•   Overview
  •   Curriculum
  •   Registration Requirements
  •   Study period
  •   Fees
  •   Scholarships
  •   Graduation Requirements
  •   Dean
  •   College and Staff members

About the Institute

The aim of the Institute is to prepare technical experts in the field of computer networks, who have the ability to protect data and information from theft, snooping and hacking, as well as web design and protection.

It is a vital and renewable specialty, related to more than one specialization interactively. it is a modern science that needs continuous follow-up due to accelerated regeneration, it is also closely linked to several disciplines, including information encryption and documentation, and all related to network science and its technical aspects,

Which makes this science unique and renewed and deep, so that the graduate of this institute several skills, the most important of which is electronic security.

Vision

Leadership and excellence in teaching students the knowledge and skills required to work in network systems and information security.

Mission

To develop qualified professionals who have the ability to meet the needs of the labor market, public institutions and all sectors of science and technology (public, private and mixed) in the field of information security and network security through consultation, design and implementation in the field of computer networks and information technology.

Objectives

  1. Qualifying high-level technicians who have an understanding and knowledge that will enable them to protect and develop computer networks, with the follow-up of these technicians after graduation.
  2. Continuing updates of teaching methods to keep pace with the scientific development in line with the needs of the labor market by providing a suitable environment for theoretical and practical teaching, using the latest means and devices, adopting international quality standards and academic accreditation.
  3. Providing academic consultancy in the field of security and technology of computer networks and applications, especially in line with the support of the need and requirements of the market

Curriculum Components

Students studying for the Associate’s Degree in Cyber & Network Security Technology must successfully complete 71 credit hours distributed as follows:

 

 

Requirement Type

Total

University Requirements

Elective

3

Obligatory

3

Faculty Requirements

Elective

9

Obligatory

12

Department  Requirements

Elective

15

Obligatory

29

Total credits

71

 

 

 

 

Requirement Type

Cr. Hours

Prerequisite

Course Code

Course Name

NO

Required

Total

Practical

Theory

University

3

3

0

3

ـ

ENGL1001

English - Expression and writing skills

1

University

3

3

0

3

ـ

HUMA1001

Islamic Culture*

2

University

3

0

3

ـ

HUMA1002

Human Culture

3

Faculty

3

3

1

2

ـ

MATH1001

Calculus-1

4

Faculty

3

3

1

2

ـ

CIS1001

Computer Architecture, Hardware & Software, IT Foundation

5

Faculty

3

3

1

2

ـ

MATH1002

Discrete Mathematics

6

Faculty

3

3

0

3

ـ

ENGL2002

English - Conversation skills

7

Faculty

9

3

0

3

ـ

PSY1001

Principles of Psychology*

8

Faculty

3

0

3

ـ

BUS2004

communication skills

9

Faculty

3

1

2

INST1102 - CIS1001

CIS2311

Data structure

10

Faculty

3

0

3

ـ

PUBH1001

Public Health

11

Department

3

3

1

2

ـ

CIS1002

Programming 1 (java1)

12

Department

3

3

1

2

ـ

CIS1003

Web Application Development-1

13

Department

3

3

1

2

ـ

CIS1004

Introduction to Database

14

Department

3

3

1

2

CIS1002

INST1102

Introduction to Scripting (Python)

15

Department

3

3

1

2

ـ

INST1001

Principle of Cyber and Information Security

16

Department

3

3

1

2

CIS2105

INST2207

Window Client Server & Active Directory

17

Department

3

3

1

2

CIS1001

CIS2105

Computer Networks 1

18

Department

3

3

1

2

INST1001

INST2205

Cloud and Mobile Network Security

19

Department

2

2

2

0

60%

INST21412

Graduate Project

20

Department

3

3

1

2

CIS2105

CIS3217

Wireless and Mobile Networks

21

Department

15

3

1

2

CIS2105

INST2204

Linux Administration 

22

Department

3

1

2

CIS1002

CIS2108

Android Application

23

Department

3

1

2

CIS1001

CIS2413

Management Information Systems (PM)

