Bachelor of Cybersecurity
نظرة عامة على البرنامج
Program Overview
The Faculty of Computer Information Science (CIS) provides future-focused programs to prepare students for the dynamic information systems and technology sectors of the UAE. CIS graduates are 'T-shaped professionals' with industry-ready technical and managerial skills.
Program Description
The Bachelor of Information Technology program prepares students to respond to the needs of the workforce for knowledgeable and skilled IT professionals who can apply ethical values to complex and unpredictable problems and to plan, design, implement, evaluate and manage IT solutions.
Program Structure
The program is structured as a set of core, elective, general studies, and concentration courses. In the core courses, students will acquire the core knowledge, skills, and competencies needed for IT. Through the concentration courses, students will develop up-to-date knowledge and skills, in this fast-growing field to meet the industry requirement.
Concentrations
The program offers four concentrations:
- Applications Development
- Networking
- Security and Forensics
- Cloud Computing
Program Goals
The program aims to:
- Provide Information Technology professionals with the technical knowledge and skills required by the industry to design, develop, and maintain computer systems to the highest level of industry standards.
- Prepare graduates for a successful career as effective decision makers with strong communication and teamwork skills and an understanding of global, ethical, and social implications of the industry and Information Technology profession.
- Prepare graduates with technical and entrepreneurial leadership qualities, who support the development of innovative computing solutions in response to local, regional, or global challenges.
- Provide graduates with strong commitment to lifelong learning, continuing education, and professional growth.
Program Learning Outcomes
Graduates of the Bachelor of Information Technology program will be able to:
- Demonstrate an understanding of critical analysis, research systems and methods, and evaluative problem-solving techniques, showing familiarity with sources of current and new research in the field of computing.
- Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions.
- Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program's discipline.
- Communicate effectively in a variety of professional contexts.
- Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
- Function effectively as a member or leader of a team engaged in activities appropriate to the program's discipline.
Concentration-Specific Learning Outcomes
Each concentration has its specific program learning outcomes:
Applications Development Concentration
Graduates will be able to:
- Use systemic approaches to select, develop, apply, integrate, and administer computing technologies to accomplish user goals.
- Apply systemic approaches to secure applications per user requirements.
Networking Concentration
Graduates will be able to:
- Use systemic approaches to select, develop, apply, integrate, and administer secure computer networking technologies to accomplish user goals.
- Produce appropriate secure network infrastructure solutions to meet customer requirements at an enterprise level.
Security and Forensics Concentration
Graduates will be able to:
- Use systemic approaches to select, develop, apply, integrate, and administer secure computer networking technologies to accomplish user goals.
- Apply security principles and practices to maintain operations in the presence of risks and threats.
Cloud Computing Concentration
Graduates will be able to:
- Use systemic approaches to select, develop, apply, integrate, and administer secure computer networking technologies to accomplish user goals.
- Produce secure cloud-based infrastructure solutions to meet stakeholder requirements.
