Focuses on the practical and theoretical dimensions of IT security across a range of fundamental areas, such as network security and vulnerability assessment, information security, digital forensics, wireless device security, and database security.
Students will gain a solid grounding in conventional computer and network security concepts and skills. In addition, the course is designed to meet the changing landscape of secure computing, which involves not only computers but also telecommunications networks and network-enabled devices such as smartphones and tablet devices
Opportunities and career options after you finish this course.
Leadership and distinction in information security and cyberspace (cybersecurity) according to international standards
Preparing distinguished cadres in information security and cyberspace (cybersecurity) capable of building and developing secure information systems according to the labor market and community service requirements.
- Excellence and creativity in providing study programs in the field of information security and cyberspace at the local and regional levels.
- Providing students with theoretical, practical and applied skills in the field of information security and cyberspace.
- Qualifying students for the ability to develop and manage secure information systems in governmental and private sector institutions at all levels.
- Encouraging students to be creative and innovative in implementing and developing information security programs
- Providing the local market and society with graduates in the field of information security and cyberspace, who are qualified to achieve the highest degree to protect information systems and data from penetration.
- Analysis, development and evaluation of systems related to information security and cyberspace.
Program Learning Outcomes describe what students are expected to know and be able to do by the time of graduation. These relate to the knowledge, skills, and behaviours that students acquire as they progress through the program. A graduate of the (CIS) program will demonstrate
Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline
Communicate effectively in a variety of professional contexts
Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
Apply security principles and practices to maintain operations in the presence of risks and threats. [CY]
PLOS CYBERSECURITY (CY)
Chief Information Security Officer
Cyber-security/Information Security Analyst
Forensic Computer Analyst
IT Security Architect
Security Systems Administrator
IT security consultants