course catalog bachelor of science degree in …...7 cys degree plan the degree plan below shows the...

122
2019 - 2020 COURSE CATALOG Bachelor of Science degree in Cyber Security and Digital Forensics (BS in CYS)

Upload: others

Post on 14-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

2019 - 2020

COURSE CATALOG

Bachelor of Science degree

in Cyber Security and Digital

Forensics (BS in CYS)

Page 2: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

2

About the College

The College of Computer Science and Information Technology (CCSIT) at Imam Abdulrahman Bin Faisal

University (IAU) is committed to provide quality education in Computer Science and Information

Technology domains. CCSIT occupies Building A-11 for male students and Building 650 for female

students on the University campus in an enclosed suite. Since its establishment in 2010, CCSIT has been

committed to providing its students with an innovative and state-of-the-art computing curriculum lined up

with ACM & IEEE guidelines. In order to meet the growing demand in the job market CCSIT offers four Bachelor-

degree programs and one Master program as shown below:

1. Bachelor of Science degree in Computer Science (BS in CS)

2. Bachelor of Science degree in Computer Information Systems (BS in CIS)

3. Bachelor of Science degree in Cyber Security and Digital Forensics (BS in CYS)

4. Bachelor of Science degree in Artificial Intelligence (BS in AI)

5. Master of Science in Computer Science (MS in CS)

Vision of College

To be a leading computing College at national, regional, and global levels.

Mission of College

Provide quality computing education, discovery, and professional services with community engagements.

Cyber Security and Digital Forensics Program

The CYS program is a traditional, four-year on-campus, daytime program. Traditional in-class delivery

methods of teaching, such as lectures and laboratories, are followed. The CYS program is based on the term

system. The program consists of a total of eight terms, which are referred as levels. The first two years are

called general years. Each academic year comprises of two terms and an optional summer term. The

duration of each term is 18 weeks, including final exams. The summer term is two months in duration.

Mission of CYS Program

Providing students with quality cybersecurity and digital forensics education to inspire discovery, lifelong

learning and professional services with community engagements.

Page 3: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

3

Program Educational Objectives of CYS Program

Graduates of the program will:

1. Have a successful career in practicing the knowledge and skills of cybersecurity and digital

forensics for solving problems and designing appropriate solution following the best practices

2. Contribute effectively in the profession of cybersecurity and digital forensics as an individual,

team member and leader.

3. Engage actively in lifelong learning, career growth, and community services.

4. Demonstrate ethical and social values in their professional practices.

Student Outcomes of CYS Program

Graduates of the program will have an ability to:

1. Analyze a complex computing problem and to apply principles of computing and other relevant

disciplines to identify solutions.

2. Design, implement, and evaluate a computing-based solution to meet a given set of computing

requirements in the context of the program’s discipline.

3. Communicate effectively in a variety of professional contexts.

4. Recognize professional responsibilities and make informed judgments in computing practice

based on legal and ethical principles.

5. Function effectively as a member or leader of a team engaged in activities appropriate to the

program’s discipline.

6. Apply security principles and practices to maintain operations in the presence of risks and threats.

Curriculum Outline of CYS Program

Imam Abdulrahman Bin Faisal University has a clear academic structure to support the curriculum design,

based on levels. The levels’ structure also establishes the basis upon which each student’s achievement can

be measured and upon which progression through the program can be approved. Typically, a level

represents a term/semester of study. A study level is the indicator of the stage within the programs study

plan. Each academic year consists of two main terms of 18 weeks and a summer term (optional) of almost

nine weeks duration. The periods of registration and final examination are not considered part of the term.

The BS curriculum in Cyber Security and Digital Forensics is structured into 124 credit-hours spanning

over a period of four academic years (excluding the preparatory year, in which students are introduced to

basic IT skills, Science, Mathematics and English language skills).The CYS program provides students

Page 4: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

4

with an educational program that ensures the ability of its graduates to handle current and future needs of

the society. As shown in below Figure, courses in the CYS curriculum are divided into five main categories:

University Requirement, Preparatory year Requirement, College Requirement, Specialized Core

Requirement and Electives.

The courses in each of these categories are listed below.

I. University Requirement Courses (8 Credit Hours)

Course ID Catalog No. Course Title Cr. Hrs

926067 ISLM 271 Faith Morals 2

926068 ISLM 272 Social System in Islam 2

926069 ISLM 273 The Economic System in Islam 2

926070 ISLM 274 Political System in Islam 2

Total 8

II. Preparatory Year courses (29 Credit Hours)

Course ID Catalog No. Course Title Cr. Hrs

820551 ENGL 101 General English Language 7

926172 ENGL102 English for Academic and Specific Purposes 3

820553 LRSK 141 Learning and Searching Skills 2

820555 LRSK 142 Communication skills 2

667593 MATH 111 Mathematics I

3

Page 5: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

5

668130 MATH 112 Mathematics II 3

820556 STAT 132 Statistics 3

669035 PHEDU 162 Physical and Health Education 1

667638 COMP 131 Computer Skills 2

926186 COMP 122 Computer Applications 3

Total Units 29

III. College Requirement Courses (60 Credit Hours)

A. Math and General Science Courses

Course ID Catalog No. Course Title Cr. Hrs

667459 MATH 211 Calculus 3

670244 STAT 207 Intro to Statistics & Probability Theory 3

670250 MATH 301 Discrete Mathematics 3

667501 PHYS 212 Physics 4

667409 BIOL 222 Biology 4

Total Credits 17

B. Business Courses

Course ID Catalog No. Course Title Cr. Hrs

928098 MGMT 320 Principles of Management 3

Total Credits 3

C. Computer Science Courses

Course ID Catalog No. Course Title Cr. Hrs

670237 CS 211 Introduction to Computing 3

670241 CS 221 Fundamentals of Programming 3

670242 CS 222 Electronics 4

670246 CS 310 Data Structure 2

670245 CS 311 Object Oriented Programming 1 3

670249 CS 314 Digital Hardware 3

670251 CS 321 Object Oriented Programming 2 3

670252 CS 322 Operating Systems 3

Total Credits 24

D. Computer Information Systems Courses

Course ID Catalog No. Course Title Cr. Hrs

670238 CIS 211 Fundamentals of Info. Systems 3

670247 CIS 313 Technical Reports 2

670278 CIS 315 Communication & Network Fund. 3

670253 CIS 321 Database Concepts and Design 3

928097 CIS 326 IT Infrastructure Management 3

670258 CIS 413 Professional Responsibility 2

Total Credits 16

Page 6: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

6

IV. Specialization Courses (56 Credit Hours)

A. Core Courses

Course ID Catalog No. Course Title Cr. Hrs

926795 CYS 401 Cyber Laws & Security Policy 3

926796 CYS 402 Mathematical Foundations of Information Security 3

926797 CYS 403 Network Forensics, Intrusion Detection, and

Response

3

926798 CYS 404 Information System Audit 3

926799 CYS 406 Network Security 3

926800 CYS 407 Digital Evidence Analysis 3

926801 CYS 408 Architecture of Secure Operating System 3

926803 CYS 409 Information Security Management & Standards 3

926802 CYS 410 Digital Forensic Techniques and Tools 3

927342 CYS 433 Cooperative Summer Training Program (COOP) 3

927320 CYS 501 Project Proposal 2

927321 CYS 502 Mobile & Wireless Security 3

927322 CYS 503 Secure Software Design and Engineering 3

927323 CYS 506 Security Threats & Vulnerabilities 3

927324 CYS 507 Applied Cryptography 3

927325 CYS 508 Project Implementation 3

Total Credits 47

V. Elective Courses (Student selects 9 credits)

Course ID Catalog No. Course Title Cr. Hrs

927326 CYS 520 Digital Forensics for Legal Professionals 3

927327 CYS 521 Advanced Computer Forensics 3

927328 CYS 522 Advanced Digital Investigation 3

927329 CYS 523 Information Theory and Coding 3

927330 CYS 524 Cyber Warfare 3

927331 CYS 525 Introduction to Reverse Engineering 3

927332 CYS 526 Advanced Network Forensics and Analysis 3

927333 CYS 527 Selected Topics in Cyber Security & Digital Forensic 3

927334 CYS 528 Digital Media Forensics 3

927335 CYS 529 Ethical Hacking and Digital Forensics 3

927336 CYS 530 Biometric Security 3

927337 CYS 531 Distributed Systems Security 3

927338 CYS 532 Multimedia Security 3

927339 CYS 533 File System Forensic Analysis 3

927340 CYS 534 Advanced Computer Networks 3

927341 CYS 535 Introduction to Complex Networks 3

670256 CIS 411 Database Management Systems 3

Total Credits (Selected by Students) 9

Page 7: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

7

CYS DEGREE PLAN

The degree plan below shows the term wise (level) course distribution for the five-year study plan for a

student to obtain a bachelor’s degree in Cyber Security and Digital Forensics.

- Credit-hour is a measure of amount of effort required to achieve the intended learning outcomes as

verified by the evidence of student’s achievement. The majority of courses at CCSIT are worth either 2

or 3 credits.

- Prerequisites are solely determined by the course content dependency. The prerequisite of a course

could be one or more courses and are listed in this section. The course codes of the prerequisite courses

needed to register for this course are listed in here.

Year Term 1 Term 2

1 (

Pre

para

tory

Yea

r)

Catalog

No. Course Title

Cr.

Hrs.

Pre

req

uis

ite

Catalog

No. Course Title

Cr.

Hrs.

Pre

req

uis

ite

820551 General English

Language

4 - 820551 General English

Language

3

667638 Computer Skills 2 - 926172 English for Academic

Purposes

3

820553 Learning and

Searching Skills

2 - 820555 Communication Skills 2

667593 Mathematics I 3 - 668130 Mathematics II 3 667593

820556 Statistics 3

669035 Physical and Health

Education

1

926186 Computer

Applications

3

Total 11 Total 18

2

CIS 211 Fundamentals of

Information

Systems

3 - CS 221 Fundamentals of

Programming

3 CS 211

CS 211 Introduction to

Computing

3 - CS 222 Electronics 4 PHYS

212

MATH

211

Calculus 3 - STAT

207

Introduction to

Statistics and

Probability Theory

3 MATH

211

PHYS

212

Physics 4 - BIOL

222

Biology 4 -

ISLM

271

Faith Morals 2 - ISLM

272

Social System in Islam 2 ISLM

271

Total 15 Total 16

Page 8: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

8

3

Term 1 Term 2

Catalog

No. Course Title

Cr.

Hrs.

Pre

req

uis

ite

Catalog

No. Course Title

Cr.

Hrs.

Pre

req

uis

ite

CIS 313 Technical Reports 2 CIS 211 CIS

321

Database Concepts

and Design

3 CIS 211

CIS 315 Communication and

Network

Fundamentals

3 CS 211 CIS

326

IT Infrastructure

Management

3 CIS 315

CS 311 Object Oriented

Programming 1

3 CS 221 CIS 413 Professional

Responsibility

2 CIS 313

CS 314 Digital Hardware 3 CS 222 CS 310 Data Structure 2 CS 311

MATH

301

Discrete

Mathematics

3 STAT

207

CS 321 Object Oriented

Programming 2

3 CS 311

ISLM

273

The Economic

System in Islam

2 ISLM

272

MGMT

320

Principles of

Management

3 -

Total 16 Total 16

4

CS 322 Operating Systems 3 CS 314 CYS

406 Network Security 3 -

CYS

401

Cyber Laws &

Security Policy 3 -

CYS

407

Digital Evidence

Analysis 3

CS 311

STAT

207

CYS

402

Mathematical

Foundations of

Information

Security

3 CS 310 CYS

408

Architecture of Secure

Operating System 3 CS 322

CYS

403

Network Forensics,

Intrusion Detection,

and Response

3 CIS 315 CYS

410

Digital Forensic

Techniques and Tools 3 -

CYS

404

Information System

Audit 3 -

CYS

409

Information Security

Management &

Standards

3 -

Total 15 Total 15

Summer

Sum

mer

CYS

433

Cooperative

Summer Training

Program (COOP)

3 Completed

90 credit hours

- - - -

Total

3

Page 9: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

9

5

Term 1 Term 2 C

ata

log N

o

Cou

rse

Tit

le

Cr.

Hrs

.

Pre

req

uis

ite

Cata

log N

o

Cou

rse

Tit

le

Cr.

Hrs

.

Pre

req

uis

ite

CYS

501 Project Proposal 2

CYS

403

CYS

406

CYS

410

CYS

506

Security Threats &

Vulnerabilities 3 -

CYS

502

Mobile & Wireless

Security 3

CYS

407

CYS

507 Applied Cryptography 3 -

CYS

503

Secure Software

Design and

Engineering

3 - CYS

508

Project

Implementation 3 CYS 501

Elective Course 3 ISLM

274

Political System in

Islam 2

ISLM

273

Elective Course 3 Elective Course 3

Total 14 Total 14

Ele

ctiv

es

CYS 508

Digital Forensics

for Legal

Professionals

3

- CYS

529

Ethical Hacking and

Digital Forensics 3

-

CYS

521

Advanced

Computer Forensics 3

- CYS

530 Biometric Security 3

-

CYS

522

Advanced Digital

Investigation 3

- CYS

531

Distributed Systems

Security 3

-

CYS

523

Information Theory

and Coding 3

- CYS

532 Multimedia Security 3

-

CYS

524 Cyber Warfare 3

- CYS

533

File System Forensic

Analysis 3

-

CYS

525

Introduction to

Reverse

Engineering

3

- CYS

534

Advanced Computer

Networks 3

-

CYS

526

Advanced Network

Forensics and

Analysis

3

- CYS

535

Introduction to Complex

Networks 3

-

CYS

527

Selected Topics in

Cyber Security &

Digital Forensic

3

- CIS

411

Database Management

Systems 3 CIS 321

CYS

528

Digital Media

Forensics 3

-

- - -

Page 10: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

10

The next Section provides the details of each course listed above. The following terms are used.

- Course description: describes both the course contents and course learning outcomes

comprehensively.

- Course Learning Outcomes (CLOs): describe what a student must be able to do after completion of

the course. Outcomes are measurable and mapped to one or more student outcomes.

- Grading (assessment strategies): lists out the key assessment components of the course and the

percentage of grade that assessment contributes to the overall grade of the student.

- Textbook and references: list the main text and reference books that will be used in the course.

The description of the courses is provided in the following order.

Index Course Code Course Title

1 ENGL 101 General English Language

2 ENGL102 English for Academic and Specific Purposes

3 LRSK 141 Learning and Searching Skills

4 COMP 131 Computer Skills

5 COMP 122 Computer Applications

6 LRSK 142 Communication skills

7 MATH 111 Mathematics I

8 MATH 112 Mathematics II

9 STAT 132 Statistics

10 PHEDU 162 Physical and Health Education

11 CIS 211 Fundamentals of Info. Systems

12 CS 221 Fundamentals of Programming

13 MATH 211 Calculus

14 PHYS 212 Physics

15 CS 222 Electronics

16 STAT 207 Intro to Statistics & Probability Theory

17 CS 311 Object Oriented Programming 1

18 CIS 313 Technical Reports

19 CS 314 Digital Hardware

20 CIS 315 Communication & Network Fund.

21 MATH 301 Discrete Mathematics

22 CS 310 Data Structure

23 CS 321 Object Oriented Programming 2

24 CIS 321 Database Concepts and Design

25 CIS 326 IT Infrastructure Management

26 MGMT 320 Principles of Management

27 CIS 413 Professional Responsibility

28 CS 322 Operating Systems

29 CS 211 Introduction to Computing

Page 11: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

11

30 BIOL 222 Biology

31 CYS 401 Cyber Laws & Security Policy

32 CYS 402 Mathematical Foundations of Information Security

33 CYS 403 Network Forensics, Intrusion Detection, and Response

34 CYS 404 Information System Audit

35 CYS 406 Network Security

36 CYS 407 Digital Evidence Analysis

37 CYS 408 Architecture of Secure Operating System

38 CYS 409 Information Security Management & Standards

39 CYS 410 Digital Forensic Techniques and Tools

40 CYS 433 Cooperative Summer Training Program (COOP)

41 CYS 501 Project Proposal

42 CYS 502 Mobile & Wireless Security

43 CYS 503 Secure Software Design and Engineering

44 CYS 506 Security Threats & Vulnerabilities

45 CYS 507 Applied Cryptography

46 CYS 508 Project Implementation

47 CIS 411 Database Management Systems

48 CYS 520 Digital Forensics for Legal Professionals

49 CYS 522 Advanced Digital Investigation

50 CYS 521 Advanced Computer Forensics

51 CYS 523 Information Theory and Coding

52 CYS 524 Cyber Warfare

53 CYS 525 Introduction to Reverse Engineering

54 CYS 529 Ethical Hacking and Digital Forensics

55 CYS 526 Advanced Network Forensics and Analysis

56 CYS 527 Selected Topics in Cyber Security & Digital Forensic

57 CYS 528 Digital Media Forensics

58 CYS 530 Biometric Security

59 CYS 531 Distributed Systems Security

60 CYS 532 Multimedia Security

61 CYS 533 File System Forensic Analysis

62 CYS 534 Advanced Computer Networks

63 CYS 535 Introduction to Complex Networks

Page 12: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

12

1. ENGL 101: G General English

Textbook:

Q: Skills for Success (Books: l- 5)

Reference Books:

1. iTooIs for Q: Skills for Success

2. Journal of English Language Teaching- FTP Direct0"' Listing

3. Randall's ESL Cyber Listening Lab http://www.esl-lab.com/

Brief list of topics to be covered

- How do you make good first impression? - What makes food taste good?

Course

Name General English لغة انجليزية

Course

Information

Course Code Course No Credit

Units

Lec. Lab. Tot. Contact

Hours1

Lec. Tut.

ENGL 101 820551 7 300 50

1Every contact hour equals minimum 50 minutes.

Track University Requirement College Requirement Program Requirement Core Elective

Program

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Level 1 and 2 Prerequisite None

Course Description The featuring aspect of the academic year English language program is fittingly designed to answer the academic needs of students of the Science and Engineering Tracks. This course (General English) is an integrated English

course intended to increase academic and general competence in listening, speaking, reading and writing. During

the academic year students will have attained to a position where they can understandingly communicate with native speakers and express themselves without hesitation.

Course Learning Outcomes (CLOs)

At the end of the course students will be able to:

1. Employ a range of listening skills allowing them to comprehend and identify required information. 2. Develop effective and appropriate speaking skills to present information in a clear and coherent

manner. 3. Articulate words using the correct pronunciation. 4. Write in various academic styles using a variety of accurate and coherent sentence structures. 5. Employ a range of reading skills allowing them to comprehend and identify required information. 6. Use a wide range of vocabulary, idioms and expressions in written and verbal discourse. 7. Use variety of grammatical structures when engaging in written and verbal discourse 8. Choose relevant points from a given resource to incorporate in a presentation/ written assignment. 9. Appraise written and verbal discourse critically for their strengths and weaknesses in a given

academic context.

Grading

(assessment

strategies)

Quiz(zes) 30% Assignment(s)

Portfolio 5% Lab

E-Learning 5% Mid-term (II)

Participation 10% Final 50%

Page 13: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

13

- How has technology affected our lives?

- Does advertising help or harm us? - Why do people take risks?

- Why do people help each other?

- How can a small amount of money make a big difference? - What makes someone admirable?

- What makes you want to buy something?

- What important lessons do we learn as children?

- How important is it to write by hand? - Should science influence what we eat?

