COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the...
Transcript of COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the...
2019 - 2020
COURSE CATALOG
Bachelor of Science degree
in Cyber Security and Digital
Forensics (BS in CYS)
2
About the College
The College of Computer Science and Information Technology (CCSIT) at Imam Abdulrahman Bin Faisal
University (IAU) is committed to provide quality education in Computer Science and Information
Technology domains. CCSIT occupies Building A-11 for male students and Building 650 for female
students on the University campus in an enclosed suite. Since its establishment in 2010, CCSIT has been
committed to providing its students with an innovative and state-of-the-art computing curriculum lined up
with ACM & IEEE guidelines. In order to meet the growing demand in the job market CCSIT offers four Bachelor-
degree programs and one Master program as shown below:
1. Bachelor of Science degree in Computer Science (BS in CS)
2. Bachelor of Science degree in Computer Information Systems (BS in CIS)
3. Bachelor of Science degree in Cyber Security and Digital Forensics (BS in CYS)
4. Bachelor of Science degree in Artificial Intelligence (BS in AI)
5. Master of Science in Computer Science (MS in CS)
Vision of College
To be a leading computing College at national, regional, and global levels.
Mission of College
Provide quality computing education, discovery, and professional services with community engagements.
Cyber Security and Digital Forensics Program
The CYS program is a traditional, four-year on-campus, daytime program. Traditional in-class delivery
methods of teaching, such as lectures and laboratories, are followed. The CYS program is based on the term
system. The program consists of a total of eight terms, which are referred as levels. The first two years are
called general years. Each academic year comprises of two terms and an optional summer term. The
duration of each term is 18 weeks, including final exams. The summer term is two months in duration.
Mission of CYS Program
Providing students with quality cybersecurity and digital forensics education to inspire discovery, lifelong
learning and professional services with community engagements.
3
Program Educational Objectives of CYS Program
Graduates of the program will:
1. Have a successful career in practicing the knowledge and skills of cybersecurity and digital
forensics for solving problems and designing appropriate solution following the best practices
2. Contribute effectively in the profession of cybersecurity and digital forensics as an individual,
team member and leader.
3. Engage actively in lifelong learning, career growth, and community services.
4. Demonstrate ethical and social values in their professional practices.
Student Outcomes of CYS Program
Graduates of the program will have an ability to:
1. Analyze a complex computing problem and to apply principles of computing and other relevant
disciplines to identify solutions.
2. Design, implement, and evaluate a computing-based solution to meet a given set of computing
requirements in the context of the program’s discipline.
3. Communicate effectively in a variety of professional contexts.
4. Recognize professional responsibilities and make informed judgments in computing practice
based on legal and ethical principles.
5. Function effectively as a member or leader of a team engaged in activities appropriate to the
program’s discipline.
6. Apply security principles and practices to maintain operations in the presence of risks and threats.
Curriculum Outline of CYS Program
Imam Abdulrahman Bin Faisal University has a clear academic structure to support the curriculum design,
based on levels. The levels’ structure also establishes the basis upon which each student’s achievement can
be measured and upon which progression through the program can be approved. Typically, a level
represents a term/semester of study. A study level is the indicator of the stage within the programs study
plan. Each academic year consists of two main terms of 18 weeks and a summer term (optional) of almost
nine weeks duration. The periods of registration and final examination are not considered part of the term.
The BS curriculum in Cyber Security and Digital Forensics is structured into 124 credit-hours spanning
over a period of four academic years (excluding the preparatory year, in which students are introduced to
basic IT skills, Science, Mathematics and English language skills).The CYS program provides students
4
with an educational program that ensures the ability of its graduates to handle current and future needs of
the society. As shown in below Figure, courses in the CYS curriculum are divided into five main categories:
University Requirement, Preparatory year Requirement, College Requirement, Specialized Core
Requirement and Electives.
The courses in each of these categories are listed below.
I. University Requirement Courses (8 Credit Hours)
Course ID Catalog No. Course Title Cr. Hrs
926067 ISLM 271 Faith Morals 2
926068 ISLM 272 Social System in Islam 2
926069 ISLM 273 The Economic System in Islam 2
926070 ISLM 274 Political System in Islam 2
Total 8
II. Preparatory Year courses (29 Credit Hours)
Course ID Catalog No. Course Title Cr. Hrs
820551 ENGL 101 General English Language 7
926172 ENGL102 English for Academic and Specific Purposes 3
820553 LRSK 141 Learning and Searching Skills 2
820555 LRSK 142 Communication skills 2
667593 MATH 111 Mathematics I
3
5
668130 MATH 112 Mathematics II 3
820556 STAT 132 Statistics 3
669035 PHEDU 162 Physical and Health Education 1
667638 COMP 131 Computer Skills 2
926186 COMP 122 Computer Applications 3
Total Units 29
III. College Requirement Courses (60 Credit Hours)
A. Math and General Science Courses
Course ID Catalog No. Course Title Cr. Hrs
667459 MATH 211 Calculus 3
670244 STAT 207 Intro to Statistics & Probability Theory 3
670250 MATH 301 Discrete Mathematics 3
667501 PHYS 212 Physics 4
667409 BIOL 222 Biology 4
Total Credits 17
B. Business Courses
Course ID Catalog No. Course Title Cr. Hrs
928098 MGMT 320 Principles of Management 3
Total Credits 3
C. Computer Science Courses
Course ID Catalog No. Course Title Cr. Hrs
670237 CS 211 Introduction to Computing 3
670241 CS 221 Fundamentals of Programming 3
670242 CS 222 Electronics 4
670246 CS 310 Data Structure 2
670245 CS 311 Object Oriented Programming 1 3
670249 CS 314 Digital Hardware 3
670251 CS 321 Object Oriented Programming 2 3
670252 CS 322 Operating Systems 3
Total Credits 24
D. Computer Information Systems Courses
Course ID Catalog No. Course Title Cr. Hrs
670238 CIS 211 Fundamentals of Info. Systems 3
670247 CIS 313 Technical Reports 2
670278 CIS 315 Communication & Network Fund. 3
670253 CIS 321 Database Concepts and Design 3
928097 CIS 326 IT Infrastructure Management 3
670258 CIS 413 Professional Responsibility 2
Total Credits 16
6
IV. Specialization Courses (56 Credit Hours)
A. Core Courses
Course ID Catalog No. Course Title Cr. Hrs
926795 CYS 401 Cyber Laws & Security Policy 3
926796 CYS 402 Mathematical Foundations of Information Security 3
926797 CYS 403 Network Forensics, Intrusion Detection, and
Response
3
926798 CYS 404 Information System Audit 3
926799 CYS 406 Network Security 3
926800 CYS 407 Digital Evidence Analysis 3
926801 CYS 408 Architecture of Secure Operating System 3
926803 CYS 409 Information Security Management & Standards 3
926802 CYS 410 Digital Forensic Techniques and Tools 3
927342 CYS 433 Cooperative Summer Training Program (COOP) 3
927320 CYS 501 Project Proposal 2
927321 CYS 502 Mobile & Wireless Security 3
927322 CYS 503 Secure Software Design and Engineering 3
927323 CYS 506 Security Threats & Vulnerabilities 3
927324 CYS 507 Applied Cryptography 3
927325 CYS 508 Project Implementation 3
Total Credits 47
V. Elective Courses (Student selects 9 credits)
Course ID Catalog No. Course Title Cr. Hrs
927326 CYS 520 Digital Forensics for Legal Professionals 3
927327 CYS 521 Advanced Computer Forensics 3
927328 CYS 522 Advanced Digital Investigation 3
927329 CYS 523 Information Theory and Coding 3
927330 CYS 524 Cyber Warfare 3
927331 CYS 525 Introduction to Reverse Engineering 3
927332 CYS 526 Advanced Network Forensics and Analysis 3
927333 CYS 527 Selected Topics in Cyber Security & Digital Forensic 3
927334 CYS 528 Digital Media Forensics 3
927335 CYS 529 Ethical Hacking and Digital Forensics 3
927336 CYS 530 Biometric Security 3
927337 CYS 531 Distributed Systems Security 3
927338 CYS 532 Multimedia Security 3
927339 CYS 533 File System Forensic Analysis 3
927340 CYS 534 Advanced Computer Networks 3
927341 CYS 535 Introduction to Complex Networks 3
670256 CIS 411 Database Management Systems 3
Total Credits (Selected by Students) 9
7
CYS DEGREE PLAN
The degree plan below shows the term wise (level) course distribution for the five-year study plan for a
student to obtain a bachelor’s degree in Cyber Security and Digital Forensics.
- Credit-hour is a measure of amount of effort required to achieve the intended learning outcomes as
verified by the evidence of student’s achievement. The majority of courses at CCSIT are worth either 2
or 3 credits.
- Prerequisites are solely determined by the course content dependency. The prerequisite of a course
could be one or more courses and are listed in this section. The course codes of the prerequisite courses
needed to register for this course are listed in here.
Year Term 1 Term 2
1 (
Pre
para
tory
Yea
r)
Catalog
No. Course Title
Cr.
Hrs.
Pre
req
uis
ite
Catalog
No. Course Title
Cr.
Hrs.
Pre
req
uis
ite
820551 General English
Language
4 - 820551 General English
Language
3
667638 Computer Skills 2 - 926172 English for Academic
Purposes
3
820553 Learning and
Searching Skills
2 - 820555 Communication Skills 2
667593 Mathematics I 3 - 668130 Mathematics II 3 667593
820556 Statistics 3
669035 Physical and Health
Education
1
926186 Computer
Applications
3
Total 11 Total 18
2
CIS 211 Fundamentals of
Information
Systems
3 - CS 221 Fundamentals of
Programming
3 CS 211
CS 211 Introduction to
Computing
3 - CS 222 Electronics 4 PHYS
212
MATH
211
Calculus 3 - STAT
207
Introduction to
Statistics and
Probability Theory
3 MATH
211
PHYS
212
Physics 4 - BIOL
222
Biology 4 -
ISLM
271
Faith Morals 2 - ISLM
272
Social System in Islam 2 ISLM
271
Total 15 Total 16
8
3
Term 1 Term 2
Catalog
No. Course Title
Cr.
Hrs.
Pre
req
uis
ite
Catalog
No. Course Title
Cr.
Hrs.
Pre
req
uis
ite
CIS 313 Technical Reports 2 CIS 211 CIS
321
Database Concepts
and Design
3 CIS 211
CIS 315 Communication and
Network
Fundamentals
3 CS 211 CIS
326
IT Infrastructure
Management
3 CIS 315
CS 311 Object Oriented
Programming 1
3 CS 221 CIS 413 Professional
Responsibility
2 CIS 313
CS 314 Digital Hardware 3 CS 222 CS 310 Data Structure 2 CS 311
MATH
301
Discrete
Mathematics
3 STAT
207
CS 321 Object Oriented
Programming 2
3 CS 311
ISLM
273
The Economic
System in Islam
2 ISLM
272
MGMT
320
Principles of
Management
3 -
Total 16 Total 16
4
CS 322 Operating Systems 3 CS 314 CYS
406 Network Security 3 -
CYS
401
Cyber Laws &
Security Policy 3 -
CYS
407
Digital Evidence
Analysis 3
CS 311
STAT
207
CYS
402
Mathematical
Foundations of
Information
Security
3 CS 310 CYS
408
Architecture of Secure
Operating System 3 CS 322
CYS
403
Network Forensics,
Intrusion Detection,
and Response
3 CIS 315 CYS
410
Digital Forensic
Techniques and Tools 3 -
CYS
404
Information System
Audit 3 -
CYS
409
Information Security
Management &
Standards
3 -
Total 15 Total 15
Summer
Sum
mer
CYS
433
Cooperative
Summer Training
Program (COOP)
3 Completed
90 credit hours
- - - -
Total
3
9
5
Term 1 Term 2 C
ata
log N
o
Cou
rse
Tit
le
Cr.
Hrs
.
Pre
req
uis
ite
Cata
log N
o
Cou
rse
Tit
le
Cr.
Hrs
.
Pre
req
uis
ite
CYS
501 Project Proposal 2
CYS
403
CYS
406
CYS
410
CYS
506
Security Threats &
Vulnerabilities 3 -
CYS
502
Mobile & Wireless
Security 3
CYS
407
CYS
507 Applied Cryptography 3 -
CYS
503
Secure Software
Design and
Engineering
3 - CYS
508
Project
Implementation 3 CYS 501
Elective Course 3 ISLM
274
Political System in
Islam 2
ISLM
273
Elective Course 3 Elective Course 3
Total 14 Total 14
Ele
ctiv
es
CYS 508
Digital Forensics
for Legal
Professionals
3
- CYS
529
Ethical Hacking and
Digital Forensics 3
-
CYS
521
Advanced
Computer Forensics 3
- CYS
530 Biometric Security 3
-
CYS
522
Advanced Digital
Investigation 3
- CYS
531
Distributed Systems
Security 3
-
CYS
523
Information Theory
and Coding 3
- CYS
532 Multimedia Security 3
-
CYS
524 Cyber Warfare 3
- CYS
533
File System Forensic
Analysis 3
-
CYS
525
Introduction to
Reverse
Engineering
3
- CYS
534
Advanced Computer
Networks 3
-
CYS
526
Advanced Network
Forensics and
Analysis
3
- CYS
535
Introduction to Complex
Networks 3
-
CYS
527
Selected Topics in
Cyber Security &
Digital Forensic
3
- CIS
411
Database Management
Systems 3 CIS 321
CYS
528
Digital Media
Forensics 3
-
- - -
10
The next Section provides the details of each course listed above. The following terms are used.
- Course description: describes both the course contents and course learning outcomes
comprehensively.
- Course Learning Outcomes (CLOs): describe what a student must be able to do after completion of
the course. Outcomes are measurable and mapped to one or more student outcomes.
- Grading (assessment strategies): lists out the key assessment components of the course and the
percentage of grade that assessment contributes to the overall grade of the student.
- Textbook and references: list the main text and reference books that will be used in the course.
The description of the courses is provided in the following order.
Index Course Code Course Title
1 ENGL 101 General English Language
2 ENGL102 English for Academic and Specific Purposes
3 LRSK 141 Learning and Searching Skills
4 COMP 131 Computer Skills
5 COMP 122 Computer Applications
6 LRSK 142 Communication skills
7 MATH 111 Mathematics I
8 MATH 112 Mathematics II
9 STAT 132 Statistics
10 PHEDU 162 Physical and Health Education
11 CIS 211 Fundamentals of Info. Systems
12 CS 221 Fundamentals of Programming
13 MATH 211 Calculus
14 PHYS 212 Physics
15 CS 222 Electronics
16 STAT 207 Intro to Statistics & Probability Theory
17 CS 311 Object Oriented Programming 1
18 CIS 313 Technical Reports
19 CS 314 Digital Hardware
20 CIS 315 Communication & Network Fund.
21 MATH 301 Discrete Mathematics
22 CS 310 Data Structure
23 CS 321 Object Oriented Programming 2
24 CIS 321 Database Concepts and Design
25 CIS 326 IT Infrastructure Management
26 MGMT 320 Principles of Management
27 CIS 413 Professional Responsibility
28 CS 322 Operating Systems
29 CS 211 Introduction to Computing
11
30 BIOL 222 Biology
31 CYS 401 Cyber Laws & Security Policy
32 CYS 402 Mathematical Foundations of Information Security
33 CYS 403 Network Forensics, Intrusion Detection, and Response
34 CYS 404 Information System Audit
35 CYS 406 Network Security
36 CYS 407 Digital Evidence Analysis
37 CYS 408 Architecture of Secure Operating System
38 CYS 409 Information Security Management & Standards
39 CYS 410 Digital Forensic Techniques and Tools
40 CYS 433 Cooperative Summer Training Program (COOP)
41 CYS 501 Project Proposal
42 CYS 502 Mobile & Wireless Security
43 CYS 503 Secure Software Design and Engineering
44 CYS 506 Security Threats & Vulnerabilities
45 CYS 507 Applied Cryptography
46 CYS 508 Project Implementation
47 CIS 411 Database Management Systems
48 CYS 520 Digital Forensics for Legal Professionals
49 CYS 522 Advanced Digital Investigation
50 CYS 521 Advanced Computer Forensics
51 CYS 523 Information Theory and Coding
52 CYS 524 Cyber Warfare
53 CYS 525 Introduction to Reverse Engineering
54 CYS 529 Ethical Hacking and Digital Forensics
55 CYS 526 Advanced Network Forensics and Analysis
56 CYS 527 Selected Topics in Cyber Security & Digital Forensic
57 CYS 528 Digital Media Forensics
58 CYS 530 Biometric Security
59 CYS 531 Distributed Systems Security
60 CYS 532 Multimedia Security
61 CYS 533 File System Forensic Analysis
62 CYS 534 Advanced Computer Networks
63 CYS 535 Introduction to Complex Networks
12
1. ENGL 101: G General English
Textbook:
Q: Skills for Success (Books: l- 5)
Reference Books:
1. iTooIs for Q: Skills for Success
2. Journal of English Language Teaching- FTP Direct0"' Listing
3. Randall's ESL Cyber Listening Lab http://www.esl-lab.com/
Brief list of topics to be covered
- How do you make good first impression? - What makes food taste good?
Course
Name General English لغة انجليزية
Course
Information
Course Code Course No Credit
Units
Lec. Lab. Tot. Contact
Hours1
Lec. Tut.
ENGL 101 820551 7 300 50
1Every contact hour equals minimum 50 minutes.
Track University Requirement College Requirement Program Requirement Core Elective
Program
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Level 1 and 2 Prerequisite None
Course Description The featuring aspect of the academic year English language program is fittingly designed to answer the academic needs of students of the Science and Engineering Tracks. This course (General English) is an integrated English
course intended to increase academic and general competence in listening, speaking, reading and writing. During
the academic year students will have attained to a position where they can understandingly communicate with native speakers and express themselves without hesitation.
Course Learning Outcomes (CLOs)
At the end of the course students will be able to:
1. Employ a range of listening skills allowing them to comprehend and identify required information. 2. Develop effective and appropriate speaking skills to present information in a clear and coherent
manner. 3. Articulate words using the correct pronunciation. 4. Write in various academic styles using a variety of accurate and coherent sentence structures. 5. Employ a range of reading skills allowing them to comprehend and identify required information. 6. Use a wide range of vocabulary, idioms and expressions in written and verbal discourse. 7. Use variety of grammatical structures when engaging in written and verbal discourse 8. Choose relevant points from a given resource to incorporate in a presentation/ written assignment. 9. Appraise written and verbal discourse critically for their strengths and weaknesses in a given
academic context.
Grading
(assessment
strategies)
Quiz(zes) 30% Assignment(s)
Portfolio 5% Lab
E-Learning 5% Mid-term (II)
Participation 10% Final 50%
13
- How has technology affected our lives?
- Does advertising help or harm us? - Why do people take risks?
- Why do people help each other?
- How can a small amount of money make a big difference? - What makes someone admirable?
- What makes you want to buy something?
- What important lessons do we learn as children?
- How important is it to write by hand? - Should science influence what we eat?
- Does school prepare you for work?
