اسم المقرر | توصيف المقرر Course Description | Course Name | رمز المقر |
أساسيات الأمن السيبراني | This course provides a holistic overview of the key components of cybersecurity. The course is designed for those interested in learning the various fundamentals of cybersecurity and aspiring to pursue a career in cybersecurity. This course will introduce the principles and practices of information security including security models, Information Security Threats, attacks, and Vulnerabilities. Course Topics include Network security, Application security, Mobile security, IoT and OT security, Data security, Access control principles, Incident Response, Computer Forensics, and risk management. The theoretical side is accompanied by critical thinking challenges and immersive lab experiences using several cybersecurity tools that allow students to apply their knowledge and move into the skill development phase in the class itself. The students must complete the principles of data communication and networks course as a prerequisite for this course. | Principles of cybersecurity | BCYN501 |
مقدمة في علم التشفير | This course will provide a comprehensive understanding of different cryptosystems and algorithms, one-way hash functions, public-key infrastructures (PKIs), and the different ways in which cryptography can ensure the privacy and security of online communication. This course will cover the Classical Encryption Techniques, Block Ciphers, Basic Concepts in Number Theory and Finite Fields, Block Cipher Operation, Pseudorandom Number Generation and Stream Ciphers, Public-Key Cryptography (i.e., RSA Algorithm, key-exchange, Hash Functions and Digital Signature). The labs in this course demonstrate the use of encryption tools to protect information systems in organizations. The students must complete the Principles of Cybersecurity course as a prerequisite for this course.
|
Introduction to Cryptography | BCYN502 |
التوجيه والتبديل | This course highlights and describes routing and switching, explaining how to build local area-network and design for small & medium enterprise networks and use Cisco Labs Techniques. We will explore how Switches, and Routers work on local area-network. The course provides the student with an advanced understanding about architecture, components, and operations of routers and switches in small networks and introduces wireless local area networks (WLAN) and security concepts. Students learn how to configure and troubleshoot routers and switches for advanced functionality using security best practices and resolve common issues with protocols in both IPv4 and IPv6 networks. Cisco Lab Activities will provide students with practical experiences in Routing and Switching. It will be centered on implementation, configuration and troubleshooting of a network. The students must complete the principles of data communication and networks course as a prerequisite for this course. | Routing and switching | BCYN403 |
البرمجة الامنة | This is an active comprehensive secure programming course, which comprehends security activities involved in all of the phases of Software Development Lifecycle (SDLC). Topics covered include Application security, threats and attacks; Secure S-SDLC activities, secure coding for: input validation, authentication & authorization, session management, error handling, static & dynamic application testing and secure deployment. Throughout lab sessions and course-project activities, students will develop their programming skills in secure software development, selecting and implementing the right security strategies, guidelines, and practices that are widely accepted and applicable to most environments used today. The prerequisites courses include Principles of Cybersecurity (BCYN501), Object Oriented Programming (BCIT07).
|
Secure Programming | BCYN504 |
تدقيق وتأكيد المعلومات | This course presents a systematic process of objectively obtaining and evaluating evidence regarding Information System’s security incidents caused by an adversary externally or internally. Security incidents will be objectively evaluated to analyze each case and create an audit report with findings. In this course, students will learn the IT auditing life cycle, from information gathering, planning, testing, reporting and issue tracking, etc. Students will also learn the overall IT audit framework and methodology and how IT audit fits into the overall internal audit function. This course is delivered through lectures, labs and assignments and technical reports. The prerequisite of this course is the principles of cybersecurity. | Information Auditing and Assurance | BCYN605 |
أمنية الشبكات | Network Security is the discipline that involves implementing measures to protect computer networks from unauthorized access, data breaches, and cyber threats. It entails safeguarding the confidentiality, integrity, and availability of information as it is transmitted and stored within a network. Network security professionals utilize various tools and techniques to identify, prevent, and respond to potential security risks, including firewalls, encryption, intrusion detection systems, vulnerability assessments and Monitoring Traffic on the Network and analysis. The field of network security is essential in ensuring the secure operation of networks in an increasingly interconnected digital landscape. The students must complete the principles of cybersecurity and Routing & Switching courses as prerequisites for this course. Upon successful completion of this course, students may take the Certified Network Defender (CNDv2) certification exam through the EC-Council’s ATC in UST. Case studies, labs and exams in addition to lectures will be accomplished to provide students with a better understanding for network security techniques.
