قسم شبكات الحاسوب والامن السبراني من الأقسام الأساسية في كلية علوم الحاسوب وتقنية المعلومات، ويمنح الطالب درجة البكالوريوس في تخصص الشبكات بعد اكماله بنجاح 135 ساعة معتمدة، حسب متطلبات القسم العلمي وبمعدل لا يقل عن 2 نقطة من مجموع 4 نقاط، و في فترة ثمان فصول دراسية. ويجوز للطالب التخرج في مدة لا تقل عن 7 فصول اعتيادية أو 6 فصول اعتيادية وفصلين صيفيين، على أن لاتتجاوز عدد 10 فصول دراسية في تخصص الشبكات.
1-اتاحة الفرص وتمكين الشباب الناشئ من الحصول على تعليم عالي في مجال الشبكات وامن السيبراني، حيث يعد هذا التخصص من اهم المجالات الحيوية التي تختص بإنشاء شبكات الحاسوب وضمان امنها المعلوماتي من الهجمات الالكترونية والقرصنة والاختراقات بانواعها.
2-إعداد المتخصصين في انظمة الشبكات الحديثة وامن المعلومات المتطورة تلبية للاحتياجات الضرورية وتطبيقاتها العلمية والعملية الداعمة لتطور المجتمع ومواكبة المجتمعات المتطورة.
3-امداد المجتمع بكفاءات متميزة لها القدرة على إعداد البرامج التطبيقية لمنظومات الشبكات والامن السيبراني المتطورة وتحسين ادائها، وضمان تشغيلها على الوجه الامثل بحيث تسهم في تطوير المجتمع وتقليص الاعتماد على الخبرات الاجنبية.
4-تعزيز ثقة الطالب من خلال دمجه في المجتمع عمليا عن طريق إسناد بعض المهام كمتطلبات دراسية مثل البحوث الميدانية وورقات العمل في المحافل والانشطة العلمية.
5-ادراج انظمة الشبكات المتطورة وبرامج امن المعلومات الحديثة ضمن الفاعليات التعليمية و ترسيخ المفاهيم التطبيقية وتوظيفها في تعزيز مفهوم الإدارة الإلكترونية والعمل علي تطبيقها بما يخدم المجتمع.
6-توفير بيئة العمل في مجموعات متجانسة تعمل بعقلية الفريق الواحد وذلك من خلال بناء الشراكات والتعاون مع الأقسام الاخرى من داخل وخارج الكلية والجامعة بما يسهم في الاستفادة من تبادل المعلومات والخبرات في تطبيق التكنولوجيا الحديثة في البحث العلمي الخاصة بأنظمة الاتصالات الامنة والموثوقة.
7-المشاركة بشكل ايجابي في الفعاليات الأكاديمية المحلية منها والدولية وعقد الندوات والمؤتمرات وورش العمل مما يضيف في فتح المجالات الحيوية ويرفع من افق التفكير للطلاب والخريجين.
أ. المعرفة والفهم
أ.1 معرفة الطالب المفاهيم الأساسية لتقنية المعلومات وشبكات الحاسوب والامن السيبراني وأنماط نظم الحوسبة
أ.2 تمييز أنواع التهديدات السيبرانية، وأنظمة كشف التسلل (IDS) وطرق الدفاع مثل الجدران النارية، التشفير، والمصادقة متعددة العوامل.
أ.3 تحديد منهجيات تحليل المخاطر الأمنية في الشبكات والتطبيقات، وطرق التقييم باستخدام معايير مثل NIST وISO/IEC 27001.
أ.4 تعريف مبادئ التشفير الكلاسيكي والحديث (Cryptography)، بما في ذلك التشفير المتماثل وغير المتماثل وتطبيقاته في أمن الشبكات.
أ.5 شرح البنية التحتية للمفاتيح العامة (PKI)، واستخدامها في حماية الاتصالات وتوقيع البيانات.
أ.6 معرفة قوانين وأخلاقيات الأمن السيبراني، مثل حقوق الخصوصية، استخدام البيانات، والأطر القانونية للأمن الرقمي.
أ.7 شرح التقنيات الحديثة مثل الأمن في الحوسبة السحابية، إنترنت الأشياء (IoT Security)، وأمن الشبكات اللاسلكية.