14
2. ENGL 102: English for Academic and Specific Purposes
Course
Name English for Academic and Specific
Purposes
لغة انجليزية أكاديمية
و تخصصية
Course
Information
Course Code Course No Credit
Units
Lec. Tut. Tot. Contact
Hours1
Lec. Tut.
ENGL 102 926172 2 1 3 2 1
1Every contact hour equals minimum 50 minutes.
Track University Requirement College Requirement Program Requirement Core Elective
Program
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS) Artificial Intelligence (AI)
Level 2 Prerequisite None
Course Description The featuring aspect of the PY academic year English language program is fittingly designed to answer the
academic needs of students of the Science Track. It consists of one semester; ESP (English for Specific Purposes) and EAP (English for Academic Purposes). During this semester students will have attained to a position where
they can understandingly communicate with native speakers and express themselves without hesitation. This
course also introduces the students to the form, style, content, and nature of scientific English and establishes a connection with their respective field of specialty. With these aspects fully introduced, they can proceed
confidently toward their undergraduate and later on postgraduate studies.
Course Learning Outcomes (CLOs)
At the end of the course students will be able to: 1. Demonstrate knowledge of vocabulary related to their specific pathways. 2. Acquire good reading skills enabling them to read faster, comprehend and identify required
information. 3. Recognize the meanings of word-roots and use such knowledge in learning the meanings of other
terms of importance. 4. Develop the ability to research and summarize the research 5. Develop effective and appropriate skills to present information in a concise manner 6. Increase ability to write in various academic styles and convey information.
Grading
(assessment
strategies)
Quiz(zes) 10% Assignment(s)
Test 20% Presentation 10%
Project 10% Mid-term (II)
Participation 10% Final 40%
Textbook:
ESP Student Book English for Science. (2017) (In-house publication) Reference Books:
S. Bailey. (2018) Academic Writing: A Handbook for International Students. 5th Edition. Routledge
Brief list of topics to be covered - Academic writing
- Expressing opinions
- Comparison report - Analysing data
- Cause and Effect essays
- Problems/Solutions essays - Supporting opinions
- New path to inductive science
15
3. LRSK 141: Learning and Searching Skills
Textbook:
LSKL Lecture Notes. 2018. ( (In-house publication) McMillan, K., & Weyers, J. (2012). The study skills book. Pearson Higher Ed. Reference Books: Tom Burns & Sandra Sinfield. 2012. Essential Study Skills: The Complete Guide to Success at University,
3rd.ed. London: SAGE Study Skills Series.
Stella Cottrell. 2013 The Study Skills Handbook 4th ed. Hampshire: Palgrave Study Skills Series.
Course
Name Learning and Searching Skills مهارات التعلم والبحث
Course
Information
Course Code Course No Credit
Units
Lec. Tut. Tot. Contact
Hours1
Lec. Tut.
LRSK 141 820553 2 2 2
1Every contact hour equals minimum 50 minutes.
Track University Requirement College Requirement Program Requirement Core Elective
Program
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS) Artificial Intelligence (AI)
Level 1 Prerequisite None
Course Description This course is set to help students acquire and develop important study and search skills that are required to
achieve greater success in the university. By extension, the learning will instil in students skills which they will carry with them to apply in their post-university life. The course covers topics in core study and basic search
skills. Topics are interlinked and provide students with strategies and practical skills needed from the early days
at university to its last phase. As such, the course is designed to help students manage successfully the challenges they will encounter in their daily student life, be it as professionals and or as members of the wider community.
Course Learning Outcomes (CLOs)
At the end of the course students will be able to: 1. Demonstrate understanding of the importance of learning skills in achieving academic and professional
success. 2. Assess personal learning styles and select appropriate strategies to meet individual learning goals. 3. Engage in active learning in all courses using higher thinking skills. 4. Develop and apply skills in basic note-taking methods including paraphrasing, outlining, and summarizing
in their everyday learning. 5. Identify and apply different reading strategies, practices, habits, and attitudes that improve reading
comprehension. 6. Demonstrate independent strategies to problem solving, completion of tasks, and monitor and evaluate their
own performance. 7. Create and use study systems, think critically, concentrate, read and listen with understanding 8. Develop and implement strategies to manage their time effectively. 9. Identify and apply specific strategies to prepare for exams and improve results.
Grading
(assessment
strategies)
Quiz(zes) 10% Assignment(s) 20%
Test Presentation
Journal 20% Mid-term (II)
Participation 10% Final 40%
16
Brief list of topics to be covered
- The University Transition
- Evaluating your own performance
- Learning and personality styles
- Becoming and effective learner
- Time management
- Exam preparation techniques
- Critical thinking and problem solving
- Cooperative learning in a team
- Basic search for academic purpose
- Avoiding Plagiarism
17
4. COMP 131: Computer Skills
Textbook:
Computer Skills. 2016. (In-house publication) Reference Books:
J. Lambert, C. Frye. (2016) Microsoft Office 2016 Step by Step, Microsoft press.
Brief list of topics to be covered
- Introduction to Computers
- Computer hardware, software
- Internet and cloud
- Windows 7 basic concepts
- Internet security, cloud concepts - Microsoft Word 2016
- Microsoft Excel 2016
- Microsoft Access 2016
Course
Name Computer Skills مهارات الحاسب اآللى
Course
Information
Course Code Course No Credit
Units
Lec. Tut. Tot. Contact
Hours1
Lec. Tut.
COMP 131 667638 2 2 2
1Every contact hour equals minimum 50 minutes.
Track University Requirement College Requirement Program Requirement Core Elective
Program
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS) Artificial Intelligence (AI)
Level 1 Prerequisite None
Course Description
Introduction to Computer skills is designed to familiarize students with computers and their
applications. It will also emphasize the use of computers and technology throughout their college and
future careers. Students will learn fundamental concepts of computer hardware and software and
become familiar with a variety of computer applications, including word processing, spreadsheets,
databases, and multimedia presentations. Students will also investigate Internet-based applications,
working with email and learning how to browse the web. Coursework also includes activities that
explore social and ethical issues related to computers.
Course Learning Outcomes (CLOs)
At the end of the course students will be able to: 1. Demonstrate knowledge of basic concepts of hardware, software, network, internet and clouds. 2. Manage files, folders and user accounts efficiently. 3. Develop well designed documents, workbooks and databases using MS Office. 4. Apply IT tools to collect, analyze, evaluate and report data.
Grading
(assessment
strategies)
Quiz(zes) 10% Assignment(s) 10%
Test Presentation
Project 10% Mid-term (II) 30%
Participation Final 40%
18
5. COMP 122: Computer Applications
Textbook:
Computer Applications for Science Track. (2017). In house publications
Reference Books: N/A
Brief list of topics to be covered
- Problem Solving – Introduction
- Programing Language
- Programing Language Classification
- Program Development Lifecycle
- Algorithm Structure
- Numbering System
- Survey Analysis
- Expression Web 4.0
- Developing a website
Course
Name Computer Applications تطبيقات الحاسب
اآللي
Course
Information
Course Code Course No Credit
Units
Lec. Tut. Tot. Contact
Hours1
Lec. Tut.
COMP 122 926186 2 1 3 2 1
1Every contact hour equals minimum 50 minutes.
Track University Requirement College Requirement Program Requirement Core Elective
Program
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS) Artificial Intelligence (AI)
Level 2 Prerequisite None
Course Description
Computer Applications course introduces the basic problem solving and programming concepts to
science track students in order to prepare them for their specialization in colleges. Introduce the main
steps of data analysis through designing a survey using Google forms; give them an introduction in E-
Commerce which develop their information about this field and its terminology. Also, learn how to
design a website using HTML & CSS. A project will be given to the student to practice all the tools they
learn and develop problem-solving skills.
Course Learning Outcomes (CLOs)
At the end of the course students will be able to: 1. Discuss key concepts related to programming, web editing and E-Commerce. 2. Apply problem solving techniques and program development stages to develop solutions for simple
problems. 3. Create a reliable and simple static web site by using HTML and CSS. 4. Work effectively in groups and exercise leadership when appropriate.
Grading
(assessment
strategies)
Quiz(zes) 10% Assignment(s) 5%
Test Lab
Project 10% Mid-term (II) 30%
Participation 5% Final 40%
19
6. LRSK 142: Communication Skills
Textbook:
Alan Barker. (2016). Improve Your Communication Skills (4th ed.). London, England: Kogan Page, Ltd.
Reference Books:
1. Eunson, B. (2015). Communicating in the 21st century (4th ed.). Milton, Australia: John Wiley & Sons Ltd. T
2. Dason, E. & Brown, J. (2015). How to succeed at Medical school (2nd ed.). Malaysia: John Wiley & Sons Ltd.
3. Brousnstein, M., Bell, A.H, Smith, D. M. (2013). Business Communication. USA: John Wiley & Sons Ltd.
4. Parrot, T. & Crook, G. (2011). Effective Communication Skills for Doctors: A practical guide
Course
Name Communication Skills مهارات الحاسب اآللي
Course
Information
Course Code Course No Credit
Units
Lec. Lab. Tot. Contact
Hours1
Lec. Tut.
LRSK 142 820555 2 2 2
1Every contact hour equals minimum 50 minutes.
Track University Requirement College Requirement Program Requirement Core Elective
Program
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS) Artificial Intelligence (AI)
Level 2 Prerequisite None
Course Description
The significance of good communication skills. Effective communication is a pre-requisite for
successful careers in this field. This course aims at developing students’ communication skills with
special focus on social skills, different relationships and teamwork.
Course Learning Outcomes (CLOs)
At the end of the course students will be able to: 1. Understand the significance of communication and communication skills in general. 2. Identify and overcome common barriers to both verbal and non-verbal communication. 3. Assess their progress as efficient communicators in the course at various levels. 4. Differentiate between intellectual and social/emotional intelligence 5. Engage in active listening and speaking activities in relevant courses 6. Negotiate and reach an agreement through dialogue and persuasion skills. 7. Recognise the elements of good presentation skills. 8. Plan and design effective academic presentations. 9. Interact confidently with people during tutorials and presentations. 10. Identify and apply key skills to communicate effectively with peers while working on joint
projects. 11. Communicate through emails at workplace. 12. Write CVs and learn to carry themselves well during interviews. 13. Apply coping strategies to manage stress and anxiety.
Grading
(assessment
strategies)
Quiz(zes) 10% Assignment(s) 10%
Role Plays 10% Lab
Presentation 20% Mid-term (II)
Participation 10% Final 40%
20
to clear communication within a hospital environment. London, England: BPP Learning Media.
Brief list of topics to be covered
- Introduction to the course and its requirements
- Principles of communication - Describing communication
- Channels of communication
- Becoming a self-aware speaker - Barrier to communication/ Active listening
- Communication in professional contexts (Health, Engineering, Science)
- Communication for a job
- Communication within a Team - Presentations Skills
- Giving presentations
- Reflective communication
21
7. MATH 111: Mathematics I
Course
Name Mathematics I ( ١رياضيات)
Course
Information
Course Code Course No Credit
Units
Lec. Tut. Tot. Contact
Hours1
Lec. Tut.
MATH 111 667593 2 1 3 2 1
1Every contact hour equals minimum 50 minutes.
Track University Requirement College Requirement Program Requirement Core Elective
Program
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Level 1 Prerequisite None
Course Description
The purpose of this course is to develop the comprehension of the course material in English, improve the
computational skills, demonstrate writing ability of solutions with logical steps and prepare students for
calculus. An emphasis will be given to the understanding of the statement of the problems and the
mathematical terminology. The course primarily aims at the development of critical thinking among the
students through the mathematical concept studied at the high school. The topics include Fundamentals
of Algebra, Equation and Inequalities, Complex Numbers, Graphs and Functions, Polynomial and
Rational Functions and include the study of Exponential and Logarithmic functions and equations.
Course Learning Outcomes (CLOs)
At the end of the course students will be able to:
1. Have the basic mathematics skills which are used in calculus and their relevance to everyday
applications.
2. Have the ability to formulate problems in a logical manner. This logical way of thinking can be
also applied to his real life.
3. Have problem solving capabilities.
4. Develop the comprehension of the course material in English.
5. Have formal way of thinking.
6. Analyze and solve some mathematical problems using computer software.
Grading
(assessment
strategies)
Quiz(zes) 15% Assignment(s) 10%
Tests 30% Lab
Presentation Mid-term (II)
Participation 5% Final 40%
Textbook:
Maths for Science Track by Math 111 Instructors. In House Publishing.
Reference Books:
N/A
Brief list of topics to be covered
- Sets
- Real numbers and their properties
- Polynomials
22
- Factoring polynomials
- Rational expressions - Rational exponents
- Complex numbers
- Linear equations and applications - Quadratic equations
- Absolute value in equations and inequalities
- Linear and polynomial inequalities
- Cartesian coordinate system - Functions, transformations of functions
- Exponential functions
- Logarithmic functions
23
8. MATH 111: Mathematics II
Course
Name Mathematics II ( ٢رياضيات)
Course
Information
Course Code Course No Credit
Units
Lec. Tut. Tot. Contact
Hours1
Lec. Tut.
MATH 112 668130 2 1 3 2 1
1Every contact hour equals minimum 50 minutes.
Track University Requirement College Requirement Program Requirement Core Elective
Program
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Level 2 Prerequisite MATH 111
Course Description
The Math-112 course reinforces basic mathematics skills which are used in calculus and
their relevance to everyday applications. These skills encompass the ability to solve
mathematical problems, analyze and interpret data. The purpose of this course is to develop
the comprehension of the course material in English, improve the computational skills,
demonstrate writing ability of solutions with logical steps and prepare students for calculus.
An emphasis will be given to understanding the statement of the problems and the
mathematical terminology. The course primarily aims at the development of critical thinking
among the students through the mathematical concept studied at the high school. The topics
include the study of the fundamental properties of trigonometric functions, some topics in
analytic geometry, Matrices systems of equations and a preview to the notions of percentage
and approximation.
Course Learning Outcomes (CLOs)
At the end of the course students will be able to:
1. Master the basic mathematics skills which are used in calculus and their relevance to everyday
applications.
2. Have the ability to formulate problems in a logical manner. This logical way of thinking can be
also applied to his real life.
3. Have problem solving capabilities.
4. Develop the comprehension of the course material in English.
5. Be able to solve more general problems in the coming academic years involving some basic
properties studied in Math 2.
6. Have the ability to analyze and solve some mathematical problems using computer software.
Grading
(assessment
strategies)
Quiz(zes) 20% Assignment(s) 10%
Tests 30% Lab
Presentation Mid-term (II)
Participation 5% Final 40%
24
Textbook:
Maths for Science Track by Math 112 Instructors. In House Publishing. Reference Books:
N/A
Brief list of topics to be covered
- Approximation and Percentage
- Angles and Triangles, Right Triangle Trigonometry,
- Trigonometric Functions
- Graph of trigonometric functions
- Inverse Trigonometric functions
- Basic Trigonometric Identities
- Verifying Trigonometric Identities
- Solving Trigonometric equations
- Application of Trigonometry
- Vectors, Polar Form of Complex Numbers
- Matrix Algebra, The Determinant of a Matrix
- The Inverse of a Matrix, Matrices and Systems of Linear Equations
25
9. STAT 132: STAT 132
Textbook:
D. Starnes and J. Tabor (2018). The Practice of Statistics. W.H. Freeman. 6th Edition. ISBN-13: 978-
1319113339
Reference Books:
N/A
Course
Name Statistics إحصاء
Course
Information
Course Code Course No Credit
Units
Lec. Tut. Tot. Contact
Hours1
Lec. Tut.
STAT 132 820556 2 1 3 2 1
1Every contact hour equals minimum 50 minutes.
Track University Requirement College Requirement Program Requirement Core Elective
Program
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Level 2 Prerequisite None
Course Description
The STAT-132 course reinforces basic statistic skills which are used in the statistic and their relevance
to everyday applications. These skills encompass the ability to analyze and interpret data.
The purpose of this course is to develop the comprehension of the course material in English, improve
the statistical skill, demonstrate writing ability of solutions with logical steps and prepare students for
analyze and interpret data. An emphasis will be given to the understanding of the statement of the
problems and the statistical terminology. This course is an introductory course designed for students
without any background in statistics. The purpose of the course is to introduce some of the basic
concepts of statistics that are used in most of the courses. Topics discussed are descriptive and
inferential Statistics; data classification; frequency distribution, tables and graphs; measures of central
tendency, variation, and position; counting methods. In addition; the course covers some basic topics in
probability such as: axioms of probabilities, law of total probability; random variables (discrete and
continuous); probability distributions (binomial and Normal); correlation and regression.
Course Learning Outcomes (CLOs)
At the end of the course students will be able to: 1. Identify the concept of statistics and the contributions of statistics in Humanities. 2. Gain skill on collect, organize, represent data from the populations or samples. 3. Describe the data using different measures and used it to describe the phenomenon under study. 4. Identify the basic concepts of probability and apply different methods to calculate it. 5. Understand the counting rules and used it to calculate probabilities. 6. Distinguish between the probability experiments types and organize them in different discrete
probability distributions. 7. Describe the relationship between two variables using the correlation and regression.
Grading
(assessment
strategies)
Quiz(zes) 20% Assignment(s)
Test Lab
Project and
presentation
15% Mid-term (I) 20%
Participation 5% Final 40%
26
Brief list of topics to be covered
- The Nature of Probability and Statistics
- Frequency Distributions And Graphs
- Data Description
- Probability And Counting Rules
- Discrete Probability Distributions
- The Normal Distribution
- Correlation And Regression
27
10. PHEDU: Physical and Health Education
Course
Name Physical and Health Education التربية البدنية
والصحية
Course
Information
Course Code Course No Credit
Units
Lec. Tut. Tot. Contact
Hours1
Lec. Tut.
PHEDU 669035 1 1 1
1Every contact hour equals minimum 50 minutes.
Track University Requirement College Requirement Program Requirement Core Elective
Program
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Level 2 Prerequisite None
Course Description This course is designed to achieve the comprehensive growth of female students in all cognitive and psychological aspects of mobility and emotional. Also, to achieve a healthy lifestyle using the physical and health
field within the limits of their abilities and characteristics in accordance with Islamic law and taking into account
the customs and traditions of society.
Course Learning Outcomes (CLOs) At the end of the course students will be able to:
1. Determines the effect of exercising on the body
2. Remember the effect of exercising on mental health
3. Explain the effect of exercising on mental health
4. Remember the importance of exercising daily.
5. Remind the objectives of physical and health education
6. Comprehensive fitness and its components
7. Learn Physical and Health Education
8. Remember the elements of physical fitness associated with health.
9. Multiplicity of principles and principles of physical training.
10. Explains precautions to be taken when starting physical activity
11. Remember security and safety requirements when exercising physical activity
12. Know first aid
13. Remember sports injuries are different
14. Explains first aid for various injuries
15. Remember physical exercise associated with health
16. Explain physical exercise performed during the menstrual cycle
17. Determines physical exercise performed during pregnancy
18. Numerous physical exercises performed after birth
19. Remember physical exercises that limit the problems resulting from taking the wrong situation during everyday practices.
