Hours: 3 (2,2)
Prerequisites: BSCY 1310 Fundamental of Cybersecurity 
Course Description:
This course focuses on fundamental knowledge and concepts concerning the organizational risk management, governance, and security policy. It introduces risk management role in the organization and methodologies for protecting organizations from cybersecurity threats and managing risk to support the successful accomplishment of the organization’s mission. It also provides the importance, benefits, and desired outcomes of cybersecurity governance and how such a program would be implemented. The course also covers the development, implementation, and maintenance of an effective information security policy, its major types, and components as well as the role of a successful information security program.
 
Course Code: BSCY 4380
Course Name: Societal Security and Cyber Law
Credit Hours: 3 (3,0)
Prerequisites: BSCY 1310 Fundamentals of Cybersecurity 
Course Description:
This course focuses on aspects of cybersecurity that affect the entire society including cybercrime, cyber law, cyber policy, cyber ethics, privacy, and their relation to each other. It covers motives of cybercrime behavior, cyber terrorism, cybercriminal investigations, economics of cybercrime, and cyber-based intellectual property theft. The course also presents legal issues and various cyber laws: privacy laws, data security law, computer hacking laws as well as cybersecurity public policy and ethical hacking issues.

Course Code: BSCY 4390
Course Name: Selected Topics
Credit Hours: 3 (3,0)
Prerequisites: none     
Course Description:
Selected Topics course will expose students to the topics and current state-of-the-art in   advanced area not offered by other existing courses. The course explores the current and potential future impacts of new, emerging, and rapidly evolving technologies in Cybersecurity. Students will gain insights into these technologies and how society, organizations and people are coping (or not) with the resulting disruption. Overall, the course will provide a broader and deeper perspective of the emerging areas in the fields.


Course Code: BSCY 1310 Course Name: Fundamentals of Cybersecurity
Credit Hours: 3 (3,0)
Prerequisites: none ​
Course Description:
This course introduces the concepts of cybersecurity and risk management. It highlights the importance of cybersecurity and the integral role of cybersecurity professionals in the planning, developing, and performing security tasks and policies with respect to hardware, software, processes, networks and communications, data and applications, policies, and procedures. The course also provides the foundational cybersecurity risk management principles, including reducing vulnerabilities and threats, applying proper safeguards/controls, security architecture, compliance and operational security, threats and vulnerabilities attacks, incidents, and cryptography.

Course Code: BSCY 2311
Course Name: Basic Cryptography Concepts
Credit Hours: 3 (2,2)
Prerequisites: BSCY 1310 Fundamentals of Cybersecurity
Course Description:
This course introduces the essential concepts to build the base knowledge in cryptography and encryption techniques. It covers Encryption/decryption, sender authentication, data integrity, non-repudiation, and Attack classification as well as Symmetric (private key) and Asymmetric (public key) ciphers. The course also presents advanced protocols including Zero-knowledge proofs, Secret sharing, Commitment, Oblivious transfer, fully homomorphic encryption, and Secure multiparty computation.

Course Code: BSCY 2320
Course Name: Secure Software Development
Credit Hours: 3 (2,2)
Prerequisites: BSCS 1350  Introduction to Programming
Course Description:
This course focuses on fundamental principles for the implementation of security controls throughout the software development process including least privilege, open design, and abstraction concepts in the cyber context. It covers secure coding techniques and application security configuration techniques. The course also covers the roles of security requirements in the design, implementing, static and dynamic testing, configuring, and patching of software systems, as well as ethics roles, especially in development, testing and vulnerability disclosure.
 

Course Code: BSCY 4391
Course Name: Capstone Project I
Credit Hours: 3 (1,4)
Prerequisites: BSCS 3365 Software Engineering
Course Description:
This course is part of a two-part capstone project, completed in Capstone Project II. The project stresses the integration of learning from across the curriculum within the Cybersecurity field with a strong technical focus. Teams practice gained knowledge and skills, in a realistic development setting with real clients. The course covers design thinking principles and techniques, and analysis of the client’s business processes to produce a project proposal that addresses a contemporary business issue or an opportunity. Projects are completed in Capstone Project II.