أ.8 معرفة بنية شبكات الحاسوب (Computer Network Architecture) بما فيها طبقات OSI، بروتوكولات TCP/IP، وطرق التوجيه والتحويل.
أ.9 التمييز بين تقنيات الوصول المختلفة في الشبكات (مثل Ethernet، Wi-Fi، LTE، 5G) ومعرفة خصائص الأداء والأمان لكل منها.
أ.10 تحليل التهديدات الناشئة مثل هجمات الهندسة الاجتماعية، وهجمات Zero-Day، والهجمات عبر الذكاء الاصطناعي.
ب. المهارات الذهنية
ب.1 تحليل حوادث الهجمات الأمنية وتحديد مصدر الخلل باستخدام التفكير المنطقي.
ب.2 مقارنة الطالب البنى الرياضية والمنطقية المستخدمة في بناء الخوارزميات..
ب.3 تفكيك الأنظمة المعقدة إلى مكونات قابلة للفهم والمعالجة الأمنية.
ب.4 المقارنة بين حلول أمنية متعددة واختيار الأنسب بحسب الموارد والمخاطر.
ب.5 اتخاذ قرارات في ظل تهديدات طارئة (مثل هجمات يوم الصفر).
ب.6 موازنة القرارات الأمنية بين الأداء والتكلفة ومستوى الأمان المطلوب
ب.7 تصميم حلول جديدة للمشكلات غير التقليدية (مثل تأمين IoT أو الحوسبة السحابية).
ب.8 استخدام تقنيات الذكاء الاصطناعي أو التعلم الآلي لتحسين الاستجابة للهجمات.
ج. المهارات العملية او المهنية
ج.1 تركيب مكونات الشبكات السلكية واللاسلكية (مثل الراوترات والسويتشات ونقاط الوصول).
ج.2 إعداد عناوين IP، وتقسيم الشبكات (Subnetting)، وتطبيق البروتوكولات (مثل OSPF, BGP, DHCP, DNS).
ج.3 تنفيذ شبكات LAN/WAN وVPN باستخدام أدوات مثل Cisco Packet Tracer وGNS3.
ج.4 تركيب وتكوين الجدران النارية (Firewalls) مثل pfSense وCisco ASA.
ج.5 إدارة أنظمة كشف التسلل/المنع (IDS/IPS) مثل Snort وSuricata.
ج.6 تنفيذ اختبارات الاختراق (Penetration Testing) باستخدام أدوات مثل Metasploit, Nmap, Burp Suite.
ج.7 تطبيق تقنيات التشفير والهوية الرقمية باستخدام أدوات مثل OpenSSL وKali Linux.
ج.8 إعداد سياسات النسخ الاحتياطي، والتعافي من الكوارث، وخطط استجابة الحوادث (Incident Response Plans).
ج.9 تطوير سكربتات أمنية بلغة Python، Bash أو PowerShell لأتمتة مهام الشبكة أو كشف التهديدات.
ج.10 إعداد الطالب تقنيات التحرير اللغوي والمراجعة لضبط الوثائق التقنية المكتوبة بالعربية والإنجليزية.
د. المهارات العامة
د.1 التعبير بوضوح عن الأفكار التقنية شفهياً وكتابياً، سواء لفنيين أو غير فنيين.
د.2 إعداد عروض تقديمية احترافية وشرحها بثقة أمام لجان أو زملاء أو إدارات.
د.3 المشاركة بفعالية في الاجتماعات والمناقشات الجماعية.
د.4 التعاون ضمن فرق متعددة التخصصات (مثل فرق الشبكات، البرمجة، الأمن، والإدارة.
د.5 احترام وجهات النظر المختلفة، والعمل بروح الفريق لتحقيق الأهداف المشتركة.
د.6 حل النزاعات المهنية بأسلوب احترافي ومبني على الاحترام المتبادل.
د.7 التعامل مع المواقف غير المتوقعة بسرعة وفعالية.
تعزيز الثقة المهنية من خلال تطبيق المفاهيم والمعايير العلمية الخاصة بتصميم شبكات الحاسوب وانظمة الاتصالات بالطرق الحديثة .