Grading
(assessment
strategies)
Quiz(zes) 15% Assignment(s) 5%
Test 30% Lab
Project 10% Mid-term (II)
Participation Final 40%
28
Textbook:
1. Abdel-Fattah Abu Ela (1998): Sport Training, physiological bases, Dar Arab Thought, Cairo. 2. Ahmed Khater, a pick (1996) 3. Measurement in the field of sports, the fourth edition, the book Dar al-Hadith, Cairo.
4. Adel Abdul Basir (1992 m): sports training and integration between theory and practice, the Library,
Port Said 5. Essam Abdul Khaliq (1992 m): sports training theories and applications, the seventh edition of
Knowledge House, Alexandria.
6. Mohammed Allawi, Nasr Mohammed Radwan (1982): motor performance tests, Dar Al Arab
Thought, Cairo 7. Mohammed Hassanein, meaning Ahmed (1998): Encyclopedia of Applied Sport Training, book
publishing center, Cairo.
8. Mohamed Sobhy Hassanein (2000): Measurement and Evaluation in Physical Education and Sports, the fourth edition, Dar Arab Thought, Cairo.
Reference Books:
1. Osama full salary (1998)Ibrahim Khalifa Sports: walking entrance to achieve mental and physical health, Dar Arab Thought, Cairo
2. Mohammed Allawi, Nasr Mohammed Radwan (1982): motor performance tests, Dar Al Arab
Thought, Cairo 3. Mohammed Hassanein (2000): Measurement and Evaluation in Physical Education and Sports, the
fourth edition, Dar Arab Thought, Cairo
Brief list of topics to be covered - planning and preparing for the academic year
- Health education and health habits
- Accidents and first aid - Physical and Health Education
- Awareness campaigns
- Exercise and health - Sports and women
29
11. CIS211: Fundamentals of Information Systems
مبادئ نظم المعلوماتFundamentals of Information
Systems Course Name
Lab. Lec. Contact Hours1
Tot. Lab. Lec. Credit Units1
Course No Course Code Course
Information 0 3 3 0 3 670238 CIS211
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100 minutes in practical
laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 3 Level
Course Description
This course is designed to introduce the basic concepts of modern Information Systems (IS) and the use of information system in global organizations. The key topics of this course will be the major components of the
information systems; people, software, hardware, data, and communication technologies. The course will also
provide students with the knowledge about the use and management of information system components to establish competitive advantage and quality improvement of local and global organizations. Moreover, the
course also covers the concepts of information system development and acquisition, in addition to emerging
types of software that are widely used in contemporary organizations and society. Students are given
knowledge of how to secure information systems resources, focusing on information security principles and issues. Students are also acquainted with career opportunities and social and ethical responsibilities.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Identify components of an information systems infrastructure and their role in achieving organization goals.
2. Recognize how information systems are enabling new forms of commerce and collaboration between individuals, organizations, and governments.
3. Explain the use of information system in an organization and its value in supporting organizational processes and decision making.
4. Analyze the data security risks in information system deployment.
5. Analyze the professional, social and ethical issues in information systems deployment
15% Assignment(s) 15% Quiz(zes) Grading
(assessment
strategies) Lab Project(s)
Mid-term (II) 25% Mid-term (I)
40% Final 5% Participation
Textbook: 9. Ralph, M. Stair, George W. Reynolds, Thomas Chesney, “Principles of Business Information
Systems”, 3rd Edition, 2018. ISBN 9781473748415
Reference Book:
4. Joseph Valacich , Christoph Schneider, "Information Systems Today: Managing in a Digital World" 7th Edition, 2015 ISBN-13: 978-0133940473 ISBN-10: 01339404705
5. Ralph M. Stair; George Reynolds, “Fundamentals of Information System”, 2017, ISBN-10: 1-337-
09753-5 ISBN-13: 978-1-337-09753-6
30
Brief list of topics to be covered
- Basic understanding of the information systems - Use of Information System in Organization
- Careers in information systems
- Hardware and software concepts - Software development concepts and detailed stages
- Database and data modeling concepts
- Internet and WWW
- Knowledge Management and Specialized Information Systems - Valuing Information System and Globalization
- Information and Decision Support Systems
- Business Intelligence - Security, Privacy and Ethical issues of Information System
31
12. CS221: Fundamentals of Programming
Course
Name Fundamentals of Programming لبرمجةئ امباد
Course
Information
Course Code Course No Credit
Units
Lec. Lab. Tot. Contact
Hours1
Lec. Lab.
CS 221 670241 2 1 3 2 2
1Every contact hour equals minimum 50 minutes.
Track University Requirement College Requirement Program Requirement
Core Elective
Program
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Level 4 Prerequisite 670237 – CS 211
Course Description
This is an entry level programming course designed to teach students the basics of program design,
coding and testing. The course begins by covering the basics of a high-level programming language
that include declaration of scalar variables and constants of basic data types. This is followed by a
discussion on including various control structures into user programs. These include sequence,
selection, and repetition control structures. Later, the course covers designing and implementing
programs that rely on user-defined functions with a focus on passing arguments to these functions.
Towards the end, the course introduces the concept of arrays and pointers. The course concludes by
providing an overview and comparison of the Object-Oriented Programming (OOP) model with the
procedural approach.
In the lab portion of the course, the students get a chance to practice their programming skills using a
high-level programming language. The students are also introduced to fundamental steps including
compiling, linking, executing, and debugging their programs.
Course Learning Outcomes (CLOs)
On successful completion of this course, students will be able to:
1. Demonstrate problem solving skills by designing flowcharts/pseudocode and implementing corresponding computer programs from a problem statement
2. Design and implement programs incorporating the concepts of variables and constants of basic/user-defined data types
3. Use sequence, selection and repetition control structures in a program. 4. Demonstrate an understanding of structured design by implementing programs with functions
and passing of parameters to solve more complex problems. 5. Design and implement programs using arrays and pointers/references. 6. Describe the Object-Oriented Programming (OOP) in comparison to procedural programming
Grading
(assessment
strategies)
Quiz(zes) 10% Assignment(s)
Project(s) Lab 20%
Mid-term(I) 15% Mid-term (II) 15%
Participation Final 40%
32
Textbook:
1. Problem Solving with C++, Global Edition (10th edition Edition), Walter Savitch , 2018, ISBN-
10: 1292222824 , ISBN-13: 9781292222820
2. Diane Zak, Introduction to Programming with C++, 8th edition, July 20, 2015, ISBN-13: 978-
1285860114, ISBN-10: 1285061470.
·
Reference Book:
Problem-Solving Strategies in Mathematics From Common Approaches to Exemplary
Strategies, Alfred S Posamentier and Stephen Krulik, April 2015, ISBN: 978-981-4651-63-9
Starting Out with C++ from Control Structures to Objects (9th Edition), Tony Gaddis , 2017,
ISBN- 13: 978-0134498379 , ISBN-10: 0134498372
C++ Programming From Problem Analysis to Program Design, 8th Edition, 2018, SBN10: 1-
337- 10208-3ISBN13: 978-1-337-10208-7
Think Like a Programmer: An Introduction to Creative Problem Solving 1st Edition, V. Anton
Spraul , ISBN-13: 978-1593274245, ISBN-10: 1593274246
Puzzle-based Learning: Introduction to critical thinking, mathematics, and problem solving.
Matthew Michalewicz, ISBN-13: 978-1876462635, ISBN-10: 1876462639
Introduction to Programming with C++, Diane Zak, Course Technology; 8th edition, July 20,
2015, ISBN-13: 978-1285860114, ISBN-10: 1285061470.
Programming Logic & Design, Comprehensive (9th Edition), Joyce Farrell, 2017, ISBN10: 1-
337-10207-5, ISBN13: 978-1-337-10207-0 · Paul Deitel & Harvey Deitel, C++ How to
Program, 9th edition, ISBN-13: 978-0133-378719
http://www.cplusplus.com.
https://www.tutorialspoint.com/cplusplus/
Brief list of topics to be covered
• Problem solving
• Variables and constants
• Selection structures
• Repetition structures
• Built-in functions
• User-defined functions
• Passing data by value or references
• Arrays and strings
• Pointers
• Intro to OO programming
33
13. MATH 211: Calculus
Calculus التفاضل والتكاملCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 0 3 3 0 3 667459 MATH 211
1 One contact hour equals 50 minutes.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 3 Level
Course Description
This course covers the following topics:
The limit. Continuity, the intermediate value theorem. Definition of derivatives. Rules for
differentiation. Applications of the derivative. The mean value theorem. L'hospital rule. The definition
of the integral. The definite and indefinite integral. Applications of the integral. Sequences.
Convergence and limits of sequences. Series. Convergence of series. Power series. The formal power
series of rational functions.
Course Learning Outcomes (CLOs)
On successful completion of this course, students will be able to:
1. Solve problems involving limits and continuity.
2. Use the definition of derivative, and compute derivatives using the rules of differentiation
expressions.
3. Apply the derivative in problems involving graphing, maximization and minimization.
4. Employ the concept of integral and the basic techniques of integration to compute integrals and
identify the relationship between the integral and derivative (the fundamental theorem of
calculus).
5. Apply integrals in solving some geometric problems.
6. Identify sequences, series and power series and compute the limits of sequences and apply
some of the tests for series convergence.
10% Assignment(s) 15% Quiz(zes) Grading
(assessment
strategies) Lab Project(s)
15% Mid-term (II) 15% Mid-term(I)
40% Final 5% Participation
Textbook:
Calculus: Early Transcendental, 8th Edition, International Metric Version
Author: James Stewart Publisher: Cengage. ISBN-13: 978-0534435387 ISBN-10: 0534435386
Reference Book:
Calculus: The Classic Edition , Earl W. Swokowski . Publisher: Cengage.
ISBN-13: 978-0534435387 ISBN-10: 0534435386
Brief list of topics to be covered
- Limits
- Continuity
34
- Differentiation Rules
- Application of Differentiation
- Integrals
- Fundamental Theorem of Calculus
- Application of Integral
- Techniques of Integration
- Infinite Sequences and Series.
35
14. PHYS 212: Physics
Physics الفيزياءCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 0 4 4 0 4 667501 PHYS 212
1 One contact hour equals 50 minutes.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 3 Level
Course Description
The course targets to enable students to comprehend the basic principles that are needed to study the
electronic courses, and acquire a good background and experience in handling and dealing with
problems in terms of theories, laws and principles of Physics.
The topics include basic ideas about:
1. Electrical charges, forces, insulators, conductors and semiconductors, concepts of electric field
and potential, electric current and electric circuit components. Electric dipoles and the effect of
electric field on them. Electric potential due to charges and potential difference, equipotential
surfaces, magnetic field and magnetic forces.
2. Introduction to Modern and Quantum Physics, semiconductors and their structures, their
applications in development of modern technology, n-type and p-type crystals, semiconductor
carrier properties and action, depletion layer and electric potential through it and introduction
to diodes and types of diodes.
Course Learning Outcomes (CLOs)
On successful completion of this course, students should be able to:
1. Define the main aspects of electric and magnetic physics.
2. Demonstrate an ability to solve and apply basic physical principles and mathematical formulas
to problems related to physics.
3. Demonstrate a good background in solid structure, especially in semiconductors and its
applications.
4. Recognize and recall basic principles and concepts needed to study electronics courses.
5. Compare and analyze the difference in electrical properties between conductors,
semiconductors and insulators.
5% Assignment(s) 15% Quiz(zes) Grading
(assessment
strategies) Lab 10% Project(s)
Mid-term (II) 25% Mid-term(I)
40% Final 5% Participation
Textbook:
Jearl Walker, David Halliday and Robert Resnick, “Fundamentals of Physics Extended”, 10th
Edition, Wiley, 2014, International edition.
36
Reference Book:
Physics for Scientists & Engineers with Modern Physics;
Serway 9th edition by Thomson Brooks, Saunders Golden Sunburst Series, 2014.
Brief list of topics to be covered
- Vectors
- Electric charge
- Electric fields
- Capacitance
- Current and resistance
- Magnetic fields
- Inductance
- Oscillation AC-current
- Photons and matter waves
- All about atoms
- Conduction of electricity in solids.
37
15. CS 222: Electronics
Electronics اإللكترونياتCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 2 3 4 1 3 670242 CS 222
1 One contact hour equals 50 minutes.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
667501 - PHYS 212 Prerequisite 4 Level
Course Description
This course provides foundation in the area of electronic circuits and devices. It incorporates a
combination of mathematics and basic sciences appropriate to the electrical/electronic circuit design
and analysis. The main objective of this course is to inculcate in students the ability to understand
fundamental and derived electrical quantities and to analyze the DC and AC circuits. In addition, the
students will be introduced to the basic electronic devices such as diodes, transistors, and optical
devices that may be used to design large scale electronic systems. These objectives are achieved by
teaching them the relevant theory and labs to analyze, describe and solve problems involving
electrical/electronic devices with the help of practical circuit implementation.
Course Learning Outcomes (CLOs)
On successful completion of this course, students will be able to:
1. Describe the fundamentals of basic DC and AC circuit elements.
2. Analyze the DC and AC circuits.
3. Explain the basics of diodes, transistors, and optical devices.
4. State the evolution of integrated circuits.
5. Define functionality of operational amplifier and its applications.
Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) 25% Lab Project(s)
Mid-term (II) 20% Mid-term(I)
40% Final 5% Participation
Textbook:
Electronics Fundamentals: Circuits, Devices, and Applications, Thomas L. Floyd, Prentice Hall, 8th
edition, 2010, ISBN-13: 978-0135072950.
Reference Book:
1. Principles of Electric Circuits: Conventional Current Version, Thomas L. Floyd, Prentice Hall, 9th
Edition, 2009, ISBN-10: 013507309X.
2. Introduction to Electric Circuits, Richard Drof& James A Svoboda, John Wiley, 8th edition, 2010,
ISBN 10: 0470521570.
Brief list of topics to be covered
- Quantities and units
- Introduction to DC circuits
- Introduction to AC circuits
- Combination circuit analysis
38
- Diode and its applications
- Transistors and its applications
- Optoelectronic devices
- Introduction to integrated circuits
- Introduction to operational amplifiers and its applications.
39
16. STAT 207: Introduction to Statistics & Probability Theory
مقدمة في اإلحصاء ونظرية االحتماالتIntroduction to Statistics &
Probability Theory
Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 0 3 3 0 3 670244 STAT 207
1 One contact hour equals 50 minutes.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
667459 – MATH 211 Prerequisite 4 Level
Course Description
This course provides an elementary introduction to probability and statistics with applications. Topics
include: graphical and numerical representation of data; random variables; introduction to probability;
conditional probability and statistical independence; Bayes theorem; mathematical expectation;
variance; covariance and the correlation coefficient for two random variables; regression analysis;
some important discrete and continuous statistical distributions; hypothesis testing; confidence
intervals. Statistical software (Minitab and SPSS) will be used to facilitate the analysis of data sets
and understand statistical concepts. Emphasis will be placed on how to collect, analyze, and interpret
data correctly. Students will also be trained on how to clearly and accurately present data to others.
Course Learning Outcomes (CLOs)
On successful completion of this course, students should be able to:
1. Compute and interpret descriptive statistics using numerical and graphical techniques.
2. Describe and apply the concept of probability, random variables, conditional probability,
statistical independence, and Bayes rule.
3. Interpret some of the important discrete and continuous distributions.
4. Compute, explain and apply the point estimation of parameters, sampling distributions, and
Central Limit Theorem.
5. Formulate and interpret hypotheses test for both large and small samples.
6. Design data collection plans, analyze data appropriately, interpret and draw conclusions from
analysis.
Assignment(s) 20% Quiz(zes) Grading
(assessment
strategies) Lab 15% Project(s)
Mid-term (II) 20% Mid-term(I)
40% Final 5% Participation
Textbook:
1. Introduction to the Practice of Statistics" by David S. Moore, George McCabe, Bruce Craig,
ISBN-13: 978-1464158933, Eighth Edition, W H Freeman & Co, 2014.
Reference Book:
1. "Probability, Statistics, and Queuing Theory with Computer Science Applications" by Arnold Allen.
Second Edition, Academic Press, Inc., 1990
2. “Probability and Statistics for Engineers and Scientists”, by Ronald E. Walpole, Raymond H.
Myers, Sharon L. Myers, Keying E. Ye, Ninth Edition, Pearson Education, 2012
40
Brief list of topics to be covered
- Displaying distributions with graphs
- Describing distributions with numbers
- Density curves and normal distributions
- Scatterplots
- Correlation
- Least-squares regression
- Data analysis for two-way tables
- Design of experiments
- Sampling design
- Toward statistical inference
- Ethics
- Randomness
- Probability models
- Random variables
- Means and variances of random variables
- General probability rules
- Sampling distributions of sample mean
- The sampling distribution for counts and proportions
- Estimating with confidence
- Tests of significance
- Inference for the mean of a population
- Inference for two-way tables
- Goodness of fit
41
17. CS 311: Object Oriented Programming 1
(1البرمجة كائنة التوجه ) Object Oriented Programming 1 Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 2 2 3 1 2 670245 CS 311
1 One contact hour equals 50 minutes.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
670241 - CS 221 Prerequisite 5 Level
Course Description
The purpose of this course is to provide students with fundamental knowledge of object oriented
programming (OOP). It emphasizes good software engineering principles and developing
programming skills. Specific topics covered include: fundamental concepts of object oriented
programming (classes, methods, instantiation, communication by message, encapsulation, inheritance,
overriding, dynamic dispatch, polymorphism, etc.) and some interesting packages (I/O, strings, etc.).
As an OOP programmer, a student will be able to translate solution problem into object oriented form.
He/she should acquire some understanding of object oriented concepts and tools such as the Unified
Modeling Language (UML). This will give the student a firm foundation on which he/she can build
high-quality software systems. In practice the programming language used is JAVA, as an introduction
to JAVA language. Students should acquire some understanding of abstraction mechanisms,
enumeration, JAVA Virtual Machines (JVM) and the byte code notion.
Course Learning Outcomes (CLOs)
On successful completion of this course, students should be able to: 1. Explain the benefits of intermediate languages in the compilation process 2. Justify the philosophy of object-oriented design and the concepts of encapsulation,
inheritance and polymorphism. 3. Explain how abstraction mechanisms support the creation of reusable software components. 4. Demonstrate how to translate solution problem into object-oriented form. 5. Describe the importance and power of abstraction in the context of virtual machines.
6. Write simple programs in an object-oriented programming language.
Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) 20% Lab 10% Project(s)
Mid-term (II) 20% Mid-term(I)
40% Final Participation
Textbook:
Introduction to JAVA Programming, Comprehensive Version, Tenth Edition
Author: Y. Daniel Liang
Publisher: Pearson Education, Inc., publishing as Prentice Hall.
ISBN-10: 0133761312, ISBN-13: 978-0133761313, 2014
Reference Book:
1. Harvey Deitel Paul J. Deitel, “Java How to Program (early objects): International Edition” ,
Pearson , 2015 (international 10th edition), ISBN-10: 1292018194 , ISBN-13: 9781292018195!
42
2. Herbert Schildt, “Java The Complete Reference 9/E”, McGraw-Hill, 9th Edition, September 2013,
ISBN-10: 0071808558 | ISBN-13: 978-0071808552!
