Cybersecurity Program Overview
The Department of Cybersecurity at
Dar Al-Hekma University offers a Bachelor of Science in Cybersecurity (BSCY), prepares students to deal with computer viruses, malware, and scams, and to protect personal privacy and organizational data from hackers and cybercriminals by setting policies and controls of ethics and risk management. Students learn how to create, operate, analyze, and penetrate computer systems and networks to ensure their security. Our program also follows the guidelines of the Association for computing Machinery (ACM), and the Institute of Electrical and Electronics Engineers (IEEE) for cybersecurity programs. The curriculum also has multiple industry-recognized certifications that are built into it to support students’ résumés.
Along with the bachelor degree in cybersecurity at Dar Al-Hekma University, the program offers three different tracks; one is a
general track, another one in
ethical hacking,
and the third one in
computer forensics. A double track which combines ethical hacking and computer forensics is also offered.
Computer Forensics Track Overview
Along with the bachelor’s degree in cybersecurity- at Dar Al-Hekma University, the Department of Cybersecurity offers a track in computer forensics, which involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law, is a four-year program with 136 credit hours. Students in this track will learn the principles and techniques of digital forensics investigation and the spectrum of available computer forensics tools while being guided through forensic procedures and revising, and analyzing forensics reports. Students will also obtain from the EC-Council, which is the world’s largest cyber security technical certification body, its official materials with their virtual labs for practice. This will make it easy for students to pass the Computer Hacking Forensic Investigator (CHFI) exam and become certified investigators.
Program educational objectives
- PEO-1: Continue seeking proper professional development by pursuing a graduate study in the field of cybersecurity.
- PEO-2: Use the necessary computing knowledge to start and run a technical company as an entrepreneur.
- PEO-3: Manage responsibilities and progress to become a leader or manager in any public or private industry occupation.
Cybersecurity Graduate Attributes
- Critical thinking and problem solving
- Design ability
- Communication skills
- Professionalism and ethical competency
- Leadership and teamwork
- Long-life learning
- Research Capability
- Deep cybersecurity knowledge and intellectual breath
Cybersecurity Program Mission
Graduating professionals equipped with design thinking, leadership, and research skills in the fields of computer science to foster creativity and sustainability.
Cybersecurity Program Goals
- Qualify specialized and distinctive graduates in Cybersecurity to fulfill the requirements of the country
- Ensure that best teaching strategies, alternative methods, and program offerings are utilized to meet current and future market needs and to cater to students' learning differences.
- Encourage engagement with the community.
- Promote research in cybersecurity.
- Contribute to financial sustainability.
Why Choose the Cybersecurity Program at DAHU
- The curriculum of the program has been designed with input from cybersecurity experts to meet the recent ABET accreditation criteria and the ACM/IEEE guidelines for cybersecurity programs.
- The curriculum includes multiple industry-recognized certifications that are built into it to support the students' resumes.
- The program has virtual labs equipped with the latest and most powerful tools for ethical hacking and digital forensics.
- It obtained partnerships with high-standard international organizations in the field like Cisco, the International Council of E-Commerce Consultants, also known as the EC-Council, and the Professional Evaluation and Certification Board (PECB).
- Instructors in the program are certified in cybersecurity by international organizations such as the EC-council and PECB
- Students will be qualified to pass professional certification exams in cybersecurity from different vendors such as the EC-council, Comp TIA, Cisco, and the PECB.
Admission Requirements
Programs
| TOEFL Score
(University Level)
| Required Certificate Percentage
| Tahsili Test Score
| Othe Admission Requirement
|
---|
Bachelor Of Cybersecurity (Computer Forensics Track)
| 400-500
OR 900 in SAT
(500 math, 400 English)
| 85%
| 70%
| Science Track in High School
|
For further details about admissions, click here
Academic Year
| Enrollment Year
| Total
| Awarded Degree
|
---|
| 1st
| 2nd | 3rd | 4th
|
| Bachelors
|
AY 23-24
| 33
| 21 | 19
| 47 | 120
|
|
AY 22-23
| 26
| 23
| 32
| 30
| 111
| 25
|
AY 21-22 | 34
| 48
| 45
| 22
| 149
| 16
|
AY 20-21
| 50
| 42
| 26
| 9
| 127
| |
AY 19-20
| 45
| 26
| 8
| -
| 79
|
|
Learning Outcomes
On successful completion of this program, graduates will be able to:
SO1. Analyze complex computing problems and apply principles of computing and other relevant disciplines to find solutions.
SO2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program's discipline.
SO3. Communicate effectively in a variety of professional context.
