As computing systems has become a vital part of our daily lives, the need for services 24/7 (availability) has become inevitable. Therefore, it’s now more important to identify if the systems are reliable and secure, provide integrity and confidentiality from cyber-attacks. To achieve this, the security specialist needs to understand security principles in planning, designing, analyzing, managing, and developing effectively in a rapidly changing world. In this program, students will advance through this program to achieve their potential in the field of Information Security.
Mission
Preparing and qualifying students for a pioneering education, job market, serving the community, and developing research skills according to the requirements of the Kingdom of Saudi Arabia Vision 2030.
Program Learning Objectives
- Reaching a pioneering level of education and research skills.
- Continuously keeping the students updated with emerging topics in the information security field.
- Stimulating the ethics of the profession and the self-growth of students and college members through information technology.
- Creating opportunities for students to practice the required technical skills.
Program Learning Outcomes (PLOs)
- Identify the systems' requirements and design a protected system by using and applying current technical concepts and practices in the core information security.
- Analyze the systems against vulnerabilities and attacks, and identify the techniques appropriate to protect sensitive data, networks, operating systems, and the web from cyber-attacks.
- Communicate effectively with a range of audience and make strategic decision with high autonomy.
- Deploy a variety of complex practices and technical tools to design a secure system that meets security objectives.
- Adhere to the ethics, regulations and laws in the practice of the profession of information security.
- Function effectively on teams to accomplish a common goal.
- Develop familiarity with the advanced development of cyber security through scientific research.
- Understand the use of mathematics cryptographic algorithms and fundamentals of information security to protect computer systems.
- Elaborate the security defense strategies, techniques, and technologies to defend against cyber attacks.
Specific Program Learning Outcomes (PLOs): Software Security track:
- Ability to break through systems after obtaining authorization to detect software security vulnerabilities.
- Deploy a variety of complex practices and technical tools to design a software secure system that meets security objectives.
Specific Program Learning Outcomes (PLOs): Attacks and Defense track:
- Elaborate the security defense strategies, techniques, and technologies to defend against cyber-attacks.
- Analyze the systems against vulnerabilities and attacks, and identify the techniques appropriate to protect sensitive data, networks, operating systems, and the web from cyber-attacks.
Program’s Handbook
For more information about the program, its rules/regulations of study, and student's rights and responsibilities, you can read the program handbook, Project Deliverables, and Milestones can be found here
Admission Requirements
- The applicant must have a university degree from a Saudi university or from another recognized institution with a suitable background with a minimum GPA of 2.75 out of 5.00 or 1.75 out of 4.00 (good), in the following disciplines: (Computer Science - Information Systems - Information Technology Software Engineering). Other related disciplines may be accepted after the approval of the department.
- Two recommendation letters.
- Certain courses are compulsory for admission in the MSc. program in Information Security. The following courses must be successfully passed:
- IT System Components
- Basic Scripting and Programming
- Operating Systems Concepts
- Basic Networking
- Data Structure
- Databases.
- The minimum score for general aptitude test is 60%.
- The minimum score for the STEP English test is 60 (should be provided within the application submission period, no provisional admission is granted) or its equivalent in other language tests as shown in the table below.
English Aptitude Test Equivalence
STEP |
IELTS |
TOEFL |
||
IBT |
CBT |
PBT |
||
97 |
6 |
79 |
213 |
550 |
92 |
5.5 |
70 |
194 |
525 |
83 |
5 |
61 |
173 |
500 |
75 |
4.5 |
53 |
153 |
475 |
67 |
4 |
45 |
133 |
450 |
52 |
3.5 |
32 |
97 |
400 |
Main Tracks
Software Security
Attacks and Defense.
Duration
Two years (Four semesters)
Study Plan (32 Credit Hours)
First Year |
|
|
|
Level 1 |
|
|
|
Code |
Course Name |
Pre-requisite |
CH |
6311 CIS |
Information Security Principles |
- |
2 |
6312 CIS |
Identity and Data Security |
- |
2 |
6321 CIS |
Information Security Management |
- |
2 |
6313 CIS |
Cryptography |
- |
3 |
|
|
|
9 |
|
|
|
|
Level 2 |
|
|
|
Code |
Course Name |
Pre-requisite |
CH |
6314 CIS |
Database Security |
- |
3 |
6315 CIS |
Advanced Network Security |
- |
3 |
6331 CIS |
Digital Forensic |
- |
3 |
|
|
|
9 |
|
|
|
|
Second Year |
|
|
|
Level 3 |
|
|
|
Code |
Course Name |
Pre-requisite |
CH |
6341 CIS |
Penetration Testing |
- |
3 |
**** |
Elective 1 |
- |
3 |
**** |
Elective 2 |
- |
3 |
|
|
|
9 |
|
|
|
|
Level 4 |
|
|
|
Code |
Course Name |
Pre-requisite |
CH |
6351 CIS |
Human Factors in Cyber Security |
- |
2 |
6361 CIS |
Capstone Project |
- |
3 |
|
|
|
5 |
|
|
|
|
Tracks Electives |
|
|
|
Track I |
Attack and Defense |
|
|
Code |
Course Name |
Pre-requisite |
CH |
6332 CIS |
Malware Analysis |
- |
3 |
6333 CIS |
IT Auditing |
- |
3 |
6334 CIS |
Security Operations and Incident Management |
- |
3 |
|
|
|
|
Track II |
Software Security |
|
|
Code |
Course Name |
Pre-requisite |
CH |
6342 CIS |
Secure Software Systems |
- |
3 |
6343 CIS |
Web Security |
- |
3 |
6344 CIS |
Wireless and Mobile Security |
- |
3 |
|
|
|
|