- Does school prepare you for work?

Page 14: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

14

2. ENGL 102: English for Academic and Specific Purposes

Course

Name English for Academic and Specific

Purposes

لغة انجليزية أكاديمية

و تخصصية

Course

Information

Course Code Course No Credit

Units

Lec. Tut. Tot. Contact

Hours1

Lec. Tut.

ENGL 102 926172 2 1 3 2 1

1Every contact hour equals minimum 50 minutes.

Track University Requirement College Requirement Program Requirement Core Elective

Program

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS) Artificial Intelligence (AI)

Level 2 Prerequisite None

Course Description The featuring aspect of the PY academic year English language program is fittingly designed to answer the

academic needs of students of the Science Track. It consists of one semester; ESP (English for Specific Purposes) and EAP (English for Academic Purposes). During this semester students will have attained to a position where

they can understandingly communicate with native speakers and express themselves without hesitation. This

course also introduces the students to the form, style, content, and nature of scientific English and establishes a connection with their respective field of specialty. With these aspects fully introduced, they can proceed

confidently toward their undergraduate and later on postgraduate studies.

Course Learning Outcomes (CLOs)

At the end of the course students will be able to: 1. Demonstrate knowledge of vocabulary related to their specific pathways. 2. Acquire good reading skills enabling them to read faster, comprehend and identify required

information. 3. Recognize the meanings of word-roots and use such knowledge in learning the meanings of other

terms of importance. 4. Develop the ability to research and summarize the research 5. Develop effective and appropriate skills to present information in a concise manner 6. Increase ability to write in various academic styles and convey information.

Grading

(assessment

strategies)

Quiz(zes) 10% Assignment(s)

Test 20% Presentation 10%

Project 10% Mid-term (II)

Participation 10% Final 40%

Textbook:

ESP Student Book English for Science. (2017) (In-house publication) Reference Books:

S. Bailey. (2018) Academic Writing: A Handbook for International Students. 5th Edition. Routledge

Brief list of topics to be covered - Academic writing

- Expressing opinions

- Comparison report - Analysing data

- Cause and Effect essays

- Problems/Solutions essays - Supporting opinions

- New path to inductive science

Page 15: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

15

3. LRSK 141: Learning and Searching Skills

Textbook:

LSKL Lecture Notes. 2018. ( (In-house publication) McMillan, K., & Weyers, J. (2012). The study skills book. Pearson Higher Ed. Reference Books: Tom Burns & Sandra Sinfield. 2012. Essential Study Skills: The Complete Guide to Success at University,

3rd.ed. London: SAGE Study Skills Series.

Stella Cottrell. 2013 The Study Skills Handbook 4th ed. Hampshire: Palgrave Study Skills Series.

Course

Name Learning and Searching Skills مهارات التعلم والبحث

Course

Information

Course Code Course No Credit

Units

Lec. Tut. Tot. Contact

Hours1

Lec. Tut.

LRSK 141 820553 2 2 2

1Every contact hour equals minimum 50 minutes.

Track University Requirement College Requirement Program Requirement Core Elective

Program

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS) Artificial Intelligence (AI)

Level 1 Prerequisite None

Course Description This course is set to help students acquire and develop important study and search skills that are required to

achieve greater success in the university. By extension, the learning will instil in students skills which they will carry with them to apply in their post-university life. The course covers topics in core study and basic search

skills. Topics are interlinked and provide students with strategies and practical skills needed from the early days

at university to its last phase. As such, the course is designed to help students manage successfully the challenges they will encounter in their daily student life, be it as professionals and or as members of the wider community.

Course Learning Outcomes (CLOs)

At the end of the course students will be able to: 1. Demonstrate understanding of the importance of learning skills in achieving academic and professional

success. 2. Assess personal learning styles and select appropriate strategies to meet individual learning goals. 3. Engage in active learning in all courses using higher thinking skills. 4. Develop and apply skills in basic note-taking methods including paraphrasing, outlining, and summarizing

in their everyday learning. 5. Identify and apply different reading strategies, practices, habits, and attitudes that improve reading

comprehension. 6. Demonstrate independent strategies to problem solving, completion of tasks, and monitor and evaluate their

own performance. 7. Create and use study systems, think critically, concentrate, read and listen with understanding 8. Develop and implement strategies to manage their time effectively. 9. Identify and apply specific strategies to prepare for exams and improve results.

Grading

(assessment

strategies)

Quiz(zes) 10% Assignment(s) 20%

Test Presentation

Journal 20% Mid-term (II)

Participation 10% Final 40%

Page 16: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

16

Brief list of topics to be covered

- The University Transition

- Evaluating your own performance

- Learning and personality styles

- Becoming and effective learner

- Time management

- Exam preparation techniques

- Critical thinking and problem solving

- Cooperative learning in a team

- Basic search for academic purpose

- Avoiding Plagiarism

Page 17: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

17

4. COMP 131: Computer Skills

Textbook:

Computer Skills. 2016. (In-house publication) Reference Books:

J. Lambert, C. Frye. (2016) Microsoft Office 2016 Step by Step, Microsoft press.

Brief list of topics to be covered

- Introduction to Computers

- Computer hardware, software

- Internet and cloud

- Windows 7 basic concepts

- Internet security, cloud concepts - Microsoft Word 2016

- Microsoft Excel 2016

- Microsoft Access 2016

Course

Name Computer Skills مهارات الحاسب اآللى

Course

Information

Course Code Course No Credit

Units

Lec. Tut. Tot. Contact

Hours1

Lec. Tut.

COMP 131 667638 2 2 2

1Every contact hour equals minimum 50 minutes.

Track University Requirement College Requirement Program Requirement Core Elective

Program

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS) Artificial Intelligence (AI)

Level 1 Prerequisite None

Course Description

Introduction to Computer skills is designed to familiarize students with computers and their

applications. It will also emphasize the use of computers and technology throughout their college and

future careers. Students will learn fundamental concepts of computer hardware and software and

become familiar with a variety of computer applications, including word processing, spreadsheets,

databases, and multimedia presentations. Students will also investigate Internet-based applications,

working with email and learning how to browse the web. Coursework also includes activities that

explore social and ethical issues related to computers.

Course Learning Outcomes (CLOs)

At the end of the course students will be able to: 1. Demonstrate knowledge of basic concepts of hardware, software, network, internet and clouds. 2. Manage files, folders and user accounts efficiently. 3. Develop well designed documents, workbooks and databases using MS Office. 4. Apply IT tools to collect, analyze, evaluate and report data.

Grading

(assessment

strategies)

Quiz(zes) 10% Assignment(s) 10%

Test Presentation

Project 10% Mid-term (II) 30%

Participation Final 40%

Page 18: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

18

5. COMP 122: Computer Applications

Textbook:

Computer Applications for Science Track. (2017). In house publications

Reference Books: N/A

Brief list of topics to be covered

- Problem Solving – Introduction

- Programing Language

- Programing Language Classification

- Program Development Lifecycle

- Algorithm Structure

- Numbering System

- Survey Analysis

- Expression Web 4.0

- Developing a website

Course

Name Computer Applications تطبيقات الحاسب

اآللي

Course

Information

Course Code Course No Credit

Units

Lec. Tut. Tot. Contact

Hours1

Lec. Tut.

COMP 122 926186 2 1 3 2 1

1Every contact hour equals minimum 50 minutes.

Track University Requirement College Requirement Program Requirement Core Elective

Program

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS) Artificial Intelligence (AI)

Level 2 Prerequisite None

Course Description

Computer Applications course introduces the basic problem solving and programming concepts to

science track students in order to prepare them for their specialization in colleges. Introduce the main

steps of data analysis through designing a survey using Google forms; give them an introduction in E-

Commerce which develop their information about this field and its terminology. Also, learn how to

design a website using HTML & CSS. A project will be given to the student to practice all the tools they

learn and develop problem-solving skills.

Course Learning Outcomes (CLOs)

At the end of the course students will be able to: 1. Discuss key concepts related to programming, web editing and E-Commerce. 2. Apply problem solving techniques and program development stages to develop solutions for simple

problems. 3. Create a reliable and simple static web site by using HTML and CSS. 4. Work effectively in groups and exercise leadership when appropriate.

Grading

(assessment

strategies)

Quiz(zes) 10% Assignment(s) 5%

Test Lab

Project 10% Mid-term (II) 30%

Participation 5% Final 40%

Page 19: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

19

6. LRSK 142: Communication Skills

Textbook:

Alan Barker. (2016). Improve Your Communication Skills (4th ed.). London, England: Kogan Page, Ltd.

Reference Books:

1. Eunson, B. (2015). Communicating in the 21st century (4th ed.). Milton, Australia: John Wiley & Sons Ltd. T

2. Dason, E. & Brown, J. (2015). How to succeed at Medical school (2nd ed.). Malaysia: John Wiley & Sons Ltd.

3. Brousnstein, M., Bell, A.H, Smith, D. M. (2013). Business Communication. USA: John Wiley & Sons Ltd.

4. Parrot, T. & Crook, G. (2011). Effective Communication Skills for Doctors: A practical guide

Course

Name Communication Skills مهارات الحاسب اآللي

Course

Information

Course Code Course No Credit

Units

Lec. Lab. Tot. Contact

Hours1

Lec. Tut.

LRSK 142 820555 2 2 2

1Every contact hour equals minimum 50 minutes.

Track University Requirement College Requirement Program Requirement Core Elective

Program

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS) Artificial Intelligence (AI)

Level 2 Prerequisite None

Course Description

The significance of good communication skills. Effective communication is a pre-requisite for

successful careers in this field. This course aims at developing students’ communication skills with

special focus on social skills, different relationships and teamwork.

Course Learning Outcomes (CLOs)

At the end of the course students will be able to: 1. Understand the significance of communication and communication skills in general. 2. Identify and overcome common barriers to both verbal and non-verbal communication. 3. Assess their progress as efficient communicators in the course at various levels. 4. Differentiate between intellectual and social/emotional intelligence 5. Engage in active listening and speaking activities in relevant courses 6. Negotiate and reach an agreement through dialogue and persuasion skills. 7. Recognise the elements of good presentation skills. 8. Plan and design effective academic presentations. 9. Interact confidently with people during tutorials and presentations. 10. Identify and apply key skills to communicate effectively with peers while working on joint

projects. 11. Communicate through emails at workplace. 12. Write CVs and learn to carry themselves well during interviews. 13. Apply coping strategies to manage stress and anxiety.

Grading

(assessment

strategies)

Quiz(zes) 10% Assignment(s) 10%

Role Plays 10% Lab

Presentation 20% Mid-term (II)

Participation 10% Final 40%

Page 20: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

20

to clear communication within a hospital environment. London, England: BPP Learning Media.

Brief list of topics to be covered

- Introduction to the course and its requirements

- Principles of communication - Describing communication

- Channels of communication

- Becoming a self-aware speaker - Barrier to communication/ Active listening

- Communication in professional contexts (Health, Engineering, Science)

- Communication for a job

- Communication within a Team - Presentations Skills

- Giving presentations

- Reflective communication

Page 21: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

21

7. MATH 111: Mathematics I

Course

Name Mathematics I ( ١رياضيات)

Course

Information

Course Code Course No Credit

Units

Lec. Tut. Tot. Contact

Hours1

Lec. Tut.

MATH 111 667593 2 1 3 2 1

1Every contact hour equals minimum 50 minutes.

Track University Requirement College Requirement Program Requirement Core Elective

Program

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Level 1 Prerequisite None

Course Description

The purpose of this course is to develop the comprehension of the course material in English, improve the

computational skills, demonstrate writing ability of solutions with logical steps and prepare students for

calculus. An emphasis will be given to the understanding of the statement of the problems and the

mathematical terminology. The course primarily aims at the development of critical thinking among the

students through the mathematical concept studied at the high school. The topics include Fundamentals

of Algebra, Equation and Inequalities, Complex Numbers, Graphs and Functions, Polynomial and

Rational Functions and include the study of Exponential and Logarithmic functions and equations.

Course Learning Outcomes (CLOs)

At the end of the course students will be able to:

1. Have the basic mathematics skills which are used in calculus and their relevance to everyday

applications.

2. Have the ability to formulate problems in a logical manner. This logical way of thinking can be

also applied to his real life.

3. Have problem solving capabilities.

4. Develop the comprehension of the course material in English.

5. Have formal way of thinking.

6. Analyze and solve some mathematical problems using computer software.

Grading

(assessment

strategies)

Quiz(zes) 15% Assignment(s) 10%

Tests 30% Lab

Presentation Mid-term (II)

Participation 5% Final 40%

Textbook:

Maths for Science Track by Math 111 Instructors. In House Publishing.

Reference Books:

N/A

Brief list of topics to be covered

- Sets

- Real numbers and their properties

- Polynomials

Page 22: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

22

- Factoring polynomials

- Rational expressions - Rational exponents

- Complex numbers

- Linear equations and applications - Quadratic equations

- Absolute value in equations and inequalities

- Linear and polynomial inequalities

- Cartesian coordinate system - Functions, transformations of functions

- Exponential functions

- Logarithmic functions

Page 23: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

23

8. MATH 111: Mathematics II

Course

Name Mathematics II ( ٢رياضيات)

Course

Information

Course Code Course No Credit

Units

Lec. Tut. Tot. Contact

Hours1

Lec. Tut.

MATH 112 668130 2 1 3 2 1

1Every contact hour equals minimum 50 minutes.

Track University Requirement College Requirement Program Requirement Core Elective

Program

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Level 2 Prerequisite MATH 111

Course Description

The Math-112 course reinforces basic mathematics skills which are used in calculus and

their relevance to everyday applications. These skills encompass the ability to solve

mathematical problems, analyze and interpret data. The purpose of this course is to develop

the comprehension of the course material in English, improve the computational skills,

demonstrate writing ability of solutions with logical steps and prepare students for calculus.

An emphasis will be given to understanding the statement of the problems and the

mathematical terminology. The course primarily aims at the development of critical thinking

among the students through the mathematical concept studied at the high school. The topics

include the study of the fundamental properties of trigonometric functions, some topics in

analytic geometry, Matrices systems of equations and a preview to the notions of percentage

and approximation.

Course Learning Outcomes (CLOs)

At the end of the course students will be able to:

1. Master the basic mathematics skills which are used in calculus and their relevance to everyday

applications.

2. Have the ability to formulate problems in a logical manner. This logical way of thinking can be

also applied to his real life.

3. Have problem solving capabilities.

4. Develop the comprehension of the course material in English.

5. Be able to solve more general problems in the coming academic years involving some basic

properties studied in Math 2.

6. Have the ability to analyze and solve some mathematical problems using computer software.

Grading

(assessment

strategies)

Quiz(zes) 20% Assignment(s) 10%

Tests 30% Lab

Presentation Mid-term (II)

Participation 5% Final 40%

Page 24: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

24

Textbook:

Maths for Science Track by Math 112 Instructors. In House Publishing. Reference Books:

N/A

Brief list of topics to be covered

- Approximation and Percentage

- Angles and Triangles, Right Triangle Trigonometry,

- Trigonometric Functions

- Graph of trigonometric functions

- Inverse Trigonometric functions

- Basic Trigonometric Identities

- Verifying Trigonometric Identities

- Solving Trigonometric equations

- Application of Trigonometry

- Vectors, Polar Form of Complex Numbers

- Matrix Algebra, The Determinant of a Matrix

- The Inverse of a Matrix, Matrices and Systems of Linear Equations

Page 25: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

25

9. STAT 132: STAT 132

Textbook:

D. Starnes and J. Tabor (2018). The Practice of Statistics. W.H. Freeman. 6th Edition. ISBN-13: 978-

1319113339

Reference Books:

N/A

Course

Name Statistics إحصاء

Course

Information

Course Code Course No Credit

Units

Lec. Tut. Tot. Contact

Hours1

Lec. Tut.

STAT 132 820556 2 1 3 2 1

1Every contact hour equals minimum 50 minutes.

Track University Requirement College Requirement Program Requirement Core Elective

Program

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Level 2 Prerequisite None

Course Description

The STAT-132 course reinforces basic statistic skills which are used in the statistic and their relevance

to everyday applications. These skills encompass the ability to analyze and interpret data.

The purpose of this course is to develop the comprehension of the course material in English, improve

the statistical skill, demonstrate writing ability of solutions with logical steps and prepare students for

analyze and interpret data. An emphasis will be given to the understanding of the statement of the

problems and the statistical terminology. This course is an introductory course designed for students

without any background in statistics. The purpose of the course is to introduce some of the basic

concepts of statistics that are used in most of the courses. Topics discussed are descriptive and

inferential Statistics; data classification; frequency distribution, tables and graphs; measures of central

tendency, variation, and position; counting methods. In addition; the course covers some basic topics in

probability such as: axioms of probabilities, law of total probability; random variables (discrete and

continuous); probability distributions (binomial and Normal); correlation and regression.

Course Learning Outcomes (CLOs)

At the end of the course students will be able to: 1. Identify the concept of statistics and the contributions of statistics in Humanities. 2. Gain skill on collect, organize, represent data from the populations or samples. 3. Describe the data using different measures and used it to describe the phenomenon under study. 4. Identify the basic concepts of probability and apply different methods to calculate it. 5. Understand the counting rules and used it to calculate probabilities. 6. Distinguish between the probability experiments types and organize them in different discrete

probability distributions. 7. Describe the relationship between two variables using the correlation and regression.

Grading

(assessment

strategies)

Quiz(zes) 20% Assignment(s)

Test Lab

Project and

presentation

15% Mid-term (I) 20%

Participation 5% Final 40%

Page 26: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

26

Brief list of topics to be covered

- The Nature of Probability and Statistics

- Frequency Distributions And Graphs

- Data Description

- Probability And Counting Rules

- Discrete Probability Distributions

- The Normal Distribution

- Correlation And Regression

Page 27: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

27

10. PHEDU: Physical and Health Education

Course

Name Physical and Health Education التربية البدنية

والصحية

Course

Information

Course Code Course No Credit

Units

Lec. Tut. Tot. Contact

Hours1

Lec. Tut.

PHEDU 669035 1 1 1

1Every contact hour equals minimum 50 minutes.

Track University Requirement College Requirement Program Requirement Core Elective

Program

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Level 2 Prerequisite None

Course Description This course is designed to achieve the comprehensive growth of female students in all cognitive and psychological aspects of mobility and emotional. Also, to achieve a healthy lifestyle using the physical and health

field within the limits of their abilities and characteristics in accordance with Islamic law and taking into account

the customs and traditions of society.

Course Learning Outcomes (CLOs) At the end of the course students will be able to:

1. Determines the effect of exercising on the body

2. Remember the effect of exercising on mental health

3. Explain the effect of exercising on mental health

4. Remember the importance of exercising daily.

5. Remind the objectives of physical and health education

6. Comprehensive fitness and its components

7. Learn Physical and Health Education

8. Remember the elements of physical fitness associated with health.

9. Multiplicity of principles and principles of physical training.

10. Explains precautions to be taken when starting physical activity

11. Remember security and safety requirements when exercising physical activity

12. Know first aid

13. Remember sports injuries are different

14. Explains first aid for various injuries

15. Remember physical exercise associated with health

16. Explain physical exercise performed during the menstrual cycle

17. Determines physical exercise performed during pregnancy

18. Numerous physical exercises performed after birth

19. Remember physical exercises that limit the problems resulting from taking the wrong situation during everyday practices.