24

Department

3

1

2

INST2205 - CIS3217

INST2611

Cryptography and Network Security

25

Department

3

1

2

INST1001

INST2206

Security Incident, Forensics and E-Hacking

26

Department

3

1

2

ـ

CIS2012

Server Management

27

Department

3

1

2

CIS1001

CIS3014

Operating Systems

28

Department

3

1

2

CIS1001

CIS2106

Computer Structure

29

Department

3

1

2

INST1001 - CIS1003

INST2309

Web Security

30

Department

3

1

2

INST1001 - CIS2105 - CIS1002

INST2410

Ethical Hacker

31

Department

3

1

2

INST1001 - CIS1002

INST2308

Encryption and its applications

32

Department

3

1

2

ـ

INST2003

Software Documentation

33

 

71

Total Credit Hours

 

 

Elective

 

Obligatory

 

Course Descriptions

1.    English - Expression and writing skills:

This course is designed to prepare the student for English writing and it will focus on reading and writing as integrally related skills. Students will study and practice reading comprehension, the writing process, and critical thinking. Students will create clear and correct sentences as they develop the skills necessary to write a variety of focused, developed, organized paragraphs and/or short essays. Students will be responsible for writing multiple full-process paragraphs/essays. The course may include a departmental proficiency test or portfolio assessment.

2.    Islamic culture:

The course deals with the concept of Islamic culture, its sources, its characteristics, the universe and man in Islam, the importance of Islamic legislation and its characteristics, legitimate transactions, social solidarity, work and production in Islam, workers' rights and duties. The position of Islam on contemporary natural issues, intellectual currents and the position of Islam.

3.    Human culture:

This course aims to introduce the student to the concept of civilization and its importance, ancient civilizations, modern Islamic and European civilization, and to know the factors of its development and achievements, and the achievements achieved by these civilizations in all political, economic, social and scientific renaissance.

4.    Calculus 1

This course is designed to develop the topics of differential and integral calculus. Emphasis is placed on limits, continuity, derivatives and integrals of algebraic and transcendental functions of one variable.

5.    Computer Architecture, Hardware & Software, IT Foundation

6.    Discrete Mathematics:

This course aims at introducing students to the logic that is used in computer science and the different techniques of mathematical proof such as the conclusion, the recognition of the logical logic of Boolean and the theories related to it;

Identification of integers and so-called computation calculations and their applications in coding operations, identification of binary relations, their representation and types including equivalence and order relationships.

7.    English2 Conversation Skills:

The course content includes conversations, debates, and presentations on a wide range of concrete, abstract, and specialized topics. It is designed to enhance the speaking and listening skills of non-native English speakers. Emphasis is on pronunciation, stress, rhythm, and intonation patterns of American English. Oral communication, listening comprehension, and vocabulary development are stressed. Students build their skills through instruction and intensive practice

8.    Principles of Psychology:

Surveys the major principles of psychology. Introduces the history of psychology, human development, personality, abnormal behavior, social psychology, feelings and emotions, research methodologies, experimental psychology, psychophysiology, learning and memory, altered states of awareness, sleep and dreams, and industrial and organizational psychology.

9.    Communication skills:

Defining the concept of self, enabling the student to understand and self-knowledge, during this course student will study the fundamentals and theories of communication and the factors influencing the effectiveness of communication. In addition, how to develop communication skills of all types and focuses on the interaction of the individual with the group and the interaction of the individual to the environment.

10.    Data structures:

This course aims to provide the basic concepts necessary for the design of data structures and algorithms suitable for solving software problems, evaluating their performance, the ability to analyze and characterize the algorithms designed and calculating their complexity, and knowledge of the appropriate data structures to solve the problems.

