A simple icon, consisting of a series of links surrounded by a circle, is a common symbol for a connection or hyperlink. The lines of the icon are outlined in a dark black color on the background, with the addition of military elements of the Saudi national identity such as the Ghutra, Shamaa, and Saudi Bisht, to reflect the distinctive local character of Qassim University.
Links to official Saudi educational websites end with edu.sa
All links to official educational websites of government agencies in Saudi Arabia end with .edu.sa.
Black leather minimalist gesture tag, black circular grip, topped with a clear depiction of a Saudi tunic with a shamma and aqal, emphasizing the features of the Saudi bisht. This design symbolizes the concept of security and digital data privacy and reflects the identity of Qassim University.
protocol for encryption and security. HTTPS for encryption and security.
Secure websites in the Kingdom of Saudi Arabia use the HTTPS protocol for encryption.
Digital Government Authority

College of Computer

Cybersecurity Department

The interior space of the building is characterized by its spaciousness and modern design, where the floor covered with shiny tiles shimmers and blue seats are organized in an elegant way, and potted plants are spread throughout the place, and a corridor leads to a number of halls and rooms. The lighting floods the natural place through large windows, while the walls of the building appear in shades of cream and light woods, above the entrance to the corridor is a sign bearing the name of the Cyber Security Department written in Arabic in a prominent and clear manner.
Head of Department:
Dr.. Dr. Faisal bin Haji Al-Huwaikem
Office :
- L1-R-2228
Phone number :
20927
e-mail:
coc-cy@qu.edu.sa

An Overview

The Department of Cybersecurity aspires to be a leader locally and internationally, providing high-quality educational content in line with technological changes, and preparing scientific research that promotes cybersecurity.

Mission

Preparing an ideal academic environment for acquiring knowledge and skills in the field of cybersecurity, which effectively contributes to achieving national development goals.

An Overview

The Department of Cybersecurity was established by a decision of the Council of University Affairs No. (24/19/45) and under the guidance of His Excellency the President of Qassim University in Rajab 1445 A.H. It specializes in educating and training students in the field of cybersecurity and protecting computer systems, networks, and data. The Cybersecurity Department focuses on studying cybersecurity threats and digital challenges, developing strategies and techniques to protect information, and qualifying students to face electronic challenges in the digital environment.

Objectives :

1- Apply cybersecurity knowledge and skills that contribute to identifying requirements, analyzing cybersecurity challenges, and designing appropriate solutions by following best practices.
2- Qualifying specialized and distinguished graduates in the field of cybersecurity to meet the needs of the labor market and serve the community.
3. Promote active participation in the field of cybersecurity as individuals, members or leaders of teams.
4- Equipping graduates with scientific research skills to enrich their active involvement in continuous learning and career development.
5- Providing graduates with leadership skills, effective communication skills, and professional ethics through innovative thinking, teamwork, and self-development to enhance their effectiveness in the labor market.

Educational outputs:
1- Understanding the theories and fundamentals of cybersecurity to characterize cybersecurity solutions.
2- Communicate effectively in a variety of professional contexts.
3- Analyze complex computing issues, and apply the principles of computing and other related disciplines to identify appropriate solutions.
4- Design, implement, and evaluate computer-based solutions to meet a specific set of cybersecurity requirements.
5- Applying cybersecurity principles and practices to maintain continuity of operations in the presence of risks and threats.
6- Work effectively as a member or leader of a team engaged in cybersecurity activities.
7- Recognize professional responsibilities and make informed judgments in the practice of computing, based on legal and ethical principles.

Cookies

This website uses special cookies to ensure ease of use, improve your browsing experience, and clarify the terms and policies related to About user privacy. By continuing to browse this website, you acknowledge that you accept the use of cookies and the terms of the Privacy Policy