Skip to main content
 

 

 

Science in Cybersecurity program

Master

Levels
6
Courses
14
Credits
52
Number of students
9
    Overview
    The Master of Science in Cybersecurity program is an academic program that aims to graduate cadres capable of competing in the labor market in the field of cybersecurity by identifying and developing modern tools in the field to contribute to the economic growth of the Saudi knowledge-based society. The program is offered by the Department of Computer Science at the College of Computer and Information Sciences at Jouf University. The program targets holders of a bachelor’s degree in one of the computer and information science specializations. The required period to obtain the degree is two years (4 semesters). The language of study in the program is English. Obtaining the degree requires passing 33 academic units, distributed as follows: 18 academic units for specialized compulsory courses, 9 academic units for specialized elective courses, in addition to a research project (6 academic units).

    Program levels

    المستوى الاول
    CS 0611 - Cryptography for Cyber and Network Security - mandatory
    Credits
    5
    Theoretical
    5
    Pratical
    Training
    Total Content
    5
    Prerequisite
    Course Description:
    This course provides students with a comprehensive study of modern cryptography. A variety of topics is covered, including symmetric encryption, public-key encryption, digital signatures, message authentication codes, and hash functions. The course also involves cryptographic protocols, including the key-exchange protocol, remote user authentication, and interactive proofs.
    المستوى الثاني
    CS 0613 - Information Governance - mandatory
    Credits
    4
    Theoretical
    4
    Pratical
    Training
    Total Content
    4
    Prerequisite
    Course Description:
    This course explores the key impact areas of Information governance such as legal functions, Records, and Information Management (RIM), Information Technology (IT), Privacy & Security, and Business Operations. Specific recommended processes, technologies, and best practices will be discussed on this course. Although information is a key source of value, retaining excessive information also carries legal and compliance risks. This course demonstrates how costly mismanaged information can be and presents techniques to minimize risk related to poor IG. Moreover, carrying out well-considered IG initiatives and policies to secure information in social media, mobile computing, cloud computing, and traditional e-mail. Addresses the practicalities of managing these various information platforms are also discussed.
    المستوى الثالث
    CS 0614 - Secure Programming - mandatory
    Credits
    5
    Theoretical
    4
    Pratical
    Training
    Total Content
    4
    Prerequisite
    Course Description:
    This course will present the basic topics in computer security and their relation to secure programming. Security models, threats, design principles and secure coding practices will be discussed. We will also look at programming language features and semantics to evaluate whether they help or hurt the ability to write secure programs.
    CS 0624 - Security of Mobile Systems - optional 1
    Credits
    4
    Theoretical
    4
    Pratical
    Training
    Total Content
    4
    Prerequisite
    Course Description:
    The purpose of this course is to provide students with the theoretical knowledge and practical skills needed to appraise vulnerabilities and threat vectors associated with mobile computing devices. This course provides an in-depth technical overview of the security features and limitations of modern mobile devices and systems, including the top risks and vulnerabilities, every IT professional needs to know.
    CS 0615 - Ethical Hacking and Penetration Testing - mandatory
    Credits
    5
    Theoretical
    5
    Pratical
    Training
    Total Content
    5
    Prerequisite
    Course Description:
    This course introduces the principles and techniques associated with penetration testing and ethical hacking. The course covers planning, reconnaissance, scanning, exploitation, post-exploitation, and result reporting. The student will learn how system vulnerabilities can be exploited and how to avoid such problems.
    المستوى الرابع
    CS 0621 - Security of Cloud Computing Systems - optional 1
    Credits
    4
    Theoretical
    4
    Pratical
    Training
    Total Content
    4
    Prerequisite
    Course Description:
    This course provides the ground-up coverage on the high-level concepts of cloud landscape, architectural principles, techniques, design patterns and real-world best practices applied to Cloud service providers and consumers and delivering secure Cloud based services. The course will describe the Cloud security architecture and explore the guiding security design principles, design patterns, industry standards, applied technologies and addressing regulatory compliance requirements critical to design, implement, deliver, and manage secure cloud-based services. The course delves deep into the secure cloud architectural aspects with regards to identifying and mitigating risks, protection and isolation of physical & logical infrastructures including compute, network and storage, comprehensive data protection at all OSI layers, end-to-end identity management & access control, monitoring and auditing processes and meeting compliance with industry and regulatory mandates.
