Admission & Registration| طلب الالتحاق الالكتروني| IU on google scholar

كلية تكنولوجيا المعلومات
Faculty of Information Technology

Monday, 17 September 2018 00:00

About the Department - Cyber Security

Introduction:

Focuses on the practical and theoretical dimensions of IT security across a range of fundamental areas, such as network security and vulnerability assessment, information security, digital forensics, wireless device security, and database security.

Students will gain a solid grounding in conventional computer and network security concepts and skills. In addition, the course is designed to meet the changing landscape of secure computing, which involves not only computers but also telecommunications networks and network-enabled devices such as smartphones and tablet devices

Opportunities and career options after you finish this course.

Vision

Leadership and distinction in information security and cyberspace (cybersecurity) according to international standards

Mission

Preparing distinguished cadres in information security and cyberspace (cybersecurity) capable of building and developing secure information systems according to the labor market and community service requirements.

Objectives

  1. Excellence and creativity in providing study programs in the field of information security and cyberspace at the local and regional levels.
  2. Providing students with theoretical, practical and applied skills in the field of information security and cyberspace.
  3. Qualifying students for the ability to develop and manage secure information systems in governmental and private sector institutions at all levels.
  4. Encouraging students to be creative and innovative in implementing and developing information security programs
  5. Providing the local market and society with graduates in the field of information security and cyberspace, who are qualified to achieve the highest degree to protect information systems and data from penetration.
  6. Analysis, development and evaluation of systems related to information security and cyberspace.

Program Learning Outcomes describe what students are expected to know and be able to do by the time of graduation. These relate to the knowledge, skills, and behaviours that students acquire as they progress through the program. A graduate of the (CIS) program will demonstrate

1.              

Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.

2.              

Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline

3.              

Communicate effectively in a variety of professional contexts

4.              

Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.

5.              

Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.

6.              

Apply security principles and practices to maintain operations in the presence of risks and threats. [CY]

PLOS CYBERSECURITY (CY)

 

Career Opportunities

Cyber Security

Chief Information Security Officer

Cyber-security/Information Security Analyst

Forensic Computer Analyst 

Penetration Tester

Security engineer

IT Security Architect

Security Systems Administrator

IT security consultants

Security Administrator

Read 1546 times