Introduction
The College of Computing and Informatics at the Saudi Electronic University offers a master's program in cybersecurity, which aims to provide students with advanced knowledge necessary to excel in the contemporary highly competitive technology industry. The program focuses on the security of the institution’s cyberspace. The program equips students with the knowledge, skills and capacity to prevent and protect enterprise data from the threat of various forms of digital crime. The courses also focus on critical analysis skills, technical skills and extensive use of virtual laboratories via the Internet. This program is designed for students wishing to pursue their careers as specialists in information technology with the aim of protecting the information of their institutions from any external penetration by integrating theories with practical application. To know the basics of information systems and know how to manage information technology within the framework of the fundamentals of cybercrime. The program covers the field of security and legal aspects that affect information security in cyberspace.
Goals
- Provide experts in the field of cybersecurity to help achieving the kingdom long term plan of having experts in the field of cybersecurity.
- Empower students with soft skills and values to effectively communicate and collaborate with others professionally, ethically and legally.
- Ensure the knowledge and skills of students are in line with state-of-the-art cybersecurity techniques.
The Importance and Reasons for Creating the Program
Keeping pace with the needs of the labor market and the Kingdom's 2030 vision.
The need for qualified professionals with the necessary knowledge and skills in the field of cybersecurity.
The need for qualified specialists in the field of combating electronic information crimes.
The need for specialists in assessing and analyzing local and international breaches that may occur to information systems.
The need for specialists with the ability to know the various vulnerabilities of computer networks and the methods used to penetrate network security and provide comprehensive solutions to reduce these breaches.
Program Objectives
The program aims to provide learners with the knowledge and skills necessary to have the ability to:
- Differentiate between various IT security models, their architecture, and the risks associated with transferring, processing, and storing information.
- Identify various weak points of the networks and the methods used to penetrate the security of computer networks and to provide comprehensive solutions to reduce these breaches.
- Demonstrate knowledge and explain the ethical and legal issues surrounding information security, which include information privacy and legitimacy.
- Evaluate and analyze the local and international breaches that may occur to the information systems.
- Develop solutions to protect computer networks and information from threats and intrusions on both internal and external scales.
Duration of Study in the Program
4 semesters, 36 credit hours (12 courses).
Admission Requirements Master Program
Admission Requirements Master Program (click here).
Career Opportunities for Graduates of the Program
Project Manager.
Information Security Analyst.
Cyber Security Manager.
Cyber Security Analyst.
Information Security Manager.
Information Technology Manager.
Network Security Manager.
Network Security Analyst.
Educational and Academic field occupations in General and Higher Education Institutions.
The Master of Cyber Security program contains 12 subjects, each of which is three credit hours, spread over 4 semesters.
The program is offered in English only.
Coding | Course Name | Credit Hours | Prerequisite |
---|---|---|---|
First Year ( First Semester ) | |||
CYS501 | Research Methods in Computational Studies | 3 | |
CYS507 | Introduction to Cyber Security and Digital Crim | 3 | |
CYS512 | Cryptography Fundamentals | 3 | - |
First Year ( Second Semester ) | |||
CYS564 | Cyber Defense in Web Based Attacks | 3 | CYS507 |
CYS566 | Securing Enterprise Infrastructure using Cyber Security Techniques | 3 | CYS507 |
CYS663 | Digital Forensics and Investigations | 3 | CYS507 |
Second Year ( Third Semester ) | |||
CYS613 | Security Threats and Countermeasures in Complex Organizational Networks | 3 | CYS564 |
CYS642 | Innovative Solutions in Software Security | 3 | CYS566 |
CYS645 | Information Security Management, Legal and Ethical Issues | 3 | CYS507 |
Second Year ( Four Semester ) | |||
CYS666 | Advanced Principles of Cyber Security | 3 | CYS566 |
CYS683 | Ethical Hacking and Penetration Testing | 3 | CYS645 |
CYS698 | Capstone Project in Cyber Security | 3 | CYS501 + Department Approval |
To view the study plan files
Master in Cyber Security plan 2023 Click Here
Transfer Conditions from Inside the University to Master in Cyber Security Program Click Here
MCS Program Specification Click Here
MCS-Student Handbook Click Here
MCS-Quality Assurance Manual Click Here
MCS KPIs Report Click Here
MCS Annual Program Report-2019-2020 Click Here
MCS Annual Program Report 2020-2021 Click Here
MCS Operational Plan Click Here
Capstone Project Supervision Click Here