3. Building Java Programs: International Edition, 3nd edition 2013,Stuart Reges, Marty Stepp,
Brief list of topics to be covered
- A revision of selections
- Loops
- Methods
- Single and multi-dimensional arrays
- Strings
- Objects and classes
- Object-oriented thinking
- Inheritance and polymorphism
- Abstract classes and interfaces
- Enumerated types
43
18. CIS 313: Technical Reports
Technical Reports كتابة التقارير التقنيةCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 0 2 2 0 2 670247 CIS 313
1 Every unit equals a minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 5 Level
Course Description
This course is designed to help students develop an effective method of planning and completing
writing tasks so that student can meet professional writing demands. Since succeeding in the
professional world requires not only technical knowledge but also effective writing skills. This course
focuses on the writing skills necessary for advanced academic and professional writing, tailored
specifically to student academic career work as professional in a technical field. Successful technical
communicators know how to organize and present complex information so that the ideas are
understandable to many readers, viewers, and listeners. In this course, students will complete several
small technical and recommendation reports on a topic related to IT related majors. Indeed, this course
requires intensive writing, reading, and peer commentary.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Describe how to use graphics and page layout to support and enhance written
communication.
2. Define the communication process to improve the technical communication.
3. Analyze audiences to appropriately structure information for different types of professional
written communication.
4. Summarize views on technical topics to prepare appropriate written reports.
5. Demonstrate the communication skills through presentation to peers.
6. Use virtual collaboration tools for collaborative authoring
7. Present information/data in appropriate written formats
Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 30% Project(s)
Mid-term (II) 20% Mid-term (I)
35% Final 5% Participation
Textbook:
John M. Lannon, Laura J. Gurak (2018) Technical Communication, MLA Update, 14/E, ISBN-10:
0134678826 • ISBN-13: 9780134678825
Reference Book:
1. Hannigan Carrie, Kaplan Technical Writing: A Resource for Technical Writers at All Levels,
Kaplan Pub, 2010, ISBN-10: 1607147092 ISBN-13: 978-1607147091
44
2. Alred, Handbook of Technical Writing, 10th ed., Published by Bedford, 2011 ISBN-10:
1250004411; ISBN-13: 978-1250004413
Brief list of topics to be covered
- Abstracts and Executive summaries
- What are the technical professions?
- What is technical communication?
- Who is the typical technical communicator?
- What skills do technical communicators need?
- Planning the communication process
- Problem solving, Analyzing audience
- Writing Document specification
- Researching
- Organizing for Readers
- Designing the Document
- Editing style, Communicating with other cultures
- Memos, Letters, and E-Mail Correspondence
- Instructions, Procedures, and Polices
- Abstracts and Executive summaries
- Professional Presentations
45
19. CS 314: Digital Hardware
Digital Hardware األجهزة الرقميةCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 2 2 3 1 2 670249 CS 314
1 One contact hour equals 50 minutes.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
670242 - CS 222 Prerequisite 5 Level
Course Description
Digital Systems: digital computer and digital systems, binary, decimal, octal and hexadecimal number
systems, number base conversion, complements, signed and unsigned numbers, binary codes, binary
storages and registers, and binary logic. Boolean algebra and logic gates: basic definitions, axioms
definitions of Boolean algebra, basic theorem and properties of Boolean algebra, Boolean functions,
canonical and standard forms, logic operations, and digital logic gates. Simplification of Boolean
functions: the map methods, product of sum simplification, NAND and NOR implementation, and the
tabulation method. Combinational logic circuits: adders, subtractors, decoders, encoders, multiplexers,
de-multiplexers, look-up table, function implementation using multiplexers/decoders and memories.
Sequential logic circuits: flip-flops, synchronous and asynchronous circuits, counters (types of
counters), registers, memories, design of counters, design of sequential circuits, analysis of counters,
and analysis of sequential circuits. Analog-to-digital converters and digital-to-analog converters.
Programmable logic devices (PLD): PLA, PAL and FPGA. Student will be trained on the products and
components of K&H products [KL-300 Digital Logic Lab-13 modules].
Course Learning Outcomes (CLOs)
On successful completion of this course, students will be able to:
1. Identify components required to assemble the circuit.
2. Use simplification methods for Boolean functions.
3. Simulate combinational and sequential circuits and predict their behavior.
4. Design combinational and sequential logic circuits.
Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) 25% Lab Project(s)
Mid-term (II) 20% Mid-term(I)
40% Final 5% Participation
Textbook:
M. Moris Mano & Michael D. Ciletti, “Digital Design”, 5th edition, Prentice Hall,
2013(international edition, ISBN -13:978-0-273-76452-6, ISBN -10:0-273-76452-7)
Reference Book: Digital Design and Computer Architecture, 2nd Edition, by Harris & Harris, Print
Book ISBN :9780123944245;eBook ISBN :9780123978165
Brief list of topics to be covered
- Digital systems
- Boolean algebra and logic gates
- Combinational digital circuits
- Sequential digital circuits, Advanced and field programmable logic device
46
20. CS 315: Communications & Network Fundamentals
والشبكات االتصاالتأساسيات Communications & Network
Fundamentals
Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 2 2 3 1 2 670278 CIS 315
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100 minutes in practical
laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
670238 – CIS 211 Prerequisite 5 Level
Course Description
This course provides the fundamentals of data communication and networking. It covers topics related
to network layered architectures including: connectivity, topology, TCP/IP and OSI models. For
Physical Layer, it introduces the essential elements of transmission media including: analogue and
digital signals, time and frequency domains concepts, and types of channels. For Data Link Layer, it
covers framing, switching and forwarding techniques, LAN addressing and ARP. For Network Layer,
it covers network service models, forwarding and routing, and IP addressing, and network design and
development for different sized business organizations. At the Transport Layer it covers TCP and UDP
protocols, operating principles, congestion control, error control and flow control. At the Application
Layer students first learn application layer principles and core application protocols and then go on to
discuss the Quality of Service requirements for business applications and their implications on network
requirements. Network security and security devices are introduced and security requirements of
business organizations are discussed. Students will be trained on the practical aspects of infrastructure
solutions in network design and development for business organizations through hands-on exercises
on device configuration including Cisco switches and routers. Popular simulation software including
Cisco Packet Tracer and Wireshark are used for the analysis of network traffic and protocol behavior
within the context of a business organization.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Describe the essential elements, components and functioning of data communication systems,
network protocols and communication media in computer networks.
2. Identify the IP addressing requirements for a business organization and propose the solutions that
enhance traffic flows.
3. Design and develop an IP based network for a business organization.
4. Evaluate the applicability of IT infrastructure, network security solutions and network technologies
for a business organization and suggest the appropriate solution.
5. Assess different networking scenarios using network software and analyze business application
type traffic QoS requirements.
\
4%
Assignment(s) 6% Quiz(zes)
Grading
(assessment
strategies) 15% Lab 10% Project(s)
47
Mid-term (II) 20% Mid-term (I)
40% Final 5% Participation
Textbook:
B.A. Fourouzan, Data communication and networking, 5th edition, 2012., ISBN-10: 0073376221,
ISBN-13: 978-0073376226
Reference Book:
1. S. Laan. IT infrastructure Architecture – Infrastructure Building Blocks and Concepts, Third
Edition, 2017. ISBN 978-1-291-25079-5.
2. L. L. Peterson, B. S. Davie. Computer Networks: A Systems Approach, Fifth Edition,
2012. ISBN-13: 978-0123850591.
Brief list of topics to be covered
- Network layering, and protocols, OSI and TCP/IP Model
- Physical layer: wired and wireless connectivity
- Data link layer: Ethernet
- LAN addressing and ARP
- Introduction to network layer. Inside a router
- Network layer: IP, IP addressing and routing, IPV6
- Network Design for different sized Business Organizations, Using public networks for secure
data transport: VPNs
- Introduction to Transport layer protocols. Principles of reliable transfer, TCP reliable transfer
implementation
- RTT and timer, flow control, TCP connection management. Principles of congestion control.
- TCP congestion control. TCP performance: response time. TCP throughput
- Principles of Application layer: core Internet application protocols: FTP, SMTP, DNS.
- Network Security and Security devices, Securing IT infrastructure in a Business organization
- Network performance requirements for Business application software: HTTP, Web Caching
and content delivery networks. Peer-to-peer applications.
48
21. MATH 301: Discrete Mathematics
Discrete Mathematics رياضيات متقطعةCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 0 3 3 0 3 670250 MATH 301
1 One contact hour equals 50 minutes.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
670244 – STAT 207 Prerequisite 5 Level
Course Description
The purpose of this course is to introduce the essential mathematical concepts and ideas in discrete
mathematics, which are required for rigorous studies in most areas of Computer Science including
logic and proof techniques, analysis of algorithm, digital circuit, network, software engineering, and
artificial intelligence. Topics include: propositional logic, logical equivalence, quantifiers; set theory,
mathematical induction; vector and matrices; relations, equivalence relations, partial ordering
relations; functions, sequences, indexed classes of sets, recurrence relations, recursively defined
functions, algorithms and complexity of algorithm; properties of integers; basic counting techniques,
binomial coefficients and Pascal triangle, pigeonhole principle; graph theory, tree graphs, directed
graphs; Boolean algebra. Emphasis will be placed on providing a context for the application of discrete
mathematics within Computer Science.
Course Learning Outcomes (CLOs)
On successful completion of this course, students should be able to:
1. Describe and apply some fundamental concepts of propositional logic and quantifiers.
2. Define, describe, and manipulate basic mathematical objects (e.g. sets, functions, relations, and
integers), and apply standards methods to verify their properties.
3. Analyze a problem to create relevant recurrence equations and solve the equations.
4. Demonstrate an understanding of analysis of algorithms using the concept of functions and
function complexity.
5. Apply the basic notions of combinatorics including permutations and combinations, binomial
coefficients and Pascal triangle, and pigeonhole principle.
6. Analyze the basic properties of graphs and trees, and use these concepts to model simple
applications.
10% Assignment(s) 15% Quiz(zes) Grading
(assessment
strategies) Lab Project(s)
15% Mid-term (II) 15% Mid-term(I)
40% Final 5% Participation
Textbook:
Discrete Mathematics and its Applications, Global Edition, McGraw-Hill Higher Education; 7
edition (1 Sept. 2012), ISBN-13: 978-0071315012.
Reference Book:
49
Seymour Lipschutz, Marc Lipson., “Schaum’s Outline of Discrete Mathematics”, Schaum’s Outline
Series., Edition 3, illustrated, revised., Publisher: McGraw-Hill Education, 2009., ISBN-10:
0071615865, ISBN-13: 9780071615860.
Brief list of topics to be covered
- The foundations: Logic and proofs
- Basic structures: Sets, relations, functions, sequences, sums, and matrices
- Algorithms
- Number theory and cryptography
- Induction and recursion
- Counting
- Advanced counting techniques
- Graphs
- Trees
- Boolean algebra
50
22. CS 310: Data Structure
Data Structure هيكلة البياناتCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 0 2 2 0 2 670246 CS 310
1 One contact hour equals 50 minutes.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
670245 - CS 311 Prerequisite 6 Level
Course Description
This course is complementary to the course “object-oriented concepts”. The aim of this course is to
provide the fundamentals of data structures, algorithm design in the light of object-oriented approach
which allows one to store collections of data efficiently with fast updates and queries.
The course is mainly focused on implementation strategies and their manipulations for arrays, stacks,
queues and linked lists; recursion; also implementation strategies for tree and graph algorithms.
The data structures representation and manipulations are exercised using Java programming language.
Course Learning Outcomes (CLOs)
On successful completion of this course, students should be able to:
1. Demonstrate the abilities to formulate and decompose a given problem
2. Apply appropriate algorithmic techniques to solve the given problem that demonstrates
comprehension of the tradeoffs involved in design choices.
3. Practice primitive data structures in a popular programming language
4. Describe the implementation of hash tables, including collision avoidance and resolution
5. Explain the heap property and use of heaps
Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) 25% Lab Project(s)
Mid-term (II) 20% Mid-term(I)
40% Final 5% Participation
Textbook:
Michael T. Goodrich, Roberto Tamassia, Michael H. Goldwasser, “Data Structures and Algorithms
in Java”, John Wiley & Sons; 6th Edition (15 July 2014), ISBN-10: 1118771338, ISBN-13: 978-
1118771334.
Reference Book:
• John R hubbard, “Data Structures with Java”, 2nd Edition, Schaum's Outline Series McGRAW-
HILL eBooks (DOI: 10.1036/0071476989)
Brief list of topics to be covered
- Arrays
- Linked lists
- Pointer and linked nodes
- Recursion
51
- Stack
- Stack implementation using array & linked list
- Queues
- Queue implementation using array & linked list
- Trees and tree traversal algorithms
- Linear and binary search
- Sorting & selection
- Graphs
52
23. CS 321: Object Oriented Programming 2
(2البرمجة كائنة التوجه ) Object Oriented Programming 2 Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 2 2 3 1 2 670251 CS 321
1 One contact hour equals 50 minutes.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
670245 – CS 311 Prerequisite 6 Level
Course Description
The main purpose of this course is to develop the understanding of advanced OOP topics using a high-
level object-oriented programming language. The focus of the course is on the design and
implementation of event-driven applications. Main topics include: exception handling, multithreading,
applets, event-driven programming, database connectivity, application programming interfaces (APIs)
and the object oriented graphical user interfaces using SWING.
Course Learning Outcomes (CLOs)
On successful completion of this course, students should be able to:
1. Describe and identify the appropriateness of graphics architectures for a given applications.
2. Apply the concept of exception handling and multi-threading.
3. Produce graphical user interfaces for various scenarios.
4. Develop applications having database connectivity.
5. Design and implement software projects for a given problem statements.
Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) 15% Lab 15% Project(s)
Mid-term (II) 20% Mid-term(I)
40% Final Participation
Textbook:
Java How to Program: International Edition, 10/E
Author: Harvey deitel, Paul J.Deitel
Publisher: Person Higher Education, 2015.
ISBN-10: 1292018194 , ISBN-13: 9781292018195
Reference Book:
1. Savitch, W., “Absolute Java”, Addison Wesley, 2nd edition. 2005.
2. Schildt, H., “Java 2: The complete reference”, McGraw-Hill, 5th edition, 2002,ISBN:0072224207
3. Bruegge, B. &Dutoit, A.,” Object-Oriented Software Engineering Using UML,Pattern,and Java”,
Prentice Hall, 3rd edition, 2010. ISBN-10: 0136061257
4. Wampler, B., “Essence of Object Oriented Programming with JAVA and UML”, Addison Wesley
2002, ISBN-13:978-0201734102.
53
Brief list of topics to be covered
- Exception handling.
- GUI components and event handling.
- Accessing database with JDBC.
- Files, streams and object serialization.
- Concurrency (Multi-threading).
54
24. CIS 321: Database Concepts and Design
Database Concepts and Design مفاهيم وتصميم قواعد البياناتCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 2 2 3 1 2 670253 CIS 321
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
670238- CIS211 Prerequisite 6 Level
Course Description
This course introduces students to basic database concepts. The course teaches students relational
database terminology, as well as data modeling concepts, building Entity Relationship Diagrams
(ERDs), and mapping ERDs. It introduces relational languages, and The Structured Query Language
(SQL) is used to interact with a relational database and manipulate date within the database.
Relational database systems are the main focus, but other types, including object-oriented databases,
are studied. This course will also cover topics such as file organization, indexes, transactions and
transaction management, concurrency control, and database recovery. Leveraging project-based
learning techniques, students will create and work with projects which challenge them to design,
implement, and demonstrate a database solution for a business or organization using modern
software tools.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Write data queries using relational algebra, relational calculus and SQL.
2. Describe database concepts and architecture including query processing and optimization,
concurrency controls and database recovery.
3. Design databases using conceptual and logical data models.
4. Analyze Functional Dependencies and apply normalization rules.
5. Develop E-R diagrams to model entities and relationships to show data organization within a
database.
Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) 10% Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
40% Final 5% Participation
Textbook:
10. Elmasri, Ramez. Navathe, Shamkant B, “Fundamentals of Database Systems” Addison-
Wesley, Seventh Edition 2015 ISBN-10: 0133970779 | ISBN-13: 0133970779
Reference Book:
6. Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan, "Database System Concepts"
McGraw Hill Education, Sixth Edition 2010 ISBN-10: 0073523321 | ISBN-13: 978-
0073523323
55
Brief list of topics to be covered
- Introduction to Database
- Database System Concepts and Architecture
- Relational Models
- Data Modeling Using ER Model
- Mapping Conceptual Design into logical Design
- Basic SQL Query
- Complex SQL Query - Views, Triggers, Assertions
- Relational Algebra
- Relational Calculus
- Functional Dependencies & Normalization
- File Organization
- Physical Database Design: Indexing
- Transaction Processing
- Concurrency Control
- Database Back up & Recovery
56
25. CIS 326: IT Infrastructure Management
IT Infrastructure Management إدارة هيكلة تكنولوجيا المعلومات Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 2 2 3 1 2 928097 CIS 326
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100 minutes in practical
laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
670278 - CIS 315 Prerequisite 6 Level
Course Description
This course covers advanced concepts in data communications and computer networks including
Media Access Control Mechanisms, wireless and mobile networks, and routing protocols. It then
focuses on the services and solutions available through IT infrastructure in an organizational context.
Students develop knowledge and skills for communicating effectively with professionals whose special
focus is on hardware and systems software technology, and for designing organizational processes and
software solutions that require in-depth understanding of the IT infrastructure capabilities and
limitations. The course focuses on Internet-based solutions, business continuity, and the role of
infrastructure in regulatory compliance. Students are given practical training on the configuration and
analysis of WLANs and routing protocols through a more in depth use of Wireshark and Packet Tracer.
It also covers the analysis of network performance for a business organization. Case studies of
noteworthy examples of success of IT infrastructure deployment in businesses help students build the
skills of successfully applying infrastructure solutions in businesses and choosing the correct options.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Describe the functioning of different components in popular MAC layer protocols, wireless and
mobile networks and network routing protocols.
2. Demonstrate how IT infrastructure components are organized into infrastructure solutions in
different sized organizations with a focus on large-scale business environments.
3. Explain how IT infrastructure decisions in business environments impact business continuity and
environmental and resource consumption.
4. Identify the opportunities that virtual computing service provision models, such as cloud
computing, create for business organizations.
5. Configure WLANs, routing protocols and VLANs and explore their suitability for different sized
organizations.
4%
Assignment(s) 6% Quiz(zes)
Grading
(assessment
strategies) 15% Lab 10% Project(s)
Mid-term (II) 20% Mid-term (I)
40% Final 5% Participation
Textbook:
S. Laan. IT infrastructure Architecture – Infrastructure Building Blocks and Concepts, Third Edition,
57
2017. ISBN 978-1-291-25079-5.
Reference Books:
4. B.A. Fourouzan, Data communication and networking, 5th edition, 2012., ISBN-10:
0073376221, ISBN-13: 978-0073376226
5. L. L. Peterson, B. S. Davie. Computer Networks: A Systems Approach, Fifth Edition, 2012.
ISBN-13: 978-0123850591.