|
Networks Security | BCYN408 |
الهاكر الاخلاقي | Ethical Hacking is a comprehensive ethical hacking course focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures. Topics include Introduction to Ethical Hacking, Reconnaissance Techniques, System Hacking Phases and Attack Techniques, Network and Perimeter Hacking, Web Application Hacking, Wireless Network Hacking, and Mobile Platform, IoT, and OT Hacking. Theoretical side is accompanied by critical thinking challenges and immersive lab experiences using several security and hacking tools. The students must complete the principles of cybersecurity course as a prerequisite for this course. Upon successful completion of this course, students may take the Certified Ethical Hacker (CEH) certification exam through the EC-Council’s ATC in UST.
|
Ethical Hacking | BCYN609 |
إدارة مشاريع | This course will introduce cybersecurity and networks project management principles, Tools & Techniques. The topics covered in this course includes Introduction to Project Management, The Project Management Process Groups, Project Integration Management, Project Scope Management, Project Time Management, Project Cost Management, Project Quality Management, Project Human Resource Management, Project Communications Management, Project Risk Management, Project Procurement Management and Project Stakeholder Management. By the end of this course, students will have master key concepts and gain the practical know how to quickly and powerfully apply Microsoft Project application to management stages of project. The prerequisite of this course is System Analysis & Design.
|
Project management | BCYN719 |
فحص الاختراقات | Penetration Testing course is a specialized training program that focuses on equipping individuals with the skills and knowledge required to conduct effective penetration tests. It covers essential topics such as reconnaissance, vulnerability assessment, exploitation, web application testing, wireless network testing, and social engineering. The course emphasizes hands-on practical experience and provides students with a comprehensive understanding of the latest hacking techniques, methodologies, and tools. The students must complete the ethical hacking course as a prerequisite for this course. Successful completion of the course prepares students to take the Certified Penetration Testing (PENT) certification exam, a widely recognized credential in the field of penetration testing.
|
Penetration Testing | BCYN612 |
أمن تطبيقات الويب والسحابة | This course will teach the principles of security in web and cloud-based systems and how these principles apply in a range of different applications. Students will gain a perspective on the importance of web applications and cloud security in the modern enterprise with a focus on security threats, common vulnerabilities, and the practical application of security controls to mitigate those risks. Topics include: Principles of cloud and web security, Client-side attacks and defences, Server-side attacks and defences, Web security in the real world, Platform and Infrastructure Security in Cloud, Application and Data Security in Cloud, Security Operations and Incident Response in Cloud, and Standards, Policies, and Legal Issues in Cloud. Students well be covering the fundamentals as well as the state-of-the-art in web application and cloud security. The course includes both theoretical and practical aspects. The course emphasizes hands-on practical experience and provides students with a comprehensive understanding of the latest techniques, methodologies, and tools associated with web application and cloud security. The pre-requisites of this course are (BCYN501) Principles of Cybersecurity, (BCIT14) Cloud computing, (BCIT16) Web Application Development. Successful completion of the course prepares students to take the Certified Cloud Security Engineer (CCSE) exam. | Web Application and cloud Security | BCYN511 |
التحري الرقمي | This course covers the main concepts, issues, and tools of Digital Forensics. The course is explored using tools of Windows and Unix/Linux operating systems. Topics include forensic aspects including the composition of hard disk and solid-state drives, file systems, challenges of password protection and encryption for investigators, handling RAM dump in an investigation, handling logs and registry, Web browser analysis, browser forensic tools, and handling program analysis.
The course includes both theoretical and practical aspects. The practical part of this course will cover the Windows server 20xx and Unix/Linux. Students must success in the course of Principles of Cybersecurity as a pre-requisite of this course. |
Digital Forensics | BCYN510 |
الشبكات المتقدمة | The Advanced Networks course is a valuable resource for students to learn about the principles of scaling networks and the technologies used to build and maintain large, complex networks, wide area networks, quality of service, virtualization and SDN, and modern wireless networks. The course covers a wide range of topics, from basic network concepts to advanced security and automation techniques. The course covers a wide range of topics, from basic network concepts to advanced security and automation techniques. The course includes both theoretical and practical aspects. The practical part of this course will cover the CCNA3. Students must success in the course of Routing and Switching as a pre-requisite of this course. | Advanced Network | BCYN407 |
إدارة النظم | This course is important for enterprise system operation and technical support. It covers general operating system administration which is explored using Linux and Windows Server operating systems. Topics covered include system configuration, network services such as Web and DNS servers, routine system maintenance, firewalls and security, Internet connectivity, system optimization, troubleshooting, and scripting languages. The course includes both theoretical and practical aspects. The practical part of this course will cover the Linux system administration and Windows Server 2022. The pre-requisite of this course is Principles of Cybersecurity (BCYN501).
