MSc in Information Security

As computing systems has become a vital part of our daily lives, the need for services 24/7 (availability) has become inevitable. Therefore, it’s now more important to identify if the systems are reliable and secure, provide integrity and confidentiality from cyber-attacks. To achieve this, the security specialist needs to understand security principles in planning, designing, analyzing, managing, and developing effectively in a rapidly changing world. In this program, students will advance through this program to achieve their potential in the field of Information Security.

MissionBullseye with solid fill

Preparing and qualifying students for a pioneering education, job market, serving the community, and developing research skills according to the requirements of the Kingdom of Saudi Arabia Vision 2030.

Target with solid fill

Program Learning Objectives

  1. Reaching a pioneering level of education and research skills.
  2. Continuously keeping the students updated with emerging topics in the information security field.
  3. Stimulating the ethics of the profession and the self-growth of students and college members through information technology.
  4. Creating opportunities for students to practice the required technical skills.

Clipboard Checked with solid fill

Program Learning Outcomes (PLOs)

  1. Identify the systems' requirements and design a protected system by using and applying current technical concepts and practices in the core information security.
  2. Analyze the systems against vulnerabilities and attacks, and identify the techniques appropriate to protect sensitive data, networks, operating systems, and the web from cyber-attacks.
  3. Communicate effectively with a range of audience and make strategic decision with high autonomy.
  4. Deploy a variety of complex practices and technical tools to design a secure system that meets security objectives.
  5. Adhere to the ethics, regulations and laws in the practice of the profession of information security.
  6. Function effectively on teams to accomplish a common goal.
  7. Develop familiarity with the advanced development of cyber security through scientific research.
  8. Understand the use of mathematics cryptographic algorithms and fundamentals of information security to protect computer systems.
  9. Elaborate the security defense strategies, techniques, and technologies to defend against cyber attacks.

   Specific Program Learning Outcomes (PLOs): Software Security track:

  1. Ability to break through systems after obtaining authorization to detect software security vulnerabilities.
  2. Deploy a variety of complex practices and technical tools to design a software secure system that meets security objectives.

   Specific Program Learning Outcomes (PLOs): Attacks and Defense track:

  1. Elaborate the security defense strategies, techniques, and technologies to defend against cyber-attacks.
  2. Analyze the systems against vulnerabilities and attacks, and identify the techniques appropriate to protect sensitive data, networks, operating systems, and the web from cyber-attacks.

 

Information with solid fill

Program’s Handbook

          For more information about the program, its rules/regulations of study, and student's rights and responsibilities, you can read the program handbookProject Deliverables, and Milestones can be found here 

 

Bar chart with solid fill

Admission Requirements

  1. The applicant must have a university degree from a Saudi university or from another recognized institution with a suitable background with a minimum GPA of 2.75 out of 5.00 or 1.75 out of 4.00 (good), in the following disciplines: (Computer Science - Information Systems - Information Technology Software Engineering). Other related disciplines may be accepted after the approval of the department.
  2. Two recommendation letters.
  3. Certain courses are compulsory for admission in the MSc. program in Information Security. The following courses must be successfully  passed:
    • IT System Components
    • Basic Scripting and Programming
    • Operating Systems Concepts
    • Basic Networking
    • Data Structure
    • Databases. 
  4. The minimum score for general aptitude test is 60%.
  5. The minimum score for the STEP English test is 60 (should be provided within the application submission period, no provisional admission is granted) or its equivalent in other language tests as shown in the table below.

English Aptitude Test Equivalence

STEP

IELTS

TOEFL

IBT

CBT

PBT

97

6

79

213

550

92

5.5

70

194

525

83

5

61

173

500

75

4.5

53

153

475

67

4

45

133

450

52

3.5

32

97

400

Settings with solid fill

 Main Tracks

Software Security

Attacks and Defense.

Stopwatch 66% with solid fill

Duration

Two years (Four semesters)

 

Monthly calendar with solid fill

Study Plan (32 Credit Hours)

 

 First Year

 

 

 

Level 1

 

 

 

Code

Course Name

Pre-requisite

CH

6311 CIS 

Information Security Principles

-

2

6312 CIS

Identity and Data Security

-

2

6321 CIS

Information Security Management

-

2

6313 CIS

Cryptography

-

3

 

 

 

9

 

 

 

 

Level 2

 

 

 

Code

Course Name

Pre-requisite

CH

6314 CIS

Database Security

-

3

6315 CIS

Advanced Network Security

-

3

6331 CIS

Digital Forensic

-

3

 

 

 

9

 

 

 

 

 Second Year

 

 

 

Level 3

 

 

 

Code

Course Name

Pre-requisite

CH

6341 CIS

Penetration Testing

-

3

****

Elective 1

-

3

****

Elective 2

-

3

 

 

 

9

 

 

 

 

Level 4

 

 

 

Code

Course Name

Pre-requisite

CH

6351 CIS

Human Factors in Cyber Security

-

2

6361 CIS

Capstone Project

-

3

 

 

 

5

 

 

 

 

 Tracks Electives

 

 

Track I

Attack and Defense

 

 

Code

Course Name

Pre-requisite

CH

6332 CIS

Malware Analysis

-

3

6333 CIS

IT Auditing

-

3

6334 CIS

Security Operations and Incident Management

-

3

 

 

 

 

Track II

Software Security

 

 

Code

Course Name

Pre-requisite

CH

6342 CIS

Secure Software Systems

-

3

6343 CIS

Web Security

-

3

6344 CIS

Wireless and Mobile Security

-

3