This program aims to provide students with the knowledge and skills that enable them to protect information and systems of all sectors and encrypt them without affecting work productivity. It also deals with the development, follow-up and evaluation of policies and legislation that govern the use of information inside and outside the organization, to protect its data from hacking. The program also equips students with knowledge, skills and values that qualify them to join and compete in the labor market and live interaction with society and its institutions. The most important objectives of the program are as follows:
1. Providing students with theoretical competencies and applied practical skills in the field of information security and cyberspace.
2. Preparing students to be qualified human cadres specialized in professions related to analyzing, designing, developing, operating, managing, monitoring and examining safe systems and software in institutions and companies.
3. Enabling students to adapt to the rapid developments in the field of information
security and cyberspace by providing them with solid foundations in its basic concepts, principles, methods and methodologies.
4. Preparing students to serve their communities, whether they are individuals, groups or institutions, by ensuring that safe information, programs and applications are provided to them.
5. Enabling students to develop some skills such as: teamwork, problem-solving, professional advancement, and lifelong independent learning.
Knowledge:
1. Demonstrating knowledge of concepts, terminologies, principles, methods and techniques of information security.
2. Discussing a wide range of technologies, available tools, and practical methods in information security.
3. Expressing professional responsibilities and forming judgments based on legal and ethical principles within the practice of computing.
4. Identifying the needs of users in the field of developing information systems and building secure computer networks
Skills:
1. Determining a set of solutions for modern and advanced methods of intruding and attacking data and computer networks.
2. Evaluating gaps and weaknesses in information systems and computer networks.
3. Determining the time and cost of handling damages resulting from any attack on an information or institutional system.
4. Evaluating the appropriate tools and techniques that handle damages resulting from security breaches
5. Determining the policies, procedures and plans necessary to manage and ensure the security of institution.
Jobs:
1. Data Security Manager
2. Data Security Specialist
3. Information systems security specialist