A simple icon, consisting of a series of links surrounded by a circle, is a common symbol for a connection or hyperlink. The lines of the icon are outlined in a dark black color on the background, with the addition of military elements of the Saudi national identity such as the Ghutra, Shamaa, and Saudi Bisht, to reflect the distinctive local character of Qassim University.
Links to official Saudi educational websites end with edu.sa
All links to official educational websites of government agencies in Saudi Arabia end with .edu.sa.
Black leather minimalist gesture tag, black circular grip, topped with a clear depiction of a Saudi tunic with a shamma and aqal, emphasizing the features of the Saudi bisht. This design symbolizes the concept of security and digital data privacy and reflects the identity of Qassim University.
protocol for encryption and security. HTTPS for encryption and security.
Secure websites in the Kingdom of Saudi Arabia use the HTTPS protocol for encryption.
Digital Government Authority

College of Computer

Master of Science in Cybersecurity

Description:

The Master of Cybersecurity program equips students with the advanced knowledge needed to excel in today's highly competitive technology industry. The program focuses on enterprise cybersecurity and equips students with the knowledge, skills, and ability to prevent and protect enterprise data from the threat of cybercrime. Courses emphasize critical analysis skills, technical skills, and extensive use of online virtual labs. This program is designed for students who wish to pursue a career as an IT professional with the goal of protecting their organization's information from external intrusion. By integrating theory and practice, students will learn about the fundamentals of information systems and how to manage information technology within the framework of cybercrime fundamentals, and the program covers the field of security and legal aspects that affect information security in cyberspace.

Eligible Applicants
Students
Method of study
Courses and Thesis, Courses and Research Project.
Degree
Master
School level
Postgraduate studies
Place of study (Male Students)
Buraydah - Qassim Region - College Headquarters
Place of study (female students)
Buraydah - Qassim Region - College Headquarters (Female Section)
Required specialization
Bachelor of Science in Cybersecurity
Admission from outside the major
Admission of other majors related to computer majors on the condition of passing the supplementary courses approved by the scientific department 
Years of study
2
Study period
None
Number of Credit Hours
37
Credits required for graduation
37 for the thesis track and 34 for the research project track
STEP test
60
Other conditions
None
Tuition fees
40,000
Required GPA
of at least 5
3
of at least 4
2
of at least 100
72.5
Preference Mechanism for Admission
GPA
50%
Undergraduate Aptitude Test
50%
Differentiation test
None

Educational goals :

1- Preparing specialists in the field of various cybersecurity technologies and sciences by qualifying manpower to implement the Kingdom's development plans.
2- Meeting the local needs of experienced, highly skilled and ethical researchers to support research activity in the department, the university and the community.
3- Preparing cadres capable of conducting scientific and training programs for employees of institutions and organizations as part of community service activities.
4- Conducting basic scientific research in the field of information security and privacy, enabling the completion of doctoral studies in any of the related fields.

Learning outcomes :

1- The ability to develop new knowledge gained through innovative scientific research that contributes to the overall field of cybersecurity.
2- Ability to communicate effectively in a variety of professional contexts.
3- Ability to analyze complex problems and apply theories and other relevant disciplines in the field to identify solutions.
4- Ability to innovate, design, implement, and evaluate cybersecurity research and investigations.
5- Possesses the skills to effectively use modern technical, digital and IT applications to create innovative digital knowledge and solutions and meet different needs in the field of cybersecurity.
6- Ability to work effectively as a member or leader of a team engaged in appropriate cybersecurity activities.

Tracks :

1- Master of Science in Cybersecurity

Career opportunities:

Career and research opportunities and managerial positions in the following areas:
1- Information Security Analyst.
2- Network Security Engineer.
3- Malware Analyzer
4- Penetration testing.
5- Cybersecurity systems developer.
6- Malware Analyzer.

Cookies

This website uses special cookies to ensure ease of use, improve your browsing experience, and clarify the terms and policies related to About user privacy. By continuing to browse this website, you acknowledge that you accept the use of cookies and the terms of the Privacy Policy