Grading

(assessment

strategies)

Quiz(zes) 15% Assignment(s) 5%

Test 30% Lab

Project 10% Mid-term (II)

Participation Final 40%

Page 28: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

28

Textbook:

1. Abdel-Fattah Abu Ela (1998): Sport Training, physiological bases, Dar Arab Thought, Cairo. 2. Ahmed Khater, a pick (1996) 3. Measurement in the field of sports, the fourth edition, the book Dar al-Hadith, Cairo.

4. Adel Abdul Basir (1992 m): sports training and integration between theory and practice, the Library,

Port Said 5. Essam Abdul Khaliq (1992 m): sports training theories and applications, the seventh edition of

Knowledge House, Alexandria.

6. Mohammed Allawi, Nasr Mohammed Radwan (1982): motor performance tests, Dar Al Arab

Thought, Cairo 7. Mohammed Hassanein, meaning Ahmed (1998): Encyclopedia of Applied Sport Training, book

publishing center, Cairo.

8. Mohamed Sobhy Hassanein (2000): Measurement and Evaluation in Physical Education and Sports, the fourth edition, Dar Arab Thought, Cairo.

Reference Books:

1. Osama full salary (1998)Ibrahim Khalifa Sports: walking entrance to achieve mental and physical health, Dar Arab Thought, Cairo

2. Mohammed Allawi, Nasr Mohammed Radwan (1982): motor performance tests, Dar Al Arab

Thought, Cairo 3. Mohammed Hassanein (2000): Measurement and Evaluation in Physical Education and Sports, the

fourth edition, Dar Arab Thought, Cairo

Brief list of topics to be covered - planning and preparing for the academic year

- Health education and health habits

- Accidents and first aid - Physical and Health Education

- Awareness campaigns

- Exercise and health - Sports and women

Page 29: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

29

11. CIS211: Fundamentals of Information Systems

مبادئ نظم المعلوماتFundamentals of Information

Systems Course Name

Lab. Lec. Contact Hours1

Tot. Lab. Lec. Credit Units1

Course No Course Code Course

Information 0 3 3 0 3 670238 CIS211

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100 minutes in practical

laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 3 Level

Course Description

This course is designed to introduce the basic concepts of modern Information Systems (IS) and the use of information system in global organizations. The key topics of this course will be the major components of the

information systems; people, software, hardware, data, and communication technologies. The course will also

provide students with the knowledge about the use and management of information system components to establish competitive advantage and quality improvement of local and global organizations. Moreover, the

course also covers the concepts of information system development and acquisition, in addition to emerging

types of software that are widely used in contemporary organizations and society. Students are given

knowledge of how to secure information systems resources, focusing on information security principles and issues. Students are also acquainted with career opportunities and social and ethical responsibilities.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Identify components of an information systems infrastructure and their role in achieving organization goals.

2. Recognize how information systems are enabling new forms of commerce and collaboration between individuals, organizations, and governments.

3. Explain the use of information system in an organization and its value in supporting organizational processes and decision making.

4. Analyze the data security risks in information system deployment.

5. Analyze the professional, social and ethical issues in information systems deployment

15% Assignment(s) 15% Quiz(zes) Grading

(assessment

strategies) Lab Project(s)

Mid-term (II) 25% Mid-term (I)

40% Final 5% Participation

Textbook: 9. Ralph, M. Stair, George W. Reynolds, Thomas Chesney, “Principles of Business Information

Systems”, 3rd Edition, 2018. ISBN 9781473748415

Reference Book:

4. Joseph Valacich , Christoph Schneider, "Information Systems Today: Managing in a Digital World" 7th Edition, 2015 ISBN-13: 978-0133940473 ISBN-10: 01339404705

5. Ralph M. Stair; George Reynolds, “Fundamentals of Information System”, 2017, ISBN-10: 1-337-

09753-5 ISBN-13: 978-1-337-09753-6

Page 30: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

30

Brief list of topics to be covered

- Basic understanding of the information systems - Use of Information System in Organization

- Careers in information systems

- Hardware and software concepts - Software development concepts and detailed stages

- Database and data modeling concepts

- Internet and WWW

- Knowledge Management and Specialized Information Systems - Valuing Information System and Globalization

- Information and Decision Support Systems

- Business Intelligence - Security, Privacy and Ethical issues of Information System

Page 31: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

31

12. CS221: Fundamentals of Programming

Course

Name Fundamentals of Programming لبرمجةئ امباد

Course

Information

Course Code Course No Credit

Units

Lec. Lab. Tot. Contact

Hours1

Lec. Lab.

CS 221 670241 2 1 3 2 2

1Every contact hour equals minimum 50 minutes.

Track University Requirement College Requirement Program Requirement

Core Elective

Program

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Level 4 Prerequisite 670237 – CS 211

Course Description

This is an entry level programming course designed to teach students the basics of program design,

coding and testing. The course begins by covering the basics of a high-level programming language

that include declaration of scalar variables and constants of basic data types. This is followed by a

discussion on including various control structures into user programs. These include sequence,

selection, and repetition control structures. Later, the course covers designing and implementing

programs that rely on user-defined functions with a focus on passing arguments to these functions.

Towards the end, the course introduces the concept of arrays and pointers. The course concludes by

providing an overview and comparison of the Object-Oriented Programming (OOP) model with the

procedural approach.

In the lab portion of the course, the students get a chance to practice their programming skills using a

high-level programming language. The students are also introduced to fundamental steps including

compiling, linking, executing, and debugging their programs.

Course Learning Outcomes (CLOs)

On successful completion of this course, students will be able to:

1. Demonstrate problem solving skills by designing flowcharts/pseudocode and implementing corresponding computer programs from a problem statement

2. Design and implement programs incorporating the concepts of variables and constants of basic/user-defined data types

3. Use sequence, selection and repetition control structures in a program. 4. Demonstrate an understanding of structured design by implementing programs with functions

and passing of parameters to solve more complex problems. 5. Design and implement programs using arrays and pointers/references. 6. Describe the Object-Oriented Programming (OOP) in comparison to procedural programming

Grading

(assessment

strategies)

Quiz(zes) 10% Assignment(s)

Project(s) Lab 20%

Mid-term(I) 15% Mid-term (II) 15%

Participation Final 40%

Page 32: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

32

Textbook:

1. Problem Solving with C++, Global Edition (10th edition Edition), Walter Savitch , 2018, ISBN-

10: 1292222824 , ISBN-13: 9781292222820

2. Diane Zak, Introduction to Programming with C++, 8th edition, July 20, 2015, ISBN-13: 978-

1285860114, ISBN-10: 1285061470.

·

Reference Book:

Problem-Solving Strategies in Mathematics From Common Approaches to Exemplary

Strategies, Alfred S Posamentier and Stephen Krulik, April 2015, ISBN: 978-981-4651-63-9

Starting Out with C++ from Control Structures to Objects (9th Edition), Tony Gaddis , 2017,

ISBN- 13: 978-0134498379 , ISBN-10: 0134498372

C++ Programming From Problem Analysis to Program Design, 8th Edition, 2018, SBN10: 1-

337- 10208-3ISBN13: 978-1-337-10208-7

Think Like a Programmer: An Introduction to Creative Problem Solving 1st Edition, V. Anton

Spraul , ISBN-13: 978-1593274245, ISBN-10: 1593274246

Puzzle-based Learning: Introduction to critical thinking, mathematics, and problem solving.

Matthew Michalewicz, ISBN-13: 978-1876462635, ISBN-10: 1876462639

Introduction to Programming with C++, Diane Zak, Course Technology; 8th edition, July 20,

2015, ISBN-13: 978-1285860114, ISBN-10: 1285061470.

Programming Logic & Design, Comprehensive (9th Edition), Joyce Farrell, 2017, ISBN10: 1-

337-10207-5, ISBN13: 978-1-337-10207-0 · Paul Deitel & Harvey Deitel, C++ How to

Program, 9th edition, ISBN-13: 978-0133-378719

http://www.cplusplus.com.

https://www.tutorialspoint.com/cplusplus/

Brief list of topics to be covered

• Problem solving

• Variables and constants

• Selection structures

• Repetition structures

• Built-in functions

• User-defined functions

• Passing data by value or references

• Arrays and strings

• Pointers

• Intro to OO programming

Page 33: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

33

13. MATH 211: Calculus

Calculus التفاضل والتكاملCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 0 3 3 0 3 667459 MATH 211

1 One contact hour equals 50 minutes.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 3 Level

Course Description

This course covers the following topics:

The limit. Continuity, the intermediate value theorem. Definition of derivatives. Rules for

differentiation. Applications of the derivative. The mean value theorem. L'hospital rule. The definition

of the integral. The definite and indefinite integral. Applications of the integral. Sequences.

Convergence and limits of sequences. Series. Convergence of series. Power series. The formal power

series of rational functions.

Course Learning Outcomes (CLOs)

On successful completion of this course, students will be able to:

1. Solve problems involving limits and continuity.

2. Use the definition of derivative, and compute derivatives using the rules of differentiation

expressions.

3. Apply the derivative in problems involving graphing, maximization and minimization.

4. Employ the concept of integral and the basic techniques of integration to compute integrals and

identify the relationship between the integral and derivative (the fundamental theorem of

calculus).

5. Apply integrals in solving some geometric problems.

6. Identify sequences, series and power series and compute the limits of sequences and apply

some of the tests for series convergence.

10% Assignment(s) 15% Quiz(zes) Grading

(assessment

strategies) Lab Project(s)

15% Mid-term (II) 15% Mid-term(I)

40% Final 5% Participation

Textbook:

Calculus: Early Transcendental, 8th Edition, International Metric Version

Author: James Stewart Publisher: Cengage. ISBN-13: 978-0534435387 ISBN-10: 0534435386

Reference Book:

Calculus: The Classic Edition , Earl W. Swokowski . Publisher: Cengage.

ISBN-13: 978-0534435387 ISBN-10: 0534435386

Brief list of topics to be covered

- Limits

- Continuity

Page 34: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

34

- Differentiation Rules

- Application of Differentiation

- Integrals

- Fundamental Theorem of Calculus

- Application of Integral

- Techniques of Integration

- Infinite Sequences and Series.

Page 35: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

35

14. PHYS 212: Physics

Physics الفيزياءCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 0 4 4 0 4 667501 PHYS 212

1 One contact hour equals 50 minutes.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 3 Level

Course Description

The course targets to enable students to comprehend the basic principles that are needed to study the

electronic courses, and acquire a good background and experience in handling and dealing with

problems in terms of theories, laws and principles of Physics.

The topics include basic ideas about:

1. Electrical charges, forces, insulators, conductors and semiconductors, concepts of electric field

and potential, electric current and electric circuit components. Electric dipoles and the effect of

electric field on them. Electric potential due to charges and potential difference, equipotential

surfaces, magnetic field and magnetic forces.

2. Introduction to Modern and Quantum Physics, semiconductors and their structures, their

applications in development of modern technology, n-type and p-type crystals, semiconductor

carrier properties and action, depletion layer and electric potential through it and introduction

to diodes and types of diodes.

Course Learning Outcomes (CLOs)

On successful completion of this course, students should be able to:

1. Define the main aspects of electric and magnetic physics.

2. Demonstrate an ability to solve and apply basic physical principles and mathematical formulas

to problems related to physics.

3. Demonstrate a good background in solid structure, especially in semiconductors and its

applications.

4. Recognize and recall basic principles and concepts needed to study electronics courses.

5. Compare and analyze the difference in electrical properties between conductors,

semiconductors and insulators.

5% Assignment(s) 15% Quiz(zes) Grading

(assessment

strategies) Lab 10% Project(s)

Mid-term (II) 25% Mid-term(I)

40% Final 5% Participation

Textbook:

Jearl Walker, David Halliday and Robert Resnick, “Fundamentals of Physics Extended”, 10th

Edition, Wiley, 2014, International edition.

Page 36: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

36

Reference Book:

Physics for Scientists & Engineers with Modern Physics;

Serway 9th edition by Thomson Brooks, Saunders Golden Sunburst Series, 2014.

Brief list of topics to be covered

- Vectors

- Electric charge

- Electric fields

- Capacitance

- Current and resistance

- Magnetic fields

- Inductance

- Oscillation AC-current

- Photons and matter waves

- All about atoms

- Conduction of electricity in solids.

Page 37: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

37

15. CS 222: Electronics

Electronics اإللكترونياتCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 2 3 4 1 3 670242 CS 222

1 One contact hour equals 50 minutes.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

667501 - PHYS 212 Prerequisite 4 Level

Course Description

This course provides foundation in the area of electronic circuits and devices. It incorporates a

combination of mathematics and basic sciences appropriate to the electrical/electronic circuit design

and analysis. The main objective of this course is to inculcate in students the ability to understand

fundamental and derived electrical quantities and to analyze the DC and AC circuits. In addition, the

students will be introduced to the basic electronic devices such as diodes, transistors, and optical

devices that may be used to design large scale electronic systems. These objectives are achieved by

teaching them the relevant theory and labs to analyze, describe and solve problems involving

electrical/electronic devices with the help of practical circuit implementation.

Course Learning Outcomes (CLOs)

On successful completion of this course, students will be able to:

1. Describe the fundamentals of basic DC and AC circuit elements.

2. Analyze the DC and AC circuits.

3. Explain the basics of diodes, transistors, and optical devices.

4. State the evolution of integrated circuits.

5. Define functionality of operational amplifier and its applications.

Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) 25% Lab Project(s)

Mid-term (II) 20% Mid-term(I)

40% Final 5% Participation

Textbook:

Electronics Fundamentals: Circuits, Devices, and Applications, Thomas L. Floyd, Prentice Hall, 8th

edition, 2010, ISBN-13: 978-0135072950.

Reference Book:

1. Principles of Electric Circuits: Conventional Current Version, Thomas L. Floyd, Prentice Hall, 9th

Edition, 2009, ISBN-10: 013507309X.

2. Introduction to Electric Circuits, Richard Drof& James A Svoboda, John Wiley, 8th edition, 2010,

ISBN 10: 0470521570.

Brief list of topics to be covered

- Quantities and units

- Introduction to DC circuits

- Introduction to AC circuits

- Combination circuit analysis

Page 38: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

38

- Diode and its applications

- Transistors and its applications

- Optoelectronic devices

- Introduction to integrated circuits

- Introduction to operational amplifiers and its applications.

Page 39: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

39

16. STAT 207: Introduction to Statistics & Probability Theory

مقدمة في اإلحصاء ونظرية االحتماالتIntroduction to Statistics &

Probability Theory

Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 0 3 3 0 3 670244 STAT 207

1 One contact hour equals 50 minutes.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

667459 – MATH 211 Prerequisite 4 Level

Course Description

This course provides an elementary introduction to probability and statistics with applications. Topics

include: graphical and numerical representation of data; random variables; introduction to probability;

conditional probability and statistical independence; Bayes theorem; mathematical expectation;

variance; covariance and the correlation coefficient for two random variables; regression analysis;

some important discrete and continuous statistical distributions; hypothesis testing; confidence

intervals. Statistical software (Minitab and SPSS) will be used to facilitate the analysis of data sets

and understand statistical concepts. Emphasis will be placed on how to collect, analyze, and interpret

data correctly. Students will also be trained on how to clearly and accurately present data to others.

Course Learning Outcomes (CLOs)

On successful completion of this course, students should be able to:

1. Compute and interpret descriptive statistics using numerical and graphical techniques.

2. Describe and apply the concept of probability, random variables, conditional probability,

statistical independence, and Bayes rule.

3. Interpret some of the important discrete and continuous distributions.

4. Compute, explain and apply the point estimation of parameters, sampling distributions, and

Central Limit Theorem.

5. Formulate and interpret hypotheses test for both large and small samples.

6. Design data collection plans, analyze data appropriately, interpret and draw conclusions from

analysis.

Assignment(s) 20% Quiz(zes) Grading

(assessment

strategies) Lab 15% Project(s)

Mid-term (II) 20% Mid-term(I)

40% Final 5% Participation

Textbook:

1. Introduction to the Practice of Statistics" by David S. Moore, George McCabe, Bruce Craig,

ISBN-13: 978-1464158933, Eighth Edition, W H Freeman & Co, 2014.

Reference Book:

1. "Probability, Statistics, and Queuing Theory with Computer Science Applications" by Arnold Allen.

Second Edition, Academic Press, Inc., 1990

2. “Probability and Statistics for Engineers and Scientists”, by Ronald E. Walpole, Raymond H.

Myers, Sharon L. Myers, Keying E. Ye, Ninth Edition, Pearson Education, 2012

Page 40: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

40

Brief list of topics to be covered

- Displaying distributions with graphs

- Describing distributions with numbers

- Density curves and normal distributions

- Scatterplots

- Correlation

- Least-squares regression

- Data analysis for two-way tables

- Design of experiments

- Sampling design

- Toward statistical inference

- Ethics

- Randomness

- Probability models

- Random variables

- Means and variances of random variables

- General probability rules

- Sampling distributions of sample mean

- The sampling distribution for counts and proportions

- Estimating with confidence

- Tests of significance

- Inference for the mean of a population

- Inference for two-way tables

- Goodness of fit

Page 41: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

41

17. CS 311: Object Oriented Programming 1

(1البرمجة كائنة التوجه ) Object Oriented Programming 1 Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 2 2 3 1 2 670245 CS 311

1 One contact hour equals 50 minutes.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

670241 - CS 221 Prerequisite 5 Level

Course Description

The purpose of this course is to provide students with fundamental knowledge of object oriented

programming (OOP). It emphasizes good software engineering principles and developing

programming skills. Specific topics covered include: fundamental concepts of object oriented

programming (classes, methods, instantiation, communication by message, encapsulation, inheritance,

overriding, dynamic dispatch, polymorphism, etc.) and some interesting packages (I/O, strings, etc.).

As an OOP programmer, a student will be able to translate solution problem into object oriented form.

He/she should acquire some understanding of object oriented concepts and tools such as the Unified

Modeling Language (UML). This will give the student a firm foundation on which he/she can build

high-quality software systems. In practice the programming language used is JAVA, as an introduction

to JAVA language. Students should acquire some understanding of abstraction mechanisms,

enumeration, JAVA Virtual Machines (JVM) and the byte code notion.

Course Learning Outcomes (CLOs)

On successful completion of this course, students should be able to: 1. Explain the benefits of intermediate languages in the compilation process 2. Justify the philosophy of object-oriented design and the concepts of encapsulation,

inheritance and polymorphism. 3. Explain how abstraction mechanisms support the creation of reusable software components. 4. Demonstrate how to translate solution problem into object-oriented form. 5. Describe the importance and power of abstraction in the context of virtual machines.

6. Write simple programs in an object-oriented programming language.

Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) 20% Lab 10% Project(s)

Mid-term (II) 20% Mid-term(I)

40% Final Participation

Textbook:

Introduction to JAVA Programming, Comprehensive Version, Tenth Edition

Author: Y. Daniel Liang

Publisher: Pearson Education, Inc., publishing as Prentice Hall.

ISBN-10: 0133761312, ISBN-13: 978-0133761313, 2014

Reference Book:

1. Harvey Deitel Paul J. Deitel, “Java How to Program (early objects): International Edition” ,

Pearson , 2015 (international 10th edition), ISBN-10: 1292018194 , ISBN-13: 9781292018195!

Page 42: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

42

2. Herbert Schildt, “Java The Complete Reference 9/E”, McGraw-Hill, 9th Edition, September 2013,

ISBN-10: 0071808558 | ISBN-13: 978-0071808552!

