- Overview
- Curriculum
- Registration Requirements
- Study period
- Fees
- Scholarships
- Graduation Requirements
- Dean
- College and Staff members
About the Institute
The aim of the Institute is to prepare technical experts in the field of computer networks, who have the ability to protect data and information from theft, snooping and hacking, as well as web design and protection.
It is a vital and renewable specialty, related to more than one specialization interactively. it is a modern science that needs continuous follow-up due to accelerated regeneration, it is also closely linked to several disciplines, including information encryption and documentation, and all related to network science and its technical aspects,
Which makes this science unique and renewed and deep, so that the graduate of this institute several skills, the most important of which is electronic security.
Vision
Leadership and excellence in teaching students the knowledge and skills required to work in network systems and information security.
Mission
To develop qualified professionals who have the ability to meet the needs of the labor market, public institutions and all sectors of science and technology (public, private and mixed) in the field of information security and network security through consultation, design and implementation in the field of computer networks and information technology.
Objectives
- Qualifying high-level technicians who have an understanding and knowledge that will enable them to protect and develop computer networks, with the follow-up of these technicians after graduation.
- Continuing updates of teaching methods to keep pace with the scientific development in line with the needs of the labor market by providing a suitable environment for theoretical and practical teaching, using the latest means and devices, adopting international quality standards and academic accreditation.
- Providing academic consultancy in the field of security and technology of computer networks and applications, especially in line with the support of the need and requirements of the market
Curriculum Components
Students studying for the Associate’s Degree in Cyber & Network Security Technology must successfully complete 71 credit hours distributed as follows:
Requirement Type | Total | |
University Requirements | Elective | 3 |
Obligatory | 3 | |
Faculty Requirements | Elective | 9 |
Obligatory | 12 | |
Department Requirements | Elective | 15 |
Obligatory | 29 | |
Total credits | 71 |
Requirement Type | Cr. Hours | Prerequisite | Course Code | Course Name | NO | |||
Required | Total | Practical | Theory | |||||
University | 3 | 3 | 0 | 3 | ـ | ENGL1001 | English - Expression and writing skills | 1 |
University | 3 | 3 | 0 | 3 | ـ | HUMA1001 | Islamic Culture* | 2 |
University | 3 | 0 | 3 | ـ | HUMA1002 | Human Culture | 3 | |
Faculty | 3 | 3 | 1 | 2 | ـ | MATH1001 | Calculus-1 | 4 |
Faculty | 3 | 3 | 1 | 2 | ـ | CIS1001 | Computer Architecture, Hardware & Software, IT Foundation | 5 |
Faculty | 3 | 3 | 1 | 2 | ـ | MATH1002 | Discrete Mathematics | 6 |
Faculty | 3 | 3 | 0 | 3 | ـ | ENGL2002 | English - Conversation skills | 7 |
Faculty | 9 | 3 | 0 | 3 | ـ | PSY1001 | Principles of Psychology* | 8 |
Faculty | 3 | 0 | 3 | ـ | BUS2004 | communication skills | 9 | |
Faculty | 3 | 1 | 2 | INST1102 - CIS1001 | CIS2311 | Data structure | 10 | |
Faculty | 3 | 0 | 3 | ـ | PUBH1001 | Public Health | 11 | |
Department | 3 | 3 | 1 | 2 | ـ | CIS1002 | Programming 1 (java1) | 12 |
Department | 3 | 3 | 1 | 2 | ـ | CIS1003 | Web Application Development-1 | 13 |
Department | 3 | 3 | 1 | 2 | ـ | CIS1004 | Introduction to Database | 14 |
Department | 3 | 3 | 1 | 2 | CIS1002 | INST1102 | Introduction to Scripting (Python) | 15 |
Department | 3 | 3 | 1 | 2 | ـ | INST1001 | Principle of Cyber and Information Security | 16 |
Department | 3 | 3 | 1 | 2 | CIS2105 | INST2207 | Window Client Server & Active Directory | 17 |
Department | 3 | 3 | 1 | 2 | CIS1001 | CIS2105 | Computer Networks 1 | 18 |
Department | 3 | 3 | 1 | 2 | INST1001 | INST2205 | Cloud and Mobile Network Security | 19 |
Department | 2 | 2 | 2 | 0 | 60% | INST21412 | Graduate Project | 20 |
