منطقة الجوف-جامعة الجوف

Skip to main content

Science in Cybersecurity program

Master

Levels
4
Courses
13
Credits
33
Number of students
38
    Overview

    Program Overview

    The Master of Science in Cybersecurity Program at Jouf University is one of the advanced academic programs aimed at preparing nationally qualified graduates with both scientific and practical competencies in the fields of digital systems protection, cybersecurity risk management, and securing information infrastructure. The program is aligned with the requirements of digital transformation and national security.

    The program is built upon the latest knowledge and technologies in cybersecurity and is committed to implementing the quality and academic accreditation standards issued by the National Center for Academic Accreditation and Evaluation (NCAAA). It continuously strives to improve its educational and research outcomes.

    The M.Sc. in Cybersecurity provides advanced academic education that integrates theoretical and practical aspects, covering a wide range of areas including network and systems security, application security, cryptography, cybersecurity governance, incident management, and response. The program contributes to achieving Jouf University’s mission by preparing graduates capable of competing in the labor market, actively participating in protecting cyberspace, and supporting national development plans

    Program Mission:

    Providing distinguished educational, professional, research and community outcomes locally and regionally in the field of cybersecurity, consistent with quality standards and contributing to meeting the needs of the labor market and community service.

    Program Goals:

    Code

    Description

    G1

    Provide high quality education through advanced curricula and equip graduates with essential knowledge and skills in cybersecurity field.

    G2

    Promote research and technological development for professional growth in the Cybersecurity labor market.

    G3

    Empower students with essential skills to embrace lifelong learning.

    G4

    Support Saudi society by providing skilled cybersecurity consultants to address emerging challenges and enhance digital security.

     

    Graduates Attributes

    Code

    Description

    GA1

    Thorough understanding of theory, research, and recent development in the field of cybersecurity

    GA2

    Familiarity with and ability to use advanced techniques of research and inquiry applicable to the field of cybersecurity and use those techniques in carrying out a research project

    GA3

    Ability to synthesize and apply the results of research in analyzing, developing, and testing hypotheses, and proposing solutions to theoretical and practical problems.

    GA4

    Ability to communicate the results of advanced study and research through refereed publications to academic, professional and community audience

    GA5

    Ability to respond to cybersecurity issues, suggesting creative solutions and making sound judgments to address such issue.

    GA6

    Act autonomously in tackling and solving both anticipated and unpredictable problems and cooperate with others and provide leadership when appropriate in group situations,

    GA7

    Apply sound ethical and moral judgment in dealing with cybersecurity issues that may involve difficult value conflict.

    GA8

    Take responsibility for improving g personal skills and continuing education.

    GA9

    Reflect high levels of loyalty, responsibility, and commitment to serve to society

     

    Program Learning outcomes (PLOs)

    Domain

    Code

    Description

    Knowledge and Understanding

    K1

    Demonstrate deep understanding of modern and advanced developments, theories, and technical topics in cybersecurity.

    K2

    Demonstrate deep understanding of the processes, practices, policies, and procedures in cybersecurity to protect and defend cyber systems, respond to advanced cyber-attacks, and recover from them.

    Skills

     

    S1

    Use and critically review a variety of specialized methods, techniques, tools and practices to address advanced cybersecurity problems

    S2

    Design and implement advanced cybersecurity research and innovative projects to develop cybersecurity products and services

    S3

    Communicate in various forms to demonstrate specialized knowledge and skills with different categories of beneficiaries

    S4

    Process data and information in advanced cybersecurity contexts using quantitative and qualitative methods

    Values, Autonomy, and Responsibility

     

    V1

    Participate effectively as leader and/or a member of a team in professional projects in the field of cybersecurity with high integrity and responsibility while adhering to ethics and standards of the cybersecurity profession

    V2

    Demonstrate high autonomy in planning and managing tasks and taking professional decisions in the field of cybersecurity

     

    Regulations and Policies:

    Students of the program are subject to the graduate studies regulations approved by Jouf University, which govern academic and administrative matters, including:

    • Registration, course add/drop
    • Withdrawal and deferment
    • Academic warning
    • Graduation requirements

    These are regulated under the Graduate Studies Regulations and Executive Bylaws at Jouf University.

