Cybersecurity Program Overview
The Department of Cybersecurity at
Dar Al-Hekma University offers a Bachelor of Science in Cybersecurity (BSCY), prepares students to deal with computer viruses, malware, and scams, and to protect personal privacy and organizational data from hackers and cybercriminals by setting policies and controls of ethics and risk management. Students learn how to create, operate, analyze, and penetrate computer systems and networks to ensure their security. Our program also follows the guidelines of the Association for computing Machinery (ACM), and the Institute of Electrical and Electronics Engineers (IEEE) for cybersecurity programs. The curriculum also has multiple industry-recognized certifications that are built into it to support students’ résumés.
Along with the bachelor degree in cybersecurity at Dar Al-Hekma University, the program offers three different tracks; one is a
general track, another one in
ethical hacking,
and the third one in
computer forensics. A double track which combines ethical hacking and computer forensics is also offered.
Ethical Hacking Track Overview
Along with the bachelor’s degree in cybersecurity at Dar Al-Hekma University, the Department of Cybersecurity offers an ethical hacking track, which is a four-year program with 136 credit hours towards graduation. This track involves a methodical practice of identifying, evaluating, testing, and reporting on vulnerabilities in an organization. Ethical hackers can evaluate nearly any application or infrastructure they are tasked with, identify potential vulnerabilities, and provide recommendations on how those vulnerabilities can be remediated. The EC-Council, which is the world’s largest cyber security technical certification body will share material and virtual labs with our students for practice. This will make it easy for students to pass the Certified Ethical Hacking (CEH) exam.
Program educational objectives
- PEO-1: Continue seeking proper professional development by pursuing a graduate study in the field of cybersecurity.
- PEO-2: Use the necessary computing knowledge to start and run a technical company as an entrepreneur.
- PEO-3: Manage responsibilities and progress to become a leader or manager in any public or private industry occupation.
Cybersecurity Graduate Attributes
- Critical thinking and problem solving
- Design ability
- Communication skills
- Professionalism and ethical competency
- Leadership and teamwork
- Long-life learning
- Research Capability
- Deep cybersecurity knowledge and intellectual breath
Cybersecurity Program Mission
Graduating professionals equipped with design thinking, leadership, and research skills in the fields of computer science to foster creativity and sustainability.
Cybersecurity Program Goals
- Qualify specialized and distinctive graduates in Cybersecurity to fulfill the requirements of the country
- Ensure that best teaching strategies, alternative methods, and program offerings areutilized to meet current and future market needs and to cater to students' learning differences.
- Encourage engagement with the community.
- Promote research in cybersecurity.
- Contribute to financial sustainability.
Why Choose the Cybersecurity Program at DAHU
- The curriculum of the program has been designed with input from cybersecurity experts to meet the recent ABET accreditation criteria and the ACM/IEEE guidelines for cybersecurity programs.
- The curriculum includes multiple industry-recognized certifications that are built into it to support the students' resumes.
- The program has virtual labs equipped with the latest and most powerful tools for ethical hacking and digital forensics.
- It obtained partnerships with high-standard international organizations in the field like Cisco, the International Council of E-Commerce Consultants, also known as the EC-Council, and the Professional Evaluation and Certification Board (PECB).
- Instructors in the program are certified in cybersecurity by international organizations such as the EC-council and PECB
- Students will be qualified to pass professional certification exams in cybersecurity from different vendors such as the EC-council, Comp TIA, Cisco, and the PECB.
Admission Requirements
Programs
| TOEFL Score
(University Level)
| Required Certificate Percentage
| Tahsili Test Score
| Othe Admission Requirement
|
---|
Bachelor Of Cybersecurity (Ethical Hacking Track)
| 400-500
OR 900 in SAT
(500 math, 400 English)
| 85%
| 70%
| Science Track in High School
|
For further details about admissions, click here
Academic Year
| Enrollment Year
| Total
| Awarded Degree
|
---|
| 1st
| 2nd | 3rd | 4th
|
| Bachelors
|
AY 23-24
| 33
| 21 | 19
| 47 | 120
| |
AY 22-23
| 26
| 23
| 32
| 30
| 111
| 25
|
AY 21-22 | 34
| 48
| 45
| 22
| 149
| 16
|
AY 20-21
| 50
| 42
| 26
| 9
| 127
| |
AY 19-20
| 45
| 26
| 8
| -
| 79
|
|
Learning Outcomes
On successful completion of this program, graduates will be able to:
SO1. Analyze complex computing problems and apply principles of computing and other relevant disciplines to find solutions.
SO2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program's discipline.
SO3. Communicate effectively in a variety of professional context.