Department | 3 | 3 | 1 | 2 | CIS2105 | CIS3217 | Wireless and Mobile Networks | 21 |
Department | 15 | 3 | 1 | 2 | CIS2105 | INST2204 | Linux Administration | 22 |
Department | 3 | 1 | 2 | CIS1002 | CIS2108 | Android Application | 23 | |
Department | 3 | 1 | 2 | CIS1001 | CIS2413 | Management Information Systems (PM) | 24 | |
Department | 3 | 1 | 2 | INST2205 - CIS3217 | INST2611 | Cryptography and Network Security | 25 | |
Department | 3 | 1 | 2 | INST1001 | INST2206 | Security Incident, Forensics and E-Hacking | 26 | |
Department | 3 | 1 | 2 | ـ | CIS2012 | Server Management | 27 | |
Department | 3 | 1 | 2 | CIS1001 | CIS3014 | Operating Systems | 28 | |
Department | 3 | 1 | 2 | CIS1001 | CIS2106 | Computer Structure | 29 | |
Department | 3 | 1 | 2 | INST1001 - CIS1003 | INST2309 | Web Security | 30 | |
Department | 3 | 1 | 2 | INST1001 - CIS2105 - CIS1002 | INST2410 | Ethical Hacker | 31 | |
Department | 3 | 1 | 2 | INST1001 - CIS1002 | INST2308 | Encryption and its applications | 32 | |
Department | 3 | 1 | 2 | ـ | INST2003 | Software Documentation | 33 | |
| 71 | Total Credit Hours |
| Elective |
| Obligatory |
Course Descriptions
1. English - Expression and writing skills:
This course is designed to prepare the student for English writing and it will focus on reading and writing as integrally related skills. Students will study and practice reading comprehension, the writing process, and critical thinking. Students will create clear and correct sentences as they develop the skills necessary to write a variety of focused, developed, organized paragraphs and/or short essays. Students will be responsible for writing multiple full-process paragraphs/essays. The course may include a departmental proficiency test or portfolio assessment.
2. Islamic culture:
The course deals with the concept of Islamic culture, its sources, its characteristics, the universe and man in Islam, the importance of Islamic legislation and its characteristics, legitimate transactions, social solidarity, work and production in Islam, workers' rights and duties. The position of Islam on contemporary natural issues, intellectual currents and the position of Islam.
3. Human culture:
This course aims to introduce the student to the concept of civilization and its importance, ancient civilizations, modern Islamic and European civilization, and to know the factors of its development and achievements, and the achievements achieved by these civilizations in all political, economic, social and scientific renaissance.
4. Calculus 1
This course is designed to develop the topics of differential and integral calculus. Emphasis is placed on limits, continuity, derivatives and integrals of algebraic and transcendental functions of one variable.
5. Computer Architecture, Hardware & Software, IT Foundation
6. Discrete Mathematics:
This course aims at introducing students to the logic that is used in computer science and the different techniques of mathematical proof such as the conclusion, the recognition of the logical logic of Boolean and the theories related to it;
Identification of integers and so-called computation calculations and their applications in coding operations, identification of binary relations, their representation and types including equivalence and order relationships.
7. English2 Conversation Skills:
The course content includes conversations, debates, and presentations on a wide range of concrete, abstract, and specialized topics. It is designed to enhance the speaking and listening skills of non-native English speakers. Emphasis is on pronunciation, stress, rhythm, and intonation patterns of American English. Oral communication, listening comprehension, and vocabulary development are stressed. Students build their skills through instruction and intensive practice
8. Principles of Psychology:
Surveys the major principles of psychology. Introduces the history of psychology, human development, personality, abnormal behavior, social psychology, feelings and emotions, research methodologies, experimental psychology, psychophysiology, learning and memory, altered states of awareness, sleep and dreams, and industrial and organizational psychology.