     

    Quick Links

    1. Program Handbook

    The program provides a comprehensive Program Handbook for its students, which includes:

    • Study plan
    • Academic regulations and policies
    • Students’ rights and responsibilities
    • Communication and support mechanisms
    1. Academic Advising and Student Support

    The program offers academic advising and student support services, including referral to specialized university support units, covering:

    • Regular academic advising

    Academic and Student Advising Handbook

    Academic and Student Advising Regulations

    • Monitoring and supporting academically at-risk students

    Early Support and Guidance Policy

    • Support for gifted and high-achieving students

    Jouf University Policy for Identifying and Supporting Talented Students

     

    Scientific Events and Workshops

    Workshops are provided to students of the Master of Science in Cybersecurity Program.

     

    Graduation Projects, Student Publications, and Statistics

    Monitoring and documenting research outputs of courses within the Master of Science in Cybersecurity Program.

     

    Admission and Registration

    Admission to the Master of Science in Cybersecurity Program is governed by the regulations and policies approved by the Deanship of Graduate Studies and Scientific Research at Jouf University. Applications are submitted through the electronic admission portal during the officially announced application period.

     

    General Admission Requirements

    Applicants must meet the following requirements:

    • Hold a Bachelor’s degree (regular study) in Computer Science, Information Technology, or a related field from a recognized university.
    • Minimum cumulative GPA:
      • 3.25 out of 5, or
      • 2.25 out of 4, or
      • 65 out of 100.
    • Pass the personal interview conducted by the academic department.
    • Achieve a minimum score of 60 in the General Aptitude Test for University Graduates.
    • Achieve a minimum score of 67 in the STEP English Language Test or its equivalent.
      Applicants holding a bachelor’s degree from a university where English is the language of instruction are exempted.
    • Successfully complete any remedial courses prescribed by the academic department if the applicant has not studied essential core specialization courses during the bachelor’s degree.

     

    Program-Specific Admission Requirements

    The academic department may impose additional requirements or remedial courses based on the applicant’s academic background to ensure achievement of program learning outcomes and maintain the quality of educational outputs.

    Admission Competitive Weighting

    Admission decisions are based on the following weighted criteria:

    Criterion

    Weight

    Bachelor’s cumulative GPA

    60%

    General Aptitude Test for University Graduates

    40%

     

    Language and Study Mode

    • Language of Instruction: English
    • Mode of Study: On-campus (Face-to-face)
    • Study Period: Morning and Evening
    • Program Duration: Two years
    • Total Credit Hours: 33 credit hours

     

    Application Procedure

    1. Submit the application electronically via the Graduate Studies Admission Portal at Jouf University.
    2. Upload all required documents during the announced application period.
    3. Admission results are announced through the official university channels.

     

    Admission Guide

    Graduate Admission Guide for the Academic Year 1447H

    Admission to the Master of Science in Cybersecurity Program is governed by the regulations and policies approved by the Deanship of Graduate Studies and Scientific Research at Jouf University. Applications are submitted through the electronic admission portal during the officially announced application period.

    General Admission Requirements

    Applicants must meet the following requirements:

    • Hold a Bachelor’s degree (regular study) in Computer Science, Information Technology, or a related field from a recognized university.
    • Minimum cumulative GPA:
      • 3.25 out of 5, or
      • 2.25 out of 4, or
      • 65 out of 100.
    • Pass the personal interview conducted by the academic department.
    • Achieve a minimum score of 60 in the General Aptitude Test for University Graduates.
    • Achieve a minimum score of 67 in the STEP English Language Test or its equivalent. 
      Applicants holding a bachelor’s degree from a university where English is the language of instruction are exempted.
    • Successfully complete any remedial courses prescribed by the academic department if the applicant has not studied essential core specialization courses during the bachelor’s degree. 

    Program-Specific Admission Requirements

    The academic department may impose additional requirements or remedial courses based on the applicant’s academic background to ensure achievement of program learning outcomes and maintain the quality of educational outputs.