  1. Public Health:

This course provides a basic introduction to public health concepts and practice by examining the philosophy, purpose, history, organization, functions, tools, activities, and the results of public health practice at the national and local levels. The course aims to stimulate interactions among students around important problems and issues facing the health of the nation and the world.

12.    Programming 1 (Java):

This course aims to introduce students in Java language, which is an object oriented programming language (OOP). This course introduces students to the components of this language, such as how to define the types of variables, sentences and functions, and then to learn what objects, rows, inheritance, packaging and abstraction are.

13.    Web Application Development:

This course aims to introduce students to the basic concepts and techniques for application development within the computer network structure. In addition, focus on knowledge and skills to develop web applications on both client and server especially in the Internet environment. It also includes design and creation of interactive Web sites that provide access to databases. Other topics, including CSS, XML, AJAX, and Web Services are also presented.

14.    Principles of databases:

This course aims to introduce students to the databases, how to analyze them, design, identify data types, link, transfer, secure and prepare backups. It also aims to define it in SQL and deal with it to generate queries.

15.     Introduction to Scripting (Python):

This course aims to train students on Python programming language, how to define their variables, and deal with data and their ability to build software through them.

16.     Principles of Cyber and Information Security:

The course aims at introducing students to all their financial resources in relation to information security, maintaining their integrity and confidentiality, and preventing illegal and illegal dealing, including legislation regulating their use and ethics.

17.    Administration of WINDOWS SERVER:

Windows servers provide applications and services that manage a network. This course examines the implementation of these services in a networked environment, and teaches students how to install, configure, and manage common services such as such as Dynamic Host Configuration Protocol (DHCP), Domain Name Service (DNS), and file and print services.

  1. Computer Networks I:

This course explores key concepts and essential technologies of computer networks and broad range of topics in networking, including General overview:

Networks applications, Network classifications and topologies, Network layers, Channel performance measures, transmission media, Communication Network Protocols and architecture; Data link layer: framing, error detection and correction, CSMA/CD, LAN IEEE standards; Network layer: IP service model, IP Addressing, submitting, Host configuration DHCP, ARP Protocol, ICMP protocol; Transport layer:

UDP protocol, TCP protocol, TCP reliable transfer and sliding window, TCP flow and congestion control; Application layer: DNS protocol, NAT protocol, HTTP protocol, persistent and non-persistent HTTP connection

19.                       Cloud and Mobile Network security:

This course aims at identifying the policies, techniques and controls to protect the distributed data, applications and associated infrastructure of cloud and cellular networks, and examines the necessary duties in the field of data protection, identity management, physical security of devices and equipment, application and system security, availability of services and confidentiality of data.

20.    Graduate Project :

Students will have the opportunity to apply their theoretical knowledge to solve real problems.

21.    Wireless Networks:

This course aims to provide students with a general knowledge of wireless networks and systems and their technologies, the basic knowledge needed to understand wireless data transmissions, the principle of sharing frequency between radio stations, the most prevalent wireless services and trends in the wireless industry market, such as WPAN, WWAN, WLAN 802.11 and infrared technology and Bluetooth and some modern technology.

22.    Linux administration:

The course covers such topics as the Linux/UNIX file system, commands, utilities, text editing, shell programming and text processing utilities. Students learn command line syntax and features of the popular Linux/UNIX shells, including filename generation, redirection, pipes and quoting mechanisms. Labs include user and group maintenance, system backups and restoration, software management, administration tasks automation, file system creation and maintenance, managing remote access, working with cron, and configuring basic file sharing and Web services, as well as working with system logging utilities such as syslog and much more.

  1. Android Application:

This course provides an introduction to the concepts associated with mobile technologies. Current mobile technologies are compared and contrasted. Topics include architecture, design, development, and deployment of mobile applications in order to introduce students to the fundamentals of mobile technologies and applications. It also provides an introduction to the Android Software Development Kit (SDK). 