الوقوف على احدث التقنيات ومواكبة مستجدات صناعة شبكات الحاسوب ومنظومات تبادل البيانات وايضا القدرة على فهم وتحليل المشاكل العملية وإيجاد الحلول المناسبة لها.
القدرة على المساهمة الايجابية والرقي بمؤسسات المجتمع في الاتجاه نحو تطبيق الإدارة الإلكترونية من خلال الثقة في تأسيس الشبكات ذات الكفاءة والاداء المتميز.
القدرة على الاستفادة من التطورات التكنولوجية وتحديثاتها المتجددة من خلال تطبيق اساليب شبكات الحاسوب وتقنية المعلومات المتطورة.
نشر الوعي والمعرفة في المجالات الهندسية وتقنية المعلومات بما يساهم في حل المشاكل بالأساليب العلمية المتطورة وذلك عبر اعتماد عناصر نظم الاتصالات وفق المعايير الدولية .
القدرة على استخدام الطرق والأساليب العلمية الحديثة المعول عليها في ترسيخ البحث العلمي واستنباط الحلول.
توظيف منهجية علم الشبكات وتقنية المعلومات بصورة مثلى تسهم ايجابيا في تطبيق المفاهيم والتطبيقات الهندسية.
استيعاب القدرات التي تفضي الى تطوير وتحليل شبكات الحاسوب وتقنية المعلومات للتغلب على مشاكل الشبكات والأمن من خلال خلق توازن ملائم بين الاحتياجات الأمنية ، والاهتمامات التجارية وكذلك الحفاظ على سرية البيانات و سلامة الانظمة.
القدرة على تحديد وتحليل احتياجات المستخدم وأخذها بعين الاعتبار في إنشاء وتقييم وإدارة شبكات المعلومات.
امتلاك المؤهلات الاكاديمية والتقنية المخولة لتصميم وتنفيذ وتقييم تقنيات الشبكات وتأسيس نظم الاتصالات واختيار البرامج المناسبة للمهام المحددة، وكذلك تحليل أثر النظم القائمة على التطبيقات المستقبلية المحتملة.
aهذا المقرر يتناول الحديث على اللغة العربية، ويركز على النحو والبلاغة والصرف في المستوى الأول، ولقد حوى الحديث على الكلمة وأقسامها، ثم المعرب والمبني، وأقسام الفعل، والمرفوعات. ثم ذكر البلاغة، وأنواع الأساليب، والتشبيه وأقسامه. كما أنه تطرق إلى بعض النصوص الأدبية ليتمرن الطالب على قراءتها.
aThe course is designed to meet the needs of student majoring in Engineering , IT and Math. It is introductory courses in Newtonian mechanics with topics include: Vectors, motion in one dimension, motion in a plane, Newton’s laws, work and energy, potential energy, momentum, Kinematics of rotational motion, dynamics of rotational motion, elasticity, and fluid mechanics.
aEnglish for IT 1 is an ESP course that introduces the students to the language encountered while studying in the field of IT. The course includes readings and vocabulary exercises designed to develop the students’ skills in the English language in general and the language of the professions related to IT, in particular. Students develop their writing skills utilizing the sentence and paragraph structure for a coherent writing.
aThe course contains a range of ideas concerning Functions, domain and range of functions, linear functions, polynomials, expositional functions, logarithmic functions, trigonometric functions (trigonometric identities), hyperbolic functions, inverse of trigonometric functions, inverse of hyperbolic functions and derivatives of functions. It also concerning with matrices and its applications, including operations appropriate in specialized applications and Determinants (some properties)and Inverse of a matrix. The course shows how to formulate algorithms to solve systems of linear equations. It also includes techniques of vector spaces for constructing important mathematical structures, illustrated by examples. Systems of linear equations (Gauss-Jordan elimination, Matrices method, Cramer’s method)
aDefinitions Importance, Scope and Limitations of Statistics – Sources of Data Collection – Classification and Representation of Data Frequency Distribution. Measures of Central Tendency – Measures of Dispersion and Skewness – Ideas about Attributes and Association – Simple Correlation and Simple Regression Permutation and Combinations – Combinatorial problems – Sample Space – Events – Counting of sample points – Classical and Axiomatic definitions of Probability – Marginal and Conditional probability – Baye’s Theorem – Concept of Random Variable Probability Function. Expectation and Variance of Random Variables – Ideas of Bernoulli , Binomial , Poisson and Normal Distributions .