3. Building Java Programs: International Edition, 3nd edition 2013,Stuart Reges, Marty Stepp,

Brief list of topics to be covered

- A revision of selections

- Loops

- Methods

- Single and multi-dimensional arrays

- Strings

- Objects and classes

- Object-oriented thinking

- Inheritance and polymorphism

- Abstract classes and interfaces

- Enumerated types

Page 43: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

43

18. CIS 313: Technical Reports

Technical Reports كتابة التقارير التقنيةCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 0 2 2 0 2 670247 CIS 313

1 Every unit equals a minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 5 Level

Course Description

This course is designed to help students develop an effective method of planning and completing

writing tasks so that student can meet professional writing demands. Since succeeding in the

professional world requires not only technical knowledge but also effective writing skills. This course

focuses on the writing skills necessary for advanced academic and professional writing, tailored

specifically to student academic career work as professional in a technical field. Successful technical

communicators know how to organize and present complex information so that the ideas are

understandable to many readers, viewers, and listeners. In this course, students will complete several

small technical and recommendation reports on a topic related to IT related majors. Indeed, this course

requires intensive writing, reading, and peer commentary.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Describe how to use graphics and page layout to support and enhance written

communication.

2. Define the communication process to improve the technical communication.

3. Analyze audiences to appropriately structure information for different types of professional

written communication.

4. Summarize views on technical topics to prepare appropriate written reports.

5. Demonstrate the communication skills through presentation to peers.

6. Use virtual collaboration tools for collaborative authoring

7. Present information/data in appropriate written formats

Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 30% Project(s)

Mid-term (II) 20% Mid-term (I)

35% Final 5% Participation

Textbook:

John M. Lannon, Laura J. Gurak (2018) Technical Communication, MLA Update, 14/E, ISBN-10:

0134678826 • ISBN-13: 9780134678825

Reference Book:

1. Hannigan Carrie, Kaplan Technical Writing: A Resource for Technical Writers at All Levels,

Kaplan Pub, 2010, ISBN-10: 1607147092 ISBN-13: 978-1607147091

Page 44: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

44

2. Alred, Handbook of Technical Writing, 10th ed., Published by Bedford, 2011 ISBN-10:

1250004411; ISBN-13: 978-1250004413

Brief list of topics to be covered

- Abstracts and Executive summaries

- What are the technical professions?

- What is technical communication?

- Who is the typical technical communicator?

- What skills do technical communicators need?

- Planning the communication process

- Problem solving, Analyzing audience

- Writing Document specification

- Researching

- Organizing for Readers

- Designing the Document

- Editing style, Communicating with other cultures

- Memos, Letters, and E-Mail Correspondence

- Instructions, Procedures, and Polices

- Abstracts and Executive summaries

- Professional Presentations

Page 45: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

45

19. CS 314: Digital Hardware

Digital Hardware األجهزة الرقميةCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 2 2 3 1 2 670249 CS 314

1 One contact hour equals 50 minutes.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

670242 - CS 222 Prerequisite 5 Level

Course Description

Digital Systems: digital computer and digital systems, binary, decimal, octal and hexadecimal number

systems, number base conversion, complements, signed and unsigned numbers, binary codes, binary

storages and registers, and binary logic. Boolean algebra and logic gates: basic definitions, axioms

definitions of Boolean algebra, basic theorem and properties of Boolean algebra, Boolean functions,

canonical and standard forms, logic operations, and digital logic gates. Simplification of Boolean

functions: the map methods, product of sum simplification, NAND and NOR implementation, and the

tabulation method. Combinational logic circuits: adders, subtractors, decoders, encoders, multiplexers,

de-multiplexers, look-up table, function implementation using multiplexers/decoders and memories.

Sequential logic circuits: flip-flops, synchronous and asynchronous circuits, counters (types of

counters), registers, memories, design of counters, design of sequential circuits, analysis of counters,

and analysis of sequential circuits. Analog-to-digital converters and digital-to-analog converters.

Programmable logic devices (PLD): PLA, PAL and FPGA. Student will be trained on the products and

components of K&H products [KL-300 Digital Logic Lab-13 modules].

Course Learning Outcomes (CLOs)

On successful completion of this course, students will be able to:

1. Identify components required to assemble the circuit.

2. Use simplification methods for Boolean functions.

3. Simulate combinational and sequential circuits and predict their behavior.

4. Design combinational and sequential logic circuits.

Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) 25% Lab Project(s)

Mid-term (II) 20% Mid-term(I)

40% Final 5% Participation

Textbook:

M. Moris Mano & Michael D. Ciletti, “Digital Design”, 5th edition, Prentice Hall,

2013(international edition, ISBN -13:978-0-273-76452-6, ISBN -10:0-273-76452-7)

Reference Book: Digital Design and Computer Architecture, 2nd Edition, by Harris & Harris, Print

Book ISBN :9780123944245;eBook ISBN :9780123978165

Brief list of topics to be covered

- Digital systems

- Boolean algebra and logic gates

- Combinational digital circuits

- Sequential digital circuits, Advanced and field programmable logic device

Page 46: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

46

20. CS 315: Communications & Network Fundamentals

والشبكات االتصاالتأساسيات Communications & Network

Fundamentals

Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 2 2 3 1 2 670278 CIS 315

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100 minutes in practical

laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

670238 – CIS 211 Prerequisite 5 Level

Course Description

This course provides the fundamentals of data communication and networking. It covers topics related

to network layered architectures including: connectivity, topology, TCP/IP and OSI models. For

Physical Layer, it introduces the essential elements of transmission media including: analogue and

digital signals, time and frequency domains concepts, and types of channels. For Data Link Layer, it

covers framing, switching and forwarding techniques, LAN addressing and ARP. For Network Layer,

it covers network service models, forwarding and routing, and IP addressing, and network design and

development for different sized business organizations. At the Transport Layer it covers TCP and UDP

protocols, operating principles, congestion control, error control and flow control. At the Application

Layer students first learn application layer principles and core application protocols and then go on to

discuss the Quality of Service requirements for business applications and their implications on network

requirements. Network security and security devices are introduced and security requirements of

business organizations are discussed. Students will be trained on the practical aspects of infrastructure

solutions in network design and development for business organizations through hands-on exercises

on device configuration including Cisco switches and routers. Popular simulation software including

Cisco Packet Tracer and Wireshark are used for the analysis of network traffic and protocol behavior

within the context of a business organization.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Describe the essential elements, components and functioning of data communication systems,

network protocols and communication media in computer networks.

2. Identify the IP addressing requirements for a business organization and propose the solutions that

enhance traffic flows.

3. Design and develop an IP based network for a business organization.

4. Evaluate the applicability of IT infrastructure, network security solutions and network technologies

for a business organization and suggest the appropriate solution.

5. Assess different networking scenarios using network software and analyze business application

type traffic QoS requirements.

\

4%

Assignment(s) 6% Quiz(zes)

Grading

(assessment

strategies) 15% Lab 10% Project(s)

Page 47: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

47

Mid-term (II) 20% Mid-term (I)

40% Final 5% Participation

Textbook:

B.A. Fourouzan, Data communication and networking, 5th edition, 2012., ISBN-10: 0073376221,

ISBN-13: 978-0073376226

Reference Book:

1. S. Laan. IT infrastructure Architecture – Infrastructure Building Blocks and Concepts, Third

Edition, 2017. ISBN 978-1-291-25079-5.

2. L. L. Peterson, B. S. Davie. Computer Networks: A Systems Approach, Fifth Edition,

2012. ISBN-13: 978-0123850591.

Brief list of topics to be covered

- Network layering, and protocols, OSI and TCP/IP Model

- Physical layer: wired and wireless connectivity

- Data link layer: Ethernet

- LAN addressing and ARP

- Introduction to network layer. Inside a router

- Network layer: IP, IP addressing and routing, IPV6

- Network Design for different sized Business Organizations, Using public networks for secure

data transport: VPNs

- Introduction to Transport layer protocols. Principles of reliable transfer, TCP reliable transfer

implementation

- RTT and timer, flow control, TCP connection management. Principles of congestion control.

- TCP congestion control. TCP performance: response time. TCP throughput

- Principles of Application layer: core Internet application protocols: FTP, SMTP, DNS.

- Network Security and Security devices, Securing IT infrastructure in a Business organization

- Network performance requirements for Business application software: HTTP, Web Caching

and content delivery networks. Peer-to-peer applications.

Page 48: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

48

21. MATH 301: Discrete Mathematics

Discrete Mathematics رياضيات متقطعةCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 0 3 3 0 3 670250 MATH 301

1 One contact hour equals 50 minutes.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

670244 – STAT 207 Prerequisite 5 Level

Course Description

The purpose of this course is to introduce the essential mathematical concepts and ideas in discrete

mathematics, which are required for rigorous studies in most areas of Computer Science including

logic and proof techniques, analysis of algorithm, digital circuit, network, software engineering, and

artificial intelligence. Topics include: propositional logic, logical equivalence, quantifiers; set theory,

mathematical induction; vector and matrices; relations, equivalence relations, partial ordering

relations; functions, sequences, indexed classes of sets, recurrence relations, recursively defined

functions, algorithms and complexity of algorithm; properties of integers; basic counting techniques,

binomial coefficients and Pascal triangle, pigeonhole principle; graph theory, tree graphs, directed

graphs; Boolean algebra. Emphasis will be placed on providing a context for the application of discrete

mathematics within Computer Science.

Course Learning Outcomes (CLOs)

On successful completion of this course, students should be able to:

1. Describe and apply some fundamental concepts of propositional logic and quantifiers.

2. Define, describe, and manipulate basic mathematical objects (e.g. sets, functions, relations, and

integers), and apply standards methods to verify their properties.

3. Analyze a problem to create relevant recurrence equations and solve the equations.

4. Demonstrate an understanding of analysis of algorithms using the concept of functions and

function complexity.

5. Apply the basic notions of combinatorics including permutations and combinations, binomial

coefficients and Pascal triangle, and pigeonhole principle.

6. Analyze the basic properties of graphs and trees, and use these concepts to model simple

applications.

10% Assignment(s) 15% Quiz(zes) Grading

(assessment

strategies) Lab Project(s)

15% Mid-term (II) 15% Mid-term(I)

40% Final 5% Participation

Textbook:

Discrete Mathematics and its Applications, Global Edition, McGraw-Hill Higher Education; 7

edition (1 Sept. 2012), ISBN-13: 978-0071315012.

Reference Book:

Page 49: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

49

Seymour Lipschutz, Marc Lipson., “Schaum’s Outline of Discrete Mathematics”, Schaum’s Outline

Series., Edition 3, illustrated, revised., Publisher: McGraw-Hill Education, 2009., ISBN-10:

0071615865, ISBN-13: 9780071615860.

Brief list of topics to be covered

- The foundations: Logic and proofs

- Basic structures: Sets, relations, functions, sequences, sums, and matrices

- Algorithms

- Number theory and cryptography

- Induction and recursion

- Counting

- Advanced counting techniques

- Graphs

- Trees

- Boolean algebra

Page 50: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

50

22. CS 310: Data Structure

Data Structure هيكلة البياناتCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 0 2 2 0 2 670246 CS 310

1 One contact hour equals 50 minutes.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

670245 - CS 311 Prerequisite 6 Level

Course Description

This course is complementary to the course “object-oriented concepts”. The aim of this course is to

provide the fundamentals of data structures, algorithm design in the light of object-oriented approach

which allows one to store collections of data efficiently with fast updates and queries.

The course is mainly focused on implementation strategies and their manipulations for arrays, stacks,

queues and linked lists; recursion; also implementation strategies for tree and graph algorithms.

The data structures representation and manipulations are exercised using Java programming language.

Course Learning Outcomes (CLOs)

On successful completion of this course, students should be able to:

1. Demonstrate the abilities to formulate and decompose a given problem

2. Apply appropriate algorithmic techniques to solve the given problem that demonstrates

comprehension of the tradeoffs involved in design choices.

3. Practice primitive data structures in a popular programming language

4. Describe the implementation of hash tables, including collision avoidance and resolution

5. Explain the heap property and use of heaps

Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) 25% Lab Project(s)

Mid-term (II) 20% Mid-term(I)

40% Final 5% Participation

Textbook:

Michael T. Goodrich, Roberto Tamassia, Michael H. Goldwasser, “Data Structures and Algorithms

in Java”, John Wiley & Sons; 6th Edition (15 July 2014), ISBN-10: 1118771338, ISBN-13: 978-

1118771334.

Reference Book:

• John R hubbard, “Data Structures with Java”, 2nd Edition, Schaum's Outline Series McGRAW-

HILL eBooks (DOI: 10.1036/0071476989)

Brief list of topics to be covered

- Arrays

- Linked lists

- Pointer and linked nodes

- Recursion

Page 51: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

51

- Stack

- Stack implementation using array & linked list

- Queues

- Queue implementation using array & linked list

- Trees and tree traversal algorithms

- Linear and binary search

- Sorting & selection

- Graphs

Page 52: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

52

23. CS 321: Object Oriented Programming 2

(2البرمجة كائنة التوجه ) Object Oriented Programming 2 Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 2 2 3 1 2 670251 CS 321

1 One contact hour equals 50 minutes.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

670245 – CS 311 Prerequisite 6 Level

Course Description

The main purpose of this course is to develop the understanding of advanced OOP topics using a high-

level object-oriented programming language. The focus of the course is on the design and

implementation of event-driven applications. Main topics include: exception handling, multithreading,

applets, event-driven programming, database connectivity, application programming interfaces (APIs)

and the object oriented graphical user interfaces using SWING.

Course Learning Outcomes (CLOs)

On successful completion of this course, students should be able to:

1. Describe and identify the appropriateness of graphics architectures for a given applications.

2. Apply the concept of exception handling and multi-threading.

3. Produce graphical user interfaces for various scenarios.

4. Develop applications having database connectivity.

5. Design and implement software projects for a given problem statements.

Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) 15% Lab 15% Project(s)

Mid-term (II) 20% Mid-term(I)

40% Final Participation

Textbook:

Java How to Program: International Edition, 10/E

Author: Harvey deitel, Paul J.Deitel

Publisher: Person Higher Education, 2015.

ISBN-10: 1292018194 , ISBN-13: 9781292018195

Reference Book:

1. Savitch, W., “Absolute Java”, Addison Wesley, 2nd edition. 2005.

2. Schildt, H., “Java 2: The complete reference”, McGraw-Hill, 5th edition, 2002,ISBN:0072224207

3. Bruegge, B. &Dutoit, A.,” Object-Oriented Software Engineering Using UML,Pattern,and Java”,

Prentice Hall, 3rd edition, 2010. ISBN-10: 0136061257

4. Wampler, B., “Essence of Object Oriented Programming with JAVA and UML”, Addison Wesley

2002, ISBN-13:978-0201734102.

Page 53: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

53

Brief list of topics to be covered

- Exception handling.

- GUI components and event handling.

- Accessing database with JDBC.

- Files, streams and object serialization.

- Concurrency (Multi-threading).

Page 54: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

54

24. CIS 321: Database Concepts and Design

Database Concepts and Design مفاهيم وتصميم قواعد البياناتCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 2 2 3 1 2 670253 CIS 321

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

670238- CIS211 Prerequisite 6 Level

Course Description

This course introduces students to basic database concepts. The course teaches students relational

database terminology, as well as data modeling concepts, building Entity Relationship Diagrams

(ERDs), and mapping ERDs. It introduces relational languages, and The Structured Query Language

(SQL) is used to interact with a relational database and manipulate date within the database.

Relational database systems are the main focus, but other types, including object-oriented databases,

are studied. This course will also cover topics such as file organization, indexes, transactions and

transaction management, concurrency control, and database recovery. Leveraging project-based

learning techniques, students will create and work with projects which challenge them to design,

implement, and demonstrate a database solution for a business or organization using modern

software tools.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Write data queries using relational algebra, relational calculus and SQL.

2. Describe database concepts and architecture including query processing and optimization,

concurrency controls and database recovery.

3. Design databases using conceptual and logical data models.

4. Analyze Functional Dependencies and apply normalization rules.

5. Develop E-R diagrams to model entities and relationships to show data organization within a

database.

Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) 10% Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

40% Final 5% Participation

Textbook:

10. Elmasri, Ramez. Navathe, Shamkant B, “Fundamentals of Database Systems” Addison-

Wesley, Seventh Edition 2015 ISBN-10: 0133970779 | ISBN-13: 0133970779

Reference Book:

6. Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan, "Database System Concepts"

McGraw Hill Education, Sixth Edition 2010 ISBN-10: 0073523321 | ISBN-13: 978-

0073523323

Page 55: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

55

Brief list of topics to be covered

- Introduction to Database

- Database System Concepts and Architecture

- Relational Models

- Data Modeling Using ER Model

- Mapping Conceptual Design into logical Design

- Basic SQL Query

- Complex SQL Query - Views, Triggers, Assertions

- Relational Algebra

- Relational Calculus

- Functional Dependencies & Normalization

- File Organization

- Physical Database Design: Indexing

- Transaction Processing

- Concurrency Control

- Database Back up & Recovery

Page 56: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

56

25. CIS 326: IT Infrastructure Management

IT Infrastructure Management إدارة هيكلة تكنولوجيا المعلومات Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 2 2 3 1 2 928097 CIS 326

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100 minutes in practical

laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

670278 - CIS 315 Prerequisite 6 Level

Course Description

This course covers advanced concepts in data communications and computer networks including

Media Access Control Mechanisms, wireless and mobile networks, and routing protocols. It then

focuses on the services and solutions available through IT infrastructure in an organizational context.

Students develop knowledge and skills for communicating effectively with professionals whose special

focus is on hardware and systems software technology, and for designing organizational processes and

software solutions that require in-depth understanding of the IT infrastructure capabilities and

limitations. The course focuses on Internet-based solutions, business continuity, and the role of

infrastructure in regulatory compliance. Students are given practical training on the configuration and

analysis of WLANs and routing protocols through a more in depth use of Wireshark and Packet Tracer.

It also covers the analysis of network performance for a business organization. Case studies of

noteworthy examples of success of IT infrastructure deployment in businesses help students build the

skills of successfully applying infrastructure solutions in businesses and choosing the correct options.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Describe the functioning of different components in popular MAC layer protocols, wireless and

mobile networks and network routing protocols.

2. Demonstrate how IT infrastructure components are organized into infrastructure solutions in

different sized organizations with a focus on large-scale business environments.

3. Explain how IT infrastructure decisions in business environments impact business continuity and

environmental and resource consumption.

4. Identify the opportunities that virtual computing service provision models, such as cloud

computing, create for business organizations.

5. Configure WLANs, routing protocols and VLANs and explore their suitability for different sized

organizations.

4%

Assignment(s) 6% Quiz(zes)

Grading

(assessment

strategies) 15% Lab 10% Project(s)

Mid-term (II) 20% Mid-term (I)

40% Final 5% Participation

Textbook:

S. Laan. IT infrastructure Architecture – Infrastructure Building Blocks and Concepts, Third Edition,

Page 57: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

57

2017. ISBN 978-1-291-25079-5.

Reference Books:

4. B.A. Fourouzan, Data communication and networking, 5th edition, 2012., ISBN-10:

0073376221, ISBN-13: 978-0073376226

5. L. L. Peterson, B. S. Davie. Computer Networks: A Systems Approach, Fifth Edition, 2012.

ISBN-13: 978-0123850591.

