Providing scientific and practical knowledge in the field of cybersecurity and enhancing students' levels through continuous and self-learning via a distinguished program aligned with labor market outcomes and community needs.
1.1 Identify the concepts, fundamentals, and various theories related to cybersecurity, information systems, and networks.1.2 Understand the risks associated with cybersecurity and take technical and ethical responsibility for them.1.3 Understand information systems, their organization, security, and their relation to data protection.
2.1 Apply basic cybersecurity, information systems, and network concepts.2.2 Acquire skills to analyze cybersecurity problems and design appropriate solutions.2.3 Secure information systems from any risks or security threats.
3.1 Ability to communicate and positively influence within work teams while performing individual roles seamlessly with the group.3.2 Practice cybersecurity in accordance with legal and ethical principles.
Course details
This course is the first of two general English courses for Humanities & Management professions students. It targets the development of the learners’ English language skills. Learners will have the opportunity to develop the four language skills (listening, speaking, reading, and writing) based on the level they have previously acquired. The course starts from Beginning of A0 level of the CEFR (Common European Framework Reference). By the end of the course, learners are expected to achieve the End of A0 level of the CEFR..
This course provides students with the concepts and issues related to securing information systems and establishing policies necessary to implement protection in the field of cybersecurity. It covers topics such as terminology, historical perspectives on networks and security, security issues, trends, security sources, and the role of policies, individuals, and processes in the field of information security. By the end of the course, students should be able to identify information security risks, develop an information security policy, and outline a path for implementing and applying the policy..
This course covers the fundamental skills that students should master to effectively interact with computers. It introduces the main components of computers, their functions, and how they operate. After mastering these skills, students will be able to complete tasks using basic computer applications. The course also highlights e-learning and how to engage with its applications, in addition to the fundamental concepts of information security and protection measures. The course concludes with an overview of the ethics of interacting with computers..
This course aims to introduce students to the different types of digital crimes that can be committed using electronic devices against internet users. It covers the basics of cybersecurity and the protection of these users. Additionally, students are introduced to the laws and regulations established by the Communications and Information Technology Commission in the Kingdom of Saudi Arabia..
This course focuses on developing students' conceptual and practical skills in building software projects using one of the programming languages to an advanced level. It includes analysis, design, and implementation of solutions to programming problems..
The course includes sets and operations on them, real number systems, algebraic operations, algebraic fractions and their simplifications, exponents and roots, linear equations, and analytic geometry..
This course is the second of two general English courses for Humanities & Management professions students. It targets the development of the learners’ English language skills. Learners will have the opportunity to develop the four language skills (listening, speaking, reading, and writing) based on the level they have previously acquired. The course starts from Beginning of A1 level of the CEFR (Common European Framework Reference). By the end of the course, learners are expected to achieve the End of A1 level of the CEFR..
This course focuses on building students' conceptual and practical skills related to information security operations, application lifecycle management, disaster recovery, software protection from piracy, and conducting necessary investigations..
This course provides students with concepts related to data encryption using symmetric and asymmetric encryption techniques, as well as digital signature techniques and secure key distribution required for the symmetric (analog) encryption process..
This course aims to provide students with technical knowledge of communication and networking systems, communication methods applied to digital and non-digital data, and an overview of networks, their types, and operational methods. It also covers the protocols necessary for communication between different types of networks and levels of communication between computers, enabling students to effectively benefit from the knowledge and skills provided..
This course provides students with concepts related to databases, system modeling, and representation using ERD, converting them into tables, and translating them into practical applications. It also covers fundamental concepts of SQL database programming and the practical application of these concepts through commands and coding..
This course is designed for teaching English for Specific Purposes to students in science and engineering disciplines. It aims to develop learners' English language skills through contextualized learning materials. Students will have the opportunity to enhance their four language skills and acquire terminology, vocabulary, and language styles related to their profession. The course starts at the Beginning of B1 level according to the Common European Framework of Reference for Languages (CEFR). By the end of the course, learners are expected to reach the End of B1 level according to the CEFR..
This course provides fundamental concepts for securing network operations and connected devices. It introduces students to various sources of network threats, methods to resist and secure the network against them. Special focus is given to training on handling systems that secure devices against viruses and their related issues..
This course introduces students to modern internet and web technologies. It also covers concepts and strategies for designing secure websites and applications. The course discusses programming languages and tools for web design. It aims to teach students the necessary concepts and skills to secure websites and web applications against cyber threats and electronic attacks..
The course on Incident Response and Forensic Analysis focuses on equipping students with the knowledge and skills necessary for effective response to and analysis of cybersecurity incidents. The course includes studying a variety of topics related to digital forensic analysis, including techniques, tools used, legal procedures, and relevant ethics..
This course aims to study the foundational concepts and principles on which the components of the operating system are based: program management, input/output management, and memory management..
This course provides content that helps students master the same techniques used by hackers to breach network systems, ethically leveraging them to protect the infrastructure of organizations and individuals. The course focuses on the most common security domains to provide a practical approach to basic security systems. Students will learn how to assess the security of computer systems using penetration testing techniques: system and application scanning, secure testing, ethical infiltration, and gaining hands-on experience in reconnaissance, phishing, and exploitation techniques..
This course addresses practical skills in conducting research, solving issues related to computer applications, information security methods, and software development. It includes project selection, studying and identifying requirements, problem definition, solution design, and implementing the proposed solution, while applying knowledge from computer science, information systems, and cybersecurity courses, or a combination of them. It covers steps for design and analysis, project planning, execution, and management. The course also focuses on skills for preparing written technical reports in the field of computing and information..
This course provides students with practical training opportunities in the field of cybersecurity within organizations, allowing them to apply the skills and knowledge gained in the classroom to real-world problems in a professional work environment..
Study Plan