    Admission Competitive Weighting

    Admission decisions are based on the following weighted criteria: 

    Criterion Weight 
    Bachelor’s cumulative GPA 60% 
    General Aptitude Test for University Graduates 40% 

    Language and Study Mode

    • Language of Instruction: English
    • Mode of Study: On-campus (Face-to-face)
    • Study Period: Morning and Evening
    • Program Duration: Two years
    • Total Credit Hours: 33 credit hours

    Application Procedure

    1. Submit the application electronically via the Graduate Studies Admission Portal at Jouf University.
    2. Upload all required documents during the announced application period.
    3. Admission results are announced through the official university channels. 

    Graduate Admission Guide for the Academic Year 1447H

    Program levels

    Level One
    CS 612 - Security Risk Analysis Management System - mandatory
    Credits
    3
    Theoretical
    3
    Pratical
    Training
    Total Content
    3
    Prerequisite
    Course Description:

    Threat analysis, Assessing Vulnerability, Information , Critical infrastructure and Key Assets, Security policy, Risk analysis process, Risk analysis models, tools and technologies, Risk identification , Risk assessment, Prioritizing Risk, Risk control, selecting risk control strategies, Risk control practices, planning and strategies to mitigate risk.

    CS 611 - Cryptography for Cyber and Network Security - mandatory
    Credits
    3
    Theoretical
    3
    Pratical
    Training
    Total Content
    3
    Prerequisite
    Course Description:

    This course provides students with a comprehensive study of modern cryptography. A variety of topics is covered, including symmetric encryption, public-key encryption, digital signatures, message authentication codes, and hash functions. The course also involves cryptographic protocols, including the key-exchange protocol, remote user authentication, and interactive proofs.

    CS 613 - Information Governance - mandatory
    Credits
    3
    Theoretical
    3
    Pratical
    Training
    Total Content
    3
    Prerequisite
    Course Description:

    This course explores the key impact areas of Information governance such as legal functions, Records, and Information Management (RIM), Information Technology (IT), Privacy & Security, and Business Operations. Specific recommended processes, technologies, and best practices will be discussed on this course. Although information is a key source of value, retaining excessive information also carries legal and compliance risks. This course demonstrates how costly mismanaged information can be and presents techniques to minimize risk related to poor IG. Moreover, carrying out well-considered IG initiatives and policies to secure information in social media, mobile computing, cloud computing, and traditional e-mail. Addresses the practicalities of managing these various information platforms are also discussed.

    Level Two
    CS 625 - Network Security - optional 1
    Credits
    3
    Theoretical
    3
    Pratical
    Training
    Total Content
    3
    Prerequisite
    Course Description:

    Network security attacks and impacts, Network and protocols vulnerabilities, DDoS attacks, Botnets, DNS cache poisoning, BGP security, Security models, Network security protocols (IPsec, SSL, and Kerberos), VPN , Application layer security protocols ( POP, IMAP, SMB, Web Services Security), Access control, Firewall, Intrusion detection systems, Network security management (SIEM technology), Wireless infrastructure security.

    CS 615 - Ethical Hacking and Penetration Testing - mandatory
    Credits
    3
    Theoretical
    3
    Pratical
    Training
    Total Content
    3
    Prerequisite
    Course Description:

    This course introduces the principles and techniques associated with penetration testing and ethical hacking. The course covers planning, reconnaissance, scanning, exploitation, post-exploitation, and result reporting. The student will learn how system vulnerabilities can be exploited and how to avoid such problems.

    CS 614 - Secure Programming - mandatory
    Credits
    3
    Theoretical
    3
    Pratical
    Training
    Total Content
    3
    Prerequisite
    Course Description:

    This course will present the basic topics in computer security and their relation to secure programming. Security models, threats, design principles and secure coding practices will be discussed. We will also look at programming language features and semantics to evaluate whether they help or hurt the ability to write secure programs.

    CS 624 - Security of Mobile Systems - optional 1
    Credits
    3
    Theoretical
    3
    Pratical
    Training
    Total Content
    3
    Prerequisite
    Course Description:

    The purpose of this course is to provide students with the theoretical knowledge and practical skills needed to appraise vulnerabilities and threat vectors associated with mobile computing devices. This course provides an in-depth technical overview of the security features and limitations of modern mobile devices and systems, including the top risks and vulnerabilities, every IT professional needs to know.