6. I. Faynberg, H-L Lu, D. Skuler. Cloud Computing: Business Trends and Technologies. 1st

Edition, 2016. ISBN-13: 978-1118501214

Brief list of topics to be covered

- Introduction to Media Access Control layer. Multiple access protocols

- Aloha protocol, CSMA. Efficiency of CSMA/CD. Ethernet

- Wireless and mobile networks

- Internet routing architecture and protocols. Multicast routing. ICMP. Routing algorithms. DHCP

- Role of IT infrastructure in a modern Business organization

- Type of Networks, Network architecture, Core Network Components

- Core computing system architecture concepts, Core computing system organizing structures,

Core technical components of computer-based systems

- System performance analysis and management

- Organizing storage on organizational networks, Data centers

- The role of IT control and service management frameworks (COBIT, ITIL, etc.) in managing the

organizational IT infrastructure

- Ensuring business continuity

- Grid computing, Cloud computing, computing as a service

Page 58: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

58

26. MGMT 320: Principles of Management

Principles of Management دارةمبادئ اإلCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 0 3 3 0 3 928097 MGMT 320

1 Every unit equals a minimum of 50 minutes in theory lecture or minimum 100 minutes in practical

laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 6 Level

Course Description

Organizational performance is dependent on the effectiveness of managerial decision making and

therefore managers require a system approach to formulate and execute organizational strategies. This

course aims to provide basic management skills to achieve efficiency and productivity in the future

professional life of learners. The course highlights modern day management challenges of complex

global business environment, corporate social responsibility, innovation management, human resource

management and operations management. The course will be supported by additional case studies.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Define the historical evolution of management theory and principles relevant to

organizational management.

2. Describe the influence of organizational culture on employee behavior in the workplace.

3. Analyze management responsibilities in modern day business environment.

4. Explain how leadership and motivation can assist a person for improving and making an

organizational change.

5. Work as a member of the team and take up leadership position when required.

20% Assignment(s) 15% Quiz(zes) Grading

(assessment

strategies) Lab Project(s)

Mid-term (II) 20% Mid-term (I)

40% Final 5% Participation

Textbook:

Stephen P. Robbins, Mary A. Coulter (2018) Management, Global Edition, 14/E ISBN-10:

1292215836 • ISBN-13: 9781292215839, Pearson

Reference Book:

1. David Boddy (2017) Management: An Introduction, 7/E, ISBN-10: 1292088591 • ISBN-

13: 9781292088594, Pearson.

Brief list of topics to be covered

- Introduction to management and organization

- Management History

- Organizational culture and environment

- Global business

Page 59: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

59

- Social responsibilities and ethics

- Foundations of planning and strategic management

- Organizational structure and design.

- Controlling.

- Motivation and leadership.

- Human resources and team management.

- Innovation and change management.

- Business communication.

- Business operations management.

Page 60: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

60

27. CIS 413: Professional Responsibility

Professional Responsibility المسؤولية المهنيةCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 0 2 2 0 2 670258 CIS 413

1 Every unit equals a minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 6 Level

Course Description

This course introduces the students to the legal, social, and ethical issues of information technology

and use; information rights, property rights, liability, accountability, privacy, security, crime, ethical

principles, codes of ethics, "the digital divide", role of patent and technology transfer, role of

government, role of law enforcement, role of business and industry; professional conduct, social

responsibility, and rigorous standards for software testing and reliability, students read, write, discuss,

and present reports on these topics, fraud and abuse, electronic communication privacy, mail fraud,

credit card abuse, privacy protection, copyright and patent statute, communication decency, law and

computing code of ethics, name dispute resolution policy.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Recognize the role of intellectual property in computing profession.

2. Describe professional code of ethics and professional conduct for computing professionals.

3. Analyze how to evaluate and control technology as part of professional responsibility of an

IT expert.

4. Analyze the risks associated with usage of computing technology at individual,

organizational, and societal levels.

5. Demonstrate the communication skills through presentation to peers on ethical and unethical

aspects of computing technologies.

6. Present ethical and unethical aspects of a computing technology in appropriate written

formats.

25% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab Project(s)

Mid-term (II) 20% Mid-term (I)

40% Final 5% Participation

Textbook:

Sara Baase, Timothy M. Henry (2017) “A Gift of Fire: Social, Legal, and Ethical Issues for Computing

and the Internet”, 5th edition, ISBN-10: 0134615271 ISBN-13: 978-0134615271 Pearson

Page 61: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

61

Reference Book:

1. Ethics & Information Technology Journal

2. Michael J. Quinn, (2016) Ethics for the Information Age, Global Edition, 6/E, ISBN-10:

1292061235 • ISBN-13: 9781292061238, Pearson Higher Education.

3. Association of Computing Machinery Code of Ethics

Brief list of topics to be covered

- Technology and Ethics

- Privacy

- Intellectual Property

- Criminal Activity and Technology

- Evaluating and Controlling Technology

- Errors, Failures and Risks

- Professional Ethics

Page 62: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

62

28. CS 322: Operating Systems

Operating Systems نظم التشغيلCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 2 2 3 1 2 670252 CS 322

1 One contact hour equals 50 minutes.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

670249 - CS 314 Prerequisite 7 Level

Course Description

In this course the student will study the basic concepts of operating systems (OS), the following

concepts will be studied in this course: OS Overview (objectives, functions, evolution of OS,

characteristics of modern OS), process description and control (process definition, process states,

process description and process control), threads (definition, why use thread, relationship between

processes and threads), microkernel (benefits of microkernel organization, microkernel design), uni-

processor scheduling (types of scheduling, short term scheduling criteria, scheduling algorithms),

memory management (memory management requirements, loading programs into main memory -fixed

partitioning, dynamic partitioning, simple paging, simple segmentation-), virtual memory (paging,

segmentation, combined paging and segmentation), operating system software (fetch policy, placement

policy, replacement policy, resident set management, cleaning policy, load control), I/O management

and disk scheduling (I/O devices, organization of I/O function, I/O buffering, disk I/O), and file

management (file management system, file organization and access, file directories, secondary storage

management).

Course Learning Outcomes (CLOs)

On successful completion of this course, students should be able to:

1. Demonstrate differences between processes and threads and compare various process/thread

synchronization methods.

2. Analyze modern memory management techniques used in operating systems.

3. Analyze structure/organization of modern file systems.

4. Compare various processor scheduling algorithms.

5. Demonstrates an understanding of the Linux operating system commands.

Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) 25% Lab Project(s)

Mid-term (II) 20% Mid-term(I)

40% Final 5% Participation

Textbook:

Abraham Silberschatz, Peter B. Galvin, Greg Gagne, “Operating Systems Concepts", 9th Edition”,

2013 Wiley.

Reference Book:

1. W. Stallings, “Operating Systems: Internals and Design Principles”, Prentice Hall. Latest Edition.

2. Jean Bacon, Tim Harris “Operating Systems”, Addison-Wesley, Latest Edition

Lab Book:

Page 63: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

63

1. “Linux Essentials”, Roderick W. Smith, Sybex, 2012.

2. “Java: How to Program ” ,Deitel, Paul , Pearson Education, 2012

Brief list of topics to be covered

- Introduction to operating system concepts

- Operating system structures

- Processes

- Threads

- Process synchronization

- CPU scheduling

- Deadlock

- Main memory

- Virtual memory

- File system

Page 64: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

64

29. CS 211: Introduction to Computing

Introduction to Computing Course مقدمة علم الحاسب

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 2 2 3 1 2 670237 CS 211

1 One contact hour equals 50 minutes.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 3 Level

Course Description

This course introduces the main concepts of Computer Science. It includes the basics of computing:

hardware, software, connectivity and users, the different types and features of computers. It presents

also the data types and data representation. A simple computer system architecture is presented so to

emphasize on main components, secondary storage devices, types of memory, hardware, software and

people. The principal peripheral devices are also presented: input, output and storage, data preparation,

factors affecting input, input devices, output devices, secondary storage devices, communication

between CPU and input/output devices. Software aspects are introduced like problem-solving and

programming: algorithm development, flowcharts, looping, some programming features, pseudo code,

some structured programming concepts, documentation, as well as programming languages: machine

language and assembly language, high-level and low-level languages, assemblers, compilers and

interpreters. Finally, the course presents the computer and communication aspects, as well as different

features of Operating Systems.

Course Learning Outcomes (CLOs)

At the end of the course students will be able to:

1. Apply suitable problem-solving strategies with assist of flowcharts and Pseudo code.

2. Use computational-thinking and logical reasoning through solving real-world problems, puzzles,

and programming competitions questions.

3. Write simple programs using C++ programming language.

4. Solve and implement computer programs involving decision structures and loops.

5. Construct and implement programs using arrays and proper data structures.

6. Apply problem generalization and problem abstraction.

Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) 25% Lab Project(s)

Mid-term (II) 20% Mid-term(I)

40% Final 5% Participation

Textbook:

Glenn Brookshear & Dennis Brylow. Computer Science: An Overview, 12th Edition. ©2015,

Pearson, ISBN-13: 978-0133760064, ISBN-10: 0133760065

Reference Book:

G.Michael Schneider, Judith L.Gersting. Invitation to Computer Science 7th Edition, ©2015, ISBN-

978-1-305-07577-1

Page 65: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

65

Brief list of topics to be covered

- History and Social Implications of Computing

- Computer Architecture

- Numbering Systems and Data Representations

- Problem Solving and Debugging

- Basic Programming Constructs

- Control Structures and Program Flow

- Networks

- Internet

- Operating Systems

- Computer Security

Page 66: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

66

30. BIOL 222: Biology

Course Name Biology حياءألا

Course

Information

Course Code Course No Credit

Units

Lec. Lab. Tot. Contact

Hours1

Lec. Lab.

BIOL 222 667409 3 1 4 3 2

1Every contact hour equals minimum 50 minutes.

Track University Requirement College Requirement Program Requirement

Core Elective

Program

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Level 4 Prerequisite None

Course Description:

This is an introductory course with lab for non-biology majors. The students will learn the basic

concepts of biology and human body systems to enable them to understand the biological phenomenon

in our daily life as well as how the human body functions. In addition, this course also aims to create

awareness about the current advances and application of biology in medicine, agriculture, environment

and society. Students will be able to understand the challenges in biological research and how

computers can help in solving them.

Course Learning Outcomes (CLOs)

On successful completion of this course, students should be able to:

1. Recognize the concepts of life, biological organization, evolution, cell, genetics and various

cellular activities such as molecular transports, cell metabolism, reproduction and gene expression.

2. Define the components, functions, and organization of cell and human organ systems.

3. Apply the scientific methods and logics to perform experiments, interpret the results and draw

conclusions.

4. Demonstrate ability to work independently and as a team member to perform experiments.

5. Perform basic scientific calculation.

6. Operate the related equipment and perform laboratory experiments according to the instruction.

Grading

(assessment

strategies)

Quiz(zes) 10% Assignment(s)

Project(s) Lab 25%

Mid-term(I) 20% Mid-term (II)

Participation 5% Final 40%

Textbook:

Biology: A Global Approach by Neil A. Campbell, 10th Edition, 2014, Pearson Education

Limited. ISBN-13: 978-1-292-00865-3.

Reference Books:

Biology Sixth Edition, Peter Raven & George Johnson. Wm. C. Brown Publishers, 2010, ISBN-10:

0077350022, ISBN-13: 978-0077350024

Page 67: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

67

31. CYS 401: Cyber Laws and Security Policy

الفضاء االلكترونيقوانين وسياسة أمن Cyber Laws and Security Policy Course Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course Code Course

Information 0 3 3 0 3 926795 CYS 401

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100 minutes in practical

laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 7 Level

Course Description

The objectives of this course are to know about Cyber Security and implementation policies. Learn the

necessary skills based on Cyber Laws so that the individual can visualize Cyber Security related problems. Compare alternative solutions for real world security problems. Have strong foundation for further studies in

Cyber Security. Apply proper knowledge of Cyber Security techniques. Carry out digging material about

Cyber Laws and Security in to the web, formulate literature review, develop research proposal, and conduct

independent project research in specific topics related to Cyber Laws and Security Policies related core areas.

Course Learning Outcome (CLOs) On completion of this course, the student should be able to:

1. Write reports relevant to cyber security and implementation policies

2. Demonstrate oral presentation skills using critical and reflective thinking

3. Demonstrate the ability to make an informed judgement regarding cyber laws and security policies.

4. Identify professional, ethical, legal, and social aspects of cyber systems in line with applicable laws

and regulations

5. Recognize the influences of Cyber Laws on the operations and functions of the entire security

processes and practices using latest security tools, practices and paradigms

6. Identify potential risks due to nonexistence of cyber laws/policies and design appropriate controls to

achieve business continuity

7. Review the role of cyber laws and regulations in carrying out cyber security strategic planning

0% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 20% Project(s)

Mid-term (II) 20% Mid-term (I)

40% Final 10% Participation

Textbook:

1. Whitman, Michael E and Mattord, Herbert J, “Principles of information security” (6th ed).

CENGAGE LEARNING CUSTOM P, 2018

Reference Book:

1. Response Solutions”, IGI Global, 2009.

Page 68: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

68

2. Debby Russell and Sr. G.T Gangemi, "Computer Security Basics (Paperback)”, 2nd

,Edition, O’ Reilly Media, ISBN: , 978-0596006693 2006.

3. Thomas R. Peltier, “Information Security policies and procedures: A Practitioner’s

Reference”, 2nd Edition Prentice Hall, 2004.

4. Thomas.R.Peltier, “Information Policies, Procedures and Standards”, CRC Press, 2004.

5. Scott Barman, “Writing Information Security Policies”, Sams Publishing, 2002.

6. Jonathan Rosenoer, “Cyber law: the Law of the Internet”, Springer-verlag, 1997.

7. Whitman, Michael E & Mattord, Herbert J., (author.) (2016). Principles of information

security (Fifth Edition).

Brief list of topics to be covered

- Introduction to Cybersecurity

- Introduction to Computer Security

- Business Continuity & Disaster Recovery

- Cybercrime

- Cyber Law

- Anti-Cybercrime Law in Saudi Arabia

- Cyber Policies & Guidelines, and Security Awareness

- Cyber Ethics

- Planning for Security

- Incident Response

- Implementing Information Security

- Information Security Maintenance

Page 69: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

69

32. CYS 402: Mathematical Foundations of Information Security

األسس الرياضياتية ألمن المعلوماتMathematical Foundations of

Information Security

Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 926796 CYS 402

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

CIS 315 Prerequisite 7 Level

Course Description

The course introduces mathematical foundations of information security by covering the

mathematics behind the theory of classical Cryptosystems as well as modern Cryptosystems

including RSA, Diffie-Hellmann key exchange, and other discrete logarithm-based cryptosystems.

The focus will be on fundamental mathematical tools such as primality testing, factorization

algorithms, probability theory, and information theory. In addition, the course includes an overview

about Cryptography and Basic Number Theory: Divisibility, primes, greatest common divisor,

extended Euclidean algorithm, congruence, Chinese Remainder Theorem, modular exponentiation,

Fermat's little Theorem and Euler's Theorem, and primitive roots.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Apply knowledge of number theory to understand information security algorithms and

techniques.

2. Analyze Information Security problems related to the Cryptography using related

mathematical tools.

3. Explain the components of classical/modern cryptosystems and underlying mathematical

theories.

4. Describe mathematical foundations for designing security algorithms and protocols.

10% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

40% Final 5% Participation

Textbook:

1. Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, " An Introduction to Mathematical

Cryptography (Undergraduate Texts in Mathematics) ", Springer-Verlag – Undergraduate

Texts in Mathematics, 2nd ed., 2016. ISBN-10: 1493939386, ISBN-13: 978-1493939381

Page 70: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

70

Reference Book:

8. A. Manezes, P. Van Oorschot and S. Vanstone, “Hand Book of Applied Cryptography”, CRC

Press, 1996.

9. Neal Koblitz, “A Course in Number Theory and Cryptography”, 2nd Edition, Springer, 2002.

Brief list of topics to be covered

Introduction to Mathematical concepts for Information security, Divisibility, Arithmetic

Modulo, Congruences,

working with inverses in modulo, GCD, Euclidean and Extended Euclidean algorithms, and

Fast Powering Algorithm

Case studies on mathematical foundation on classical cryptosystems

Discrete Logarithms, Fermat’s theorem

Chinese remainder theorem, Shanks Algorithm, Pohlig Algorithm

Case studies on Discrete Logarithms on modern crypto systems: Diffie-Hellman.

Groups, Rings, finite fields

Group Theory, Rings, Field, Galois field, polynomials, and quotient rings

Factorization methods, Euler’s Theorem

Primality theory

Case studies on Integer Factorization: RSA

Combinatorics, Probability Theory and Information Theory

Probability Theory and Information Theory

Algebra for secrecy, complexity theory.

Lattices and Cryptography

Page 71: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

71

33. CYS 403: Network Forensics, Intrusion Detection, and Response

واالستجابة التسلل، كشف الشبكات، على التحريات Network Forensics, Intrusion

Detection, and Response

Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 2 2 3 2 2 926797 CYS 403

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

670278– CIS 315 Prerequisite 7 Level

Course Description

This course focuses on network forensics. Topics covered include Fundamentals of Network

Forensics, Forensics Basics and Criminalistics, Basics of OS and Networking, Forensic Duplication

and Analysis, Network Surveillance, Intrusion and Online Frauds Detection, Intrusion Detection and

Response. Coverage on the foundational and technical components of network forensics is included

to reinforce key concepts. The course includes up-to-date information on changes in the field.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Recognize the effectiveness of contemporary network forensic practices to evaluate system

robustness

2. Breakdown network investigation tasks into manageable modules to meet deadlines

3. Apply forensics skills and tools for detecting and responding to security risks of an

enterprise network

4. Use network forensics tools to realize strategic planning goals related to organizational

infrastructure security

10% Assignment(s) 5% Quiz(zes) Grading

(assessment

strategies) 30% Lab Project(s)

Mid-term (II) 20% Mid-term (I)

35% Final Participation

Textbook:

1. Network Forensics: Tracking Hackers through Cyberspace 1st Edition, By Sherri Davidof

and Jonathan Ham. Publisher: Prentice Hall; 1st edition (2013), ISBN-10: 0132564718,

ISBN-13: 978-0132564717

Reference Book:

1. Edward Amoroso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation,

Trace Back, Traps, and Response, Intrusion.Net Books, 1999, ISBN 0-9666700-7-8.

2. Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems,

John Wiley & Sons, 2001, ISBN: 0471389226.

Page 72: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

72

3. Alberto Leon-Garcia and Indra Widjaja, Communication Networks: Fundamental Concepts and

Key Architectures, First Edition, McGraw-Hill Companies, Inc., 2000, ISBN 0-07-022839-6.

4. Warren Kruse and Jay Heiser, Computer Forensics: Incident Response Essentials, Addition-

Wesley, 2002, ISBN 0-201-70719-5.