aThe course contains a range of ideas concerning L’Hospital Rule, Taylor series and Maclaurin series. It also concerning Integral of functions in part (1) (using anti-derivatives). Integration techniques (Substitution technique, Integration by Parts, trigonometric substations, completing the square, partial fractions). Multiple integral (double integrals, triple integrals), applications (area, volumes, moments and center of mass).
aEnglish for IT 2 is an ESP course that continues to expose the students to the language encountered while studying in the field of IT. The course is a continuation of English for IT1 and includes readings and vocabulary exercises designed to further develop the students’ skills in the English language in general and the language of the professions related to IT, in particular. Grammar, and writing in topics related to IT are also covered.
aIn this course students will become acquainted with the forms, functions and rhetorical lives of technical documents. Students will examine and produce a variety of technical documents
aThis course prepares students to conduct research in Computer Science & information technology. The course involves multiple topics including time management, writing and presentation skills, and general considerations for experiment design and planning. It introduces students to concepts, methods, and techniques associated with Computer Sciences research in general. It covers oral and written communication skills. These Skills and knowledge gained from this course will prepare students to conduct and to communicate their own research, as well as to be knowledgeable consumers of others’ research.
Understand the history of how computer technology unfolded, with particular emphasis on the “generations”. Understand how people and events affected the development of computers. Identify the basic components of computer system: input, processing, output and storage. Understand the difference between the difference types of software. Identify the components of the central processing unit and how they work together to form a system and interact with memory. Appreciate the need for the different applications included in the accessories of an Operating System. Know how the commands work in both GUI (Graphical User Interface) and CUI (Character User Interface) environment. |
This course is to provide an introduction to basic programming techniques including the following: Problem solving skills. Understand flowcharting tools. Use the proper tool for proper operation. Learn the necessary properties of algorithms: input, output, definiteness, correctness, finiteness, effectiveness, and generality. Understand how to analyze the given problem scientifically and not by intuition. Understand how to write an algorithm to solve a given problem. Convert the algorithm into flowchart and ultimately to a given programming language. Introduction to program design and problem solving using the C programming language.
Review to program design and problem solving using the C programming language. Programming topics include control structures, functions, arrays, pointers, and file I/O. Control Statements Algorithms Pseudo-code, Selection Statement Repetition Statement Formulating Algorithms Compound Assignment Operators, Primitive data Types, Repetition Statement, Multiple-Selection Statement, Logical Operators. Functions Program Modules in C Declaring and using Functions Passing arguments by values and by reference Recursive functions Argument Promotion and Casting Math library functions Scope of Declarations. Arrays Declaring and Creating Arrays Examples Using Arrays Passing Arrays to Methods Multidimensional Arrays. Pointers and Strings Introduction to pointers and pointer arithmetic. Directly and indirectly referencing a variable Pointer operators & and * Pass-by-reference with pointer arguments Introduction to Strings and String manipulations Library string manipulation functions. |
This course aims to introduce students to the concepts and fundamentals of computer networks, including their components, architecture, and the protocols used in their design and operation. The course covers the various layers of the OSI and TCP/IP models, focusing on how data is exchanged between different devices. Topics include network addressing (IP Addressing), data switching techniques, routing, and an introduction to network devices such as switches and routers. The course also explores basic concepts of network security and troubleshooting. |
Introduction. OOP Programming basics. Functions. Classes and Objects. Constructor and Destructor. Inheritance: Derived class. Virtual Function, Files |
Data structures is an essential area of study for computer scientists and for anyone who will ever undertake a serious programming course. Use and implement fundamental data structures including stacks, queues, priority queues, lists, trees and hash tables. Use specified programming tool to develop and implement computer-based solutions to problems. Develop software by using different data structures studied. Learn to implement search and sorting algorithms including the quick sort, the heap sort and hashing. Learn to use recursion to solve problems. Do a Big-Oh analysis for their implementations of basic data structures.