Course Code: BSCY 4392
Course Name: Capstone Project II
Credit Hours: 3 (1,4)
Prerequisites: BSCY 4391 Capstone Project I
Course Description:
This course is a continuation of a two-part research project, begun in Capstone Project I. It stresses the integration of learning from across the curriculum within the Cybersecurity field in an applied capstone project with a strong technical focus. This course concentrates on the further development, information system project implementation, deployment and validation. The course emphasizes the successful demonstration of the information system in a practical environment.

Course Code: BSCY 3393
Course Name: Internship
Credit Hours: 1 (1,0,6)
Prerequisites: BSCS 3365 Software Engineering
Course Description:
This course offers the opportunity to undertake either an external work experience at an organization or on-site professional practicum relevant to the field of Cybersecurity. The Internship provides the ability to apply skills and academic knowledge acquired in a contemporary workplace situation and to receive hands-on learning, in preparation for the workforce.

​CY Program Elective Courses

Course Code: BSCY 3303
Course Name: IT Essential
Credit Hours: 3 (2,2)
Prerequisites: none
Course Description:
This course provides a comprehensive overview of computer hardware and software with an introduction to advanced concepts. It introduces the internal components of a computer, mobile devices hardware and software, as well as operating systems, networking concepts and IT security. It explains the responsibilities of an IT professional and different system tools and diagnostic software used for troubleshooting.


Course Code: BSCY 3390

Course Name: Research Methods in Cybersecurity
Credit Hours:​ 3 (3,0)
Prerequisites: none
Course Description:
The course enhances the knowledge of research methods on both practical and theoretical level, including lectures and seminars. It explains various research methods and techniques within the area of Cybersecurity (CY). It also covers planning, designing, and carrying out investigations and studies using both qualitative and quantitative methods in addition to writing up and presenting the research reports and results.

Course Code: BSCY 3301
Course Name: IT Audit and Controls
Credit Hours: 3 (3,0)
Prerequisites: BSCY 3350 Managing Systems Security
Course Description:
This course presents the essential principles of the information technology audit and control function. It defines the information controls, their kinds, and their effects on the organization and explains how to manage and audit them using concepts and techniques of information technology audits. It covers the process of creating a control structure with goals and objectives, audit of an information technology infrastructure, and systematic remediation procedures for improvements. The course also focuses on audit and control best practices, standards, and regulatory requirements governing information.


Course Code: BSCY 3302
Course Name: Emerging Technologies in Cybersecurity
Credit Hours: 3 (3,0)
Prerequisites: BSCY 3350 Managing Systems Security
Course Description:
This course provides an overview of theory and practice related to contemporary topics in cybersecurity, including emerging technologies, new trends, and policies. It covers how emerging trends in cybersecurity can be analyzed and reviewed to be adopted by organizations to provide competitive advantages in the workplace. This course also evaluates how policies and procedures continue to evolve as technology changes and become more capable in the workplace.


Course Code:  BSCY 4341
Course Name: Cybersecurity Operations 
Credit Hours: 3 (2,2)
Prerequisite: BSCS 2375
Course Description:
This course focuses on the understanding of cybersecurity operations network principles, roles and responsibilities as well as the related technologies, tools, regulations and frameworks available. It provides knowledge and skills to monitor, detect, investigate, analyze, and respond to security incidents. It also introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect, and analyze cybersecurity intelligence and handle incidents and report incidents as they occur. It provides a comprehensive approach to security aimed toward those on the front line of defense.


Course Code: BSCY 4342 
Course Name: Network Defender
Credit Hours: 4 (3,2)
Prerequisites: BSCY 3340
Course Description:
This course provides the knowledge on how to protect, detect, and respond to network attacks. It covers network defense fundamentals, application of network security controls, protocols, perimeter appliances, secure IDS, VPN, and firewall configuration. It also focuses on intricacies of network traffic signature, analysis, and vulnerability scanning. The course contains hands-on labs, based on major network security tools and to provide network administrators real world expertise on current network security technologies and operations.

Course Code:
BSCY 3304
Course Name:
Ethical Hacking Concepts
Credit Hours: 3 (2,2)
Prerequisites: BSCY 3350 Managing Systems Security
Course Description:
This course focuses on hacking tools, techniques, exploits, and the critical activity of incident handling by adopting the viewpoint of a hacker. It introduces an entirely different way of achieving optimal information security posture in organizations through ethical hacking principle to scan, test, hack, and secure their systems.