Brief list of topics to be covered

Introduction to course

Practical investigation strategies

Technical Fundamentals

Evidence Acquisition

Packet Analysis

Statistical Flow Analysis

Wireless Network Forensics

Network Intrusion Detection and Analysis

Event log Aggregation, Correlation, and Analysis

Switches, Routers, and Firewalls

Web Proxies

Network Tunneling

Malware Forensics

Page 73: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

73

34. CYS 404: Information System Audit

Information System Audit تدقيق نظام المعلوماتCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 926798 CYS 404

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100 minutes

in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

- Prerequisite 7 Level

Course Description

Financial auditing is considered the more vital for an organization to run effectively and efficiently. But

due to the evolvement of information technology and vast development of information systems, a new

auditing term is evolved, IT auditing. Auditing information systems is designed to collect, record, store

and process data to produce information for decision makers. In this course, in start, basic terms and

definitions have been introduced. After that, the process of information systems auditing is explained. It

is also described components of IT governance and management. The data acquisition and evidence for

auditing, IS operations and security are described. The course encourages student’s involvement through

class participation, class assignments and class projects.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Identify the components of IT governance and management within an organization

2. Write requirements pertaining to organizational audit goals, objective and scope

3. Estimate technical, human resource and supporting requirements to realize audit function.

4. Prepare audit reports highlighting audit outcomes

5. Demonstrate the presentation skills by describing audit process and findings

6. Examine organizational continuity and disaster recovery plans for smooth business operations

7. Produce audit recommendations for effective IT governance and management strategies

15% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) 0% Lab 15% Project(s)

0% Mid-term (II) 20% Mid-term (I)

30% Final 10% Participation

Textbook:

2. CISA Review Manual 2014. ISACA Publishers, ISBN: 978-1-60420-400-1

Page 74: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

74

Reference Book:

1. David L. Cannon. CISA Certified Information Systems Auditor – Study Guide. Second

Edition.2008 Wiley Publishing. ISBN: 978-0-470-23152-4

2. CASCARINO, R. "Auditor's guide to IT auditing", John Wiley & Sons, 2012. ISBN: 978-1-

118-14761-0

3. "IT assurance guide: using COBIT", Published by IT Governance Institute, 2007. ISBN: 978-1-

933284-74-3

Brief list of topics to be covered

- Introduction to Information System Auditing

- The Process of Auditing Information Systems

- Governance and Management of IT

- Information Systems Acquisition, Development and Implementation

- Information Systems Operation, Maintenance, and Support

- Protection of Information Assets

Page 75: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

75

35. CYS 406: Network Security

Network Security امن الشبكاتCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 926799 CYS 406

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 8 Level

Course Description

This course introduces the fundamental principles of network security domain. the course starts by

introducing required cryptographic techniques for secure (confidential) communication of two parties

over an insecure (public) channel and verification of the authenticity and integrity of a message. then,

introducing several topics related to network security architecture and design of selected protocols

including access control, application layer security protocols, transport layer security, network layer

security, wireless security, Data link layer security, firewall, and Intrusion Detection Systems (IDS).

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Write an extensive analysis report on network security product or related concerns and issues.

2. Practice authentication and integrity techniques required to provide related network security

objectives.

3. Analyze common network vulnerabilities and attacks, security weakness, and defense

mechanisms against network attacks.

4. Apply encryption and authentication approaches for the maintaining and protecting the privacy

of the information in the network under investigation.

5. Identify the necessary concepts in network security and the required cryptographic techniques for

secure data communication.

10% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

40% Final 5% Participation

Textbook:

1. W. Stallings, Cryptography and Network Security: Principles and Practices, 7th

edition, Prentice Hall, 2017.

Reference Book:

1. W. Stallings, Network Security Essentials: Applications and Standers, 6th edition,

Prentice Hall, 2017.

Page 76: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

76

2. C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in

a Public World, 2nd Edition. Prentice Hall, 2002.

Brief list of topics to be covered

Introduction to Network Security

symmetric encryption: Data Encryption Standard & Advanced Encryption Standard

Public-Key Cryptography and Digital signature.

Message Authentication CODES

User Authentication: Identification, key-distribution centers &

CA & PKI

Network Access Control and Cloud Security

Transport-Level Security: SSL, TLS

Transport-Level Security: more on attacks and other protocols

Electronic Mail Security

Application Layer Security:

Kerberos, Secure HTTP (HTTPS), SSH

IP SECURITY and VPN

Firewalls

Intrusion Detection Systems (IDS)

Malicious Software

Wireless Security and Data Link Layer security

Page 77: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

77

36. CYS 407: Digital Evidence Analysis

Digital Evidence Analysis تحليل األدلة الرقميةCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 2 2 3 1 2 926800 CYS 407

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

CS 311 - Course ID: 670245

STAT 207 –

Course ID: 670244

Prerequisites 8 Level

Course Description

This course provides a description of graphing techniques as used in the particular field of security

analysis. The course covers the gap between security specialists and graphing specialists. Therefore,

the course covers the data sources that security analysts work with, and graphing techniques and

principles needed to develop meaningful graphical representations of information. Students are

exposed to current graphing software for general purpose and/or specialized for security information.

Graphing software applies in the analysis of security meaningful data in both structured and

unstructured form and collected from a comprehensive set of sources, at various levels in the network

hierarchy and/or software activities.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Write reports highlighting evidence results

2. Demonstrate the findings of graphical security analysis through reporting, visual

representations and oral presentations

3. Use security graphing techniques and tools as required by security data: files, logs, registry

4. Recognize ethical, legal and social issues pertaining to digital evidence analysis

5. Analyze security data, by showing the most important features using graphical properties

5% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) 25% Lab 10% Project(s)

Mid-term (II) 15% Mid-term (I)

30% Final 5% Participation

Textbook:

1. Network Security through Data Analysis – From Data to Action, Michael Collins, O’Reilly

Media Inc, 2017. ISBN: 978-1-491-96284-8

Page 78: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

78

Reference Book:

1. Applied Security Visualization, Raffael Marty, Addison-Wesley Professional, 2008. ISBN:

0-321-51010-0

2. Data-Driven Security: Analysis, Visualization and Dashboards, Jay Jacobs, Bob Rudis,

Wiley, 2014. ISBN 978-1-118-79372-5

Brief list of topics to be covered

- Visualization. Perception. Graph design principles.

- Analysis of evidence: Sources of digital evidence: Deleted and undeleted files, temporary

files, Metadata, Print spool files, Slack space, Hibernation files. Windows registry, Browser

history, Log files, File systems, File recovery, and File carving.

- Visually Representing Data. Data types. Charts and Graph Types.

- From Data to Graphs. Presentation of results: Timeline analysis. Attribution, Lay

versus technical explanations. Executive summaries, Reports and Limitations.

- Reporting, incident response and handling: Report structures, Incident detection and

analysis, Containment, eradication and recovery. Post-incident activities, and Information

sharing.

- Authentication of evidence: Hashing algorithms (MD5, SHA-1, etc. Hashing entire

media vs individual files, and Pre-exam and post-exam verification hashing.

Page 79: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

79

37. CYS 408: Architecture of Secure Operating System

بنية نظام التشغيل اآلمنةArchitecture of Secure

Operating System

Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 2 2 3 1 2 926801 CYS 408

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100 minutes

in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

CS 322 – Operating System Prerequisite 8 Level

Course Description

The objective of this course is to study the challenges involved in the design and implementation of a

secure operating system and familiarize students with the technologies for designing a secure operating

system. The course begins by introducing some basic concepts related to secure operating system- threat

and trust models. Principles and design of a secure architecture are discussed. Discretionary access

control (DAC) and Mandatory access control (MAC) models for information flow secrecy and integrity

are presented. System administration and system hardening of Windows and Linux Operating systems

are also the major topics of this course. Latter topics include secure data storage, security kernels and

secure virtual machine systems. There is a lab component in this course which will provide hands on

experience to scan vulnerabilities in operating systems and applying security tools and techniques for a

secure system.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Describe security requirements of an operating systems

2. Design protection mechanisms of commercial operating systems

3. Produce quality work to realize project goals

4. Schedule team activities to achieve project deliverables

5. Apply information flow secrecy and integrity models to design a secure operating system

6. Employ system’s security mechanisms to enforce the requirements of a secure operating system

0% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) 20% Lab 10% Project(s)

0% Mid-term 20% Mid-term

40% Final 0% Participation

Textbook:

1. Trent Jaeger: "Operating System Security" Morgan & Claypool Publishers, 2008, ISBN: 978-15-

98292121

2. Morrie Gasser: "Building a Secure Computer System" Van Nostrand Reinhold; First Edition

(May 1, 1988), ISBN-10: 0442230222, ISBN-13: 978-0442230227

Page 80: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

80

Reference Book:

1. Silberschatz and Galvin, "Operating System Concepts" Addison Wesley, 2008, ISBN-13: 978-

0470128725, ISBN-10: 9780470128725

2. Andrew S. Tanenbaum, "Modern Operating Systems" Prentice Hall International, 2014, ISBN-

13: 978-0133591620, ISBN-10: 013359162X

3. Michael Palmer, "Guide to Operating Systems Security" 2nd Edition, Cengage Learning, 2019

ISBN-10: 1111639256, ISBN-13: 978-1111639259

Brief list of topics to be covered

- Intro: Secure Operating system, System thinking, Threat and Trust Model

- Design Technique: Reference Monitor and Security kernels, System development

process

- Principles of a Security Architecture

- Access Control and Multilevel Security: Discretionary Access Control (DAC)

- Access Control and Multilevel Security: Mandatory Access Control (MAC) - Secrecy

models (Bell La Padula & Biba Secrecy Models)

- Access Control and Multilevel Security: MAC- Integrity Model (Bell La Padula,

Biba, Clark-Wilson)

- Physical data Security

- Windows Security: Operating system administration

- Windows Security: System Hardening

- Linux/Unix Security: Operating System Administration

- Linux/Unix Security: System Hardening

- Data storage technologies, disk and file encryption, data storage formats, data masking,

database security, data security law

- Secure Virtual Machine Systems

- System Assurance

Page 81: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

81

38. CYS 409: Information Security Management & Standards

إدارة ومعايير أمن المعلوماتInformation Security

Management & Standards

Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 926803 CYS409

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 8 Level

Course Description

This course focuses on the managerial aspects of information security and assurance. Topics covered

include access control models, information security governance, and information security program

assessment and metrics. Coverage on the foundational and technical components of information

security is included to reinforce key concepts. The course includes up-to-date information on changes

in the field, such as national and international laws and international standards.

Course Learning Outcome (CLOs)

On completion of this course, the student should be able to:

1. Evaluate variety of cybersecurity tools/techniques to achieve appropriate solutions

2. Discover the concepts of Information security management.

3. Apply risk assessment and control plans and response to issues of managing

4. Use the concepts of information security planning and governance.

5. Demonstrate practices and planning for the management of information security

10% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 20% Project(s)

Mid-term (II) 20% Mid-term (I)

40% Final Participation

Textbook:

1. Management of Information Security, 5th Edition, Michael E. Whitman & Herbert J.

Mattord, 2016, ISBN-13: 978-1305501256| ISBN-10: 130550125X

Reference Book:

1. Douglas J. Landoll, Information Security Policies, Procedures, and Standards: A

Practitioner's Reference 1st Edition , 2016

2. Matt Bishop, "Introduction to Computer Security," Addison-Wesley Professional, Oct-04,

784 pp., ISBN:0321247442.

Page 82: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

82

Brief list of topics to be covered

Strategic Planning and Governance for Security

Planning for Contingencies

Developing the Security Program

Developing the Security Program

Security Management Models

Security Management Practices

Risk Management: Identifying and Assessing Risk

Risk Management: controlling risk

Supply chain security, risks and vetting

Protection Mechanisms

Security of Industrial control systems, Internet of Things (IoT)

Social and Behavioral Privacy: Social theories of privacy, Social media privacy and

security

Page 83: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

83

39. CYS 410: Digital Forensics Techniques and Tools

أدوات وتقنيات التحقيق الرقمي Digital Forensics Techniques

and Tools

Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 2 2 3 1 2 926802 CYS 410

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 8 Level

Course Description

Digital Forensics Techniques and Tools is part of forensic science. The course starts identifying the

most relevant forensics tools and techniques suitable for the nature of data. The students will be

introduced how to use those methods for digital investigation. They will be explained how to apply

them for detecting errors and flaws in cyber systems. Next, there is an analysis part, where students

will learn how to analyze suspected content including recent cybersecurity crimes by using different

forensics tools and techniques. Finally, students will be taught how to structure the extracted

information from analysis part and write a proper forensics report. The course also includes a lab part

where students will get hands-on experience for different forensics tools and techniques for digital

investigation.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Write comprehensive report on findings of forensic investigations

2. Demonstrate skills to present digital forensics concepts for class assignments/project

3. Compare and contrast among several file systems

4. Recognize ethical, legal and social issues pertaining to cybersecurity and digital forensics

5. Apply the hands-on experiments needed for investigating digital crimes or suspicious content

0% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) 20% Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

30% Final 5% Participation

Textbook:

1. Bill Nelson, Amelia Phillips, Christopher Steuart, Guide to Computer Forensics and

Investigations Fifth Edition. Cengage Learning, 2016, ISBN-13: 978-1-305-71651-3.

Reference Book:

1. Sikorski, Michael & Honig, Andrew, “Practical Malware Analysis: The Hands-On Guide to

Dissecting Malicious Software”, Starch Press, 2012 , ISBN: 1593272901, ISBN13:

9781593272906

Brief list of topics to be covered

- Computer Forensics and Investigations as a Profession

Page 84: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

84

- Understanding Computer Investigations

- Data Acquisition

- Working with Windows and DOS Systems

- Digital forensic tools

- Virtual Machines Forensics, Live Acquisitions, and Network Forensics

- Static Malware Analysis

- Dynamic Malware Analysis

- Digital Forensics Analysis and Validation

- Report Writing for High-Tech Investigations

Page 85: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

85

40. CYS 433: Cooperative Summer Training Program (COOP)

(التدريب(التعاوني العملي Cooperative Summer Training

Program (COOP)

Course

Name

Lab Lec. Contact

Hours1

Tot. Lab Lec. Credi

t

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927342 CYS 433

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

Completed 90 credit hours Prerequisite Summer Level

Course Description

The Cooperative education program is a collaborative and structured practical training academic

program at CCSIT between Imam Abdulrahman Bin Faisal University and employers to improve

student's skills for employment upon graduation. The students who have completed at least 90 credit

units are eligible to register for this course. The course duration is 12 weeks with 10 weeks onsite

training/practical work and 2 weeks for preparing the technical report and oral presentation. This

training provides students complementary knowledge and training to deal with real-world problems

in a professional organizational environment. The students must join in organization and work under

the supervision of 2 supervisors (one form the organization and one from the college) to accomplish

the training.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Prepare a task list to realize deliverables appropriate to organizational needs

2. Identify requirements and document them effectively

3. Schedule milestones resulting in timely completion of tasks assigned during field training

program

4. Describe the development strategy to solve the given problem

5. Write field training report to document field training experience

6. Demonstrate oral presentation skills by presenting the field training experience

7. Apply theoretical knowledge to solve real-world problems.

8. Demonstrate the knowledge of professional, ethical, legal, and social issues related to

assign task

9. Employ group work spirit to participate in functional teams.

10. Demonstrate the skills to integrate smoothly in organizational setting to complete assign

tasks.

11. Categorize suitable cybersecurity and digital forensics tools/techniques to improve

organizational security

12. Apply security knowledge to protect organizational IT infrastructure

35% Final Report 15% Progress Report Grading

Page 86: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

86

0% Presentation 25% Supervisor Evaluation (assessmen

t

strategies) 0% Mid-term (II) 0% Mid-term Report

0% Final 25% Project Presentation &

Demo

Textbook:

This course has no textbook

Reference Book:

COOP Handbook-2016

List of Activities:

- Understanding of organizational environment

- Deployment of technology in an organization

- Development of IT solutions for organization

- Report writing and presentation.

Page 87: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

87

41. CYS 501: Project Proposal

Project Proposal مقترح مشروعCourse

Name

Lab. Lec. Contact

Hours1

Tot. La

b Lec.

Credi

t

Units1

Course No Course

Code Course

Information 0 2 2 0 2 927320 CYS 501

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

CYS 403, CYS 406, CYS

410 Prerequisite 9 Level

Course Description

In this course, students choose a project topic and define the objectives of the project under the

supervision of a faculty member. They prepare the project proposal including defining the statement

of the problem, system requirements, different candidate solutions for the problem of study to select

the best candidate solution for the project topic. Students also prepare the feasibility study for the

best candidate solution and go through all the initial planning phases to execute the project. Students

submit project two reports: midterm report and the final report which are reviewed by the supervisors

and two external committee members. At the end, students give oral presentation and a demo of all

the work done in the semester to award them the final grades. Students will be allowed to work

individually or in groups.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Create appropriate components to effectively manage a project

2. Write requirements specifications addressing the needs of a problem

3. Estimate required resources for successful completion of the task

4. Compose a design strategy to meet desired needs of the problem

5. Write technical reports to document project activities

6. Demonstrate oral presentation skills using critical and reflective thinking

7. Demonstrate the ability to acquire new skills and practice them in realizing a solution

8. Categorize professional, ethical, legal, and social implications related to a proposed system

9. Demonstrate the abilities to participate in team activities

10. Formulate appropriate team structure to timely achieve common goals

11. Asses alternative cybersecurity and digital forensics tools/techniques to select most suitable

one

12. Summarize the impact of data, software, component, connection, and system security in the

devised solution

13. Explain security risks pertaining to IT infrastructure for smooth operations

Page 88: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

88

14. Construct appropriate control mechanisms for effective risk management

0% Assignment(s) 10% Internal Assessment Report Grading

(assessment

strategies) 0% Lab 0% Project(s)

0% Mid-term (II) 30% Mid-term Report

30% Final Report 30% Project Presentation & Demo

Textbook:

No prescribed textbook. However, templates and handouts will be given in classes.

Reference Book:

1. Lynn E. Miner & Jeremy T. Miner , “Proposal Planning and Writing”, Greenwood Publishing

Group; ISBN-10: 0313356742 | ISBN-13: 978-0313356742 | Publication Date: July 30, 2008

| Edition: 4

2. David L. Olson, David Olson “Introduction to Information Systems Project Management”,

ISBN-10: 0072872705 | ISBN-13: 978-0072872705 | Publication Date: May 8, 2003 |

Edition: 2

3. Roger Pressman, “Software Engineering: A Practitioner’s Approach, McGraw-Hill, 7th

edition, Published 2010., ISBN-10: 0073375977, ISBN-13: 978-0-07-337597-7

4. Kathy Schwalbe, “Managing Information Technology Projects, Revised, International

Edition (7th edition)”, 2013, ISBN-13: 978-1133627227 ISBN-10: 1133627226.

