توصيف المقرر Course Description  اسم المقرر  رمز المقر
This course provides a holistic overview of the key components of cybersecurity. The course is designed for those interested in learning the various fundamentals of cybersecurity and aspiring to pursue a career in cybersecurity. This course will introduce the principles and practices of information security including security models, Information Security Threats, attacks, and Vulnerabilities. Course Topics include Network security, Application security, Mobile security, IoT and OT security, Data security, Access control principles, Incident Response, Computer Forensics, and risk management. The theoretical side is accompanied by critical thinking challenges and immersive lab experiences using several cybersecurity tools that allow students to apply their knowledge and move into the skill development phase in the class itself. The students must complete the principles of data communication and networks course as a prerequisite for this course.   Principles of cybersecurity BCYN501
This course will provide a comprehensive understanding of different cryptosystems and algorithms, one-way hash functions, public-key infrastructures (PKIs), and the different ways in which cryptography can ensure the privacy and security of online communication. This course will cover the Classical Encryption Techniques, Block Ciphers, Basic Concepts in Number Theory and Finite Fields, Block Cipher Operation, Pseudorandom Number Generation and Stream Ciphers, Public-Key Cryptography (i.e., RSA Algorithm, key-exchange, Hash Functions and Digital Signature). The labs in this course demonstrate the use of encryption tools to protect information systems in organizations. The students must complete the Principles of Cybersecurity course as a prerequisite for this course. 

 

Introduction to Cryptography  BCYN502 
This course highlights and describes routing and switching, explaining how to build local area-network and design for small & medium enterprise networks and use Cisco Labs Techniques. We will explore how Switches, and Routers work on local area-network. The course provides the student with an advanced understanding about architecture, components, and operations of routers and switches in small networks and introduces wireless local area networks (WLAN) and security concepts. Students learn how to configure and troubleshoot routers and switches for advanced functionality using security best practices and resolve common issues with protocols in both IPv4 and IPv6 networks. Cisco Lab Activities will provide students with practical experiences in Routing and Switching. It will be centered on implementation, configuration and troubleshooting of a network. The students must complete the principles of data communication and networks course as a prerequisite for this course.  Routing and switching  BCYN403 
The course introduces secure programming essentials, skills and secure practices requirement in the development of secure applications. The integration of security controls and the association of vulnerabilities mitigation within variant applications like, web applications, utility applications, and old-style applications are introduced and explored. Topics covered including Overview of application security, threats, attacks, and vulnerabilities; Secure Software Development Lifecycle (S-SDLC), secure coding practices for: input validation, authentication, buffer overflow & memory usage, analysis approaches & testing tools, and OWASP & Web-application security. Throughout lab sessions and course-project activities, students will develop their programming skills in secure software development, defensive programming techniques, and some Penetration Testing methods, etc. The prerequisites courses include Web Application Development, Introduction to Cryptography (BCYN502), Principles of Operating Systems (BCIT11), and System Analysis and Design (BCYN217). 

 

Secure Programming  BCYN504 
This course presents a systematic process of objectively obtaining and evaluating evidence regarding Information System’s security incidents caused by an adversary externally or internally. Security incidents will be objectively evaluated to analyze each case and create an audit report with findings.  In this course, students will learn the IT auditing life cycle, from information gathering, planning, testing, reporting and issue tracking, etc. Students will also learn the overall IT audit framework and methodology and how IT audit fits into the overall internal audit function. This course is delivered through lectures, labs and assignments and technical reports. The prerequisite of this course is the principles of cybersecurity.  Information Auditing and Assurance  BCYN605 
Network Security is the discipline that involves implementing measures to protect computer networks from unauthorized access, data breaches, and cyber threats. It entails safeguarding the confidentiality, integrity, and availability of information as it is transmitted and stored within a network. Network security professionals utilize various tools and techniques to identify, prevent, and respond to potential security risks, including firewalls, encryption, intrusion detection systems, vulnerability assessments and Monitoring Traffic on the Network and analysis. The field of network security is essential in ensuring the secure operation of networks in an increasingly interconnected digital landscape.

 

Networks Security BCYN408 
Ethical Hacking is a comprehensive ethical hacking course focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures. Topics include Introduction to Ethical Hacking, Reconnaissance Techniques, System Hacking Phases and Attack Techniques, Network and Perimeter Hacking, Web Application Hacking, Wireless Network Hacking, and Mobile Platform, IoT, and OT Hacking. Theoretical side is accompanied by critical thinking challenges and immersive lab experiences using several security and hacking tools. The students must complete the principles of cybersecurity course as a prerequisite for this course. Upon successful completion of this course, students may take the Certified Ethical Hacker (CEH) certification exam through the EC-Council’s ATC in UST.  Ethical Hacking  BCYN609 
Project management  BCYN719 
Penetration Testing  BCYN612 
Web Application and cloud Security BCYN511 
Digital Forensics  BCYN510 
Advanced Network  BCYN407 
Systems Administration  BCYN406 
Principles of Artificial Intelligence  BCYN218 
In the past Information system development was considered a rapidly changing art. In this course information system development concepts, methodologies and techniques will be covered, reinforced by homework assignments and a project. Deferent structured development approaches will be discussed such as system development life cycle SDLC, rapid application development, and Agile. Many important concepts will also be addressed such as project management, information system strategic planning alignment and the role of information systems in organizations. After the completion of the course student should be able to analyze a problem and design an appropriate solution using a combination of tools and techniques. 

 

System Analysis and Design

 

BCYN217 
This course provides an introduction to the system and the fundamentals of computer organization. It discusses computer systems, which provides an overview of the physical layout and components of a computer used to run software. The course also covers computer organization that overviews the computer’s fundamental building blocks, hardware units, and their interconnection. Topics include data representation and encoding; binary arithmetic; fixed-and floating-point representation; numbering systems; instruction set architecture; memory organization and addressing; I/O; interrupts; internal architecture; instruction pipelining; multi-core architectures; and CPU/ALU basics. Also, topics include Boolean algebra, logic gates, flip-flops, counters, registers, combinational and sequential circuits, K-maps, circuit design, and various digital components.

 

Computer Organization  BCYN216 
 

Wireless and Mobile Device security 

 

BCYNL401 
 

 

Multimedia Networks  BCYNL402 

 

 

 

 

 

IoT Concepts and Application

 

BCYNL408

Selected Topics in Cybersecurity and Networking 

 

BCYNL403 
 

 

Distributed Systems 

 

BCYNL409 
 

 

Cyber Crimes

BCYNL704 
This course introduces the fundamentals of machine learning (ML) and its techniques. It enables students to use ML techniques to build real-world AI applications. It covers the main ML approaches and algorithms including supervised learning (regression and classification), unsupervised learning (dimensionality reduction and clustering), and model evaluating metrics. By the end of this course, students will have master key concepts and gain the practical know-how to quickly and powerfully apply machine learning techniques to solve real-world problems. The prerequisite of this course are linear algebra and introduction to data science.

 

Machine Learning 

 

BCYNL710 
Intrusion Detection, and Response 

 

BCYNL605 
Risk Management and Disaster Recovery

 

BCYNL706 
This course provides students with the knowledge and skills to understand and apply security concepts to information storage using Oracle. Students will learn about the threats and risks to information storage systems, the controls that can be used to mitigate these risks, and how to design and implement security solutions for databases. The course emphasizes practical experience with the security concepts and techniques covered in the theoretical content. Students will work in groups to design and implement a security solution for a real-world database. The prerequisite of this course is Introduction to Cryptography and introduction to database.

 

Information storage security 

 

BCYNL507 
 

 

Physics

 

BCYNL111