To learn and understand basic digital design techniques. Distinguish between a variety of decimal and alphanumeric codes. Acquire sound knowledge in the key principles and practices used in the design and analysis of a digital computer. Analyze related combinational circuits. Discuss the issues involved in hardware or software implementation of an instruction in a digital computer instruction set. Comprehend in-depth knowledge of advanced digital design principles and practice in real-world applications. Make an analysis and synthesis of sequential switching circuits |
aaa
Introduction to Computer Security and Privacy: The meaning of computer security, Comparing security with privacy . Types of threats and attacks, Methods of defense. Program Security: Secure programs, Non malicious program errors, Malicious code. Controls against program threats. Operating System Security: Methods of protection. Access control, User authentication. Network Security: Network threats, Firewalls. Intrusion detection systems: Internet Application Security and Privacy: Basics of cryptography. Security and Privacy for Internet Applications. Database Security and Privacy: Security and privacy requirements: Reliability, Integrity, Privacy, Inference, Data mining, K-anonymity. Non-technical Aspects: Administration of security systems, Policies, Physical security, Economics of security, Legal and Ethical issues.
Introduction to Computer Security and Privacy: The meaning of computer security, Comparing security with privacy . Types of threats and attacks, Methods of defense. Program Security: Secure programs, Non malicious program errors, Malicious code. Controls against program threats. Operating System Security: Methods of protection. Access control, User authentication. Network Security: Network threats, Firewalls. Intrusion detection systems: Internet Application Security and Privacy: Basics of cryptography. Security and Privacy for Internet Applications. Database Security and Privacy: Security and privacy requirements: Reliability, Integrity, Privacy, Inference, Data mining, K-anonymity. Non-technical Aspects: Administration of security systems, Policies, Physical security, Economics of security, Legal and Ethical issues.
This course serves the following purposes: To have a thorough knowledge of processes, scheduling concepts, memory management, I/O and file systems in an operating system. To have an overview of different types of operating systems. To know the components of an operating system. To have a thorough knowledge of process management. To have a thorough knowledge of storage management. To know the concepts of I/O and file systems.
In this course students should become familiar with designing database systems for business applications, and should become familiar with commercially available relational database technology. By the end of this course, the student will be able to: Understand the basic concepts, task, methods, and techniques in designing a database. Develop an understanding of the database designing process. Develop the ability to conceptualize the problem at hand. Learn the different Architecture of DBMS. Apply techniques for the design of a database system. Learn some of the appropriate design techniques. Develop the ability to select appropriate DBMS to the solution of the problem at hand.
Introduction to Computer Organization & Architecture: Types of Computers, Processors. Primary and Secondary Memory I/O Devices. Digital Logic Circuits and Components: Digital Logic Circuits, Boolean Algebra K. Map simplifications. Combinational Circuits, Sequential Circuits. Data Representation: Data Types Complements. Fixed, Floating point representation. Binary Codes, Error detection Codes. Central Processing Unit: Register Organization .Stack Organization, Instructions Formats. Addressing, RISC. Overview of Pipeline and Vector Processing. The Instruction Set Architecture Level: Data Types, Instruction Formats Input Output Organization: IO interface, Asynchronous Data Transfer, Modes of Transfer. Memory Organization: Main memory, Auxiliary Memory, Associative Memory, Cache.
Field training is an integral part of the academic program the IT department, where students are required to work for a certain period in one of the government or private enterprises concerned information services in a government institution or quasi-governmental or private approved by the Faculty plan part, so as to equip them with practical experience in the areas of software engineering. Of field training for a full semester (six hours, twice a week throughout the semester). Under the student training period specified in the work site.
The first part of the final year project course is enrolled upon completion of 96 credit hours. Students are expected to select topics of their projects under the supervisor guidance and to submit a preliminary project report at the end of the semester. In this part, the students should identify the project objectives and the implemented methodology. With this module students will gain an adequate background of how to work in a group as well as independently.
The final year project II course is undertaken after completing Graduation Project I, Students are expected to select topics of their projects related to software engineering and submit a project report on completion of the project. They are expected to do a presentation and perform a working demonstration of their selected project. This module will give students skills and experience in doing either an individual project or a group project. Students will be assigned project advisors who will guide the students during the project. The members of the group in the project range from minimum of 2 to maximum of 3. Students will work closely with their project advisor and provide evidence of programming.