6. I. Faynberg, H-L Lu, D. Skuler. Cloud Computing: Business Trends and Technologies. 1st
Edition, 2016. ISBN-13: 978-1118501214
Brief list of topics to be covered
- Introduction to Media Access Control layer. Multiple access protocols
- Aloha protocol, CSMA. Efficiency of CSMA/CD. Ethernet
- Wireless and mobile networks
- Internet routing architecture and protocols. Multicast routing. ICMP. Routing algorithms. DHCP
- Role of IT infrastructure in a modern Business organization
- Type of Networks, Network architecture, Core Network Components
- Core computing system architecture concepts, Core computing system organizing structures,
Core technical components of computer-based systems
- System performance analysis and management
- Organizing storage on organizational networks, Data centers
- The role of IT control and service management frameworks (COBIT, ITIL, etc.) in managing the
organizational IT infrastructure
- Ensuring business continuity
- Grid computing, Cloud computing, computing as a service
58
26. MGMT 320: Principles of Management
Principles of Management دارةمبادئ اإلCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 0 3 3 0 3 928097 MGMT 320
1 Every unit equals a minimum of 50 minutes in theory lecture or minimum 100 minutes in practical
laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 6 Level
Course Description
Organizational performance is dependent on the effectiveness of managerial decision making and
therefore managers require a system approach to formulate and execute organizational strategies. This
course aims to provide basic management skills to achieve efficiency and productivity in the future
professional life of learners. The course highlights modern day management challenges of complex
global business environment, corporate social responsibility, innovation management, human resource
management and operations management. The course will be supported by additional case studies.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Define the historical evolution of management theory and principles relevant to
organizational management.
2. Describe the influence of organizational culture on employee behavior in the workplace.
3. Analyze management responsibilities in modern day business environment.
4. Explain how leadership and motivation can assist a person for improving and making an
organizational change.
5. Work as a member of the team and take up leadership position when required.
20% Assignment(s) 15% Quiz(zes) Grading
(assessment
strategies) Lab Project(s)
Mid-term (II) 20% Mid-term (I)
40% Final 5% Participation
Textbook:
Stephen P. Robbins, Mary A. Coulter (2018) Management, Global Edition, 14/E ISBN-10:
1292215836 • ISBN-13: 9781292215839, Pearson
Reference Book:
1. David Boddy (2017) Management: An Introduction, 7/E, ISBN-10: 1292088591 • ISBN-
13: 9781292088594, Pearson.
Brief list of topics to be covered
- Introduction to management and organization
- Management History
- Organizational culture and environment
- Global business
59
- Social responsibilities and ethics
- Foundations of planning and strategic management
- Organizational structure and design.
- Controlling.
- Motivation and leadership.
- Human resources and team management.
- Innovation and change management.
- Business communication.
- Business operations management.
60
27. CIS 413: Professional Responsibility
Professional Responsibility المسؤولية المهنيةCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 0 2 2 0 2 670258 CIS 413
1 Every unit equals a minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 6 Level
Course Description
This course introduces the students to the legal, social, and ethical issues of information technology
and use; information rights, property rights, liability, accountability, privacy, security, crime, ethical
principles, codes of ethics, "the digital divide", role of patent and technology transfer, role of
government, role of law enforcement, role of business and industry; professional conduct, social
responsibility, and rigorous standards for software testing and reliability, students read, write, discuss,
and present reports on these topics, fraud and abuse, electronic communication privacy, mail fraud,
credit card abuse, privacy protection, copyright and patent statute, communication decency, law and
computing code of ethics, name dispute resolution policy.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Recognize the role of intellectual property in computing profession.
2. Describe professional code of ethics and professional conduct for computing professionals.
3. Analyze how to evaluate and control technology as part of professional responsibility of an
IT expert.
4. Analyze the risks associated with usage of computing technology at individual,
organizational, and societal levels.
5. Demonstrate the communication skills through presentation to peers on ethical and unethical
aspects of computing technologies.
6. Present ethical and unethical aspects of a computing technology in appropriate written
formats.
25% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab Project(s)
Mid-term (II) 20% Mid-term (I)
40% Final 5% Participation
Textbook:
Sara Baase, Timothy M. Henry (2017) “A Gift of Fire: Social, Legal, and Ethical Issues for Computing
and the Internet”, 5th edition, ISBN-10: 0134615271 ISBN-13: 978-0134615271 Pearson
61
Reference Book:
1. Ethics & Information Technology Journal
2. Michael J. Quinn, (2016) Ethics for the Information Age, Global Edition, 6/E, ISBN-10:
1292061235 • ISBN-13: 9781292061238, Pearson Higher Education.
3. Association of Computing Machinery Code of Ethics
Brief list of topics to be covered
- Technology and Ethics
- Privacy
- Intellectual Property
- Criminal Activity and Technology
- Evaluating and Controlling Technology
- Errors, Failures and Risks
- Professional Ethics
62
28. CS 322: Operating Systems
Operating Systems نظم التشغيلCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 2 2 3 1 2 670252 CS 322
1 One contact hour equals 50 minutes.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
670249 - CS 314 Prerequisite 7 Level
Course Description
In this course the student will study the basic concepts of operating systems (OS), the following
concepts will be studied in this course: OS Overview (objectives, functions, evolution of OS,
characteristics of modern OS), process description and control (process definition, process states,
process description and process control), threads (definition, why use thread, relationship between
processes and threads), microkernel (benefits of microkernel organization, microkernel design), uni-
processor scheduling (types of scheduling, short term scheduling criteria, scheduling algorithms),
memory management (memory management requirements, loading programs into main memory -fixed
partitioning, dynamic partitioning, simple paging, simple segmentation-), virtual memory (paging,
segmentation, combined paging and segmentation), operating system software (fetch policy, placement
policy, replacement policy, resident set management, cleaning policy, load control), I/O management
and disk scheduling (I/O devices, organization of I/O function, I/O buffering, disk I/O), and file
management (file management system, file organization and access, file directories, secondary storage
management).
Course Learning Outcomes (CLOs)
On successful completion of this course, students should be able to:
1. Demonstrate differences between processes and threads and compare various process/thread
synchronization methods.
2. Analyze modern memory management techniques used in operating systems.
3. Analyze structure/organization of modern file systems.
4. Compare various processor scheduling algorithms.
5. Demonstrates an understanding of the Linux operating system commands.
Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) 25% Lab Project(s)
Mid-term (II) 20% Mid-term(I)
40% Final 5% Participation
Textbook:
Abraham Silberschatz, Peter B. Galvin, Greg Gagne, “Operating Systems Concepts", 9th Edition”,
2013 Wiley.
Reference Book:
1. W. Stallings, “Operating Systems: Internals and Design Principles”, Prentice Hall. Latest Edition.
2. Jean Bacon, Tim Harris “Operating Systems”, Addison-Wesley, Latest Edition
Lab Book:
63
1. “Linux Essentials”, Roderick W. Smith, Sybex, 2012.
2. “Java: How to Program ” ,Deitel, Paul , Pearson Education, 2012
Brief list of topics to be covered
- Introduction to operating system concepts
- Operating system structures
- Processes
- Threads
- Process synchronization
- CPU scheduling
- Deadlock
- Main memory
- Virtual memory
- File system
64
29. CS 211: Introduction to Computing
Introduction to Computing Course مقدمة علم الحاسب
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 2 2 3 1 2 670237 CS 211
1 One contact hour equals 50 minutes.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 3 Level
Course Description
This course introduces the main concepts of Computer Science. It includes the basics of computing:
hardware, software, connectivity and users, the different types and features of computers. It presents
also the data types and data representation. A simple computer system architecture is presented so to
emphasize on main components, secondary storage devices, types of memory, hardware, software and
people. The principal peripheral devices are also presented: input, output and storage, data preparation,
factors affecting input, input devices, output devices, secondary storage devices, communication
between CPU and input/output devices. Software aspects are introduced like problem-solving and
programming: algorithm development, flowcharts, looping, some programming features, pseudo code,
some structured programming concepts, documentation, as well as programming languages: machine
language and assembly language, high-level and low-level languages, assemblers, compilers and
interpreters. Finally, the course presents the computer and communication aspects, as well as different
features of Operating Systems.
Course Learning Outcomes (CLOs)
At the end of the course students will be able to:
1. Apply suitable problem-solving strategies with assist of flowcharts and Pseudo code.
2. Use computational-thinking and logical reasoning through solving real-world problems, puzzles,
and programming competitions questions.
3. Write simple programs using C++ programming language.
4. Solve and implement computer programs involving decision structures and loops.
5. Construct and implement programs using arrays and proper data structures.
6. Apply problem generalization and problem abstraction.
Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) 25% Lab Project(s)
Mid-term (II) 20% Mid-term(I)
40% Final 5% Participation
Textbook:
Glenn Brookshear & Dennis Brylow. Computer Science: An Overview, 12th Edition. ©2015,
Pearson, ISBN-13: 978-0133760064, ISBN-10: 0133760065
Reference Book:
G.Michael Schneider, Judith L.Gersting. Invitation to Computer Science 7th Edition, ©2015, ISBN-
978-1-305-07577-1
65
Brief list of topics to be covered
- History and Social Implications of Computing
- Computer Architecture
- Numbering Systems and Data Representations
- Problem Solving and Debugging
- Basic Programming Constructs
- Control Structures and Program Flow
- Networks
- Internet
- Operating Systems
- Computer Security
66
30. BIOL 222: Biology
Course Name Biology حياءألا
Course
Information
Course Code Course No Credit
Units
Lec. Lab. Tot. Contact
Hours1
Lec. Lab.
BIOL 222 667409 3 1 4 3 2
1Every contact hour equals minimum 50 minutes.
Track University Requirement College Requirement Program Requirement
Core Elective
Program
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Level 4 Prerequisite None
Course Description:
This is an introductory course with lab for non-biology majors. The students will learn the basic
concepts of biology and human body systems to enable them to understand the biological phenomenon
in our daily life as well as how the human body functions. In addition, this course also aims to create
awareness about the current advances and application of biology in medicine, agriculture, environment
and society. Students will be able to understand the challenges in biological research and how
computers can help in solving them.
Course Learning Outcomes (CLOs)
On successful completion of this course, students should be able to:
1. Recognize the concepts of life, biological organization, evolution, cell, genetics and various
cellular activities such as molecular transports, cell metabolism, reproduction and gene expression.
2. Define the components, functions, and organization of cell and human organ systems.
3. Apply the scientific methods and logics to perform experiments, interpret the results and draw
conclusions.
4. Demonstrate ability to work independently and as a team member to perform experiments.
5. Perform basic scientific calculation.
6. Operate the related equipment and perform laboratory experiments according to the instruction.
Grading
(assessment
strategies)
Quiz(zes) 10% Assignment(s)
Project(s) Lab 25%
Mid-term(I) 20% Mid-term (II)
Participation 5% Final 40%
Textbook:
Biology: A Global Approach by Neil A. Campbell, 10th Edition, 2014, Pearson Education
Limited. ISBN-13: 978-1-292-00865-3.
Reference Books:
Biology Sixth Edition, Peter Raven & George Johnson. Wm. C. Brown Publishers, 2010, ISBN-10:
0077350022, ISBN-13: 978-0077350024
67
31. CYS 401: Cyber Laws and Security Policy
الفضاء االلكترونيقوانين وسياسة أمن Cyber Laws and Security Policy Course Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course Code Course
Information 0 3 3 0 3 926795 CYS 401
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100 minutes in practical
laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 7 Level
Course Description
The objectives of this course are to know about Cyber Security and implementation policies. Learn the
necessary skills based on Cyber Laws so that the individual can visualize Cyber Security related problems. Compare alternative solutions for real world security problems. Have strong foundation for further studies in
Cyber Security. Apply proper knowledge of Cyber Security techniques. Carry out digging material about
Cyber Laws and Security in to the web, formulate literature review, develop research proposal, and conduct
independent project research in specific topics related to Cyber Laws and Security Policies related core areas.
Course Learning Outcome (CLOs) On completion of this course, the student should be able to:
1. Write reports relevant to cyber security and implementation policies
2. Demonstrate oral presentation skills using critical and reflective thinking
3. Demonstrate the ability to make an informed judgement regarding cyber laws and security policies.
4. Identify professional, ethical, legal, and social aspects of cyber systems in line with applicable laws
and regulations
5. Recognize the influences of Cyber Laws on the operations and functions of the entire security
processes and practices using latest security tools, practices and paradigms
6. Identify potential risks due to nonexistence of cyber laws/policies and design appropriate controls to
achieve business continuity
7. Review the role of cyber laws and regulations in carrying out cyber security strategic planning
0% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 20% Project(s)
Mid-term (II) 20% Mid-term (I)
40% Final 10% Participation
Textbook:
1. Whitman, Michael E and Mattord, Herbert J, “Principles of information security” (6th ed).
CENGAGE LEARNING CUSTOM P, 2018
Reference Book:
1. Response Solutions”, IGI Global, 2009.
68
2. Debby Russell and Sr. G.T Gangemi, "Computer Security Basics (Paperback)”, 2nd
,Edition, O’ Reilly Media, ISBN: , 978-0596006693 2006.
3. Thomas R. Peltier, “Information Security policies and procedures: A Practitioner’s
Reference”, 2nd Edition Prentice Hall, 2004.
4. Thomas.R.Peltier, “Information Policies, Procedures and Standards”, CRC Press, 2004.
5. Scott Barman, “Writing Information Security Policies”, Sams Publishing, 2002.
6. Jonathan Rosenoer, “Cyber law: the Law of the Internet”, Springer-verlag, 1997.
7. Whitman, Michael E & Mattord, Herbert J., (author.) (2016). Principles of information
security (Fifth Edition).
Brief list of topics to be covered
- Introduction to Cybersecurity
- Introduction to Computer Security
- Business Continuity & Disaster Recovery
- Cybercrime
- Cyber Law
- Anti-Cybercrime Law in Saudi Arabia
- Cyber Policies & Guidelines, and Security Awareness
- Cyber Ethics
- Planning for Security
- Incident Response
- Implementing Information Security
- Information Security Maintenance
69
32. CYS 402: Mathematical Foundations of Information Security
األسس الرياضياتية ألمن المعلوماتMathematical Foundations of
Information Security
Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 926796 CYS 402
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
CIS 315 Prerequisite 7 Level
Course Description
The course introduces mathematical foundations of information security by covering the
mathematics behind the theory of classical Cryptosystems as well as modern Cryptosystems
including RSA, Diffie-Hellmann key exchange, and other discrete logarithm-based cryptosystems.
The focus will be on fundamental mathematical tools such as primality testing, factorization
algorithms, probability theory, and information theory. In addition, the course includes an overview
about Cryptography and Basic Number Theory: Divisibility, primes, greatest common divisor,
extended Euclidean algorithm, congruence, Chinese Remainder Theorem, modular exponentiation,
Fermat's little Theorem and Euler's Theorem, and primitive roots.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Apply knowledge of number theory to understand information security algorithms and
techniques.
2. Analyze Information Security problems related to the Cryptography using related
mathematical tools.
3. Explain the components of classical/modern cryptosystems and underlying mathematical
theories.
4. Describe mathematical foundations for designing security algorithms and protocols.
10% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
40% Final 5% Participation
Textbook:
1. Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, " An Introduction to Mathematical
Cryptography (Undergraduate Texts in Mathematics) ", Springer-Verlag – Undergraduate
Texts in Mathematics, 2nd ed., 2016. ISBN-10: 1493939386, ISBN-13: 978-1493939381
70
Reference Book:
8. A. Manezes, P. Van Oorschot and S. Vanstone, “Hand Book of Applied Cryptography”, CRC
Press, 1996.
9. Neal Koblitz, “A Course in Number Theory and Cryptography”, 2nd Edition, Springer, 2002.
Brief list of topics to be covered
Introduction to Mathematical concepts for Information security, Divisibility, Arithmetic
Modulo, Congruences,
working with inverses in modulo, GCD, Euclidean and Extended Euclidean algorithms, and
Fast Powering Algorithm
Case studies on mathematical foundation on classical cryptosystems
Discrete Logarithms, Fermat’s theorem
Chinese remainder theorem, Shanks Algorithm, Pohlig Algorithm
Case studies on Discrete Logarithms on modern crypto systems: Diffie-Hellman.
Groups, Rings, finite fields
Group Theory, Rings, Field, Galois field, polynomials, and quotient rings
Factorization methods, Euler’s Theorem
Primality theory
Case studies on Integer Factorization: RSA
Combinatorics, Probability Theory and Information Theory
Probability Theory and Information Theory
Algebra for secrecy, complexity theory.
Lattices and Cryptography
71
33. CYS 403: Network Forensics, Intrusion Detection, and Response
واالستجابة التسلل، كشف الشبكات، على التحريات Network Forensics, Intrusion
Detection, and Response
Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 2 2 3 2 2 926797 CYS 403
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
670278– CIS 315 Prerequisite 7 Level
Course Description
This course focuses on network forensics. Topics covered include Fundamentals of Network
Forensics, Forensics Basics and Criminalistics, Basics of OS and Networking, Forensic Duplication
and Analysis, Network Surveillance, Intrusion and Online Frauds Detection, Intrusion Detection and
Response. Coverage on the foundational and technical components of network forensics is included
to reinforce key concepts. The course includes up-to-date information on changes in the field.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Recognize the effectiveness of contemporary network forensic practices to evaluate system
robustness
2. Breakdown network investigation tasks into manageable modules to meet deadlines
3. Apply forensics skills and tools for detecting and responding to security risks of an
enterprise network
4. Use network forensics tools to realize strategic planning goals related to organizational
infrastructure security
10% Assignment(s) 5% Quiz(zes) Grading
(assessment
strategies) 30% Lab Project(s)
Mid-term (II) 20% Mid-term (I)
35% Final Participation
Textbook:
1. Network Forensics: Tracking Hackers through Cyberspace 1st Edition, By Sherri Davidof
and Jonathan Ham. Publisher: Prentice Hall; 1st edition (2013), ISBN-10: 0132564718,
ISBN-13: 978-0132564717
Reference Book:
1. Edward Amoroso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation,
Trace Back, Traps, and Response, Intrusion.Net Books, 1999, ISBN 0-9666700-7-8.
2. Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems,
John Wiley & Sons, 2001, ISBN: 0471389226.
72
3. Alberto Leon-Garcia and Indra Widjaja, Communication Networks: Fundamental Concepts and
Key Architectures, First Edition, McGraw-Hill Companies, Inc., 2000, ISBN 0-07-022839-6.
4. Warren Kruse and Jay Heiser, Computer Forensics: Incident Response Essentials, Addition-
Wesley, 2002, ISBN 0-201-70719-5.