|
Systems Administration | BCYN406 |
مبادئ الذكاء الاصطناعي | The goal of artificial intelligence (AI) is to tackle complex real-world problems with rigorous mathematical tools and reasoning algorithms. In this course, you will learn the foundational principles and practice implementing various AI systems. Specific topics include machine learning, search, Markov decision processes, game playing, constraint satisfaction, graphical models, logic and Generative AI. Students completing this course will have also an in-depth understanding of three core areas of AI and the connections among them, and with such other key AI areas as machine learning, robotics, natural language processing and multi-agent systems. This will be conducted through lectures, labs and assignments. The prerequisite is Discrete structure. | Principles of Artificial Intelligence | BCYN218 |
تحليل وتصميم نظم |
In the past Information system development was considered a rapidly changing art. In this course information system development concepts, methodologies and techniques will be covered, reinforced by homework assignments and a project. Deferent structured development approaches will be discussed such as system development life cycle SDLC, rapid application development, and Agile. Many important concepts will also be addressed such as project management, information system strategic planning alignment and the role of information systems in organizations. After the completion of the course student should be able to analyze a problem and design an appropriate solution using a combination of tools and techniques.
|
System Analysis and Design
|
BCYN217 |
تنظيم الحاسوب |
This course provides an introduction to the system and the fundamentals of computer organization. It discusses computer systems, which provides an overview of the physical layout and components of a computer used to run software. The course also covers computer organization that overviews the computer’s fundamental building blocks, hardware units, and their interconnection. Topics include data representation and encoding; binary arithmetic; fixed-and floating-point representation; numbering systems; instruction set architecture; memory organization and addressing; I/O; interrupts; internal architecture; instruction pipelining; multi-core architectures; and CPU/ALU basics. Also, topics include Boolean algebra, logic gates, flip-flops, counters, registers, combinational and sequential circuits, K-maps, circuit design, and various digital components.
|
Computer Organization | BCYN216 |
مفاهيم وتطبيقات انترنت الأشياء |
This course covers the technology and the market around the Internet of Things (IoT), applications, trends and implications. The course also describes the technology used to build these kinds of devices, explain what embedded systems are and how they are used for IoT, how IoT devices communicate, how they store data, and the kinds of distributed systems needed to support them. Student also will be equipped with designing an IoT device to work with a Cloud Computing infrastructure taking security issues into account. |
IoT Concepts and Application
|
BCYNL408 |
تعلم الآلة |
This course introduces the fundamentals of machine learning (ML) and its techniques. It enables students to use ML techniques to build real-world AI applications. It covers the main ML approaches and algorithms including supervised learning (regression and classification), unsupervised learning (dimensionality reduction and clustering), and model evaluating metrics. By the end of this course, students will have master key concepts and gain the practical know-how to quickly and powerfully apply machine learning techniques to solve real-world problems. The prerequisite of this course are linear algebra and introduction to data science.
|
Machine Learning
|
BCYNL710 |
إدارة المخاطر والتعافي من الكوارث | The risk management and disaster recovery (RMDR) course aims to improve students’ competencies in IT risk management of the enterprise. It covers the principles of the cybersecurity of business continuity and disaster recovery (BCDR), conducting business impact analysis, business continuity plan and its testing, business continuity management, risk assessment, maintenance and training, strategies of data backup, and different types of recovery (data, virtualization-based, system, centralized, and decentralized computing). This course focuses on the DR planning process with several case studies according to the best practices and enables students to take the EC-Council disaster recovery professional (EDRP) certification exam. Pre-Requisite: Principals of Cybersecurity. |
Risk Management and Disaster Recovery
|
BCYNL706 |
أمن تخزين المعلومات |
This course provides students with the knowledge and skills to understand and apply security concepts to information storage using Oracle. Students will learn about the threats and risks to information storage systems, the controls that can be used to mitigate these risks, and how to design and implement security solutions for databases. The course emphasizes practical experience with the security concepts and techniques covered in the theoretical content. Students will work in groups to design and implement a security solution for a real-world database. The prerequisite of this course is Introduction to Cryptography and introduction to database.
|
Information storage security
|
BCYNL507 |
امن الأجهزة اللاسلكية والنقالة |
|
Wireless and Mobile Device security
|
BCYNL401 |
شبكات الوسائط المتعددة |
|
Multimedia Networks | BCYNL402 |
مواضيع مختارة في الأمن السيبراني والشبكات | Selected Topics in Cybersecurity and Networking
|
BCYNL403 | |
النظم الموزعة |
|
Distributed Systems
|
BCYNL409 |
الجرائم الإلكترونية |
|
Cyber Crimes
|
BCYNL704 |
كشف التسلل والاستجابة | Intrusion Detection, and Response
|
BCYNL605 | |
فيزياء |
|
Physics
|
BCYNL111 |
Views: 429