This course provides an overview of the fundamental concepts and principles of data communications. It covers the transmission of data across networks, focusing on data encoding, modulation techniques, transmission media, error detection and correction, flow control, and networking protocols. Students will explore the OSI and TCP/IP models to understand how data is transmitted between devices. Practical labs and real-world scenarios are included to bridge the gap between theory and practice.
This course introduces the foundational concepts of switching and routing in computer networks. It covers the operation, configuration, and troubleshooting of switches and routers, focusing on Layer 2 and Layer 3 technologies. Students will gain practical skills in configuring Virtual LANs (VLANs), inter-VLAN routing, static and dynamic routing protocols, and basic troubleshooting of switching and routing issues. The course emphasizes hands-on training to develop skills for real-world networking scenarios.
This course provides all knowledge about Introduction to Workgroup and Clint to server And What’s difference between them ,also understand the versions of network operating system Windows Server 2008,2012 ,2016,2019,2022,2025. Know all information about Domains ,Active directory DHCP,DNS, domain controller ,domain, users ,OUS, and maintain a Microsoft Windows Server network infrastructure. Group Policy ,Group Policy Settings ,How Group Policy Group Policy Components Are Applied and Configuring Group Policy Objects , Enforce security settings , Enforce a consistent desktop environment, Group Policy Processing Order, Options for Modifying Group Policy Processing ,this course with its skills is considered as a part two of Microsoft exam MCSA and MCSE curriculum.
This course introduces the fundamental principles of cybersecurity, focusing on the concepts, tools, and best practices used to protect digital systems and data. Students will explore common cyber threats, vulnerabilities, and attack vectors, as well as the strategies for risk management, incident response, and secure system design. The course also covers the ethical, legal, and societal implications of cybersecurity, preparing students for further studies or careers in the field.
This course provides a comprehensive introduction to the Linux operating system, with a focus on system structure, command-line operations, file systems, user and process management, and shell scripting. Students will learn to interact with Linux using terminal commands, manage users and permissions, install and update software, and automate tasks using shell scripts. The course is hands-on and designed to equip students with foundational Linux skills for systems administration, cybersecurity, and development tasks. Students will use popular Linux distributions like Ubuntu and CentOS during lab activities.
This course provides all knowledge about difference type of domains (Child, tree, and parent domain) and Understand difference type of domain controller ( additional domain controller, read only domain controller), also understand rely agent in windows server and routing operation. Know information about virtual private network(VPN),network address translation(NAT) and packet filter ,how make backup and restore for windows server and active directory final backup and restore active directory.
This course builds upon the foundational knowledge from Switching and Routing I, focusing on advanced Layer 2 and Layer 3 concepts, protocols, and configurations. Topics include advanced switching features such as EtherChannel, Rapid Spanning Tree Protocol (RSTP), and Multi-Layer Switching.frame relay , PPP.ATM, and HDLC .On the routing side, the course covers advanced routing protocols like EIGRP and BGP, redistribution between protocols, and route optimization. Students will also engage in advanced troubleshooting techniques and network performance tuning. The course combines theoretical instruction with extensive hands-on labs to prepare students for real-world scenarios.
This course provides an in-depth exploration of the principles and practices of network programming, emphasizing the development of robust, secure, and efficient network applications. Students will learn about communication protocols such as TCP, UDP, and HTTP, and how to implement client-server architectures using modern programming languages. Topics include socket programming, asynchronous communication, multi-threading, secure coding practices, error handling, and performance optimization. The course also examines real-world applications and case studies to provide a practical understanding of networked systems. By the end of the course, students will be capable of designing, implementing, and troubleshooting scalable networked solutions.
This course explores the principles, architecture, and standards of wireless communication systems, focusing on IEEE wireless standards (a, b, g, n, ac, ax) and their applications. Topics include wireless signal propagation, modulation techniques, medium access control, wireless LANs, cellular networks, and emerging wireless technologies such as 5G and IoT. Practical lab sessions and simulations provide hands-on experience with configuring and analyzing wireless systems.
