Bachelor of Cybersecurity Program Overview
The Bachelor of Science in Cybersecurity (BSCY) is a four-year program with 136 credit hours toward graduation. It prepares students to deal with computer viruses, malware, and scams, and to protect personal privacy and organizational data from hackers and cybercriminals by setting policies and controls of ethics and risk management. Students learn how to create, operate, analyze, and penetrate computer systems and networks to ensure their security
The BSCY curriculum has been designed with input from cybersecurity experts to meet the recent accreditation criteria of the of the Accreditation Board for Engineering and Technology (ABET) and the Association for computing Machinery (ACM) and the Institute of Electrical and Electronics Engineers (IEEE) guidelines for cybersecurity programs. The curriculum also has multiple industry-recognized certifications that are built into it to support students’ résumés.
Bachelor of Cybersecurity Program Tracks
-
Ethical Hacking: The Ethical Hacking track focuses on web applications hacking and network hacking.
-
Computer Forensics: The Computer Forensics track focuses on network forensics, mobile forensics, and analysis.
Also Dar Alhekmka University offers one of its kind program, which is double tracking as following:
-
Ethical Hacking & Computer Forensics
Bachelor of Cybersecurity Program Mission
To graduate professionals, leaders, and entrepreneurs equipped with adequate knowledge and technical skills of international standards in the field of Cybersecurity.
Bachelor of Cybersecurity Program Goals
- Qualify specialized and distinctive graduates in Cybersecurity to fulfill the requirements of the country
- Ensure that best teaching strategies, alternative methods, and program offerings are utilized to meet current and future market needs and to cater to students' learning differences.
- Encourage engagement with the community.
- Promote research in cybersecurity.
- Contribute to financial sustainability.
Why Choose this Bachelor of Cybersecurity Program at Dar Al Hekma University?
- The curriculum of the program has been designed with input from cybersecurity experts to meet the recent ABET accreditation criteria and the ACM/IEEE guidelines for cybersecurity programs.
- The curriculum includes multiple industry-recognized certifications that are built into it to support the students' resumes.
- The program has virtual labs equipped with the latest and most powerful tools for ethical hacking and digital forensics.
- It obtained partnerships with high-standard international organizations in the field like Cisco, the International Council of E-Commerce Consultants, also known as the EC-Council, and the Professional Evaluation and Certification Board (PECB).
- Instructors in the program are certified in cybersecurity by international organizations such as the EC-council and PECB
- Students will be qualified to pass professional certification exams in cybersecurity from different vendors such as the EC-council, CompTia, Cisco, and the PECB.
Bachelor of Cybersecurity Program Admission Requirements
Programs
| TOEFL Score
(University Level)
| Required Certificate Percentage
| Tahsili Test Score
| Othe Admission Requirement
|
---|
Bachelor Of Cybersecurity Cybersecurity (Track) Ethical Hacking (Track) Computer Forensics (Track)
| 400-500
OR 900 in SAT
(500 math, 400 English)
| 85%
| 70%
| Science Track in High School
|
For further details about admissions,
click here
Academic Year
| Enrollment Year
| Total
| Awarded Degree
|
---|
| 1st
| 2nd | 3rd | 4th
|
| Bachelors
|
AY 22-23
| 26
| 23
| 32
| 30
| 111
| |
AY 21-22 | 34
| 48
| 45
| 22
| 149
| 16
|
AY 20-21
| 50
| 42
| 26
| 9
| 127
| |
AY 19-20
| 45
| 26
| 8
| -
| 79
|
|
Bachelor of Cybersecurity Program Learning Outcomes
On successful completion of this program, graduates will be able to:
Knowledge
- Analyze complex computing problems and apply principles of computing and other relevant disciplines to find solutions.
Skills
- Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program's discipline.
- Communicate effectively in a variety of professional contexts.
- Apply security principles and practices to maintain operations in the presence of risks and threats.
Values
- Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
- Function effectively as members or leaders of a team engaged in activities appropriate to the program's discipline.