    Level Three
    CS 621 - Security of Cloud Computing Systems - optional 1
    Credits
    3
    Theoretical
    3
    Pratical
    Training
    Total Content
    3
    Prerequisite
    Course Description:

    This course provides the ground-up coverage on the high-level concepts of cloud landscape, architectural principles, techniques, design patterns and real-world best practices applied to Cloud service providers and consumers and delivering secure Cloud based services. The course will describe the Cloud security architecture and explore the guiding security design principles, design patterns, industry standards, applied technologies and addressing regulatory compliance requirements critical to design, implement, deliver, and manage secure cloud-based services. The course delves deep into the secure cloud architectural aspects with regards to identifying and mitigating risks, protection and isolation of physical & logical infrastructures including compute, network and storage, comprehensive data protection at all OSI layers, end-to-end identity management & access control, monitoring and auditing processes and meeting compliance with industry and regulatory mandates.

    CS 696 - Selected Topics in Cyber Security - optional 1
    Credits
    3
    Theoretical
    3
    Pratical
    Training
    Total Content
    3
    Prerequisite
    Course Description:

    This course offers an intensive, hands-on exploration of machine learning (ML) techniques and their application in the field of cybersecurity. Utilizing a versatile and user-friendly ML platform, students will learn to apply various machine learning algorithms and processes to real-world security challenges. The course covers a range of topics from basic ML concepts to advanced applications in network security, anomaly detection, and ethical considerations. The curriculum is designed to provide a balance between theoretical understanding and practical skills. Students will engage with ML platform’s intuitive interface to implement ML workflows, making the course accessible even to those with limited programming experience. This approach allows students to focus more on understanding the concepts and strategies of machine learning in security, rather than the intricacies of coding. Throughout the course, students will work on hands-on projects and case studies, applying their knowledge to solve practical security problems. The course culminates in a capstone project where students will demonstrate their ability to use machine learning for a comprehensive security solution.

    CS 622 - Security of Operating Systems - optional 1
    Credits
    3
    Theoretical
    3
    Pratical
    Training
    Total Content
    3
    Prerequisite
    Course Description:

    This advanced course adopts a highly technical approach to cover important security techniques and tools. By providing visibility both into attack and possible security holes, this course provides you with a complete guide on how to mitigate security risks in any Linux environment. This course will walk you through the many risks and threats that exist, show you how to use best practices by open-source tools to mitigate or counteract those threats, and teach you what you need to know to detect and recover from those attacks that do happen.

    CS 623 - Security of Database Management Systems - optional 1
    Credits
    3
    Theoretical
    3
    Pratical
    Training
    Total Content
    3
    Prerequisite
    Course Description:

    This course provides a strong foundation in database security and auditing. This course covers the following topics: security architecture, operating system security fundamentals, administration of user, profile, password policies, privileges and roles, database application security models, access control, virtual private databases, databases auditing models, application data auditing, distributed database systems security, and database security solution as database monitoring and blocking.

    CS 616 - Digital Crime and Forensics - mandatory
    Credits
    3
    Theoretical
    3
    Pratical
    Training
    Total Content
    3
    Prerequisite
    Course Description:

    This course provides students with an introduction to digital crime and with insight into system forensics investigation and response. He will also gain the ability to analyze potential vulnerabilities that can have an adverse impact on digital assets. In addition, the student will learn procedures for investigating computer and cybercrime, and concepts for collecting, analyzing, recovering, and preserving forensic evidence. Students will learn how to respond to cyber breaches, including the recovery, preservation, analysis of digital evidence, and proper incident response. In addition to the tools of the digital forensics trade, students will become familiar with relevant federal statutes. They will be presented with various scenarios a digital forensics investigator may face and be asked how they would react.

    Level Four
    CS 698 - Research Project - mandatory
    Credits
    6
    Theoretical
    6
    Pratical
    Training
    Total Content
    6
    Prerequisite
    Course Description:

    This is an advanced research project conducted individually under the guidance of an academic supervisor. It gives students the chance to investigate and contribute to an area at the cutting edge of cyber security. As part of the project students will present their work to an audience and write a major report detailing their results. Project topics vary from year to year depending on staff availability and research focus.

    Contact