Trial Version
04-June-2025 7:13:21 PM
Government websites use the HTTPS protocol for encryption and security.
Secure websites in the Kingdom of Saudi Arabia use the HTTPS protocol for encryption.
Official Saudi educational websites end with edu.sa
All official educational websites in Saudi Arabia end with sch.sa or edu.sa
Registered with the Digital Government Authority under number: 20250303403
An official government website of the Kingdom of Saudi Arabia: Official government website: How to verify?
Riyadh Loading...

College of Computing and Informatics

Introduction

The College of Computing and Informatics at the Saudi Electronic University offers a master's program in cybersecurity, which aims to provide students with advanced knowledge necessary to excel in the contemporary highly competitive technology industry. The program focuses on the security of the institution’s cyberspace. The program equips students with the knowledge, skills and capacity to prevent and protect enterprise data from the threat of various forms of digital crime. The courses also focus on critical analysis skills, technical skills and extensive use of virtual laboratories via the Internet. This program is designed for students wishing to pursue their careers as specialists in information technology with the aim of protecting the information of their institutions from any external penetration by integrating theories with practical application. To know the basics of information systems and know how to manage information technology within the framework of the fundamentals of cybercrime. The program covers the field of security and legal aspects that affect information security in cyberspace.

Goals

- Provide experts in the field of cybersecurity to help achieving the kingdom long term plan of having experts in the field of cybersecurity.

- Empower students with soft skills and values to effectively communicate and collaborate with others professionally, ethically and legally.

- Ensure the knowledge and skills of students are in line with state-of-the-art cybersecurity techniques.

The Importance and Reasons for Creating the Program

Keeping pace with the needs of the labor market and the Kingdom's 2030 vision.

The need for qualified professionals with the necessary knowledge and skills in the field of cybersecurity.

The need for qualified specialists in the field of combating electronic information crimes.

The need for specialists in assessing and analyzing local and international breaches that may occur to information systems.

The need for specialists with the ability to know the various vulnerabilities of computer networks and the methods used to penetrate network security and provide comprehensive solutions to reduce these breaches.

Program Objectives

The program aims to provide learners with the knowledge and skills necessary to have the ability to:

  1. Differentiate between various IT security models, their architecture, and the risks associated with transferring, processing, and storing information.
  2. Identify various weak points of the networks and the methods used to penetrate the security of computer networks and to provide comprehensive solutions to reduce these breaches.
  3. Demonstrate knowledge and explain the ethical and legal issues surrounding information security, which include information privacy and legitimacy.
  4. Evaluate and analyze the local and international breaches that may occur to the information systems.
  5. Develop solutions to protect computer networks and information from threats and intrusions on both internal and external scales.

Duration of Study in the Program

 4 semesters, 36 credit hours (12 courses).

Admission Requirements Master Program

Admission Requirements Master Program (click here).

Career Opportunities for Graduates of the Program

Project Manager.

Information Security Analyst.

Cyber Security Manager.

Cyber Security Analyst.

Information Security Manager.

Information Technology Manager.

Network Security Manager.

Network Security Analyst.

Educational and Academic field occupations in General and Higher Education Institutions.

The Master of Cyber ​​Security program contains 12 subjects, each of which is three credit hours, spread over 4 semesters.
The program is offered in English only.

Coding ​ Course Name Credit Hours Prerequisite​
First Year ( First Semester )
CYS501 Research Methods in Computational Studies 3
CYS507 Introduction to Cyber Security and Digital Crim 3
CYS512 Cryptography Fundamentals 3 -
First Year ( Second Semester )
CYS564 Cyber Defense in Web Based Attacks 3 CYS507
CYS566 Securing Enterprise Infrastructure using Cyber Security Techniques 3 CYS507
CYS663 Digital Forensics and Investigations 3 CYS507
Second Year ( Third Semester )
CYS613 Security Threats and Countermeasures in Complex Organizational Networks 3 CYS564
CYS642 Innovative Solutions in Software Security 3 CYS566
CYS645 Information Security Management, Legal and Ethical Issues 3 CYS507
Second Year ( Four Semester )
CYS666 Advanced Principles of Cyber Security 3 CYS566
CYS683 Ethical Hacking and Penetration Testing 3 CYS645
CYS698 Capstone Project in Cyber Security 3 CYS501 + Department Approval
To view the study plan files

Master in Cyber S​ecurity​ plan 2023 Click Here

Transfer Conditions from Inside the University to Master in Cyber Security Program Click Here

MCS Program Specification Click Here

MCS-Student Handbook Click Here

MCS-Quality Assurance Manual Click Here

MCS KPIs Report Click Here

MCS Annual Program Report-2019-2020 Click Here

MCS Annual Program Report 2020-2021 Click Here

MCS Operational Plan Click Here

Capstone Project Supervision Click Here