Program Overview

Like any technology, Internet has advantages and shortcomings. Since the Internet is a network of connected devices, the most important disadvantage could be the greatest exposure to breakthroughs and the serious impacts on networks connected through the Internet. This may consequence in heavy losses as when a network is compromised. 
  • Apply the use of mathematics cryptographic algorithms and fundamentals of information security to protect computer systems.
  • An ability to analyze the systems against vulnerabilities and attacks, and identify the techniques appropriate to protect sensitive data, networks, operating systems, and the web from cyber-attacks.
  • An ability to breakthrough systems after obtaining authorization to detect security vulnerabilities.
  • An ability to define the systems' requirements and design a protected system by using and applying current technical concepts and practices in the core information security.
  • Adhering to the ethics, regulations and laws in the practice of the profession of information security.
  • Develop familiarity with the scientific research writing skills.
  • An ability to function effectively on teams to accomplish a common goal.
  •  An ability to communicate effectively with a range of audiences.
  • Software Security
  • Attacks and Defenses
11 Core Courses
2 Elective Courses
Capstone Project

Two Years (4 Semesters)