Brief list of topics to be covered
Introduction to course
Practical investigation strategies
Technical Fundamentals
Evidence Acquisition
Packet Analysis
Statistical Flow Analysis
Wireless Network Forensics
Network Intrusion Detection and Analysis
Event log Aggregation, Correlation, and Analysis
Switches, Routers, and Firewalls
Web Proxies
Network Tunneling
Malware Forensics
73
34. CYS 404: Information System Audit
Information System Audit تدقيق نظام المعلوماتCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 926798 CYS 404
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100 minutes
in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
- Prerequisite 7 Level
Course Description
Financial auditing is considered the more vital for an organization to run effectively and efficiently. But
due to the evolvement of information technology and vast development of information systems, a new
auditing term is evolved, IT auditing. Auditing information systems is designed to collect, record, store
and process data to produce information for decision makers. In this course, in start, basic terms and
definitions have been introduced. After that, the process of information systems auditing is explained. It
is also described components of IT governance and management. The data acquisition and evidence for
auditing, IS operations and security are described. The course encourages student’s involvement through
class participation, class assignments and class projects.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Identify the components of IT governance and management within an organization
2. Write requirements pertaining to organizational audit goals, objective and scope
3. Estimate technical, human resource and supporting requirements to realize audit function.
4. Prepare audit reports highlighting audit outcomes
5. Demonstrate the presentation skills by describing audit process and findings
6. Examine organizational continuity and disaster recovery plans for smooth business operations
7. Produce audit recommendations for effective IT governance and management strategies
15% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) 0% Lab 15% Project(s)
0% Mid-term (II) 20% Mid-term (I)
30% Final 10% Participation
Textbook:
2. CISA Review Manual 2014. ISACA Publishers, ISBN: 978-1-60420-400-1
74
Reference Book:
1. David L. Cannon. CISA Certified Information Systems Auditor – Study Guide. Second
Edition.2008 Wiley Publishing. ISBN: 978-0-470-23152-4
2. CASCARINO, R. "Auditor's guide to IT auditing", John Wiley & Sons, 2012. ISBN: 978-1-
118-14761-0
3. "IT assurance guide: using COBIT", Published by IT Governance Institute, 2007. ISBN: 978-1-
933284-74-3
Brief list of topics to be covered
- Introduction to Information System Auditing
- The Process of Auditing Information Systems
- Governance and Management of IT
- Information Systems Acquisition, Development and Implementation
- Information Systems Operation, Maintenance, and Support
- Protection of Information Assets
75
35. CYS 406: Network Security
Network Security امن الشبكاتCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 926799 CYS 406
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 8 Level
Course Description
This course introduces the fundamental principles of network security domain. the course starts by
introducing required cryptographic techniques for secure (confidential) communication of two parties
over an insecure (public) channel and verification of the authenticity and integrity of a message. then,
introducing several topics related to network security architecture and design of selected protocols
including access control, application layer security protocols, transport layer security, network layer
security, wireless security, Data link layer security, firewall, and Intrusion Detection Systems (IDS).
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Write an extensive analysis report on network security product or related concerns and issues.
2. Practice authentication and integrity techniques required to provide related network security
objectives.
3. Analyze common network vulnerabilities and attacks, security weakness, and defense
mechanisms against network attacks.
4. Apply encryption and authentication approaches for the maintaining and protecting the privacy
of the information in the network under investigation.
5. Identify the necessary concepts in network security and the required cryptographic techniques for
secure data communication.
10% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
40% Final 5% Participation
Textbook:
1. W. Stallings, Cryptography and Network Security: Principles and Practices, 7th
edition, Prentice Hall, 2017.
Reference Book:
1. W. Stallings, Network Security Essentials: Applications and Standers, 6th edition,
Prentice Hall, 2017.
76
2. C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in
a Public World, 2nd Edition. Prentice Hall, 2002.
Brief list of topics to be covered
Introduction to Network Security
symmetric encryption: Data Encryption Standard & Advanced Encryption Standard
Public-Key Cryptography and Digital signature.
Message Authentication CODES
User Authentication: Identification, key-distribution centers &
CA & PKI
Network Access Control and Cloud Security
Transport-Level Security: SSL, TLS
Transport-Level Security: more on attacks and other protocols
Electronic Mail Security
Application Layer Security:
Kerberos, Secure HTTP (HTTPS), SSH
IP SECURITY and VPN
Firewalls
Intrusion Detection Systems (IDS)
Malicious Software
Wireless Security and Data Link Layer security
77
36. CYS 407: Digital Evidence Analysis
Digital Evidence Analysis تحليل األدلة الرقميةCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 2 2 3 1 2 926800 CYS 407
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
CS 311 - Course ID: 670245
STAT 207 –
Course ID: 670244
Prerequisites 8 Level
Course Description
This course provides a description of graphing techniques as used in the particular field of security
analysis. The course covers the gap between security specialists and graphing specialists. Therefore,
the course covers the data sources that security analysts work with, and graphing techniques and
principles needed to develop meaningful graphical representations of information. Students are
exposed to current graphing software for general purpose and/or specialized for security information.
Graphing software applies in the analysis of security meaningful data in both structured and
unstructured form and collected from a comprehensive set of sources, at various levels in the network
hierarchy and/or software activities.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Write reports highlighting evidence results
2. Demonstrate the findings of graphical security analysis through reporting, visual
representations and oral presentations
3. Use security graphing techniques and tools as required by security data: files, logs, registry
4. Recognize ethical, legal and social issues pertaining to digital evidence analysis
5. Analyze security data, by showing the most important features using graphical properties
5% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) 25% Lab 10% Project(s)
Mid-term (II) 15% Mid-term (I)
30% Final 5% Participation
Textbook:
1. Network Security through Data Analysis – From Data to Action, Michael Collins, O’Reilly
Media Inc, 2017. ISBN: 978-1-491-96284-8
78
Reference Book:
1. Applied Security Visualization, Raffael Marty, Addison-Wesley Professional, 2008. ISBN:
0-321-51010-0
2. Data-Driven Security: Analysis, Visualization and Dashboards, Jay Jacobs, Bob Rudis,
Wiley, 2014. ISBN 978-1-118-79372-5
Brief list of topics to be covered
- Visualization. Perception. Graph design principles.
- Analysis of evidence: Sources of digital evidence: Deleted and undeleted files, temporary
files, Metadata, Print spool files, Slack space, Hibernation files. Windows registry, Browser
history, Log files, File systems, File recovery, and File carving.
- Visually Representing Data. Data types. Charts and Graph Types.
- From Data to Graphs. Presentation of results: Timeline analysis. Attribution, Lay
versus technical explanations. Executive summaries, Reports and Limitations.
- Reporting, incident response and handling: Report structures, Incident detection and
analysis, Containment, eradication and recovery. Post-incident activities, and Information
sharing.
- Authentication of evidence: Hashing algorithms (MD5, SHA-1, etc. Hashing entire
media vs individual files, and Pre-exam and post-exam verification hashing.
79
37. CYS 408: Architecture of Secure Operating System
بنية نظام التشغيل اآلمنةArchitecture of Secure
Operating System
Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 2 2 3 1 2 926801 CYS 408
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100 minutes
in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
CS 322 – Operating System Prerequisite 8 Level
Course Description
The objective of this course is to study the challenges involved in the design and implementation of a
secure operating system and familiarize students with the technologies for designing a secure operating
system. The course begins by introducing some basic concepts related to secure operating system- threat
and trust models. Principles and design of a secure architecture are discussed. Discretionary access
control (DAC) and Mandatory access control (MAC) models for information flow secrecy and integrity
are presented. System administration and system hardening of Windows and Linux Operating systems
are also the major topics of this course. Latter topics include secure data storage, security kernels and
secure virtual machine systems. There is a lab component in this course which will provide hands on
experience to scan vulnerabilities in operating systems and applying security tools and techniques for a
secure system.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Describe security requirements of an operating systems
2. Design protection mechanisms of commercial operating systems
3. Produce quality work to realize project goals
4. Schedule team activities to achieve project deliverables
5. Apply information flow secrecy and integrity models to design a secure operating system
6. Employ system’s security mechanisms to enforce the requirements of a secure operating system
0% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) 20% Lab 10% Project(s)
0% Mid-term 20% Mid-term
40% Final 0% Participation
Textbook:
1. Trent Jaeger: "Operating System Security" Morgan & Claypool Publishers, 2008, ISBN: 978-15-
98292121
2. Morrie Gasser: "Building a Secure Computer System" Van Nostrand Reinhold; First Edition
(May 1, 1988), ISBN-10: 0442230222, ISBN-13: 978-0442230227
80
Reference Book:
1. Silberschatz and Galvin, "Operating System Concepts" Addison Wesley, 2008, ISBN-13: 978-
0470128725, ISBN-10: 9780470128725
2. Andrew S. Tanenbaum, "Modern Operating Systems" Prentice Hall International, 2014, ISBN-
13: 978-0133591620, ISBN-10: 013359162X
3. Michael Palmer, "Guide to Operating Systems Security" 2nd Edition, Cengage Learning, 2019
ISBN-10: 1111639256, ISBN-13: 978-1111639259
Brief list of topics to be covered
- Intro: Secure Operating system, System thinking, Threat and Trust Model
- Design Technique: Reference Monitor and Security kernels, System development
process
- Principles of a Security Architecture
- Access Control and Multilevel Security: Discretionary Access Control (DAC)
- Access Control and Multilevel Security: Mandatory Access Control (MAC) - Secrecy
models (Bell La Padula & Biba Secrecy Models)
- Access Control and Multilevel Security: MAC- Integrity Model (Bell La Padula,
Biba, Clark-Wilson)
- Physical data Security
- Windows Security: Operating system administration
- Windows Security: System Hardening
- Linux/Unix Security: Operating System Administration
- Linux/Unix Security: System Hardening
- Data storage technologies, disk and file encryption, data storage formats, data masking,
database security, data security law
- Secure Virtual Machine Systems
- System Assurance
81
38. CYS 409: Information Security Management & Standards
إدارة ومعايير أمن المعلوماتInformation Security
Management & Standards
Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 926803 CYS409
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 8 Level
Course Description
This course focuses on the managerial aspects of information security and assurance. Topics covered
include access control models, information security governance, and information security program
assessment and metrics. Coverage on the foundational and technical components of information
security is included to reinforce key concepts. The course includes up-to-date information on changes
in the field, such as national and international laws and international standards.
Course Learning Outcome (CLOs)
On completion of this course, the student should be able to:
1. Evaluate variety of cybersecurity tools/techniques to achieve appropriate solutions
2. Discover the concepts of Information security management.
3. Apply risk assessment and control plans and response to issues of managing
4. Use the concepts of information security planning and governance.
5. Demonstrate practices and planning for the management of information security
10% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 20% Project(s)
Mid-term (II) 20% Mid-term (I)
40% Final Participation
Textbook:
1. Management of Information Security, 5th Edition, Michael E. Whitman & Herbert J.
Mattord, 2016, ISBN-13: 978-1305501256| ISBN-10: 130550125X
Reference Book:
1. Douglas J. Landoll, Information Security Policies, Procedures, and Standards: A
Practitioner's Reference 1st Edition , 2016
2. Matt Bishop, "Introduction to Computer Security," Addison-Wesley Professional, Oct-04,
784 pp., ISBN:0321247442.
82
Brief list of topics to be covered
Strategic Planning and Governance for Security
Planning for Contingencies
Developing the Security Program
Developing the Security Program
Security Management Models
Security Management Practices
Risk Management: Identifying and Assessing Risk
Risk Management: controlling risk
Supply chain security, risks and vetting
Protection Mechanisms
Security of Industrial control systems, Internet of Things (IoT)
Social and Behavioral Privacy: Social theories of privacy, Social media privacy and
security
83
39. CYS 410: Digital Forensics Techniques and Tools
أدوات وتقنيات التحقيق الرقمي Digital Forensics Techniques
and Tools
Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 2 2 3 1 2 926802 CYS 410
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 8 Level
Course Description
Digital Forensics Techniques and Tools is part of forensic science. The course starts identifying the
most relevant forensics tools and techniques suitable for the nature of data. The students will be
introduced how to use those methods for digital investigation. They will be explained how to apply
them for detecting errors and flaws in cyber systems. Next, there is an analysis part, where students
will learn how to analyze suspected content including recent cybersecurity crimes by using different
forensics tools and techniques. Finally, students will be taught how to structure the extracted
information from analysis part and write a proper forensics report. The course also includes a lab part
where students will get hands-on experience for different forensics tools and techniques for digital
investigation.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Write comprehensive report on findings of forensic investigations
2. Demonstrate skills to present digital forensics concepts for class assignments/project
3. Compare and contrast among several file systems
4. Recognize ethical, legal and social issues pertaining to cybersecurity and digital forensics
5. Apply the hands-on experiments needed for investigating digital crimes or suspicious content
0% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) 20% Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
30% Final 5% Participation
Textbook:
1. Bill Nelson, Amelia Phillips, Christopher Steuart, Guide to Computer Forensics and
Investigations Fifth Edition. Cengage Learning, 2016, ISBN-13: 978-1-305-71651-3.
Reference Book:
1. Sikorski, Michael & Honig, Andrew, “Practical Malware Analysis: The Hands-On Guide to
Dissecting Malicious Software”, Starch Press, 2012 , ISBN: 1593272901, ISBN13:
9781593272906
Brief list of topics to be covered
- Computer Forensics and Investigations as a Profession
84
- Understanding Computer Investigations
- Data Acquisition
- Working with Windows and DOS Systems
- Digital forensic tools
- Virtual Machines Forensics, Live Acquisitions, and Network Forensics
- Static Malware Analysis
- Dynamic Malware Analysis
- Digital Forensics Analysis and Validation
- Report Writing for High-Tech Investigations
85
40. CYS 433: Cooperative Summer Training Program (COOP)
(التدريب(التعاوني العملي Cooperative Summer Training
Program (COOP)
Course
Name
Lab Lec. Contact
Hours1
Tot. Lab Lec. Credi
t
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927342 CYS 433
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
Completed 90 credit hours Prerequisite Summer Level
Course Description
The Cooperative education program is a collaborative and structured practical training academic
program at CCSIT between Imam Abdulrahman Bin Faisal University and employers to improve
student's skills for employment upon graduation. The students who have completed at least 90 credit
units are eligible to register for this course. The course duration is 12 weeks with 10 weeks onsite
training/practical work and 2 weeks for preparing the technical report and oral presentation. This
training provides students complementary knowledge and training to deal with real-world problems
in a professional organizational environment. The students must join in organization and work under
the supervision of 2 supervisors (one form the organization and one from the college) to accomplish
the training.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Prepare a task list to realize deliverables appropriate to organizational needs
2. Identify requirements and document them effectively
3. Schedule milestones resulting in timely completion of tasks assigned during field training
program
4. Describe the development strategy to solve the given problem
5. Write field training report to document field training experience
6. Demonstrate oral presentation skills by presenting the field training experience
7. Apply theoretical knowledge to solve real-world problems.
8. Demonstrate the knowledge of professional, ethical, legal, and social issues related to
assign task
9. Employ group work spirit to participate in functional teams.
10. Demonstrate the skills to integrate smoothly in organizational setting to complete assign
tasks.
11. Categorize suitable cybersecurity and digital forensics tools/techniques to improve
organizational security
12. Apply security knowledge to protect organizational IT infrastructure
35% Final Report 15% Progress Report Grading
86
0% Presentation 25% Supervisor Evaluation (assessmen
t
strategies) 0% Mid-term (II) 0% Mid-term Report
0% Final 25% Project Presentation &
Demo
Textbook:
This course has no textbook
Reference Book:
COOP Handbook-2016
List of Activities:
- Understanding of organizational environment
- Deployment of technology in an organization
- Development of IT solutions for organization
- Report writing and presentation.
87
41. CYS 501: Project Proposal
Project Proposal مقترح مشروعCourse
Name
Lab. Lec. Contact
Hours1
Tot. La
b Lec.
Credi
t
Units1
Course No Course
Code Course
Information 0 2 2 0 2 927320 CYS 501
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
CYS 403, CYS 406, CYS
410 Prerequisite 9 Level
Course Description
In this course, students choose a project topic and define the objectives of the project under the
supervision of a faculty member. They prepare the project proposal including defining the statement
of the problem, system requirements, different candidate solutions for the problem of study to select
the best candidate solution for the project topic. Students also prepare the feasibility study for the
best candidate solution and go through all the initial planning phases to execute the project. Students
submit project two reports: midterm report and the final report which are reviewed by the supervisors
and two external committee members. At the end, students give oral presentation and a demo of all
the work done in the semester to award them the final grades. Students will be allowed to work
individually or in groups.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Create appropriate components to effectively manage a project
2. Write requirements specifications addressing the needs of a problem
3. Estimate required resources for successful completion of the task
4. Compose a design strategy to meet desired needs of the problem
5. Write technical reports to document project activities
6. Demonstrate oral presentation skills using critical and reflective thinking
7. Demonstrate the ability to acquire new skills and practice them in realizing a solution
8. Categorize professional, ethical, legal, and social implications related to a proposed system
9. Demonstrate the abilities to participate in team activities
10. Formulate appropriate team structure to timely achieve common goals
11. Asses alternative cybersecurity and digital forensics tools/techniques to select most suitable
one
12. Summarize the impact of data, software, component, connection, and system security in the
devised solution
13. Explain security risks pertaining to IT infrastructure for smooth operations
88
14. Construct appropriate control mechanisms for effective risk management
0% Assignment(s) 10% Internal Assessment Report Grading
(assessment
strategies) 0% Lab 0% Project(s)
0% Mid-term (II) 30% Mid-term Report
30% Final Report 30% Project Presentation & Demo
Textbook:
No prescribed textbook. However, templates and handouts will be given in classes.
Reference Book:
1. Lynn E. Miner & Jeremy T. Miner , “Proposal Planning and Writing”, Greenwood Publishing
Group; ISBN-10: 0313356742 | ISBN-13: 978-0313356742 | Publication Date: July 30, 2008
| Edition: 4
2. David L. Olson, David Olson “Introduction to Information Systems Project Management”,
ISBN-10: 0072872705 | ISBN-13: 978-0072872705 | Publication Date: May 8, 2003 |
Edition: 2
3. Roger Pressman, “Software Engineering: A Practitioner’s Approach, McGraw-Hill, 7th
edition, Published 2010., ISBN-10: 0073375977, ISBN-13: 978-0-07-337597-7
4. Kathy Schwalbe, “Managing Information Technology Projects, Revised, International
Edition (7th edition)”, 2013, ISBN-13: 978-1133627227 ISBN-10: 1133627226.