Course Code:
BSCY 4305
Course Name:
Web Applications Ethical Hacking
Credit Hours: 3 (2,2)
Prerequisites: BSCY 3304 Ethical Hacking Concepts
Course Description:
This course focuses on inner mechanisms of web applications and how these applications can be broken, analyzed, and penetrated. It introduces all vulnerability classes pertaining to web applications, and how each vulnerability class can be discovered, attacked, and mitigated. It also covers the concepts, skills, and tools for Cross-Site Scripting (XSS) attacks, Cross-Site Request Forgery (CSRF) attacks, SQL Injection (SQLi) attacks, file inclusion attacks, command execution attacks, and many others.

Course Code:
BSCY 4306
Course Name:
Network Ethical Hacking
Credit Hours: 3 (2,2)
Prerequisites: BSCY 3304 Ethical Hacking Concepts
Course Description:
This course focuses on conducting successful penetration testing and ethical hacking for computer networks. It introduces the steps of pen testing planning, scoping, and reconnaissance. The course also covers target environment scanning tools, kinds of exploits used to compromise target machines including client-side exploits, service-side exploits, and local privilege escalation, and performing post-exploitation and pivoting as well as password cracking and attacks.
 
Course Code: BSCY 3307  Course Name: Computer Forensics Investigations
Credit Hours: 3 (2,2)
Prerequisites: BSCY 3350 Managing Systems Security
Course Description:
This course focuses on the basic computer forensics knowledge and skills needed by analysts and incident responders to identify and counter a wide range of threats within enterprise networks, including economic espionage, hacktivism, and financial crime syndicates. It introduces definitions, limits, and types of digital forensics tools and the investigatory process stages: acquisition and preservation of evidence, evidence analysis, results presentation, and evidence authentication. The course also covers the methodology for reporting, investigating, responding, and handling of computer incidents as well as collecting and analyzing data from computer systems to track user-based activity that can be used in internal investigations or civil/criminal litigation.

Course Code:
BSCY 4308
Course Name:
Network Forensics and Analysis
Credit Hours: 3 (2,2)
Prerequisites: BSCY 3307 Computer Forensics Investigations
Course Description:
This course focuses on the skills needed to mount efficient and effective post-incident response investigations. It introduces the tools, technology, and processes required to integrate network evidence sources into investigations, covering high-level NetFlow analysis, low-level pcap exploration, and ancillary network log examination. The course also covers a wide range of open source and commercial tools, and real-world scenarios to learn the underlying techniques and practices to best evaluate the most common types of network-based attacks.

Course Code:
BSCY 4309
Course Name:
Mobile Forensics and Analysis
Credit Hours: 3 (2,2)
Prerequisites: BSCY 4308 Network Forensics and Analysis
Course Description:
This course focuses on the mobile forensics knowledge and skills to perform forensic examinations on devices such as mobile phones and tablets. It introduces device file system analysis, mobile application behavior, event artifact analysis, and the identification and analysis of mobile device malware. The course also covers the needed forensic tools and custom scripts to detect, decode, decrypt, and correctly interpret evidence recovered from mobile devices.


 Course Code:
BSCY 3325
Course Name:
Fundamental of Threat Intelligence

 Credit Hours: 3 (2,2)
 Prerequisites: BSCY 3330 System Components Security
Course Description:
This course aims to equip cybersecurity professionals, analysts, and individuals interested in the field with the essential knowledge and skills required to identify, assess, and respond to cybersecurity threats effectively. This course covers the importance of artificial intelligence in cybersecurity field to detect emerging attacks. Threat actor, threat vectors, Advanced Persistent Threat (APT), Indicator of Compromize (IoC), and threat modeling are also presented in this course. The course also focus on threat intelligence cycle and methodology.  


Course Code:
BSCY 4326
Course Name:
Threat Collection and Analysis


Credit Hours: 3 (2,2)
Prerequisites: BSCY 3325
BSCY  3380 Fundamental of Threat Intelligence
Artificial Intelligence

Course Description:
Course description: This course highlights how artificial intelligence supports Cybersecurity to detect emerging threats. This course focus on threat collection that extract intelligence from data by implementing several advanced strategies such as dynamic honeypots. Threat analysis is also covered with tools such as data mining, clustering, deep learning, machine learning, and other artificial intelligence tools. This course focuses on practical methodologies and hands-on exercises to equip cybersecurity professionals, threat analysts, and incident responders with the expertise needed to gather and analyze threat intelligence effectively.


