Master of Science in Cybersecurity
Description:
The Master of Cybersecurity program equips students with the advanced knowledge needed to excel in today's highly competitive technology industry. The program focuses on enterprise cybersecurity and equips students with the knowledge, skills, and ability to prevent and protect enterprise data from the threat of cybercrime. Courses emphasize critical analysis skills, technical skills, and extensive use of online virtual labs. This program is designed for students who wish to pursue a career as an IT professional with the goal of protecting their organization's information from external intrusion. By integrating theory and practice, students will learn about the fundamentals of information systems and how to manage information technology within the framework of cybercrime fundamentals, and the program covers the field of security and legal aspects that affect information security in cyberspace.
Eligible Applicants
Students
Method of study
Courses and Thesis, Courses and Research Project.
Degree
Master
School level
Postgraduate studies
Place of study (Male Students)
Buraydah - Qassim Region - College Headquarters
Place of study (female students)
Buraydah - Qassim Region - College Headquarters (Female Section)
Required specialization
Bachelor of Science in Cybersecurity
Admission from outside the major
Admission of other majors related to computer majors on the condition of passing the supplementary courses approved by the scientific department
Years of study
2
Study period
None
Number of Credit Hours
37
Credits required for graduation
37 for the thesis track and 34 for the research project track
STEP test
60
Other conditions
None
Tuition fees
40,000
Required GPA
of at least 5
3
of at least 4
2
of at least 100
72.5
Preference Mechanism for Admission
GPA
50%
Undergraduate Aptitude Test
50%
Differentiation test
None
Educational goals :
1- Preparing specialists in the field of various cybersecurity technologies and sciences by qualifying manpower to implement the Kingdom's development plans.
2- Meeting the local needs of experienced, highly skilled and ethical researchers to support research activity in the department, the university and the community.
3- Preparing cadres capable of conducting scientific and training programs for employees of institutions and organizations as part of community service activities.
4- Conducting basic scientific research in the field of information security and privacy, enabling the completion of doctoral studies in any of the related fields.
Learning outcomes :
1- The ability to develop new knowledge gained through innovative scientific research that contributes to the overall field of cybersecurity.
2- Ability to communicate effectively in a variety of professional contexts.
3- Ability to analyze complex problems and apply theories and other relevant disciplines in the field to identify solutions.
4- Ability to innovate, design, implement, and evaluate cybersecurity research and investigations.
5- Possesses the skills to effectively use modern technical, digital and IT applications to create innovative digital knowledge and solutions and meet different needs in the field of cybersecurity.
6- Ability to work effectively as a member or leader of a team engaged in appropriate cybersecurity activities.
Tracks :
1- Master of Science in Cybersecurity
Career opportunities:
Career and research opportunities and managerial positions in the following areas:
1- Information Security Analyst.
2- Network Security Engineer.
3- Malware Analyzer
4- Penetration testing.
5- Cybersecurity systems developer.
6- Malware Analyzer.