SO4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
SO5. Function effectively as members or leaders of a team engaged in activities appropriate to the program's discipline
SO6. Apply security principles and practices to maintain operations in the presence of risks and threats.
Plan of Study
Semester – Fall |
Semester – Spring |
---|
Course Code |
Course Title |
Credit Hours |
Course Code |
Course Title |
Credit Hours |
ICTC 1302
| Information & Computing
Technology Concepts
| 3
| COMM 1302
| Communication Skills II
| 3
|
LOGC 1202
| Digital Logic Concepts
| 2
| ISLS XXXX
| Islamic Studies
| 3 |
ARTS XXXX
| Arts & Design
| 2
| BSCS 1330
| Discrete Structures
| 3 |
COMM 1301
| Communication Skills I | 3 | BSCS 1350
| Introduction to Programming
| 3 |
ARAB XXXX
| Arabic Studies
| 3
| BSCS 1320
| Computer Architecture & Organization
| 3 |
MATH 1304
| Calculus I
| 3
| BSCY 1310
| Fundamentals of
Cybersecurity
| 3 |
BSCS 1160
| Compuer Ethics & Society
| 1
|
Total Credit Hours |
17 |
Total Credit Hours |
18 |
---|
Semester – Fall |
Semester – Spring |
---|
Course Code |
Course Title |
Credit Hours |
Course Code |
Course Title |
Credit Hours |
ISLS XXXX
| Islamic Studies
| 3
| ARAB XXXX
| Arabic Studies
| 3
|
STAT 2301
| Statistics
| 3 | XXXX XXXX
| Required Gen. Ed Elective
| 3 |
BSCS 2355
| Object-Oriented Programming
| 3
| BSCS 2375
| Networking & Data Communication
| 3 |
BSCS 2351
| Fundamental Data
Structures
| 3
| BSCS 2310
| Analysis of Algorithms
| 3 |
BSCS 2370
| Operating Systems
| 3 | BSIS 2340
| IS Project Management
| 3
|
BSCY 2311
| Basic Cryptography
Concepts
| 3
| BSCY 2320
| Secure Software Development
| 3 |
Total Credit Hours |
18 |
Total Credit Hours |
18 |
Semester – Fall |
Semester – Spring |
---|
Course Code |
Course Title |
Credit Hours |
Course Code |
Course Title |
Credit Hours |
EMOI 1201
| Emotional Intelligence
| 2
| ISLS XXXX
| Islamic Studies
| 2
|
XXXX XXXX
| Free Elective
| 3 | XXXX XXXX
| Free Elective
| 3
|
BSCS 3360
| Software Engineering
| 3
| BSCS 3345
| Human Computer Interaction
| 3
|
BSCY 3330
| System Components Security
| 3
| BSIS 3320
| Database Management Systems
| 3
|
BSCY 3340
| Networks & Connections Security
| 3 | BSCY 3360
| Human Privacy & Security
| 3
|
BSCY 3350
| Managing Systems Security
| 3 | BSCY XXXX
| Program Elective
| 3 |
Total Credit Hours |
17 |
Total Credit Hours |
17 |
Semester – Fall |
Semester – Spring |
---|
Course Code |
Course Title |
Credit Hours |
Course Code |
Course Title |
Credit Hours |
ENTR 3301
| Entrepreneurship & Design Thinking
| 3
| BBBF 1101
| Basic Brain & Body Fitness
| 1
|
XXXX XXXX
| Required Gen. Ed Elective
| 3 | BSCY 4380
| Societal Security & Cyber Law
| 3 |
BSCY 4312
| Information Storage Security
| 3
| BSCY 4292
| Capstone Project II
| 3 |
BSCY 4370
| Organizational Risk
Management & Governance
| 3 | BSCY 4393
| Internship
| 3
|
BSCY 4291
| Capstone Project I
| 3 | BSCY XXXX
| Program Elective
| 3 |
BSCY XXXX
| Program Elective
| 3 | | |
Total Credit Hours |
18 |
Total Credit Hours |
13 |
In addition to the above POS in BSCY, students will also cover the following courses based on her chosen track:
Course Code |
Course Name |
Credit Hours |
BSCY 3304 | Ethical Hacking Concepts | 3 |
BSCY 4305 | Web Applications Ethical Hacking | 3 |
BSCY 4306 | Network Ethical Hacking | 3
|
Career Prospects
The program equips students with the necessary skills that qualify them for a variety of career paths/jobs in the market including, but not limited to:
- Information security officers
- Cybersecurity specialists
- Cybersecurity analysts
- Ethical hacking specialists
- Project managers
- Information technology specialists