Master of Science in Cybersecurity
Description:
The Master of Cybersecurity program aims to provide students with advanced knowledge and applied skills to protect data and address cybercrime by combining scientific theories with practical applications. The program focuses on enterprise cybersecurity and prepares competencies capable of driving secure technical solutions and working effectively in diverse professional environments. The program covers the technical, security, legal and ethical aspects of cybercrime, and provides an inspiring learning and research environment that encourages innovation and partnerships with research laboratories and technology companies. It also contributes to the preparation of competitive competencies that support scientific research and sustainable national development, and has been conditionally aligned with the National Cybersecurity Authority (Cyber Education).
Eligible Applicants
Students
Method of study
Courses and Thesis, Courses and Research Project.
Degree
Master
School level
Postgraduate studies
Place of study (Male Students)
Buraydah - Qassim Region - College Headquarters
Place of study (female students)
Buraydah - Qassim Region - College Headquarters (Female Section)
Required specialization
Bachelor of Science in Cybersecurity
Admission from outside the major
Admission of other majors related to computer majors on the condition of passing the supplementary courses approved by the scientific department
Years of study
2
Study period
None
Number of Credit Hours
37
Credits required for graduation
37
STEP test
60
Other conditions
None
Tuition fees
40,000
Required GPA
of at least 5
3
of at least 4
2
of at least 100
72.5
Preference Mechanism for Admission
GPA
50%
Undergraduate Aptitude Test
50%
Differentiation test
None
Educational goals :
1- Providing educational, research and professional services in the field of cybersecurity
2- Preparing competitive competencies and contributing to the promotion of scientific research and sustainable national development
3- Supporting and encouraging scientific and applied research and innovation to promote sustainable development.
4- Strengthening local partnerships with research laboratories and technology companies.
Learning outcomes :
1- Explain the theories of cybersecurity and the fundamentals of software development, enabling the characterization of computer solutions according to sound scientific methodologies.
2- Identify software development principles and research methodologies to design, evaluate, and optimize cybersecurity solutions, incorporating contemporary developments and security considerations.
3- Communicate effectively in a variety of professional contexts.
4- Analyze complex issues and apply the principles of cybersecurity and other IT disciplines in order to identify appropriate solutions.
5- Design, implement, and evaluate a computing-based solution to meet a specific set of computing requirements in the context of the cybersecurity discipline.
6- Possess the necessary skills to effectively use modern technical and digital applications and information technologies, to shape knowledge and develop innovative digital solutions that meet various needs in the field of cybersecurity.
7- Work effectively as a team member or leader in activities related to the cybersecurity discipline.
8. Recognize professional responsibilities and make informed decisions in computing practice based on legal and ethical principles.
Tracks :
1- Master of Science in Cybersecurity
Career opportunities:
- Information Security Analyst: Monitoring systems and detecting and responding to security threats.
- Network Security Engineer: Design and develop a network infrastructure that is secure against attacks.
- Malware/Malware Analyst: Analyze and disassemble malware and understand attack mechanisms.
- A penetration tester: Run tests to discover vulnerabilities and strengthen protection.
- Cybersecurity systems developer: Create and implement advanced security solutions to protect data and digital architectures.
- Information Security Manager: Leading organizational security strategies at the managerial level.
- Academic or industrial researcher: Contribute to the development of new cybersecurity technologies and solutions.
- Digital Investigations Expert: Analyze digital evidence and support cases related to cybercrime.
- Cybersecurity consultant: Provide security consulting to organizations to ensure compliance with standards and laws.