24.                       Management Information Systems (PM):

The purpose of this course is to familiarize students with the skills of preparing and implementing plans related to the development of electronic systems such as collection, purification, preservation and tabulation of data, and then disseminating and providing them to interested parties, researchers and experts as information. Information systems focus on a larger conception than a programming process where programming levels are reduced. Instead of focusing on how organizations can help their businesses do business, students learn equally about project programming, project management and business management.

25.           Cryptography and Network Security

This course will provide students with general Cyber and  network security concepts and implementation. Students will learn about general security concepts involved in maintaining a secure computer-networking environment. Additionally, students will be introduced to a variety of security methodologies as well as technologies and concepts used for implementing a secure network environment.  Upon successful completion, students will be able to apply general security concepts involved in maintaining a secure computer-networking environment.

26.   Security Incident, Forensics and E-Hacking:

Introduces computer security administrators to computer forensics. Includes setup and use of an investigator's laboratory, computer investigations using digital evidence controls, processing crime and incident scenes, performing data acquisition, computer forensic analysis, e-mail investigations, image file recovery, investigative report writing, and expert witness testimony.

27.   Server Management

This course will explain to students the important problem solving techniques, including installation, processing, server development, preventive maintenance, problem solving, and disaster recovery to recover lost information.

  1. Operating System:

Definition and role of the operating systems; history of operating systems and development; functionality and structuring methods of a typical operating system. Concepts of a process vs. the concept of a thread; scheduling and dispatching and context switching; concurrent execution: the "mutual exclusion" problem and some solutions. Deadlocks: causes, conditions, methods for resolution. Memory management; virtual memory management. I/O management; files: data, metadata, operations, buffering, sequential, non-consequential. Weekly practice in the lab.

  1. Computer Structure
  1. Web Security

31.                       Ethical Hacking CEH:

The purpose of this course is to protect and secure networks and information. It aims at introducing the student to how to hack any system such as Hacking wired and wireless networks, Hacking devices, web applications and websites, advanced Hacking using loopholes and exploits, and some simple exploiting software.

32.                       Encryption and its applications:            

This course aims at understanding the basics of information encryption and how to use these techniques to achieve three objectives: Confidentiality, Data Integrity, and Caller ID. Identify the symmetric encryption methods of the traditional key that have appeared and used in the past.

33.                       Software Documentation:                  

This course aims at providing the student with knowledge of the documentation of the source code which are explanatory texts explaining how the program works or how it is used. It deals with a number of topics including: documenting the requirements such as defining the characteristics and system standards, documenting the structure as a description of the relations between the software environment and building principles, Software development, manuals for software users, documentation of how to market a software product and analyze market requirements.

- Obtaining a Scientific Secondary Certificate with 55% of total scores, an Industrial Secondary Certificate with 65% of total scores, or a communication Secondary Certificate with 60% of total scores

- Provide original document of secondary certificate and required certified

  copies.

- A copy of personnel identification or identity registration)

- A receipt of Registration and participation with the trade-off (value of  $ 2 price of documents, stamp)

- Registration Form

4 semesters

Registration

 $50.00

Academic

$300.00

Scholarships awarded for academic fees /year 2018-2019 as follows:

- $ 150 for all students.

- 20% on the $225 fee for students whom their brothers and couples are hired at IRU.

- $ 125 for students obtained an approval document from the local councils.

- Free of fees for forced displacement. children of martyrs, detainees and their spouses, special needs, and the injured who can’ t work

Minimum score for passing the course is 60%.

- The cumulative graduate  average  points (AGPA) of all courses should be ≥ 2  points

- The student must study a number of credit hours ≥ 71

  • Dr. Yasser Alyousef
  • Dr. Yasser Alyousef
  • Shohada Ibrahim
  • Abdalmohaymen Ismail
  • Wassem Alrasheed
  • Mahmoud Alsaleh
  • Ammar Alsheekh Ali