Brief list of topics to be covered

Problem statement, Motivation and Literature study

Project Plan (SPMP)

Analyzing phase (System requirements) (SRS)

Initial design (SDS) & Final design

Page 89: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

89

42. CYS 502: Mobile and Wireless Security

Mobile and Wireless Security مبادئ نظم المعلوماتCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927321 CYS 502

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

CYS407: “Digital Evidence

Analysis” Prerequisite 9 Level

Course Description

The objective of this course is to familiarize students with the issues and technologies involved in

designing a secure wireless system which is robust against attacks. The course begins by covering

the basic concepts in building a network and highlight the differences between a wired and a wireless

network. It is reviewed the fundamental security mechanisms which follows the dedicated security

architectures for wireless networks. Later, the course discusses security in Wireless Local Area

Networks (WLANs), Wireless Ad Hoc Networks and Mobile Telecommunication Networks. The

course ends by providing some practical scenarios to protect a wireless network.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Outline ethical responsibilities and liabilities of practicing mobile security in the design of

wireless security projects

2. Categorize the influences of Mobile Security on the operations and functions of the entire

wireless communication

3. Apply contemporary tools and techniques to optimally design a secure wireless communication

system

4. Formulate a plan to timely achieve project goals

5. Demonstrate the abilities to participate in team activities

10% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

40% Final 5% Participation

Textbook:

1. Wolfgang Osterhage "Wireless Network Security: Second Edition", 2018

Reference Book:

1. Nguyen, Hoa Gia Bao "Wireless Network Security: A Guide for Small and Medium

Premises" 2018

Page 90: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

90

2. Ross Anderson "Security Engineering: A Guide to Building Dependable Distributed

Systems" 2nd Edition 2008

3. Ammar Yasir Korkusuz "Security in the GSM Network" 2012

Brief list of topics to be covered

- Overview of Wireless and Mobile Networks

- Fundamental Security Mechanisms

- Wi-Fi Security Dedicated Architectures

- Wi-Fi Security: Attacks on wireless networks, Security in the IEEE 802.11 standard

- Wi-Fi Security: Authentication in wireless networks, Layer 3 security mechanisms

- Wi-Fi Security: Security in 802.1x, Security i

- Security in Wireless Ad Hoc Networks: Attacks and Security Mechanisms

- Bluetooth Security

- Security in Mobile Telecommunication Networks: GSM, GPRS

Page 91: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

91

43. CYS 503: Secure Software Design and Engineering

تصميم وهندسة البرامج اآلمنةSecure Software Design and

Engineering

Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927322 CYS 503

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Program

None Prerequisite 9 Level

Course Description

The process of secure software designing require thorough understanding of security principles,

security standards and security considerations during the whole software development life cycle

(SDLC). As this process requires security considerations at each stage of SDLC, after introducing

the basic concepts related to software security design, it is discussed, what are the threats/risks at

each stage of the design and how they can be mitigated by adequate security mechanisms. Students

will be given various assignments at home to study and analyze case studies related to secure software

design.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Separate the problem of security of a software into clearly defined components with possible

interrelationships

2. Produce a complete set of a software requirements specification that focuses on security

requirements as formulated by a customer need

3. Choose the resources required by a secure software that benefit most efficiently the expected

level of security

4. Prepare the architecture of a secure software by clearly marking its components and

component interactions

5. Write misuse and mal-use cases for a multipurpose, commercially viable software

6. Design secure software following the principles of software security and security

considerations at each stage of software development life cycle

0% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) 20% Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

30% Final 5% Participation

Textbook:

1. OFFICIAL (ISC)2®, GUIDE TO THE CSSLP® CBK®, SECOND EDITION, 2014

2. John Musa D, “Software Reliability Engineering”, 2nd Edition, Tata McGraw-Hill, 2005

Page 92: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

92

3. Selected papers from annual conference: IEEE International Symposium on Software

Reliability Engineering

Reference Book:

1. Jan Jürjens, “Secure Systems Development with UML”, Springer; 2004

2. Jason Grembi, “Developing Secure Software”, CENGAGE Learning, 2008

3. Adam Shostack, “Threat Modeling-Designing for Security”, Wiley, 2014

4. Harvey Deitel, Abbey Deitel, “Internet and World Wide Web How to Program (Harvey &

Paul) Deitel & Associates” Publisher: Prentice Hall, 2012, 5/E, ISBN-10: 0132151006,

ISBN-13: 9780132151009

Brief list of topics to be covered

- Introduction to Secure Software Design.

- Secure Software - Standards /Policies

- Principles of Security and Quality

- Secure Software development process

- Secure Software Requirements

- Secure Software Design

- Secure Software Implementation and Coding

- Secure Software Testing

Page 93: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

93

44. CYS 506: Security threats and vulnerabilities

التهديدات األمنية ونقاط الضعفSecurity threats and

vulnerabilities

Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927323 CYS 506

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 10 Level

Course Description

This course focuses on threats and vulnerabilities in information security. Topics covered include

sources of threats, Network threats and vulnerabilities, hackers, malware, security assessment and

evaluation and countermeasures. Coverage on the foundational and technical components of

information security is included to reinforce key concepts. The course includes up-to-date

information on changes in the field, such as Side-channel attack mitigation and Anti-tamper

technologies.

Course Learning Outcome (CLOs)

On completion of this course, the student should be able to:

1. Demonstrate skills to learn emerging trends related to cybercrime, malware, and hostile

scripts.

2. Recognize ethical, legal and social issues pertaining to information security

3. Produce quality work to realize project goals

4. Schedule team activities to achieve project deliverables

5. Synthesize the impact of risks, threats and vulnerabilities to produce optimal strategy for

business continuity

10% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 20% Project(s)

Mid-term (II) 20% Mid-term (I)

40% Final Participation

Textbook:

1. Joseph M Kizza, Guide to Computer Network Security (Computer Communications and

Networks) 3rd Edition 2015

Reference Book:

1. William Stallings and Lawrie Brown, “Computer Security: Principles and Practice”, 3rd

Edition 2014.

2. Adam Shostack, “Threat Modeling: Designing for Security”, 2014.

Page 94: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

94

Brief list of topics to be covered

Concepts of Information Security

Vulnerability, threats, and attacks

Network security threats

Network security Vulnerabilities

Cybercrime and hackers

Hostile scripts

Malware, Virus and Content Filtering

Security Assessment. Analysis. and Assurance

Social Engineering: Types of social engineering attacks, Detection and mitigation of

social engineering attacks

Security Evaluations of Computer Products

Security control measures

Side-channel attack mitigation

Anti-tamper technologies

Page 95: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

95

45. CYS 507: Applied cryptography

Applied cryptography الترميز التطبيقيCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927324 CYS 507

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

CYS 402 Prerequisite 10 Level

Course Description

The goal of this course is to introduce modern cryptography in-depth for both theories and practical

implementations. This course emphasizes how cryptographic mechanisms can be effectively used

within larger security systems. Among the topics covered will be Symmetric and Asymmetric

cryptosystems (including DES/AES and RSA/Elliptic Curves), Steganography, cryptographic

hashing, digital signatures, pseudo-random generators, zero-knowledge proofs, message

authentication codes and block ciphers, and security against active attacks (chosen case studies). In

addition, the course introduces recent case studies related to applied cryptography.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Identify knowledge, essential concepts, methods, and technologies of cryptography

2. Analyze both Public and Private cryptography techniques along with the methods used to

attack such systems

3. Apply cryptographic techniques of encipherment, digital signature, hashing, and

steganography to various security designs

4. Demonstrate skills to present latest advances and computer-based solutions achievable in

the field of cryptography

5. Solve security problems related to confidentiality, integrity, and authenticity using modern

cryptographic techniques

6. Write reports on emerging concepts in cryptography

10% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 20% Project(s)

Mid-term (II) 20% Mid-term (I)

35% Final 5% Participation

Textbook:

Page 96: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

96

1. Jonathan Katz and Yehuda Lindell, Introduction to Modern Cryptography, Chapman & Hall

/ CRC, 2014, ISBN-13: 978-1466570269.

Reference Book:

2. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, New Delhi,

2006.

3. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons, New York, 2004.

4. W. Stallings, Cryptography and Network Security: Principles and Practice, 6th Edition,

Pearson Prentice Hall, 2014.

Brief list of topics to be covered

Introduction to classical cryptosystems

Perfectly Secret Encryption

Private-Key Encryption

Stream ciphers

Constructing CPA-Secure Encryption Schemes

padding attacks

Steganography

Message integrity and message authentication codes

Collision-Resistant

NMAC and HMAC

Hash Functions

Generic Attacks on Hash Functions

The Random-Oracle Model

Additional Applications of Hash Functions

Data Encryption Standard (DES, AED).

Practical Constructions of Symmetric-Key Primitives

Theoretical Constructions of Symmetric-Key Primitives

Public-Key (Asymmetric) Cryptography: RSA & Elliptic Curves (ECC).

CCA security.

Public Key Encryption from Trapdoor Permutations

Crypto pitfalls and case studies

Advanced Digital Signature Schemes

Case studies: Bitcoins and Block Chain.

Page 97: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

97

46. CYS 508: Project Implementation

Project Implementation تنفيذ مشروعCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927325 CYS 508

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

CYS 501 Project Proposal Prerequisite 10 Level

Course Description

Project implementation course offers students an opportunity to assemble their knowledge acquired

throughout their BS curriculum to realize a final project. This would require them to gather

information about the proposed subject and realize a final report as well as to develop a system

practically. At this stage, students must carry on all phases system development of the subject already

defined in the precedent course (Project Proposal), and under the supervision of the same supervisor

(as possible). At the end of the semester, grading will be obtained based on Final Report, Project

Demo and an Oral Presentation of the project to be held by a committee from faculty members

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Create appropriate components to effectively manage a project

2. Write requirements specifications addressing the needs of a problem

3. Estimate required resources for successful completion of the task

4. Compose a design strategy to meet desired needs of the problem

5. Construct a computer-based solution addressing design specifications

6. Design testcases to measure the effectiveness of the solution

7. Write technical reports to document project activities

8. Demonstrate oral presentation skills using critical and reflective thinking

9. Demonstrate the ability to acquire new skills and practice them in realizing a solution

10. Categorize professional, ethical, legal, and social implications related to a proposed system

11. Demonstrate the abilities to participate in team activities

12. Formulate appropriate team structure to timely achieve common goals

13. Asses alternative cybersecurity and digital forensics tools/techniques to select most suitable

one

14. Summarize the impact of data, software, component, connection, and system security in the

devised solution

15. Explain security risks pertaining to IT infrastructure for smooth operations

16. Construct appropriate control mechanisms for effective risk management

Page 98: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

98

0% Assignment(s) 0% Internal Assessment Report Grading

(assessment

strategies) 0% Lab 0% Project(s)

0% Mid-term (II) 10% Mid-term (I)

30% Final Report Participation

30% Continuous Progress (Bi-

Weekly)

10% Project Presentation 20% Project Demo

Textbook:

-No prescribed textbook. However, templates and handouts will be given in classes.

Reference Book:

1. Ian Sommerville “Software Engineering” 10th edition 2015 ISBN-13: 978-0133943030.

2. Kathy Schwalbe, “Managing Information Technology Projects, Revised, International Edition (7th

edition)”, 2013, ISBN-13: 978-1133627227.

3. IEEE 829 Standard for Test Plan

4. IEEE 1063 Standard for Software User Documentation

Brief list of topics to be covered

Implementation phase of the Project

Testing phase of the Project

End user deployment, preparing user manual and installation

Page 99: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

99

47. CIS 411: Database Management System

Database Management System تحليل وتحري نظام الملفاتCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 670256 CIS 411

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

CIS 321 Prerequisite 9 or 10 Level

Course Description

This course emphasizes on the principal concepts of Database Management Systems (DBMS). The

DBMS concepts include: Storing data: disks and files which include the memory hierarchy, RAID,

disk space management, buffer management, file and indexes, page formats and record formats; file

organization and indexes which introduce cost modeling, comparison of three file organizations,

overview of indexes and properties of indexes. Three-structured indexing, hash-based indexing and

database design security; transaction management which introduce to transactions and schedules,

concurrent execution of transaction, lock-based concurrency control and crash recovery. Crash

recovery includes introduction to ARIES, recovery from a system crash and media recovery. The

course also covers advanced topics such as: Parallel and distributed database including architectures

for parallel databases, parallel query evaluation and optimization, distributed DBMS architectures,

storing data in distributed DBMS, distributed catalog management and query processing, updating

distributed data, distributed transactions and concurrency and recovery. As part of this course,

students will be trained on some latest database management software.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Explain the concepts of records, record types, and files, as well as the different

techniques for placing file records on disk.

2. Give example(s) of the application of primary, secondary, and clustering indexes.

3. Evaluate simple strategies for executing a distributed query to select the strategy that

minimizes the amount of data transfer.

4. Demonstrate a substantial DBMS project as part of a team

5. Illustrate how DBMS deals with crash recovery.

6. Explain the techniques used for data fragmentation, replication, and allocation during

the distributed database design process.

Assignment(s) 15% Quiz(zes) Grading

(assessment

strategies) Lab 15% Project(s)

Mid-term (II) 25% Mid-term (I)

40% Final 5% Participation

Page 100: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

100

Textbook:

1. Elmasri, R. Navathe, B,” Fundamentals of Database Systems”, 6th Edition, 2010. ISBN

978-0136086208.

Reference Book:

10. Date, C. J., “Introduction Database Systems”. 8th ed ,2003. ISBN 9780321197849.

Brief list of topics to be covered

- Introduction DBMS

- SQL Query Language

- Storing Data

- File Organizations

- Dynamic/Extendible Hashed Files and RAID Technology

- Indexing Technique

- Transactions Processing

- Concurrency Control

- Database Recovery Protocols.

- Distributed Database.

- DBMS Security

Page 101: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

101

48. CYS 520: Digital Forensics for Legal Professionals

التحري الرقمي للمهنيين القانونيينDigital Forensics for Legal

Professionals

Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927326 CYS 520

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 9 or 10 Level

Course Description

This course explains how to determine what evidence to ask for, evidence that might be discoverable,

and furthermore, it provides an overview of the current state of digital forensics, the right way to

select a qualified expert, what to expect from that expert, and how to properly use experts before and

during trial. The course explains different types of digital evidence and examples of direct and cross

examination questions.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Apply professional excellence in conducting digital forensic investigations.

2. Discuss state of the art in theory and practice of digital forensics for legal professionals.

3. Analyze, professional and legal implications in digital forensics assignments and adhere to

professional code of conduct.

15% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

30% Final 10% Participation

Textbook:

1. Lars,D.Larry,D, “Digital Forensics for Legal Professionals: Understanding Digital Evidence”,

2012. ISBN 9781597496438

Reference Book:

1. Breeuwsma, M. de Jongh, C. Klaver, R. van der Knijff and M. Roeloffs, “Forensic data

recovery from flash memory, Small Scale Digital Device Forensics Journal”, vol. 1(1), 2007.

Brief list of topics to be covered

- The Foundations of Digital Forensics: Best Practices

- Digital Forensics at Work in the Legal System

- Digital Forensics Experts

- Discovery of Digital Evidence in Criminal and Civil Cases

- Obtaining Expert Funding in Indigent Cases

Page 102: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

102

49. CYS 520: Advanced Digital Investigation

Advanced Digital Investigation مواضيع متقدمة في التحري الرقميCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927328 CYS 522

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 9 or 10 Level

Course Description

This course exposes delegates to advanced concepts, skills and knowledge of undertaking

investigations in the digital space. The course explains how to apply an advanced investigative and

strategic mindset in considering and balancing the opportunities and benefits against the restrictions

and risks associated with each discipline of digital investigation and how they can operate and

compliment when intelligently cross referenced as part of an investigation strategy.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Demonstrate the skills to initiate and complete digital investigations by making use of latest

tools and techniques appropriate to the needs of the situation.

2. Compare contemporary computer-based techniques and tools to make an informed judgement

for a digital investigation task.

3. Show highest professional and ethical conduct while performing digital investigations.

10% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

40% Final 5% Participation

Textbook:

1. Eoghan,C, “Handbook of Digital Forensics and Investigation”, 1st Edition, 2015. ISBN

9780123742674

Reference Book:

1. Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, 3rd

Edition, 2015.

2. Brian,C. “File System Forensic Analysis, ISBN 321268172, Addison-Wesley Professional

Brief list of topics to be covered

- Basics of digital investigation

- Digital evidence

- The Digital space (advanced)

Page 103: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

103

- Investigative Methodology Introduction to Forensic Analysis

- Electronic Discovery Intrusion Investigation

- Data organization and acquisition

- Volume analysis -- PC and server partitions

- DOS, Apple and BSD partitions

- File system analysis-- FAT, NTFS and Ext2 & Ext3

- OSINT and The Deep Web

- The Dark Web

- Cryptocurrencies

- Understanding and working on Sleuth Kit (TSK), Autopsy etc.

- Emerging threats and future technology

Page 104: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

104

50. CYS 521: Advanced Computer Forensics

المتقدمةالتحقيقات الجنائية الحاسوبية Advanced Computer Forensics Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927327 CYS 521

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 9 or 10 Level

Course Description

This course focuses on providing advanced topics in computer forensics. It assists incident responders

with the required skills to investigate different types of threat. Besides explaining the forensics value

of Windows registries and system hives, it demonstrates Macintosh and Linux Boot process and file

system. It explains how to analyze and validate computer forensics. It discusses recovering graphic

files. Also, it focuses on mail and mobile devices.

Course Learning Outcome (CLOs)

At the end of the course students will be able to: 1. Demonstrate skills to identify, preserve and examine evidences in a digital forensic

investigation.

2. Analyze a large amount of digital evidence to find out most significant data in a forensic

analysis.

3. Develop a linkage between the scientific findings and legal implications while performing a

forensic operation.

15% Assignment(s) 15% Quiz(zes) Grading

(assessment

strategies) Lab 15% Project(s)

Mid-term (II) 25% Mid-term (I)

40% Final 5% Participation

Textbook:

2. Bill Nelson, Amelia Philips and Christopher Steuart, “ Guide to Computer Forensics and

Investigations”. 5th Edition, 2015. ISBN-13: 978-1285060033, ISBN-10: 1285060032

3. Harlan Carvy “Windows Registry Forensics: Advanced Digital Forensic Analysis of the

Windows Registry”. 1st Edition, 2011. ISBN-10: 978159749580, ISBN-13: 978-

1597495806

Reference Book:

None

Page 105: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

105

Brief list of topics to be covered

- Macintosh and Linux Boot Processes and File System

- Computer Forensics Analysis and Validation

- Recovering Graphic Files

- Cell Phone and Mobile Device Forensics

- Registry Analysis

- Processes and Tools

- Analyzing the system hives

- Email Investigation

- Expert Testimony in High-Tech Investigations

Page 106: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

106

51. CYS 523: Information Theory and Coding

Information Theory and Coding نظرية المعلومات والترميزCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927329 CYS 523

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 9 or 10 Level

Course Description

The aim of this course is to introduce the principles and applications of information theory. This

course covers the concept of amount of information, entropy, channel capacity, error-detection and

error-correction codes, block coding, convolutional coding, and Viterbi decoding algorithm.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Design lossless source codes for discrete memoryless source to improve the efficiency of

information transmission.

2. Define channel capacities and properties using Shannon's Theorems

3. Apply information theoretic results as fundamental limits on performance of communication

systems

4. Compare different design tools for multimedia information coding to select a suitable alternative.

15% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

30% Final 10% Participation

Textbook:

1. Monica, B, “Fundamentals in information Theory and Coding”, 1st Edition, 2011. ISBN

9780123742674

Reference Book:

1. Ranjan, B, “Information theory, coding and cryptography”, 2nd Edition, 2002. ISBN

9780070669017

2. Mehmet, S, “Digital Communications”, 2nd Edition, 2017, ISBN 9781119091264

Brief list of topics to be covered

- Information Theory, Source Coding

- Probability, Uncertainty, and Information

- Error-Control Coding

- Channel Capacity and Coding

- Cyclic Codes, Convolutional Codes

- Differential Entropy, Trellis Coded Modulation

Page 107: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

107

52. CYS 525: Introduction to Reverse Engineering

الشبكات معقدةمقدمة في Introduction to Reverse

Engineering

Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927331 CYS 525

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 9 or 10 Level

Course Description

The aim of this course is to obtain knowledge about engineering device or system. Applying reverse

engineering methodologies allow students to disassemble and re-assemble of the device, taking care

to document, test, analyze and report on the study of its function.

Course Learning Outcome (CLOs)

At the end of the course students will be able to: 1. Show an understanding of the operations and functions performed in Reverse Engineering process. 2. Apply reverse engineering approach to identify potential vulnerabilities in enterprise network

environment. 3. Describe the effectiveness of modern tools to conduct reverse engineering projects.