 Course Code:
BSCY 4327
Course Name:
Vulnerability Assessment Analysis 

 Credit Hours: 3 (2,2)
 Prerequisites: BSCY 3325 Fundamental of Threat Intelligence
Course Description:

This course equips cybersecurity professionals, system administrators, and IT personnel with the expertise needed to conduct effective vulnerability assessments and analyze the results to enhance the security posture of organization. Course Description: This course also focus on ethical hacking concept and how to assess vulnerabilities to create threat modeling. Hacking stages and methodology are also covered in this course. This course also introduce mythological approach to digital forensic with investigating and analyzing evidences using various tools that help to improve the threat intelligence process.​


 Course Code:
BSCY 3355
Course Name:
Fundamentals of Operational Technology

 Credit Hours: 3 (2,2)
 Prerequisites: BSCY 3330 System Components Security 

Course Description:

Explore the foundational elements of Industrial Control Systems (ICS) in this comprehensive course. Students will delve into the core components, including the ICS model, Supervisory Control and Data Acquisition (SCADA), and key ICS protocols. Gain profound insights into the intricate landscape of potential attacks and vulnerabilities within ICS environments. Learn the art of effective risk management in the context of ICS and explore the essential standards that mold this critical field. Join us to build a solid foundation in ICS and equip yourself with the knowledge necessary for navigating the dynamic world of industrial cybersecurity


Course Code:
BSCY 4356
Course Name:
Industrial Control Systems 
Security
Credit Hours: 3 (2,2)
 Prerequisites: BSCY 3355 Fundamentals of Operational Technology


Course Description:

Embark on a comprehensive exploration of advanced Industrial Control Systems (ICS) security, emphasizing secure system architecture and design principles. This course delves into the critical aspects of safeguarding ICS environments, with a specific focus on Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). Students will gain an in-depth understanding of the pivotal role played by physical security in ICS, strategies for securing protocols, conducting vulnerability assessments, and implementing robust risk mitigation strategies. Join us in navigating the complexities of securing industrial systems and enhancing your expertise in advanced ICS security practices.

Course Code:
BSCY 4357
Course Name:
Internet of Things Security 
Credit Hours: 3 (2,2)
Prerequisites: BSCY 3355 Fundamentals of Operational Technology


Course Description:
​A comprehensive exploration of the intricacies involved in securing the Internet of Things (IoT) in this specialized course. Students will delve into the unique challenges presented by RFID, sensors, and Google's IoT ecosystem. Explore the multifaceted dimensions of device security, delve into critical network security considerations, and uncover strategies for ensuring robust data security within IoT environments. Gain a holistic understanding of pivotal aspects such as authentication, authorization, monitoring, analytics, regulatory compliance, physical security, lifecycle management, vendor risk management, and user education within the expansive landscape of IoT. Join us to unravel the complexities and emerge equipped to secure the ever-evolving world of IoT technologies.


Dr. Dheyaaldin Hashim AlSalman

Assistant Professor

Hekma School of Engineering, Computing and Design

Dr. Hashim Mohammed Alaidarous

Chair - Assistant Professor

Hekma School of Engineering, Computing and Design

Dr. Homam Reda Kamel El-Taj

Director - Assistant Professor

Hekma School of Engineering, Computing and Design

Ms. Laila Abuljadayel

Lecturer

Hekma School of Engineering, Computing and Design

Key Facts

Program Name

Cybersecurity


Academic Degree

Bachelor


Credit Hours

130


Program Length

4 Years


Mode of study

Full time


Current number of students

133


Number of graduates

41


Employability STATISTIC

0%

Dr. Hashim Mohammed Alaidarous

Chair, Cybersecurity Department; Director, Cybersecurity Program


PhD, Cybersecurity, Universiti Utara Malaysia, Malaysia, 2017

MSc, Computer Science Engineering, Universiti Putra Malaysia, Malaysia, 2007

BSc, Electrical Engineering (Computer Science), Jordan University of Science & Technology, Jordan, 2003

For an optimal experience please
rotate your device to portrait mode