This course provides an in-depth introduction to the principles and practices of cloud computing and virtualization. Students will explore key concepts such as cloud service models (IaaS, PaaS, SaaS), deployment models (public, private, hybrid), and virtualization technologies that enable cloud infrastructure. Students will learn about virtualization platforms such as VMware vSphere, NSX, and vCenter, with an emphasis on clustering, high availability, load balancing, fault tolerance, and disaster recovery techniques. The course emphasizes hands-on experience with cloud platforms and virtual machine (VM) environments. By the end of the course, students will be equipped to configure, manage, and secure cloud-based and virtualized environments in both academic and professional contexts.
This course provides an in-depth exploration of network design principles, architectures, and methodologies. Students will learn to analyze organizational networking needs and translate them into scalable, efficient, and secure network infrastructures. Topics include network design lifecycle, hierarchical design models, IP addressing, subnetting, VLAN architecture, WAN technologies, redundancy protocols, and performance optimization. The course emphasizes practical application through hands-on lab activities and network simulation tools such as Cisco Packet Tracer and GNS3, preparing students for real-world network design challenges.
This course provides an in-depth exploration of network defense strategies and the tools used to protect networks from cyberattacks and unauthorized access. Key topics include risk assessment, intrusion detection and prevention systems (IDS/IPS), firewalls, Virtual Private Networks (VPNs), cryptography, security policies, and countermeasure techniques. Students will develop hands-on skills in configuring network defense mechanisms, analyzing attack scenarios, and implementing effective security measures to mitigate threats and enhance organizational security posture.
This course introduces students to the field of ethical hacking and penetration testing, focusing on identifying and mitigating vulnerabilities in computer systems and networks. It covers key topics such as reconnaissance, scanning, exploitation, post-exploitation, and reporting. Students will gain hands-on experience using industry-standard tools such as Kali Linux, Metasploit, Wireshark, and Burp Suite to simulate real-world cyberattacks in a controlled and ethical environment. The course emphasizes adherence to ethical and legal guidelines while highlighting professional conduct in cybersecurity. Through practical exercises and real-world case studies, students will develop the skills to perform penetration testing, secure systems, and contribute to organizational cybersecurity. By the end of the course, students will be prepared for industry certifications and professional roles in ethical hacking.
This course provides a comprehensive introduction to the principles and practices of digital forensics and incident response (DFIR). Students will learn the methodologies and tools required to investigate and respond to cybersecurity incidents. The course covers topics such as forensic imaging, data recovery, network and memory forensics, log analysis, and malware investigation. Through hands-on labs and real-world case studies, students will develop skills to collect, analyze, and preserve digital evidence in a legally acceptable manner. By the end of the course, students will be equipped to conduct investigations and design effective response plans for modern cybersecurity incidents.
This course provides an in-depth introduction to malware analysis and its critical role in cybersecurity. It covers the techniques, tools, and methodologies used to analyze, classify, and mitigate malicious software threats. Students will explore various types of malwares, including viruses, worms, Trojans, ransomware, and advanced persistent threats (APTs). The course emphasizes practical skills in static and dynamic analysis, reverse engineering, and malware behavior analysis. Through real-world case studies and hands-on exercises, students will gain a comprehensive understanding of how malware operates and how to develop effective countermeasures. By the end of the course, students will be equipped to detect, analyze, and respond to malware threats in professional cybersecurity environments.
This course provides an in-depth exploration of emerging and advanced topics in the field of cybersecurity. It is designed to address current trends, challenges, and innovations in protecting information systems against evolving threats. The course covers a range of topics, including advanced threat analysis, zero-day vulnerabilities, cyber forensics, blockchain security, and artificial intelligence applications in cybersecurity. Students will engage in hands-on projects and case studies to analyze real-world cybersecurity incidents and propose robust solutions. By the end of the course, students will develop the skills to tackle complex security challenges and contribute to advancements in the cybersecurity field.