4. Discuss the trade-offs of different reverse engineering methodologies.

15% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

30% Final 10% Participation

Textbook:

1. Reverse Engineering for Beginners, By: Dennis Yurichev ©2013-2015

Reference Book:

1. Ulrich Drepper. What Every Programmer Should Know About Memory, any edition

2. Ulrich Drepper. “ELF Handling For Thread-Local Storage”. (2013)

Brief list of topics to be covered

- Introduction to Reverse Engineering

- Intro to Formal Methods & Software Engineering Methods

- Systems Analysis, - Rapid Prototyping

- Static Code Analysis

- Self-Defending Malware

- Dynamic Code Analysis

- Reverse Engineering Tools (System Monitors, Disassemblers, Debuggers)

Page 108: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

108

53. CYS 524: Cyber Warfare

Cyber Warfare الحرب السيبرانيةCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927330 CYS 524

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 9 or 10 Level

Course Description

The cyber domain is undergoing extraordinary changes that present both exceptional opportunities

to and major challenges for users of cyberspace. The course provides perspective on emerging policy,

doctrine, strategy, and operational constraints affecting the development of cyber warfare systems.

This course discusses the challenges arise from the malevolent actors who use cyberspace and the

many security vulnerabilities that plague this sphere. Students learn about cyber warfare for

management, exploiting opportunities and overcoming challenges that require a balanced body of

knowledge in the cyber domain.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Discuss essential concepts related to Cyber Security such as Cyber Espionage, legal Status of

Cyber War, Non-State Actors, Cyber warfare in 20th and 21st Century.

2. Evaluate alternative solution for safeguarding IT infrastructure against cyber-attacks.

3. Analyze Cyber warfare scenarios to design appropriate controls for organizational security.

Assignment(s) 15% Quiz(zes) Grading

(assessment

strategies) Lab 10% Project(s)

15% Mid-term (II) 15% Mid-term (I)

30% Final 15% Participation

Textbook:

Jeffrey, C. Lewis, S, “Inside Cyber Warfare: Mapping the Cyber Underworld”. 1st Edition,

2010. ISBN 9781449310042

Reference Book:

1. The Next World War: Computers Are the Weapons and the Front Line Is Everywhere by

James Adams

2. The Ashgate research companion to modern warfare By George Kassimeris, John D. Buckley

Brief list of topics to be covered

- Assessing the Problem Domain of Cyberspace.

- Unconventional War Around the World Stop Georgia Project.

- Legal Status of Cyber War Nuclear Non-proliferation Treaties.

Page 109: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

109

- Response to International Cyber Attack as Act of War the Legal Dilemma.

- Intelligence Component to Cyber War Korean DDoS Attack.

- Non-State Hacker and Social Web Case studies from around the world.

- Organized Crime in Cyberspace Atrivo/Intercage, ESTDomains, McColo

- Weapon zing Malware A New Threat Landscape.

- The Role of Cyber in Military Doctrine the Russian Federation.

Page 110: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

110

54. CYS 529: Ethical Hacking and Digital Forensics

األخالقي والتحري الرقمي االختراق Ethical Hacking and Digital

Forensics

Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 2 2 3 1 2 927335 CYS 529

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100 minutes in practical

laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 9 or 10 Level

Course Description

The aim of this course is to learn how to determine potential online criminal activity at its inception,

legally gather evidences, search and investigate wireless attacks. Students understand ethical

approaches of operating with technology to search out weaknesses of a system taking it to future level

for more development. The course discusses interactive setting wherever the students can learn the

aptitudes of activity vulnerability assessment, pen-testing of systems and networks, repairing the

weaknesses, creating reports of scanned vulnerabilities.

Course Learning Outcome (CLOs)

At the end of the course students will be able to: Analyze the activities required to compromise a target system during an ethical hacking attack.

Demonstrate systematic understanding of digital forensic process and its linkage with ethical hacking.

1. Classify tools and techniques to carry out a penetration testing.

15% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) 20% Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

30% Final 5% Participation

1. Stuart McClure, Joel Scambray and Goerge Kurtz, “Hacking Exposed Network Security

Secrets & Solutions”, Tata McGraw hill Publishers, 2012

Reference Book:

1. Android Forensics: Investigation, Analysis and Mobile Security for Google Android", by Andrew

Hoog,1597496529, 9781597496520, Elsevier, 2011 2012

Brief list of topics to be covered

- Casing the Establishment

- Securing Permission

- System Hacking

- Network Hacking

- Software Hacking

- Password Cracking

- Buffer Overflow

- Network Hacking

Page 111: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

111

55. CYS 526: Advanced Network Forensics and Analysis

تحري الشبكاتو تحليل في متقدمة مواضيع Advanced Network Forensics

and Analysis

Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927332 CYS 526

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 9 or 10 Level

Course Description

This course introduces the full spectrum of network evidence, traffic capture and analysis, network

log examination etc. Other topics include understanding and analyzing various logging mechanisms

available to both endpoint and network transport devices. The course helps students learning about

different types of devices that can be used to capture and process valuable evidence and at various

level with adequate details, and accurately report on their findings.

Course Learning Outcome (CLOs)

At the end of the course students will be able to: 1. Discuss advances concepts in network forensics.

2. Apply logging and aggregation to conduct network forensics analysis reports.

3. Compare theories, research issues and recent developments of network forensics literature.

15% Assignment(s) 15% Quiz(zes) Grading

(assessment

strategies) Lab Project(s)

Mid-term (II) 25% Mid-term (I)

40% Final 5% Participation

Textbook:

1. Daljit, J. “Advanced Computer and Network Security”. 2006. ISBN 9780977139934

Reference Book:

1. Sherri, D. Jonathan, H, “Network Forensics: Tracking Hackers through Cyberspace”. 1st

Edition, 2012. ISBN 9780132564717

Page 112: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

112

Brief list of topics to be covered

- Capture and analyze wireless traffic

- Network Forensic Process Flow

- Packet Capture Applications

- Components of network acquisition strategies

- High-level analysis tools and utilities

- Open-source tool sets to examine NetFlow data

- Topics in Wireless Network Forensics

- Intrusion Detection Systems

- Logging, - Aggregation, Reverse engineering in network Protocol

- Tools for large-scale analysis

- Collection risks and mitigations, Forensic Filtering, Network Analyzer, VoIP Call

Interception.

- Forensic Filtering, Network Analyzer, VoIP Call Interception.

- Reverse engineering in network Protocol

- Tools for large-scale analysis

Page 113: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

113

56. CYS 527: Selected Topics in Cyber Security & Digital Forensics

األمن السيبراني والتحري الرقمي في متقدمة مواضيع Selected Topics in Cyber

Security & Digital Forensics

Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927333 CYS 527

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 9 or 10 Level

Course Description

This course covers subjects of recent issues and trends in Cyber Security and Digital Forensics and

may be left to the willing of the instructor, and may cover but not limited to the following advanced

topics: new trends in the Web technology, distributed and mobile computing, cyber security, digital

forensics, and software engineering, etc. Students are assigned individual projects in these specific

fields: Project Reports and seminars, so to demonstrate their ability in research and oral

presentations. Projects are discussed in workgroups so to involve the whole class in these subjects.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Review emerging concepts in cyber security and digital forensics research.

2. Apply professional code of ethics while conducting digital forensic investigation.

3. Compare latest computer-based techniques for practically applying Cyber Security

methodologies in digital forensic activities.

15% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 20% Project(s)

Mid-term (II) 20% Mid-term (I)

30% Final 5% Participation

Textbook:

1. Due to nature of this course, text book will be recommended by the concerned teacher before

course begins.

Reference Book:

2. Nelson, B. Amelia, P. Chrisopher, S. “Guide to Computer Forensics and Investigation”. 3rd

Edition, 2014. ISBN 9781435498839

3. Luttgens, J. Matthew, P. Kevin, M. “Incident Response & Computer Forensics”. 3rd Edition,

2014. ISBN 9780071798686

Brief list of topics to be covered

- Latest attacks/threat happening in the domain cyber-crimes

- Test current infrastructure to investigate their it’s to stand against latest attacks

- Penetration testing case studies

Page 114: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

114

- Post evet analysis of the accidents

(Due to nature of this course, topics do vary every year as per department needs. Ramming topics

are being left to the concerned instructor.)

Page 115: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

115

57. CYS 528: Digital Media Forensics

Digital Media Forensics تحري الوسائط الرقميةCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927334 CYS 528

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 9 or 10 Level

Course Description

Digital media forensics is growing and is an ever-evolving field. This course focuses on providing

all the necessary knowledge for digital media forensics. It consists of collecting, preserving,

analyzing, and Investigating digital media evidences. In addition, It shades lights into how to analyze

and validate cloud forensics.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Describe the collection, preservation, and analysis of digital media.

2. Demosntrate the skills in preservation, and analysis of digital media.

3. Analyze the legal issues of data acquisition and duplication in digital media forensic assignments.

10% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

40% Final 5% Participation

Textbook:

1. Patrick, E. “The Basics of Hacking and Penetration Testing: Ethical Hacking and

Penetration Testing Made Easy”. 2nd Edition, 2013. ISBN 9781597496551

Reference Book:

1. Mechanisms, New Media and the Forensic Imagination, By Matthew G. Kirschenbaum

Brief list of topics to be covered

- Introduction/Legal Issues

- ISO standard (ISO 17025)

- Data Acquisition and duplication

- Forensic Investigations

- Methodologies, Digital Media, Boot Processes

- Windows Forensics, Linux Forensics

- Application Password Crackers

- Practicum discussion Investigating Wireless Attacks

- Blackberry Forensics

- iPod & iPhone Forensics & Android, - Cloud Forensic

Page 116: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

116

58. CYS 530: Biometric Security

Biometric Security األمن البيومتريCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927336 CYS 530

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 9 or 10 Level

Course Description

Biometrics has emerged from relatively specialized use in the criminal forensics’ domain to more

mainstream use for computer authentication, identification document security, and surveillance for

public safety. This emergence has been accompanied by an expansion in biometric modality from

mainly fingerprints to face, iris, hand, voice, and other novel biometrics. This course concentrates on

the unique advantages that biometrics brings to computer security, but also addresses challenging

issues such as security strength, recognition rates, and privacy, as well as alternatives of passwords

and smart cards. The course introduces biometric security-based systems or engines store human

body characteristics that do not change over an individual's lifetime. Additional topics include

biometric system design, performance evaluation, multimodal biometric systems, biometric system

security, and identity science technologies. By the end of the course students will be able to evaluate

and design security systems that include biometrics.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Apply secure mechanisms for biometric identification in IT security systems

2. Employ theoretical and scientific methods relevant for design, development and operation of

biometric access control systems.

3. Describe emerging concepts in Biological and Behavioral biometric security field.

10% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

40% Final 5% Participation

Textbook:

1. Ravi, D. “Biometric Technology: Authentication, Bio cryptography, and Cloud-Based

Architecture”, 2014. ISBN 9781466592452

Reference Book:

1. John Berger,” Biometrics for Network Security”, Prentice Hall, 2004.

2. Samir, N. Michel, T. Raj, N. “Biometrics -Identity verification in a network”, Wiley Eastern,

2002. Brief list of topics to be covered

- Introduction to Biometrics

Page 117: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

117

- Physiological Biometric Technologies

- Types of Biometrics (DNA Matching, Ear, Eyes - Iris Recognition, face, etc.)

- Security Architecture

- Behavioral Biometric Technologies

- Multi Biometrics

- Case studies on Physiological, Behavioral and Multifactor Biometrics in Identification

Systems

Page 118: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

118

59. CYS 531: Distributed System Security

Distributed System Security أمن النظم الموزعهCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927337 CYS531

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 9 or 10 Level

Course Description

This course presents an overview of distributed systems security issues, including threats, trends,

standards and solutions. Students understand threats and vulnerabilities in different layers namely the

host, infrastructure, application, and service layer to provide a holistic and practical, contemporary

view of enterprise architectures.

Course Learning Outcome (CLOs)

At the end of the course students will be able to: 1. Review distributed systems security appraoches in theory and practice.

2. Apply emerging techniques and methods in securing Distributed Systems paradigms.

3. Analyze a distributed system to identify security threats and design appropriate controls.

15% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

30% Final 10% Participation

Textbook:

1. Abhijit, B. Anirban, C. et al., “Distributed Systems Security: Issues. Processes and

solutions”. 1st Edition, 2009. ISBN 9780470751770

Reference Book:

1. Ruschitzka, M. Clevenger, J. “Heterogeneous data translations based on environment grammars,”

IEEE Transactions on Software Engineering, vol. 15, no. 10, pp. 1236-1251, 1989.

2. Rachid, G. Franck, P. “Stabilization, Safety, and Security of Distributed Systems”, 2010.

Brief list of topics to be covered

- Distributed Systems Security

- Security mechanisms

- Host-level Threats and Vulnerabilities

- Security Framework

- Testing on data in distributed systems

- Application-Level Threats and Vulnerabilities

- Host-Level Solutions

- Service-Level Solutions, Encryption Algorithms

Page 119: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

119

60. CYS 532: Multimedia Security

Multimedia Security أمن الوسائط المتعددةCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927338 CYS 532

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 9 or 10 Level

Course Description

The course provides students with a good working knowledge on the basic background relating to

multimedia security technologies for multimedia content currently available in the digital arena.

Students learn how to secure multimedia data by providing confidentiality, integrity, and identity or

ownership. The main topics include digital steganography and its counter-measure, stegnalysis,

watermarking and authentication, data encryption, network security and biometric identification.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Describe security constructs of multimedia systems.

2. Analyze algorithms, theories and tools developed in research and market of multimedia

security issues, including digital rights management, copyright protection, authenticity

verification, and mobile information assurance.

3. Review theories, research issues and recent developments of multimedia-based security

systems, such as video surveillance, biometric feature applications, and sensor networks.

10% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

40% Final 5% Participation

Textbook:

1. Zeng, W. Heather, Y. Ching-Yung, L. Multimedia security technologies for digital rights

management. 1st Edition, 2011. ISBN 9780123694768

Reference Book:

1. Shih, Frank Y. Digital watermarking and steganography: fundamentals and techniques. 1st

Edition, 2007. ISBN 9781420047578

Brief list of topics to be covered

- Overview-Multimedia systems, secured multimedia, digital rights management systems and technical

trends

- Multimedia encryption, Digital watermarking, Watermarking applications

- Frequency domain-based watermarking - Security attacks

- Video watermarking, Multimedia quality measurements

- Robustness error analysis, MATLAB applications, Biometric identification

Page 120: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

120

61. CYS 533: File System Forensic Analysis

File System Forensic Analysis تحليل وتحري نظام الملفاتCourse

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927339 CYS 533

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 9 or 10 Level

Course Description

This course provides a comparison of file systems, overview of volume analysis and why it’s

important. This course offers solid understanding of both the structures that make up different file

systems and how these structures work. Students learn analysis of data structures in a volume that are

used to store and retrieve files. The course also covers analysis of data structures partition and

assemble storage volumes.

Course Learning Outcome (CLOs)

At the end of the course students will be able to: 1. Compare different design tools for file system forenisc analysis to select a suitable alternative.

2. Apply state of the art forensic Analysis techniques in conducting file system forensic analysis.

3. Review File Systems and Forensic Analysis body of knowledge.

15% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

30% Final 10% Participation

Textbook:

1. Eoghan, C. “Malware Forensics: Investigating and Analyzing Malicious Code” 1st Edition,

2008. ISBN 9780080560199

Reference Book:

1. Brian, C. “File System Forensic Analysis”. 1st Edition, 2005. ISBN 0321268172

Brief list of topics to be covered

- Introduction to Digital Forensics.

- Creating a Forensic Boot Disk.

- File System Analysis, Hard disk Acquisition

- Partitions and volumes, Removable Media

- File System Analysis, OS-Specific Forensics

- Volume Analysis, Application Forensics

- Metadata, Password protected files.

- Data-hiding techniques, Recovering/identifying files, Working with browser

Page 121: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

121

62. CYS 534: Advanced Computer Networks

شبكات الكمبيوترمقدمة في Advanced Computer Networks Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927340 CYS 534

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 9 or 10 Level

Course Description

The aim of this course to cover principles, architectures, and protocols used in modern data center

networks. The course material in provide an understanding of large and complex networked systems.

Main topics include Quality of Service (QoS) and advanced routing algorithms, IPv6 and Mobile IP,

and Internet of Thinks (IoT).

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Discuss emerging concepts in network security.

2. Evaluate the computer network and information security needs of an organization.

3. Devise a strategy for continuous network monitoring and providing real-time security

solutions.

15% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 20% Project(s)

Mid-term (II) 20% Mid-term (I)

30% Final 5% Participation

Textbook:

1. James, F. Kurose, R. Keith, R. “Computer Networking: A Top-Down Approach”. 6th Edition,

2013.

Reference Book:

1. Peter, L.”IPv6: Theory, Protocol, Practice”. 2nd edition, 2004.

2. Eldad, P. Robert, S. “Next Generation Wireless LANs: 802.11n and 802.11ac”. 2nd edition, 2013.

Brief list of topics to be covered

- Advanced Routing algorithms

- Advanced Network Congestion Control algorithms

- Quality of service,

- Real Time Transport Protocol

- Wireless Networks, Adhoc Networks

- Mobile Networks, Wireless Sensor Networks (WSN)

- Internet of Thinks (IoT)

- Vehicular Adhoc Networks (VANET), IPv6, Mobile IP, Mobile TCP,IP

Page 122: COURSE CATALOG Bachelor of Science degree in …...7 CYS DEGREE PLAN The degree plan below shows the term wise (level) course distribution for the five-year study plan for a student

122

63. CYS 535: Introduction to Complex Networks

مقدمة في الشبكات معقدةIntroduction to Complex

Networks

Course

Name

Lab. Lec. Contact

Hours1

Tot. Lab. Lec. Credit

Units1

Course No Course

Code Course

Information 0 3 3 0 3 927341 CYS 535

1 Every unit equals minimum of 50 minutes in theory lecture or minimum 100

minutes in practical laboratory.

University Requirement College Requirement Program Requirement

Core Elective Track

Computer Science (CS)

Computer Information Systems (CIS)

Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Program

None Prerequisite 9 or 10 Level

Course Description

This course describes the backbone of complex systems, from computer communication, transport

infrastructures to online social systems. It will Cover algorithms for graph exploration, node ranking

and network generation, among others. It allows students to experiment with network models and

real-world data sets, providing them with a deep understanding of the basics of network theory and

its practical applications.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Discuss theories and research issues in security of complex networks.

2. Apply tools for recovering data from under investigation network resources.

3. Compare different network diagnostic techniques to select a suitable alternative.

15% Assignment(s) 10% Quiz(zes) Grading

(assessment

strategies) Lab 15% Project(s)

Mid-term (II) 20% Mid-term (I)

30% Final 10% Participation

Textbook:

1. Vito, L. Vincenzo,N. Giovanni, R. “Complex Networks Principles, Methods and

Applications”. 1st Edition, 2017. ISBN 9781108299961

Reference Book:

1. Ernesto, E. “The Structure of Complex Networks”. 1st Edition, 2011. ISBN 9780198783800

Brief list of topics to be covered - Graphs and graph theory

- Centrality measures

- Random graphs

- Small-world networks

- Generalized random graphs

- Models of growing graphs

- Degree correlations

- Cycles and motifs, Community structure

- Weighted networks