SO4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
SO5. Function effectively as members or leaders of a team engaged in activities appropriate to the program's discipline
SO6. Apply security principles and practices to maintain operations in the presence of risks and threats.
Plan of Study
Semester – Fall |
Semester – Spring |
---|
Course Code |
Course Title |
Credit Hours |
Course Code |
Course Title |
Credit Hours |
ICTC 1302
| Information & Computing
Technology Concepts
| 3
| COMM 1302
| Communication Skills II
| 3
|
LOGC 1202
| Digital Logic Concepts
| 2
| ISLS XXXX
| Islamic Studies
| 3 |
ARTS XXXX
| Arts & Design
| 2
| BSCS 1330
| Discrete Structures
| 3 |
COMM 1301
| Communication Skills I | 3 | BSCS 1350
| Introduction to Programming
| 3 |
ARAB XXXX
| Arabic Studies
| 3
| BSCS 1320
| Computer Architecture & Organization
| 3 |
MATH 1304
| Calculus I
| 3
| BSCY 1310
| Fundamentals of
Cybersecurity
| 3 |
BSCS 1160
| Compuer Ethics & Society
| 1
|
Total Credit Hours |
17 |
Total Credit Hours |
18 |
---|
Semester – Fall |
Semester – Spring |
---|
Course Code |
Course Title |
Credit Hours |
Course Code |
Course Title |
Credit Hours |
ISLS XXXX
| Islamic Studies
| 3
| ARAB XXXX
| Arabic Studies
| 3
|
STAT 2301
| Statistics
| 3 | XXXX XXXX
| Required Gen. Ed Elective
| 3 |
BSCS 2355
| Object-Oriented Programming
| 3
| BSCS 2375
| Networking & Data Communication
| 3 |
BSCS 2351
| Fundamental Data
Structures
| 3
| BSCS 2310
| Analysis of Algorithms
| 3 |
BSCS 2370
| Operating Systems
| 3 | BSIS 2340
| IS Project Management
| 3
|
BSCY 2311
| Basic Cryptography
Concepts
| 3
| BSCY 2320
| Secure Software Development
| 3 |
Total Credit Hours |
18 |
Total Credit Hours |
18 |
Semester – Fall |
Semester – Spring |
---|
Course Code |
Course Title |
Credit Hours |
Course Code |
Course Title |
Credit Hours |
EMOI 1201
| Emotional Intelligence
| 2
| ISLS XXXX
| Islamic Studies
| 2
|
XXXX XXXX
| Free Elective
| 3 | XXXX XXXX
| Free Elective
| 3
|
BSCS 3360
| Software Engineering
| 3
| BSCS 3345
| Human Computer Interaction
| 3
|
BSCY 3330
| System Components Security
| 3
| BSIS 3320
| Database Management Systems
| 3
|
BSCY 3340
| Networks & Connections Security
| 3 | BSCY 3360
| Human Privacy & Security
| 3
|
BSCY 3350
| Managing Systems Security
| 3 | BSCY XXXX
| Program Elective
| 3 |
Total Credit Hours |
17 |
Total Credit Hours |
17 |
Semester – Fall |
Semester – Spring |
---|
Course Code |
Course Title |
Credit Hours |
Course Code |
Course Title |
Credit Hours |
ENTR 3301
| Entrepreneurship & Design Thinking
| 3
| BBBF 1101
| Basic Brain & Body Fitness
| 1
|
XXXX XXXX
| Required Gen. Ed Elective
| 3 | BSCY 4380
| Societal Security & Cyber Law
| 3 |
BSCY 4312
| Information Storage Security
| 3
| BSCY 4292
| Capstone Project II
| 3 |
BSCY 4370
| Organizational Risk
Management & Governance
| 3 | BSCY 4393
| Internship
| 3
|
BSCY 4291
| Capstone Project I
| 3 | BSCY XXXX
| Program Elective
| 3 |
BSCY XXXX
| Program Elective
| 3 | | |
Total Credit Hours |
18 |
Total Credit Hours |
13 |
Course Code |
Course Name |
Credit Hours |
BSCY 3307 | Computer Forensics Investigations | 3 |
BSCY 4308 | Network Forensics and Analysis | 3 |
BSCY 4309 | Mobile Forensics and Analysis | 3
|
Career Prospects
The program equips students with the necessary skills that qualify them for a variety of career paths/jobs in the market including, but not limited to:
- Information security officers
- Cybersecurity specialists
- Cybersecurity analysts
- Ethical hacking specialists
- Computer forensics specialists
- Project managers
- Information technology specialists