This course focuses on creating, implementing, and managing effective cybersecurity programs and policies to protect organizational assets. Students will learn how to align cybersecurity initiatives with organizational goals, legal and regulatory requirements, and industry standards. The course covers risk assessment, policy development, incident response planning, and the integration of security frameworks such as NIST, ISO/IEC, and CIS controls. By combining theoretical knowledge with practical applications, students will acquire the skills to design comprehensive cybersecurity strategies that address evolving threats while ensuring business continuity. |
Students are required to select three courses (9 Cr.H.) from the Computer Networks and Cybersecrity Department or from the available elective courses from the other departments.
a
This course explores the principles and technologies behind Unified Communication (UC) over IP networks. It covers protocols, standards, and architectures enabling voice, video, messaging, and collaboration tools to work seamlessly over IP-based networks. Students will gain insights into VoIP, SIP, QoS, and multimedia communication standards while examining the challenges and solutions associated with implementing UC in enterprise environments. The course emphasizes hands-on activities and real-world scenarios to prepare students to design, deploy, and manage UC solutions effectively. |
a
This course focuses on advanced mathematical and statistical concepts tailored for Information Technology applications. Topics include linear algebra, calculus, probability theory, statistical inference, and optimization techniques relevant to IT. Students will explore the application of these concepts in algorithms, machine learning, cryptography, and data analytics. Practical examples and exercises emphasize problem-solving and analytical thinking in IT contexts, preparing students to address challenges in data-driven environments.
This course provides a comprehensive study of data centers, focusing on their architecture, design, and management. It examines key components such as servers, storage systems, networking infrastructure, and energy-efficient cooling solutions. Students will learn about modern practices in virtualization, scalability, disaster recovery, and security for data centers. The course also explores emerging trends, including green data centers, edge computing integration, and the role of automation and AI in managing data center operations. Practical labs and case studies will enhance the understanding of operational challenges and solutions in building and maintaining efficient, scalable, and secure data centers.
This course provides students with a deep understanding of wireless networks’ offensive and defensive security aspects. It explores wireless technologies, protocols, and their vulnerabilities, offering insights into attacking wireless systems ethically. Students will also study defensive mechanisms and countermeasures to secure wireless infrastructures. The course emphasizes practical skills in using wireless penetration testing tools, configuring secure wireless environments, and implementing defensive strategies. By the end of the course, students will be proficient in identifying, exploiting, and mitigating wireless network vulnerabilities, preparing them for real-world challenges in wireless security.
This course explores the principles, practices, and challenges associated with securing cloud computing environments. It covers cloud security architecture, identity and access management (IAM), encryption techniques, and regulatory compliance in cloud systems. Students will examine the shared responsibility model, secure cloud application design, and incident response in cloud environments. The course also delves into emerging trends such as multi-cloud security and serverless security. Through hands-on labs and case studies, students will develop the skills necessary to assess, implement, and manage security measures for cloud-based systems, ensuring robust protection against evolving threats.
This course introduces the fundamental principles, techniques, and technologies of distributed systems. It covers concepts such as communication, synchronization, consistency, fault tolerance, and distributed algorithms. Students will explore real-world distributed systems, including cloud computing platforms, peer-to-peer networks, and blockchain technology. The course emphasizes the challenges of building scalable and reliable systems that operate across multiple nodes. Through a combination of theoretical concepts and practical projects, students will develop the skills needed to design, implement, and evaluate distributed applications. By the end of this course, students will have a solid understanding of the architecture and behavior of distributed systems and their impact on modern computing environments.
This course is designed to give surveys of important concepts related to information systems and how these systems are used throughout global organizations. Topics include data and information differences between them, information quality, the major parts of an Information System (Hardware, Software, Database, Network and People), as well as special topics in information systems including role of Information System for competitive advantage, information system in organizations, administrative information system and its types, internet and world wide technologies and major ethical issues in the digital world. Upon completion, students should be able to understand the implications of how IS provides a competitive advantage, and students will gain an understanding of how information enables improvement in quality and speed in organization.
This course is aimed at helping students build up an understanding of how to develop a software system from scratch by guiding them thru the development process and giving them, the fundamental principles of system development with object oriented technology using UML. The course will initiate students to the different software process models, project management, software requirements engineering process, systems analysis and design as a problem-solving activity, key elements of analysis and design, and the place of the analysis and design phases within the system development life cycle.