Science in Cybersecurity
Symbol: MSISR
Issue number: 421
Total hours: 37
Compulsory: 25
Optional: 12
Compulsory courses
First level
Symbol | Name | Hours | My theory | My work | Requirement | Classification |
---|---|---|---|---|---|---|
IT 662 | Principles of Information Security and Safety | 3 | 3 | 0 | Specialty requirements | |
IT 661 | Data security and encryption | 3 | 3 | 0 | Specialty requirements | |
IT 660 | Network security | 3 | 3 | 0 | Specialty requirements |
Second level
Symbol | Name | Hours | My theory | My work | Requirement | Classification |
---|---|---|---|---|---|---|
IT 663 | Web Application Security | 3 | 3 | 0 | Specialty requirements | |
CSC 621 | Search methods | 3 | 3 | 0 | Specialty requirements |
Third level
Symbol | Name | Hours | My theory | My work | Requirement | Classification |
---|---|---|---|---|---|---|
IT 696 | Cybersecurity Research Symposium | 1 | 1 | 0 | Specialty requirements |
Fourth level
Symbol | Name | Hours | My theory | My work | Requirement | Classification |
---|---|---|---|---|---|---|
IT 699 | Mission | 9 | 1 | 0 | Specialty requirements |
Optional courses
Symbol | Name | Hours | My theory | My work | Requirement | Classification |
---|---|---|---|---|---|---|
IT 671 | Security and protection of personal information | 3 | 3 | 0 | Specialty requirements | |
IT 672 | Information security management and policy | 3 | 3 | 0 | Specialty requirements | |
IT 673 | Legal and regulatory aspects of e-commerce | 3 | 3 | 0 | Specialty requirements | |
IT 674 | Security tests: Theory and Practice | 3 | 3 | 0 | Specialty requirements | |
IT 675 | Reliable computing | 3 | 3 | 0 | Specialty requirements | |
IT 676 | Safe programming | 3 | 3 | 0 | Specialty requirements | |
IT 670 | Special Topics in Information Security | 3 | 3 | 0 | Specialty requirements | |
IT 669 | Information security and privacy | 3 | 3 | 0 | Specialty requirements | |
IT 668 | Digital Forensics | 3 | 3 | 0 | Specialty requirements | |
IT 677 | Security for pervasive mobile computing | 3 | 3 | 0 | Specialty requirements | |
IT 666 | Advanced security architectures and network defense | 3 | 3 | 0 | Specialty requirements | |
IT 665 | Cloud Computing Security | 3 | 3 | 0 | Specialty requirements | |
IT 664 | Computer and network forensics | 3 | 3 | 0 | Specialty requirements | |
IT 667 | Database security | 3 | 3 | 0 | Specialty requirements |
Science in Cybersecurity
Symbol: MSISP
Issue number: 421
Total hours: 34
Compulsory: 19
Optional: 15
Compulsory courses
First level
Symbol | Name | Hours | My theory | My work | Requirement | Classification |
---|---|---|---|---|---|---|
IT 662 | Principles of Information Security and Safety | 3 | 3 | 0 | Specialty requirements | |
IT 661 | Data security and encryption | 3 | 3 | 0 | Specialty requirements | |
IT 660 | Network security | 3 | 3 | 0 | Specialty requirements |
Second level
Symbol | Name | Hours | My theory | My work | Requirement | Classification |
---|---|---|---|---|---|---|
CSC 621 | Search methods | 3 | 3 | 0 | Specialty requirements | |
IT 663 | Web Application Security | 3 | 3 | 0 | Specialty requirements |
Third level
Symbol | Name | Hours | My theory | My work | Requirement | Classification |
---|---|---|---|---|---|---|
IT 697 | Research Project (1) | 1 | 1 | 0 | Specialty requirements |
Fourth level
Symbol | Name | Hours | My theory | My work | Requirement | Classification |
---|---|---|---|---|---|---|
IT 698 | Research Project (2) | 3 | 3 | 0 | Specialty requirements |
Optional courses
Symbol | Name | Hours | My theory | My work | Requirement | Classification |
---|---|---|---|---|---|---|
IT 671 | Security and protection of personal information | 3 | 3 | 0 | Specialty requirements | |
IT 672 | Information security management and policy | 3 | 3 | 0 | Specialty requirements | |
IT 673 | Legal and regulatory aspects of e-commerce | 3 | 3 | 0 | Specialty requirements | |
IT 674 | Security tests: Theory and Practice | 3 | 3 | 0 | Specialty requirements | |
IT 675 | Reliable computing | 3 | 3 | 0 | Specialty requirements | |
IT 676 | Safe programming | 3 | 3 | 0 | Specialty requirements | |
IT 670 | Special Topics in Information Security | 3 | 3 | 0 | Specialty requirements | |
IT 669 | Information security and privacy | 3 | 3 | 0 | Specialty requirements | |
IT 668 | Digital Forensics | 3 | 3 | 0 | Specialty requirements | |
IT 677 | Security for pervasive mobile computing | 3 | 3 | 0 | Specialty requirements | |
IT 666 | Advanced security architectures and network defense | 3 | 3 | 0 | Specialty requirements | |
IT 665 | Cloud Computing Security | 3 | 3 | 0 | Specialty requirements | |
IT 664 | Computer and network forensics | 3 | 3 | 0 | Specialty requirements | |
IT 667 | Database security | 3 | 3 | 0 | Specialty requirements |