9. Communication skills:
Defining the concept of self, enabling the student to understand and self-knowledge, during this course student will study the fundamentals and theories of communication and the factors influencing the effectiveness of communication. In addition, how to develop communication skills of all types and focuses on the interaction of the individual with the group and the interaction of the individual to the environment.
10. Data structures:
This course aims to provide the basic concepts necessary for the design of data structures and algorithms suitable for solving software problems, evaluating their performance, the ability to analyze and characterize the algorithms designed and calculating their complexity, and knowledge of the appropriate data structures to solve the problems.
- Public Health:
This course provides a basic introduction to public health concepts and practice by examining the philosophy, purpose, history, organization, functions, tools, activities, and the results of public health practice at the national and local levels. The course aims to stimulate interactions among students around important problems and issues facing the health of the nation and the world.
12. Programming 1 (Java):
This course aims to introduce students in Java language, which is an object oriented programming language (OOP). This course introduces students to the components of this language, such as how to define the types of variables, sentences and functions, and then to learn what objects, rows, inheritance, packaging and abstraction are.
13. Web Application Development:
This course aims to introduce students to the basic concepts and techniques for application development within the computer network structure. In addition, focus on knowledge and skills to develop web applications on both client and server especially in the Internet environment. It also includes design and creation of interactive Web sites that provide access to databases. Other topics, including CSS, XML, AJAX, and Web Services are also presented.
14. Principles of databases:
This course aims to introduce students to the databases, how to analyze them, design, identify data types, link, transfer, secure and prepare backups. It also aims to define it in SQL and deal with it to generate queries.
15. Introduction to Scripting (Python):
This course aims to train students on Python programming language, how to define their variables, and deal with data and their ability to build software through them.
16. Principles of Cyber and Information Security:
The course aims at introducing students to all their financial resources in relation to information security, maintaining their integrity and confidentiality, and preventing illegal and illegal dealing, including legislation regulating their use and ethics.
17. Administration of WINDOWS SERVER:
Windows servers provide applications and services that manage a network. This course examines the implementation of these services in a networked environment, and teaches students how to install, configure, and manage common services such as such as Dynamic Host Configuration Protocol (DHCP), Domain Name Service (DNS), and file and print services.
- Computer Networks I:
This course explores key concepts and essential technologies of computer networks and broad range of topics in networking, including General overview:
Networks applications, Network classifications and topologies, Network layers, Channel performance measures, transmission media, Communication Network Protocols and architecture; Data link layer: framing, error detection and correction, CSMA/CD, LAN IEEE standards; Network layer: IP service model, IP Addressing, submitting, Host configuration DHCP, ARP Protocol, ICMP protocol; Transport layer:
UDP protocol, TCP protocol, TCP reliable transfer and sliding window, TCP flow and congestion control; Application layer: DNS protocol, NAT protocol, HTTP protocol, persistent and non-persistent HTTP connection
19. Cloud and Mobile Network security:
This course aims at identifying the policies, techniques and controls to protect the distributed data, applications and associated infrastructure of cloud and cellular networks, and examines the necessary duties in the field of data protection, identity management, physical security of devices and equipment, application and system security, availability of services and confidentiality of data.
20. Graduate Project :
Students will have the opportunity to apply their theoretical knowledge to solve real problems.
21. Wireless Networks:
This course aims to provide students with a general knowledge of wireless networks and systems and their technologies, the basic knowledge needed to understand wireless data transmissions, the principle of sharing frequency between radio stations, the most prevalent wireless services and trends in the wireless industry market, such as WPAN, WWAN, WLAN 802.11 and infrared technology and Bluetooth and some modern technology.
22. Linux administration:
The course covers such topics as the Linux/UNIX file system, commands, utilities, text editing, shell programming and text processing utilities. Students learn command line syntax and features of the popular Linux/UNIX shells, including filename generation, redirection, pipes and quoting mechanisms. Labs include user and group maintenance, system backups and restoration, software management, administration tasks automation, file system creation and maintenance, managing remote access, working with cron, and configuring basic file sharing and Web services, as well as working with system logging utilities such as syslog and much more.