Brief list of topics to be covered
Problem statement, Motivation and Literature study
Project Plan (SPMP)
Analyzing phase (System requirements) (SRS)
Initial design (SDS) & Final design
89
42. CYS 502: Mobile and Wireless Security
Mobile and Wireless Security مبادئ نظم المعلوماتCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927321 CYS 502
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
CYS407: “Digital Evidence
Analysis” Prerequisite 9 Level
Course Description
The objective of this course is to familiarize students with the issues and technologies involved in
designing a secure wireless system which is robust against attacks. The course begins by covering
the basic concepts in building a network and highlight the differences between a wired and a wireless
network. It is reviewed the fundamental security mechanisms which follows the dedicated security
architectures for wireless networks. Later, the course discusses security in Wireless Local Area
Networks (WLANs), Wireless Ad Hoc Networks and Mobile Telecommunication Networks. The
course ends by providing some practical scenarios to protect a wireless network.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Outline ethical responsibilities and liabilities of practicing mobile security in the design of
wireless security projects
2. Categorize the influences of Mobile Security on the operations and functions of the entire
wireless communication
3. Apply contemporary tools and techniques to optimally design a secure wireless communication
system
4. Formulate a plan to timely achieve project goals
5. Demonstrate the abilities to participate in team activities
10% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
40% Final 5% Participation
Textbook:
1. Wolfgang Osterhage "Wireless Network Security: Second Edition", 2018
Reference Book:
1. Nguyen, Hoa Gia Bao "Wireless Network Security: A Guide for Small and Medium
Premises" 2018
90
2. Ross Anderson "Security Engineering: A Guide to Building Dependable Distributed
Systems" 2nd Edition 2008
3. Ammar Yasir Korkusuz "Security in the GSM Network" 2012
Brief list of topics to be covered
- Overview of Wireless and Mobile Networks
- Fundamental Security Mechanisms
- Wi-Fi Security Dedicated Architectures
- Wi-Fi Security: Attacks on wireless networks, Security in the IEEE 802.11 standard
- Wi-Fi Security: Authentication in wireless networks, Layer 3 security mechanisms
- Wi-Fi Security: Security in 802.1x, Security i
- Security in Wireless Ad Hoc Networks: Attacks and Security Mechanisms
- Bluetooth Security
- Security in Mobile Telecommunication Networks: GSM, GPRS
91
43. CYS 503: Secure Software Design and Engineering
تصميم وهندسة البرامج اآلمنةSecure Software Design and
Engineering
Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927322 CYS 503
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Program
None Prerequisite 9 Level
Course Description
The process of secure software designing require thorough understanding of security principles,
security standards and security considerations during the whole software development life cycle
(SDLC). As this process requires security considerations at each stage of SDLC, after introducing
the basic concepts related to software security design, it is discussed, what are the threats/risks at
each stage of the design and how they can be mitigated by adequate security mechanisms. Students
will be given various assignments at home to study and analyze case studies related to secure software
design.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Separate the problem of security of a software into clearly defined components with possible
interrelationships
2. Produce a complete set of a software requirements specification that focuses on security
requirements as formulated by a customer need
3. Choose the resources required by a secure software that benefit most efficiently the expected
level of security
4. Prepare the architecture of a secure software by clearly marking its components and
component interactions
5. Write misuse and mal-use cases for a multipurpose, commercially viable software
6. Design secure software following the principles of software security and security
considerations at each stage of software development life cycle
0% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) 20% Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
30% Final 5% Participation
Textbook:
1. OFFICIAL (ISC)2®, GUIDE TO THE CSSLP® CBK®, SECOND EDITION, 2014
2. John Musa D, “Software Reliability Engineering”, 2nd Edition, Tata McGraw-Hill, 2005
92
3. Selected papers from annual conference: IEEE International Symposium on Software
Reliability Engineering
Reference Book:
1. Jan Jürjens, “Secure Systems Development with UML”, Springer; 2004
2. Jason Grembi, “Developing Secure Software”, CENGAGE Learning, 2008
3. Adam Shostack, “Threat Modeling-Designing for Security”, Wiley, 2014
4. Harvey Deitel, Abbey Deitel, “Internet and World Wide Web How to Program (Harvey &
Paul) Deitel & Associates” Publisher: Prentice Hall, 2012, 5/E, ISBN-10: 0132151006,
ISBN-13: 9780132151009
Brief list of topics to be covered
- Introduction to Secure Software Design.
- Secure Software - Standards /Policies
- Principles of Security and Quality
- Secure Software development process
- Secure Software Requirements
- Secure Software Design
- Secure Software Implementation and Coding
- Secure Software Testing
93
44. CYS 506: Security threats and vulnerabilities
التهديدات األمنية ونقاط الضعفSecurity threats and
vulnerabilities
Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927323 CYS 506
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 10 Level
Course Description
This course focuses on threats and vulnerabilities in information security. Topics covered include
sources of threats, Network threats and vulnerabilities, hackers, malware, security assessment and
evaluation and countermeasures. Coverage on the foundational and technical components of
information security is included to reinforce key concepts. The course includes up-to-date
information on changes in the field, such as Side-channel attack mitigation and Anti-tamper
technologies.
Course Learning Outcome (CLOs)
On completion of this course, the student should be able to:
1. Demonstrate skills to learn emerging trends related to cybercrime, malware, and hostile
scripts.
2. Recognize ethical, legal and social issues pertaining to information security
3. Produce quality work to realize project goals
4. Schedule team activities to achieve project deliverables
5. Synthesize the impact of risks, threats and vulnerabilities to produce optimal strategy for
business continuity
10% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 20% Project(s)
Mid-term (II) 20% Mid-term (I)
40% Final Participation
Textbook:
1. Joseph M Kizza, Guide to Computer Network Security (Computer Communications and
Networks) 3rd Edition 2015
Reference Book:
1. William Stallings and Lawrie Brown, “Computer Security: Principles and Practice”, 3rd
Edition 2014.
2. Adam Shostack, “Threat Modeling: Designing for Security”, 2014.
94
Brief list of topics to be covered
Concepts of Information Security
Vulnerability, threats, and attacks
Network security threats
Network security Vulnerabilities
Cybercrime and hackers
Hostile scripts
Malware, Virus and Content Filtering
Security Assessment. Analysis. and Assurance
Social Engineering: Types of social engineering attacks, Detection and mitigation of
social engineering attacks
Security Evaluations of Computer Products
Security control measures
Side-channel attack mitigation
Anti-tamper technologies
95
45. CYS 507: Applied cryptography
Applied cryptography الترميز التطبيقيCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927324 CYS 507
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
CYS 402 Prerequisite 10 Level
Course Description
The goal of this course is to introduce modern cryptography in-depth for both theories and practical
implementations. This course emphasizes how cryptographic mechanisms can be effectively used
within larger security systems. Among the topics covered will be Symmetric and Asymmetric
cryptosystems (including DES/AES and RSA/Elliptic Curves), Steganography, cryptographic
hashing, digital signatures, pseudo-random generators, zero-knowledge proofs, message
authentication codes and block ciphers, and security against active attacks (chosen case studies). In
addition, the course introduces recent case studies related to applied cryptography.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Identify knowledge, essential concepts, methods, and technologies of cryptography
2. Analyze both Public and Private cryptography techniques along with the methods used to
attack such systems
3. Apply cryptographic techniques of encipherment, digital signature, hashing, and
steganography to various security designs
4. Demonstrate skills to present latest advances and computer-based solutions achievable in
the field of cryptography
5. Solve security problems related to confidentiality, integrity, and authenticity using modern
cryptographic techniques
6. Write reports on emerging concepts in cryptography
10% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 20% Project(s)
Mid-term (II) 20% Mid-term (I)
35% Final 5% Participation
Textbook:
96
1. Jonathan Katz and Yehuda Lindell, Introduction to Modern Cryptography, Chapman & Hall
/ CRC, 2014, ISBN-13: 978-1466570269.
Reference Book:
2. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, New Delhi,
2006.
3. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons, New York, 2004.
4. W. Stallings, Cryptography and Network Security: Principles and Practice, 6th Edition,
Pearson Prentice Hall, 2014.
Brief list of topics to be covered
Introduction to classical cryptosystems
Perfectly Secret Encryption
Private-Key Encryption
Stream ciphers
Constructing CPA-Secure Encryption Schemes
padding attacks
Steganography
Message integrity and message authentication codes
Collision-Resistant
NMAC and HMAC
Hash Functions
Generic Attacks on Hash Functions
The Random-Oracle Model
Additional Applications of Hash Functions
Data Encryption Standard (DES, AED).
Practical Constructions of Symmetric-Key Primitives
Theoretical Constructions of Symmetric-Key Primitives
Public-Key (Asymmetric) Cryptography: RSA & Elliptic Curves (ECC).
CCA security.
Public Key Encryption from Trapdoor Permutations
Crypto pitfalls and case studies
Advanced Digital Signature Schemes
Case studies: Bitcoins and Block Chain.
97
46. CYS 508: Project Implementation
Project Implementation تنفيذ مشروعCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927325 CYS 508
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
CYS 501 Project Proposal Prerequisite 10 Level
Course Description
Project implementation course offers students an opportunity to assemble their knowledge acquired
throughout their BS curriculum to realize a final project. This would require them to gather
information about the proposed subject and realize a final report as well as to develop a system
practically. At this stage, students must carry on all phases system development of the subject already
defined in the precedent course (Project Proposal), and under the supervision of the same supervisor
(as possible). At the end of the semester, grading will be obtained based on Final Report, Project
Demo and an Oral Presentation of the project to be held by a committee from faculty members
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Create appropriate components to effectively manage a project
2. Write requirements specifications addressing the needs of a problem
3. Estimate required resources for successful completion of the task
4. Compose a design strategy to meet desired needs of the problem
5. Construct a computer-based solution addressing design specifications
6. Design testcases to measure the effectiveness of the solution
7. Write technical reports to document project activities
8. Demonstrate oral presentation skills using critical and reflective thinking
9. Demonstrate the ability to acquire new skills and practice them in realizing a solution
10. Categorize professional, ethical, legal, and social implications related to a proposed system
11. Demonstrate the abilities to participate in team activities
12. Formulate appropriate team structure to timely achieve common goals
13. Asses alternative cybersecurity and digital forensics tools/techniques to select most suitable
one
14. Summarize the impact of data, software, component, connection, and system security in the
devised solution
15. Explain security risks pertaining to IT infrastructure for smooth operations
16. Construct appropriate control mechanisms for effective risk management
98
0% Assignment(s) 0% Internal Assessment Report Grading
(assessment
strategies) 0% Lab 0% Project(s)
0% Mid-term (II) 10% Mid-term (I)
30% Final Report Participation
30% Continuous Progress (Bi-
Weekly)
10% Project Presentation 20% Project Demo
Textbook:
-No prescribed textbook. However, templates and handouts will be given in classes.
Reference Book:
1. Ian Sommerville “Software Engineering” 10th edition 2015 ISBN-13: 978-0133943030.
2. Kathy Schwalbe, “Managing Information Technology Projects, Revised, International Edition (7th
edition)”, 2013, ISBN-13: 978-1133627227.
3. IEEE 829 Standard for Test Plan
4. IEEE 1063 Standard for Software User Documentation
Brief list of topics to be covered
Implementation phase of the Project
Testing phase of the Project
End user deployment, preparing user manual and installation
99
47. CIS 411: Database Management System
Database Management System تحليل وتحري نظام الملفاتCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 670256 CIS 411
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
CIS 321 Prerequisite 9 or 10 Level
Course Description
This course emphasizes on the principal concepts of Database Management Systems (DBMS). The
DBMS concepts include: Storing data: disks and files which include the memory hierarchy, RAID,
disk space management, buffer management, file and indexes, page formats and record formats; file
organization and indexes which introduce cost modeling, comparison of three file organizations,
overview of indexes and properties of indexes. Three-structured indexing, hash-based indexing and
database design security; transaction management which introduce to transactions and schedules,
concurrent execution of transaction, lock-based concurrency control and crash recovery. Crash
recovery includes introduction to ARIES, recovery from a system crash and media recovery. The
course also covers advanced topics such as: Parallel and distributed database including architectures
for parallel databases, parallel query evaluation and optimization, distributed DBMS architectures,
storing data in distributed DBMS, distributed catalog management and query processing, updating
distributed data, distributed transactions and concurrency and recovery. As part of this course,
students will be trained on some latest database management software.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Explain the concepts of records, record types, and files, as well as the different
techniques for placing file records on disk.
2. Give example(s) of the application of primary, secondary, and clustering indexes.
3. Evaluate simple strategies for executing a distributed query to select the strategy that
minimizes the amount of data transfer.
4. Demonstrate a substantial DBMS project as part of a team
5. Illustrate how DBMS deals with crash recovery.
6. Explain the techniques used for data fragmentation, replication, and allocation during
the distributed database design process.
Assignment(s) 15% Quiz(zes) Grading
(assessment
strategies) Lab 15% Project(s)
Mid-term (II) 25% Mid-term (I)
40% Final 5% Participation
100
Textbook:
1. Elmasri, R. Navathe, B,” Fundamentals of Database Systems”, 6th Edition, 2010. ISBN
978-0136086208.
Reference Book:
10. Date, C. J., “Introduction Database Systems”. 8th ed ,2003. ISBN 9780321197849.
Brief list of topics to be covered
- Introduction DBMS
- SQL Query Language
- Storing Data
- File Organizations
- Dynamic/Extendible Hashed Files and RAID Technology
- Indexing Technique
- Transactions Processing
- Concurrency Control
- Database Recovery Protocols.
- Distributed Database.
- DBMS Security
101
48. CYS 520: Digital Forensics for Legal Professionals
التحري الرقمي للمهنيين القانونيينDigital Forensics for Legal
Professionals
Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927326 CYS 520
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 9 or 10 Level
Course Description
This course explains how to determine what evidence to ask for, evidence that might be discoverable,
and furthermore, it provides an overview of the current state of digital forensics, the right way to
select a qualified expert, what to expect from that expert, and how to properly use experts before and
during trial. The course explains different types of digital evidence and examples of direct and cross
examination questions.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Apply professional excellence in conducting digital forensic investigations.
2. Discuss state of the art in theory and practice of digital forensics for legal professionals.
3. Analyze, professional and legal implications in digital forensics assignments and adhere to
professional code of conduct.
15% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
30% Final 10% Participation
Textbook:
1. Lars,D.Larry,D, “Digital Forensics for Legal Professionals: Understanding Digital Evidence”,
2012. ISBN 9781597496438
Reference Book:
1. Breeuwsma, M. de Jongh, C. Klaver, R. van der Knijff and M. Roeloffs, “Forensic data
recovery from flash memory, Small Scale Digital Device Forensics Journal”, vol. 1(1), 2007.
Brief list of topics to be covered
- The Foundations of Digital Forensics: Best Practices
- Digital Forensics at Work in the Legal System
- Digital Forensics Experts
- Discovery of Digital Evidence in Criminal and Civil Cases
- Obtaining Expert Funding in Indigent Cases
102
49. CYS 520: Advanced Digital Investigation
Advanced Digital Investigation مواضيع متقدمة في التحري الرقميCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927328 CYS 522
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 9 or 10 Level
Course Description
This course exposes delegates to advanced concepts, skills and knowledge of undertaking
investigations in the digital space. The course explains how to apply an advanced investigative and
strategic mindset in considering and balancing the opportunities and benefits against the restrictions
and risks associated with each discipline of digital investigation and how they can operate and
compliment when intelligently cross referenced as part of an investigation strategy.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Demonstrate the skills to initiate and complete digital investigations by making use of latest
tools and techniques appropriate to the needs of the situation.
2. Compare contemporary computer-based techniques and tools to make an informed judgement
for a digital investigation task.
3. Show highest professional and ethical conduct while performing digital investigations.
10% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
40% Final 5% Participation
Textbook:
1. Eoghan,C, “Handbook of Digital Forensics and Investigation”, 1st Edition, 2015. ISBN
9780123742674
Reference Book:
1. Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, 3rd
Edition, 2015.
2. Brian,C. “File System Forensic Analysis, ISBN 321268172, Addison-Wesley Professional
Brief list of topics to be covered
- Basics of digital investigation
- Digital evidence
- The Digital space (advanced)
103
- Investigative Methodology Introduction to Forensic Analysis
- Electronic Discovery Intrusion Investigation
- Data organization and acquisition
- Volume analysis -- PC and server partitions
- DOS, Apple and BSD partitions
- File system analysis-- FAT, NTFS and Ext2 & Ext3
- OSINT and The Deep Web
- The Dark Web
- Cryptocurrencies
- Understanding and working on Sleuth Kit (TSK), Autopsy etc.
- Emerging threats and future technology
104
50. CYS 521: Advanced Computer Forensics
المتقدمةالتحقيقات الجنائية الحاسوبية Advanced Computer Forensics Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927327 CYS 521
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 9 or 10 Level
Course Description
This course focuses on providing advanced topics in computer forensics. It assists incident responders
with the required skills to investigate different types of threat. Besides explaining the forensics value
of Windows registries and system hives, it demonstrates Macintosh and Linux Boot process and file
system. It explains how to analyze and validate computer forensics. It discusses recovering graphic
files. Also, it focuses on mail and mobile devices.
Course Learning Outcome (CLOs)
At the end of the course students will be able to: 1. Demonstrate skills to identify, preserve and examine evidences in a digital forensic
investigation.
2. Analyze a large amount of digital evidence to find out most significant data in a forensic
analysis.
3. Develop a linkage between the scientific findings and legal implications while performing a
forensic operation.
15% Assignment(s) 15% Quiz(zes) Grading
(assessment
strategies) Lab 15% Project(s)
Mid-term (II) 25% Mid-term (I)
40% Final 5% Participation
Textbook:
2. Bill Nelson, Amelia Philips and Christopher Steuart, “ Guide to Computer Forensics and
Investigations”. 5th Edition, 2015. ISBN-13: 978-1285060033, ISBN-10: 1285060032
3. Harlan Carvy “Windows Registry Forensics: Advanced Digital Forensic Analysis of the
Windows Registry”. 1st Edition, 2011. ISBN-10: 978159749580, ISBN-13: 978-
1597495806
Reference Book:
None
105
Brief list of topics to be covered
- Macintosh and Linux Boot Processes and File System
- Computer Forensics Analysis and Validation
- Recovering Graphic Files
- Cell Phone and Mobile Device Forensics
- Registry Analysis
- Processes and Tools
- Analyzing the system hives
- Email Investigation
- Expert Testimony in High-Tech Investigations
106
51. CYS 523: Information Theory and Coding
Information Theory and Coding نظرية المعلومات والترميزCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927329 CYS 523
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 9 or 10 Level
Course Description
The aim of this course is to introduce the principles and applications of information theory. This
course covers the concept of amount of information, entropy, channel capacity, error-detection and
error-correction codes, block coding, convolutional coding, and Viterbi decoding algorithm.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Design lossless source codes for discrete memoryless source to improve the efficiency of
information transmission.
2. Define channel capacities and properties using Shannon's Theorems
3. Apply information theoretic results as fundamental limits on performance of communication
systems
4. Compare different design tools for multimedia information coding to select a suitable alternative.
15% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
30% Final 10% Participation
Textbook:
1. Monica, B, “Fundamentals in information Theory and Coding”, 1st Edition, 2011. ISBN
9780123742674
Reference Book:
1. Ranjan, B, “Information theory, coding and cryptography”, 2nd Edition, 2002. ISBN
9780070669017
2. Mehmet, S, “Digital Communications”, 2nd Edition, 2017, ISBN 9781119091264
Brief list of topics to be covered
- Information Theory, Source Coding
- Probability, Uncertainty, and Information
- Error-Control Coding
- Channel Capacity and Coding
- Cyclic Codes, Convolutional Codes
- Differential Entropy, Trellis Coded Modulation
107
52. CYS 525: Introduction to Reverse Engineering
الشبكات معقدةمقدمة في Introduction to Reverse
Engineering
Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927331 CYS 525
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 9 or 10 Level
Course Description
The aim of this course is to obtain knowledge about engineering device or system. Applying reverse
engineering methodologies allow students to disassemble and re-assemble of the device, taking care
to document, test, analyze and report on the study of its function.
Course Learning Outcome (CLOs)
At the end of the course students will be able to: 1. Show an understanding of the operations and functions performed in Reverse Engineering process. 2. Apply reverse engineering approach to identify potential vulnerabilities in enterprise network
environment. 3. Describe the effectiveness of modern tools to conduct reverse engineering projects.