Bachelor of Cybersecurity Program Plan of Study
Semester – Fall |
Semester – Spring |
---|
Course Code |
Course Title |
Credit Hours |
Course Code |
Course Title |
Credit Hours |
ICTC 1302
| Information & Computing
Technology Concepts
| 3
| COMM 1302
| Communication Skills II
| 3
|
LOGC 1202
| Digital Logic Concepts
| 2
| ISLS XXXX
| Islamic Studies
| 3 |
ARTS XXXX
| Arts & Design
| 2
| BSCS 1330
| Discrete Structures
| 3 |
COMM 1301
| Communication Skills I | 3 | BSCS 1350
| Introduction to Programming
| 3 |
ARAB XXXX
| Arabic Studies
| 3
| BSCS 1320
| Computer Architecture & Organization
| 3 |
MATH 1304
| Calculus I
| 3
| BSCY 1310
| Fundamentals of
Cybersecurity
| 3 |
BSCS 1160
| Compuer Ethics & Society
| 1
|
Total Credit Hours |
17 |
Total Credit Hours |
18 |
---|
Semester – Fall |
Semester – Spring |
---|
Course Code |
Course Title |
Credit Hours |
Course Code |
Course Title |
Credit Hours |
ISLS XXXX
| Islamic Studies
| 3
| ARAB XXXX
| Arabic Studies
| 3
|
STAT 2301
| Statistics
| 3 | XXXX XXXX
| Required Gen. Ed Elective
| 3 |
BSCS 2355
| Object-Oriented Programming
| 3
| BSCS 2375
| Networking & Data Communication
| 3 |
BSCS 2351
| Fundamental Data
Structures
| 3
| BSCS 2310
| Analysis of Algorithms
| 3 |
BSCS 2370
| Operating Systems
| 3 | BSIS 2340
| IS Project Management
| 3
|
BSCY 2311
| Basic Cryptography
Concepts
| 3
| BSCY 2320
| Secure Software Development
| 3 |
Total Credit Hours |
18 |
Total Credit Hours |
18 |
Semester – Fall |
Semester – Spring |
---|
Course Code |
Course Title |
Credit Hours |
Course Code |
Course Title |
Credit Hours |
EMOI 1201
| Emotional Intelligence
| 2
| ISLS XXXX
| Islamic Studies
| 2
|
XXXX XXXX
| Free Elective
| 3 | XXXX XXXX
| Free Elective
| 3
|
BSCS 3360
| Software Engineering
| 3
| BSCS 3345
| Human Computer Interaction
| 3
|
BSCY 3330
| System Components Security
| 3
| BSIS 3320
| Database Management Systems
| 3
|
BSCY 3340
| Networks & Connections Security
| 3 | BSCY 3360
| Human Privacy & Security
| 3
|
BSCY 3350
| Managing Systems Security
| 3 | BSCY XXXX
| Program Elective
| 3 |
Total Credit Hours |
17 |
Total Credit Hours |
17 |
Semester – Fall |
Semester – Spring |
---|
Course Code |
Course Title |
Credit Hours |
Course Code |
Course Title |
Credit Hours |
ENTR 3301
| Entrepreneurship & Design Thinking
| 3
| BBBF 1101
| Basic Brain & Body Fitness
| 1
|
XXXX XXXX
| Required Gen. Ed Elective
| 3 | BSCY 4380
| Societal Security & Cyber Law
| 3 |
BSCY 4312
| Information Storage Security
| 3
| BSCY 4292
| Capstone Project II
| 3 |
BSCY 4370
| Organizational Risk
Management & Governance
| 3 | BSCY 4393
| Internship
| 3
|
BSCY 4291
| Capstone Project I
| 3 | BSCY XXXX
| Program Elective
| 3 |
BSCY XXXX
| Program Elective
| 3 | | |
Total Credit Hours |
18 |
Total Credit Hours |
13 |
Bachelor of Cybersecurity Program Career Prospects
The program equips students with the necessary skills that qualify them for a variety of career paths/jobs in the market including, but not limited to:
- Information security officers
- Cybersecurity specialists
- Cybersecurity analysts
- Ethical hacking specialists
- Computer forensics specialists
- Project managers
- Information technology specialists
Bachelor of Cybersecurity Program Trachs Plan of Study
In addition to the above POS in BSCY, students will also cover the following courses based on her chosen track:
Course Code |
Course Name |
Credit Hours |
BSCY 3304 | Ethical Hacking Concepts | 3 |
BSCY 4305 | Web Applications Ethical Hacking | 3 |
BSCY 4306 | Network Ethical Hacking | 3
|
Course Code |
Course Name |
Credit Hours |
BSCY 3307 | Computer Forensics Investigations | 3 |
BSCY 4308 | Network Forensics and Analysis | 3 |
BSCY 4309 | Mobile Forensics and Analysis | 3
|
Bachelor of Cybersecurity Program Double Track Plan of Study
For students who choose double tracking. The following POS will be followed in addition to the main POS:
Course Code |
Course Name |
Credit Hours |
BSCY 3304 | Ethical Hacking Concepts | 3 |
BSCY 4305 | Web Applications Ethical Hacking | 3 |
BSCY 4306 | Network Ethical Hacking | 3 |
BSCY 3307 | Computer Forensics Investigations | 3 |
BSCY 4308 | Network Forensics and Analysis | 3 |
BSCY 4309 | Mobile Forensics and Analysis | 3
|