    CS 0623 - Security of Database Management Systems - optional 1
    Credits
    4
    Theoretical
    4
    Pratical
    Training
    Total Content
    4
    Prerequisite
    Course Description:
    This course provides a strong foundation in database security and auditing. This course covers the following topics: security architecture, operating system security fundamentals, administration of user, profile, password policies, privileges and roles, database application security models, access control, virtual private databases, databases auditing models, application data auditing, distributed database systems security, and database security solution as database monitoring and blocking.
    CS 0696 - Selected Topics in Cyber Security - optional 1
    Credits
    4
    Theoretical
    4
    Pratical
    Training
    Total Content
    4
    Prerequisite
    Course Description:
    This course offers an intensive, hands-on exploration of machine learning (ML) techniques and their application in the field of cybersecurity. Utilizing a versatile and user-friendly ML platform, students will learn to apply various machine learning algorithms and processes to real-world security challenges. The course covers a range of topics from basic ML concepts to advanced applications in network security, anomaly detection, and ethical considerations. The curriculum is designed to provide a balance between theoretical understanding and practical skills. Students will engage with ML platform’s intuitive interface to implement ML workflows, making the course accessible even to those with limited programming experience. This approach allows students to focus more on understanding the concepts and strategies of machine learning in security, rather than the intricacies of coding. Throughout the course, students will work on hands-on projects and case studies, applying their knowledge to solve practical security problems. The course culminates in a capstone project where students will demonstrate their ability to use machine learning for a comprehensive security solution.
    CS 0622 - Security of Operating Systems - optional 1
    Credits
    4
    Theoretical
    4
    Pratical
    Training
    Total Content
    4
    Prerequisite
    Course Description:
    This advanced course adopts a highly technical approach to cover important security techniques and tools. By providing visibility both into attack and possible security holes, this course provides you with a complete guide on how to mitigate security risks in any Linux environment. This course will walk you through the many risks and threats that exist, show you how to use best practices by open-source tools to mitigate or counteract those threats, and teach you what you need to know to detect and recover from those attacks that do happen.
    CS 0625 - Network Security - mandatory
    Credits
    4
    Theoretical
    4
    Pratical
    Training
    Total Content
    4
    Prerequisite
    Course Description:
    Network security attacks and impacts, Network and protocols vulnerabilities, DDoS attacks, Botnets, DNS cache poisoning, BGP security, Security models, Network security protocols (IPsec, SSL, and Kerberos), VPN , Application layer security protocols ( POP, IMAP, SMB, Web Services Security), Access control, Firewall, Intrusion detection systems, Network security management (SIEM technology), Wireless infrastructure security.
    المستوى الخامس
    CS 0616 - Digital Crime and Forensics - mandatory
    Credits
    5
    Theoretical
    5
    Pratical
    Training
    Total Content
    5
    Prerequisite
    Course Description:
    This course provides students with an introduction to digital crime and with insight into system forensics investigation and response. He will also gain the ability to analyze potential vulnerabilities that can have an adverse impact on digital assets. In addition, the student will learn procedures for investigating computer and cybercrime, and concepts for collecting, analyzing, recovering, and preserving forensic evidence. Students will learn how to respond to cyber breaches, including the recovery, preservation, analysis of digital evidence, and proper incident response. In addition to the tools of the digital forensics trade, students will become familiar with relevant federal statutes. They will be presented with various scenarios a digital forensics investigator may face and be asked how they would react.
    المستوى السادس
    CS 0698 - Research Project - mandatory
    Credits
    8
    Theoretical
    8
    Pratical
    Training
    Total Content
    8
    Prerequisite
    Course Description:
    This is an advanced research project conducted individually under the guidance of an academic supervisor. It gives students the chance to investigate and contribute to an area at the cutting edge of cyber security. As part of the project students will present their work to an audience and write a major report detailing their results. Project topics vary from year to year depending on staff availability and research focus.
    Contact