Science in Cybersecurity
Symbol: MSISR
Issue number: 421
Total hours: 37
Compulsory: 25
Optional: 12
Compulsory courses
First level
| Symbol | Name | Hours | My theory | My work | Requirement | Category |
|---|---|---|---|---|---|---|
| IT 662 | Principles of Information Security and Safety | 3 | 3 | 0 | Specialty requirements | |
| IT 661 | Data security and encryption | 3 | 3 | 0 | Specialty requirements | |
| IT 660 | Network security | 3 | 3 | 0 | Specialty requirements |
Second level
| Symbol | Name | Hours | My theory | My work | Requirement | Category |
|---|---|---|---|---|---|---|
| IT 663 | Web Application Security | 3 | 3 | 0 | Specialty requirements | |
| CSC 621 | Search methods | 3 | 3 | 0 | Specialty requirements |
Third level
| Symbol | Name | Hours | My theory | My work | Requirement | Category |
|---|---|---|---|---|---|---|
| IT 696 | Cybersecurity Research Symposium | 1 | 1 | 0 | Specialty requirements |
Fourth level
| Symbol | Name | Hours | My theory | My work | Requirement | Category |
|---|---|---|---|---|---|---|
| IT 699 | Mission Statement | 9 | 1 | 0 | Specialty requirements |
Optional courses
| Symbol | Name | Hours | My theory | My work | Requirement | Category |
|---|---|---|---|---|---|---|
| IT 671 | Security and protection of personal information | 3 | 3 | 0 | Specialty requirements | |
| IT 672 | Information security management and policy | 3 | 3 | 0 | Specialty requirements | |
| IT 673 | Legal and regulatory aspects of e-commerce | 3 | 3 | 0 | Specialty requirements | |
| IT 674 | Security tests: Theory and Practice | 3 | 3 | 0 | Specialty requirements | |
| IT 675 | Reliable computing | 3 | 3 | 0 | Specialty requirements | |
| IT 676 | Safe programming | 3 | 3 | 0 | Specialty requirements | |
| IT 670 | Special Topics in Information Security | 3 | 3 | 0 | Specialty requirements | |
| IT 669 | Information security and privacy | 3 | 3 | 0 | Specialty requirements | |
| IT 668 | Digital Forensics | 3 | 3 | 0 | Specialty requirements | |
| IT 677 | Security for pervasive mobile computing | 3 | 3 | 0 | Specialty requirements | |
| IT 666 | Advanced security architectures and network defense | 3 | 3 | 0 | Specialty requirements | |
| IT 665 | Cloud Computing Security | 3 | 3 | 0 | Specialty requirements | |
| IT 664 | Computer and network forensics | 3 | 3 | 0 | Specialty requirements | |
| IT 667 | Database security | 3 | 3 | 0 | Specialty requirements |
Science in Cybersecurity
Symbol: MSISP
Issue number: 421
Total hours: 34
Compulsory: 19
Optional: 15
Compulsory courses
First level
| Symbol | Name | Hours | My theory | My work | Requirement | Category |
|---|---|---|---|---|---|---|
| IT 662 | Principles of Information Security and Safety | 3 | 3 | 0 | Specialty requirements | |
| IT 661 | Data security and encryption | 3 | 3 | 0 | Specialty requirements | |
| IT 660 | Network security | 3 | 3 | 0 | Specialty requirements |
Second level
| Symbol | Name | Hours | My theory | My work | Requirement | Category |
|---|---|---|---|---|---|---|
| CSC 621 | Search methods | 3 | 3 | 0 | Specialty requirements | |
| IT 663 | Web Application Security | 3 | 3 | 0 | Specialty requirements |
Third level
| Symbol | Name | Hours | My theory | My work | Requirement | Category |
|---|---|---|---|---|---|---|
| IT 697 | Research Project (1) | 1 | 1 | 0 | Specialty requirements |
Fourth level
| Symbol | Name | Hours | My theory | My work | Requirement | Category |
|---|---|---|---|---|---|---|
| IT 698 | Research Project (2) | 3 | 3 | 0 | Specialty requirements |
Optional courses
| Symbol | Name | Hours | My theory | My work | Requirement | Category |
|---|---|---|---|---|---|---|
| IT 671 | Security and protection of personal information | 3 | 3 | 0 | Specialty requirements | |
| IT 672 | Information security management and policy | 3 | 3 | 0 | Specialty requirements | |
| IT 673 | Legal and regulatory aspects of e-commerce | 3 | 3 | 0 | Specialty requirements | |
| IT 674 | Security tests: Theory and Practice | 3 | 3 | 0 | Specialty requirements | |
| IT 675 | Reliable computing | 3 | 3 | 0 | Specialty requirements | |
| IT 676 | Safe programming | 3 | 3 | 0 | Specialty requirements | |
| IT 670 | Special Topics in Information Security | 3 | 3 | 0 | Specialty requirements | |
| IT 669 | Information security and privacy | 3 | 3 | 0 | Specialty requirements | |
| IT 668 | Digital Forensics | 3 | 3 | 0 | Specialty requirements | |
| IT 677 | Security for pervasive mobile computing | 3 | 3 | 0 | Specialty requirements | |
| IT 666 | Advanced security architectures and network defense | 3 | 3 | 0 | Specialty requirements | |
| IT 665 | Cloud Computing Security | 3 | 3 | 0 | Specialty requirements | |
| IT 664 | Computer and network forensics | 3 | 3 | 0 | Specialty requirements | |
| IT 667 | Database security | 3 | 3 | 0 | Specialty requirements |