4. Discuss the trade-offs of different reverse engineering methodologies.
15% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
30% Final 10% Participation
Textbook:
1. Reverse Engineering for Beginners, By: Dennis Yurichev ©2013-2015
Reference Book:
1. Ulrich Drepper. What Every Programmer Should Know About Memory, any edition
2. Ulrich Drepper. “ELF Handling For Thread-Local Storage”. (2013)
Brief list of topics to be covered
- Introduction to Reverse Engineering
- Intro to Formal Methods & Software Engineering Methods
- Systems Analysis, - Rapid Prototyping
- Static Code Analysis
- Self-Defending Malware
- Dynamic Code Analysis
- Reverse Engineering Tools (System Monitors, Disassemblers, Debuggers)
108
53. CYS 524: Cyber Warfare
Cyber Warfare الحرب السيبرانيةCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927330 CYS 524
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 9 or 10 Level
Course Description
The cyber domain is undergoing extraordinary changes that present both exceptional opportunities
to and major challenges for users of cyberspace. The course provides perspective on emerging policy,
doctrine, strategy, and operational constraints affecting the development of cyber warfare systems.
This course discusses the challenges arise from the malevolent actors who use cyberspace and the
many security vulnerabilities that plague this sphere. Students learn about cyber warfare for
management, exploiting opportunities and overcoming challenges that require a balanced body of
knowledge in the cyber domain.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Discuss essential concepts related to Cyber Security such as Cyber Espionage, legal Status of
Cyber War, Non-State Actors, Cyber warfare in 20th and 21st Century.
2. Evaluate alternative solution for safeguarding IT infrastructure against cyber-attacks.
3. Analyze Cyber warfare scenarios to design appropriate controls for organizational security.
Assignment(s) 15% Quiz(zes) Grading
(assessment
strategies) Lab 10% Project(s)
15% Mid-term (II) 15% Mid-term (I)
30% Final 15% Participation
Textbook:
Jeffrey, C. Lewis, S, “Inside Cyber Warfare: Mapping the Cyber Underworld”. 1st Edition,
2010. ISBN 9781449310042
Reference Book:
1. The Next World War: Computers Are the Weapons and the Front Line Is Everywhere by
James Adams
2. The Ashgate research companion to modern warfare By George Kassimeris, John D. Buckley
Brief list of topics to be covered
- Assessing the Problem Domain of Cyberspace.
- Unconventional War Around the World Stop Georgia Project.
- Legal Status of Cyber War Nuclear Non-proliferation Treaties.
109
- Response to International Cyber Attack as Act of War the Legal Dilemma.
- Intelligence Component to Cyber War Korean DDoS Attack.
- Non-State Hacker and Social Web Case studies from around the world.
- Organized Crime in Cyberspace Atrivo/Intercage, ESTDomains, McColo
- Weapon zing Malware A New Threat Landscape.
- The Role of Cyber in Military Doctrine the Russian Federation.
110
54. CYS 529: Ethical Hacking and Digital Forensics
األخالقي والتحري الرقمي االختراق Ethical Hacking and Digital
Forensics
Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 2 2 3 1 2 927335 CYS 529
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100 minutes in practical
laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 9 or 10 Level
Course Description
The aim of this course is to learn how to determine potential online criminal activity at its inception,
legally gather evidences, search and investigate wireless attacks. Students understand ethical
approaches of operating with technology to search out weaknesses of a system taking it to future level
for more development. The course discusses interactive setting wherever the students can learn the
aptitudes of activity vulnerability assessment, pen-testing of systems and networks, repairing the
weaknesses, creating reports of scanned vulnerabilities.
Course Learning Outcome (CLOs)
At the end of the course students will be able to: Analyze the activities required to compromise a target system during an ethical hacking attack.
Demonstrate systematic understanding of digital forensic process and its linkage with ethical hacking.
1. Classify tools and techniques to carry out a penetration testing.
15% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) 20% Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
30% Final 5% Participation
1. Stuart McClure, Joel Scambray and Goerge Kurtz, “Hacking Exposed Network Security
Secrets & Solutions”, Tata McGraw hill Publishers, 2012
Reference Book:
1. Android Forensics: Investigation, Analysis and Mobile Security for Google Android", by Andrew
Hoog,1597496529, 9781597496520, Elsevier, 2011 2012
Brief list of topics to be covered
- Casing the Establishment
- Securing Permission
- System Hacking
- Network Hacking
- Software Hacking
- Password Cracking
- Buffer Overflow
- Network Hacking
111
55. CYS 526: Advanced Network Forensics and Analysis
تحري الشبكاتو تحليل في متقدمة مواضيع Advanced Network Forensics
and Analysis
Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927332 CYS 526
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 9 or 10 Level
Course Description
This course introduces the full spectrum of network evidence, traffic capture and analysis, network
log examination etc. Other topics include understanding and analyzing various logging mechanisms
available to both endpoint and network transport devices. The course helps students learning about
different types of devices that can be used to capture and process valuable evidence and at various
level with adequate details, and accurately report on their findings.
Course Learning Outcome (CLOs)
At the end of the course students will be able to: 1. Discuss advances concepts in network forensics.
2. Apply logging and aggregation to conduct network forensics analysis reports.
3. Compare theories, research issues and recent developments of network forensics literature.
15% Assignment(s) 15% Quiz(zes) Grading
(assessment
strategies) Lab Project(s)
Mid-term (II) 25% Mid-term (I)
40% Final 5% Participation
Textbook:
1. Daljit, J. “Advanced Computer and Network Security”. 2006. ISBN 9780977139934
Reference Book:
1. Sherri, D. Jonathan, H, “Network Forensics: Tracking Hackers through Cyberspace”. 1st
Edition, 2012. ISBN 9780132564717
112
Brief list of topics to be covered
- Capture and analyze wireless traffic
- Network Forensic Process Flow
- Packet Capture Applications
- Components of network acquisition strategies
- High-level analysis tools and utilities
- Open-source tool sets to examine NetFlow data
- Topics in Wireless Network Forensics
- Intrusion Detection Systems
- Logging, - Aggregation, Reverse engineering in network Protocol
- Tools for large-scale analysis
- Collection risks and mitigations, Forensic Filtering, Network Analyzer, VoIP Call
Interception.
- Forensic Filtering, Network Analyzer, VoIP Call Interception.
- Reverse engineering in network Protocol
- Tools for large-scale analysis
113
56. CYS 527: Selected Topics in Cyber Security & Digital Forensics
األمن السيبراني والتحري الرقمي في متقدمة مواضيع Selected Topics in Cyber
Security & Digital Forensics
Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927333 CYS 527
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 9 or 10 Level
Course Description
This course covers subjects of recent issues and trends in Cyber Security and Digital Forensics and
may be left to the willing of the instructor, and may cover but not limited to the following advanced
topics: new trends in the Web technology, distributed and mobile computing, cyber security, digital
forensics, and software engineering, etc. Students are assigned individual projects in these specific
fields: Project Reports and seminars, so to demonstrate their ability in research and oral
presentations. Projects are discussed in workgroups so to involve the whole class in these subjects.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Review emerging concepts in cyber security and digital forensics research.
2. Apply professional code of ethics while conducting digital forensic investigation.
3. Compare latest computer-based techniques for practically applying Cyber Security
methodologies in digital forensic activities.
15% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 20% Project(s)
Mid-term (II) 20% Mid-term (I)
30% Final 5% Participation
Textbook:
1. Due to nature of this course, text book will be recommended by the concerned teacher before
course begins.
Reference Book:
2. Nelson, B. Amelia, P. Chrisopher, S. “Guide to Computer Forensics and Investigation”. 3rd
Edition, 2014. ISBN 9781435498839
3. Luttgens, J. Matthew, P. Kevin, M. “Incident Response & Computer Forensics”. 3rd Edition,
2014. ISBN 9780071798686
Brief list of topics to be covered
- Latest attacks/threat happening in the domain cyber-crimes
- Test current infrastructure to investigate their it’s to stand against latest attacks
- Penetration testing case studies
114
- Post evet analysis of the accidents
(Due to nature of this course, topics do vary every year as per department needs. Ramming topics
are being left to the concerned instructor.)
115
57. CYS 528: Digital Media Forensics
Digital Media Forensics تحري الوسائط الرقميةCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927334 CYS 528
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 9 or 10 Level
Course Description
Digital media forensics is growing and is an ever-evolving field. This course focuses on providing
all the necessary knowledge for digital media forensics. It consists of collecting, preserving,
analyzing, and Investigating digital media evidences. In addition, It shades lights into how to analyze
and validate cloud forensics.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Describe the collection, preservation, and analysis of digital media.
2. Demosntrate the skills in preservation, and analysis of digital media.
3. Analyze the legal issues of data acquisition and duplication in digital media forensic assignments.
10% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
40% Final 5% Participation
Textbook:
1. Patrick, E. “The Basics of Hacking and Penetration Testing: Ethical Hacking and
Penetration Testing Made Easy”. 2nd Edition, 2013. ISBN 9781597496551
Reference Book:
1. Mechanisms, New Media and the Forensic Imagination, By Matthew G. Kirschenbaum
Brief list of topics to be covered
- Introduction/Legal Issues
- ISO standard (ISO 17025)
- Data Acquisition and duplication
- Forensic Investigations
- Methodologies, Digital Media, Boot Processes
- Windows Forensics, Linux Forensics
- Application Password Crackers
- Practicum discussion Investigating Wireless Attacks
- Blackberry Forensics
- iPod & iPhone Forensics & Android, - Cloud Forensic
116
58. CYS 530: Biometric Security
Biometric Security األمن البيومتريCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927336 CYS 530
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 9 or 10 Level
Course Description
Biometrics has emerged from relatively specialized use in the criminal forensics’ domain to more
mainstream use for computer authentication, identification document security, and surveillance for
public safety. This emergence has been accompanied by an expansion in biometric modality from
mainly fingerprints to face, iris, hand, voice, and other novel biometrics. This course concentrates on
the unique advantages that biometrics brings to computer security, but also addresses challenging
issues such as security strength, recognition rates, and privacy, as well as alternatives of passwords
and smart cards. The course introduces biometric security-based systems or engines store human
body characteristics that do not change over an individual's lifetime. Additional topics include
biometric system design, performance evaluation, multimodal biometric systems, biometric system
security, and identity science technologies. By the end of the course students will be able to evaluate
and design security systems that include biometrics.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Apply secure mechanisms for biometric identification in IT security systems
2. Employ theoretical and scientific methods relevant for design, development and operation of
biometric access control systems.
3. Describe emerging concepts in Biological and Behavioral biometric security field.
10% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
40% Final 5% Participation
Textbook:
1. Ravi, D. “Biometric Technology: Authentication, Bio cryptography, and Cloud-Based
Architecture”, 2014. ISBN 9781466592452
Reference Book:
1. John Berger,” Biometrics for Network Security”, Prentice Hall, 2004.
2. Samir, N. Michel, T. Raj, N. “Biometrics -Identity verification in a network”, Wiley Eastern,
2002. Brief list of topics to be covered
- Introduction to Biometrics
117
- Physiological Biometric Technologies
- Types of Biometrics (DNA Matching, Ear, Eyes - Iris Recognition, face, etc.)
- Security Architecture
- Behavioral Biometric Technologies
- Multi Biometrics
- Case studies on Physiological, Behavioral and Multifactor Biometrics in Identification
Systems
118
59. CYS 531: Distributed System Security
Distributed System Security أمن النظم الموزعهCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927337 CYS531
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 9 or 10 Level
Course Description
This course presents an overview of distributed systems security issues, including threats, trends,
standards and solutions. Students understand threats and vulnerabilities in different layers namely the
host, infrastructure, application, and service layer to provide a holistic and practical, contemporary
view of enterprise architectures.
Course Learning Outcome (CLOs)
At the end of the course students will be able to: 1. Review distributed systems security appraoches in theory and practice.
2. Apply emerging techniques and methods in securing Distributed Systems paradigms.
3. Analyze a distributed system to identify security threats and design appropriate controls.
15% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
30% Final 10% Participation
Textbook:
1. Abhijit, B. Anirban, C. et al., “Distributed Systems Security: Issues. Processes and
solutions”. 1st Edition, 2009. ISBN 9780470751770
Reference Book:
1. Ruschitzka, M. Clevenger, J. “Heterogeneous data translations based on environment grammars,”
IEEE Transactions on Software Engineering, vol. 15, no. 10, pp. 1236-1251, 1989.
2. Rachid, G. Franck, P. “Stabilization, Safety, and Security of Distributed Systems”, 2010.
Brief list of topics to be covered
- Distributed Systems Security
- Security mechanisms
- Host-level Threats and Vulnerabilities
- Security Framework
- Testing on data in distributed systems
- Application-Level Threats and Vulnerabilities
- Host-Level Solutions
- Service-Level Solutions, Encryption Algorithms
119
60. CYS 532: Multimedia Security
Multimedia Security أمن الوسائط المتعددةCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927338 CYS 532
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 9 or 10 Level
Course Description
The course provides students with a good working knowledge on the basic background relating to
multimedia security technologies for multimedia content currently available in the digital arena.
Students learn how to secure multimedia data by providing confidentiality, integrity, and identity or
ownership. The main topics include digital steganography and its counter-measure, stegnalysis,
watermarking and authentication, data encryption, network security and biometric identification.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Describe security constructs of multimedia systems.
2. Analyze algorithms, theories and tools developed in research and market of multimedia
security issues, including digital rights management, copyright protection, authenticity
verification, and mobile information assurance.
3. Review theories, research issues and recent developments of multimedia-based security
systems, such as video surveillance, biometric feature applications, and sensor networks.
10% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
40% Final 5% Participation
Textbook:
1. Zeng, W. Heather, Y. Ching-Yung, L. Multimedia security technologies for digital rights
management. 1st Edition, 2011. ISBN 9780123694768
Reference Book:
1. Shih, Frank Y. Digital watermarking and steganography: fundamentals and techniques. 1st
Edition, 2007. ISBN 9781420047578
Brief list of topics to be covered
- Overview-Multimedia systems, secured multimedia, digital rights management systems and technical
trends
- Multimedia encryption, Digital watermarking, Watermarking applications
- Frequency domain-based watermarking - Security attacks
- Video watermarking, Multimedia quality measurements
- Robustness error analysis, MATLAB applications, Biometric identification
120
61. CYS 533: File System Forensic Analysis
File System Forensic Analysis تحليل وتحري نظام الملفاتCourse
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927339 CYS 533
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 9 or 10 Level
Course Description
This course provides a comparison of file systems, overview of volume analysis and why it’s
important. This course offers solid understanding of both the structures that make up different file
systems and how these structures work. Students learn analysis of data structures in a volume that are
used to store and retrieve files. The course also covers analysis of data structures partition and
assemble storage volumes.
Course Learning Outcome (CLOs)
At the end of the course students will be able to: 1. Compare different design tools for file system forenisc analysis to select a suitable alternative.
2. Apply state of the art forensic Analysis techniques in conducting file system forensic analysis.
3. Review File Systems and Forensic Analysis body of knowledge.
15% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
30% Final 10% Participation
Textbook:
1. Eoghan, C. “Malware Forensics: Investigating and Analyzing Malicious Code” 1st Edition,
2008. ISBN 9780080560199
Reference Book:
1. Brian, C. “File System Forensic Analysis”. 1st Edition, 2005. ISBN 0321268172
Brief list of topics to be covered
- Introduction to Digital Forensics.
- Creating a Forensic Boot Disk.
- File System Analysis, Hard disk Acquisition
- Partitions and volumes, Removable Media
- File System Analysis, OS-Specific Forensics
- Volume Analysis, Application Forensics
- Metadata, Password protected files.
- Data-hiding techniques, Recovering/identifying files, Working with browser
121
62. CYS 534: Advanced Computer Networks
شبكات الكمبيوترمقدمة في Advanced Computer Networks Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927340 CYS 534
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 9 or 10 Level
Course Description
The aim of this course to cover principles, architectures, and protocols used in modern data center
networks. The course material in provide an understanding of large and complex networked systems.
Main topics include Quality of Service (QoS) and advanced routing algorithms, IPv6 and Mobile IP,
and Internet of Thinks (IoT).
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Discuss emerging concepts in network security.
2. Evaluate the computer network and information security needs of an organization.
3. Devise a strategy for continuous network monitoring and providing real-time security
solutions.
15% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 20% Project(s)
Mid-term (II) 20% Mid-term (I)
30% Final 5% Participation
Textbook:
1. James, F. Kurose, R. Keith, R. “Computer Networking: A Top-Down Approach”. 6th Edition,
2013.
Reference Book:
1. Peter, L.”IPv6: Theory, Protocol, Practice”. 2nd edition, 2004.
2. Eldad, P. Robert, S. “Next Generation Wireless LANs: 802.11n and 802.11ac”. 2nd edition, 2013.
Brief list of topics to be covered
- Advanced Routing algorithms
- Advanced Network Congestion Control algorithms
- Quality of service,
- Real Time Transport Protocol
- Wireless Networks, Adhoc Networks
- Mobile Networks, Wireless Sensor Networks (WSN)
- Internet of Thinks (IoT)
- Vehicular Adhoc Networks (VANET), IPv6, Mobile IP, Mobile TCP,IP
122
63. CYS 535: Introduction to Complex Networks
مقدمة في الشبكات معقدةIntroduction to Complex
Networks
Course
Name
Lab. Lec. Contact
Hours1
Tot. Lab. Lec. Credit
Units1
Course No Course
Code Course
Information 0 3 3 0 3 927341 CYS 535
1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100
minutes in practical laboratory.
University Requirement College Requirement Program Requirement
Core Elective Track
Computer Science (CS)
Computer Information Systems (CIS)
Cyber Security and Digital Forensics (CYS)
Artificial Intelligence (AI)
Program
None Prerequisite 9 or 10 Level
Course Description
This course describes the backbone of complex systems, from computer communication, transport
infrastructures to online social systems. It will Cover algorithms for graph exploration, node ranking
and network generation, among others. It allows students to experiment with network models and
real-world data sets, providing them with a deep understanding of the basics of network theory and
its practical applications.
Course Learning Outcome (CLOs)
At the end of the course students will be able to:
1. Discuss theories and research issues in security of complex networks.
2. Apply tools for recovering data from under investigation network resources.
3. Compare different network diagnostic techniques to select a suitable alternative.
15% Assignment(s) 10% Quiz(zes) Grading
(assessment
strategies) Lab 15% Project(s)
Mid-term (II) 20% Mid-term (I)
30% Final 10% Participation
Textbook:
1. Vito, L. Vincenzo,N. Giovanni, R. “Complex Networks Principles, Methods and
Applications”. 1st Edition, 2017. ISBN 9781108299961
Reference Book:
1. Ernesto, E. “The Structure of Complex Networks”. 1st Edition, 2011. ISBN 9780198783800
Brief list of topics to be covered - Graphs and graph theory
- Centrality measures
- Random graphs
- Small-world networks
- Generalized random graphs
- Models of growing graphs
- Degree correlations
- Cycles and motifs, Community structure
- Weighted networks