Isra University | Amman - Jordan

ضمان الجودة | جامعة الاسراء شعار الاطار الوطني الاردني لل | جامعة الاسراء

Admission & Registration| طلب القبول الالكتروني| IU on google scholar

كلية تكنولوجيا المعلومات
Faculty of Information Technology

Monday, 17 September 2018 00:00

About the Department - Cyber Security


Focuses on the practical and theoretical dimensions of IT security across a range of fundamental areas, such as network security and vulnerability assessment, information security, digital forensics, wireless device security, and database security.

Students will gain a solid grounding in conventional computer and network security concepts and skills. In addition, the course is designed to meet the changing landscape of secure computing, which involves not only computers but also telecommunications networks and network-enabled devices such as smartphones and tablet devices

Opportunities and career options after you finish this course.


Leadership and distinction in information security and cyberspace (cybersecurity) according to international standards


Preparing distinguished cadres in information security and cyberspace (cybersecurity) capable of building and developing secure information systems according to the labor market and community service requirements.


  1. Excellence and creativity in providing study programs in the field of information security and cyberspace at the local and regional levels.
  2. Providing students with theoretical, practical and applied skills in the field of information security and cyberspace.
  3. Qualifying students for the ability to develop and manage secure information systems in governmental and private sector institutions at all levels.
  4. Encouraging students to be creative and innovative in implementing and developing information security programs
  5. Providing the local market and society with graduates in the field of information security and cyberspace, who are qualified to achieve the highest degree to protect information systems and data from penetration.
  6. Analysis, development and evaluation of systems related to information security and cyberspace.

Program Learning Outcomes describe what students are expected to know and be able to do by the time of graduation. These relate to the knowledge, skills, and behaviours that students acquire as they progress through the program. A graduate of the (CIS) program will demonstrate


Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.


Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline


Communicate effectively in a variety of professional contexts


Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.


Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.


Apply security principles and practices to maintain operations in the presence of risks and threats. [CY]



Career Opportunities

Cyber Security

Chief Information Security Officer

Cyber-security/Information Security Analyst

Forensic Computer Analyst 

Penetration Tester

Security engineer

IT Security Architect

Security Systems Administrator

IT security consultants

Security Administrator

Read 1777 times