- Android Application:
This course provides an introduction to the concepts associated with mobile technologies. Current mobile technologies are compared and contrasted. Topics include architecture, design, development, and deployment of mobile applications in order to introduce students to the fundamentals of mobile technologies and applications. It also provides an introduction to the Android Software Development Kit (SDK).
24. Management Information Systems (PM):
The purpose of this course is to familiarize students with the skills of preparing and implementing plans related to the development of electronic systems such as collection, purification, preservation and tabulation of data, and then disseminating and providing them to interested parties, researchers and experts as information. Information systems focus on a larger conception than a programming process where programming levels are reduced. Instead of focusing on how organizations can help their businesses do business, students learn equally about project programming, project management and business management.
25. Cryptography and Network Security
This course will provide students with general Cyber and network security concepts and implementation. Students will learn about general security concepts involved in maintaining a secure computer-networking environment. Additionally, students will be introduced to a variety of security methodologies as well as technologies and concepts used for implementing a secure network environment. Upon successful completion, students will be able to apply general security concepts involved in maintaining a secure computer-networking environment.
26. Security Incident, Forensics and E-Hacking:
Introduces computer security administrators to computer forensics. Includes setup and use of an investigator's laboratory, computer investigations using digital evidence controls, processing crime and incident scenes, performing data acquisition, computer forensic analysis, e-mail investigations, image file recovery, investigative report writing, and expert witness testimony.
27. Server Management
This course will explain to students the important problem solving techniques, including installation, processing, server development, preventive maintenance, problem solving, and disaster recovery to recover lost information.
- Operating System:
Definition and role of the operating systems; history of operating systems and development; functionality and structuring methods of a typical operating system. Concepts of a process vs. the concept of a thread; scheduling and dispatching and context switching; concurrent execution: the "mutual exclusion" problem and some solutions. Deadlocks: causes, conditions, methods for resolution. Memory management; virtual memory management. I/O management; files: data, metadata, operations, buffering, sequential, non-consequential. Weekly practice in the lab.
- Computer Structure
- Web Security
31. Ethical Hacking CEH:
The purpose of this course is to protect and secure networks and information. It aims at introducing the student to how to hack any system such as Hacking wired and wireless networks, Hacking devices, web applications and websites, advanced Hacking using loopholes and exploits, and some simple exploiting software.
32. Encryption and its applications:
This course aims at understanding the basics of information encryption and how to use these techniques to achieve three objectives: Confidentiality, Data Integrity, and Caller ID. Identify the symmetric encryption methods of the traditional key that have appeared and used in the past.
33. Software Documentation:
This course aims at providing the student with knowledge of the documentation of the source code which are explanatory texts explaining how the program works or how it is used. It deals with a number of topics including: documenting the requirements such as defining the characteristics and system standards, documenting the structure as a description of the relations between the software environment and building principles, Software development, manuals for software users, documentation of how to market a software product and analyze market requirements.
- Obtaining a Scientific Secondary Certificate with 55% of total scores, an Industrial Secondary Certificate with 65% of total scores, or a communication Secondary Certificate with 60% of total scores
- Provide original document of secondary certificate and required certified
copies.
- A copy of personnel identification or identity registration)
- A receipt of Registration and participation with the trade-off (value of $ 2 price of documents, stamp)
- Registration Form
4 semesters
Registration
$50.00
Academic
$300.00
Scholarships awarded for academic fees /year 2018-2019 as follows:
- $ 150 for all students.
- 20% on the $225 fee for students whom their brothers and couples are hired at IRU.
- $ 125 for students obtained an approval document from the local councils.
- Free of fees for forced displacement. children of martyrs, detainees and their spouses, special needs, and the injured who can’ t work
Minimum score for passing the course is 60%.
- The cumulative graduate average points (AGPA) of all courses should be ≥ 2 points
- The student must study a number of credit hours ≥ 71
- Dr. Yasser Alyousef
- Dr. Yasser Alyousef
- Shohada Ibrahim
- Abdalmohaymen Ismail
- Wassem Alrasheed
- Mahmoud Alsaleh
- Ammar Alsheekh Ali