You may be trying to access this site from a secured browser on the server. Please enable scripts and reload this page.
Turn on more accessible mode
Turn off more accessible mode
Skip Ribbon Commands
Skip to main content
Turn off Animations
Turn on Animations
Faculty of Information Technology
Data Science & Artificial Intelligence
Innovation and Entrepreneurship Center
Virtual and Augmented Reality
Quick Navigation »
About UOP +
Vision, Mission, Objectives & Values
Board of Trustees
The Chancellor of the University and the Board of Trustees
Centers and Units
Departments and Offices
Vice President's Office
Global Partnerships & Relations
Faculty of Information Technology
Faculty of Architecture & Design
Faculty of Administrative & Financial Sciences
Facultyof Arts & Sciences
Faculy of Law
Faculty of Pharmacy & Medical Sciences
Faculty of Mass Communication
Faculty of Engineering
Majors' Tuition & Fees
New Students Registration
Graduate Studies Board
Office of External Funding for Research Projects (OFFER)
Human Resources +
Electronic Library and Databases
A Bridge Towards Knowledge
Faculty of Information Technology
This course serves as the introduction to cryptography. The focus is on definitions, theoretical foundations, and rigorous proofs of security. Topics covered: classical cryptography and its limitations, define a notion of perfect security, an introduction to computational security, number theory and computational hardness, deterministic
testing and computational hardness, one-way functions from number theory, pseudorandom generators (PRGs) and pseudorandom functions (PRFs) and their uses, private-key encryption and PRFs, message authentication codes, perfect message authentication, algorithmic number theory, public-key encryption (PKE), Diffie-Hellman problems, the El Gamal encryption scheme, hybrid encryption, trapdoor permutations and PKE, signature schemes, signature schemes for multiple messages, and any advance and new topics in cryptography.
Prerequisite: Dept. Approval
This course provides the ability to practice on using computer tools and applications in various fields, either in a public or private sectors under the supervision of the department members. The purpose of the supervised field training experiences is for students to synthesize the knowledge and skills developed during the academic portion of the program in a practical setting. Field training is both a learning experience for students and contributes to the work undertaken by the field training site. The expectation is that the field training will provide learning opportunities unavailable in a classroom setting.
Digital Forensic Investigation
Evaluate The Principles of Digital Forensic Analysis and Appreciate Where and How These Principles Should Be Applied; Critically Discuss the Nature of Digital Evidence and The Interpretations of That Evidence Obtained from Computer Forensics Investigations; Evaluate The Legal and Procedural Issues and Be Aware of the Documentary and Evidentiary Standards; Understanding the Digital Forensics Techniques : Data Acquisition, Working with Windows and CLI Systems, Current Digital Forensics Tools, Recovering Graphics Files, Email and Social Media Investigations, Mobile Device Forensics, Cloud Forensics.
605440 Information Security Protocols Investigation
This course discusses the Information Security Protocols within Internet Protocol (IP) Suite. Topics covered: protocol principles and architecture; Secure File Transfer Protocol (SFTP), Secure Hypertext Transfer Protocol (HTTPS), digital signatures, IP security, secure socket layer (SSL), intrusion detection, authentication, firewalls, denial of service (DoS), spam, email viruses, and phishing.
Secured e-Transactions Environment
This course introduces the four essential elements of safe e-Commerce: the data transaction, the server, the client, and the host network. Topics covered: encryption, firewalls, transaction security, securing Web commerce, and Web security risk management. Theoretical and practical foundation in the field of information security, E-Commerce and the Internet needed to better design, develop and manage E-Commerce resources. Define and describe the infrastructure components of E-Commerce, identify and describe the risks and vulnerabilities of E-Commerce.
2 Database security
602281 + 605342
This course introduces the security challenges and threats in database systems and provide an understanding of the state-of-the art security technologies. In addition to the security issues, the course addresses issues related to distributed databases and current technologies, such as service-oriented architecture. Access control in relational databases
grant/revoke model; cascading and non-cascading revoke; timestamp-based revoke
security by views; query modification; Oracle VPD; Truman and non-Truman models
auditing in databases; information warfare in databases; multi-level database security.
Ethical Hacking and Intrusion Detection & Prevention
This course will use hacking techniques used by malicious, black hat hackers as a means to learn best defense from these same hackers. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization.
Students will learn about the entire penetration testing process including planning, reconnaissance, scanning, exploitation, post-exploitation, and result reporting.
Prerequisite: 602302 +
This course gives the students the chance to demonstrate their intellectual, technical and creative abilities through developing a project in one of information technology fields. The Graduation Project challenges students to go beyond the learning that occurs as the result of their prescribed educational program. Students shall complete their projects in areas of concentrated study under the direction and supervision of faculty members. The projects will demonstrate the students' ability to: apply, analyze, synthesize, evaluate information, and communicate significant knowledge and comprehension.
Security of Mobile & Wireless Networks
This course focuses on aspects of information and network security that arise in this challenging and ever-evolving space of mobile and wireless networks, primarily focusing on smart phones and mobile telecommunication systems, aspects of mobile ad hoc networks (MANETs), and sensor networks. Topics covered includes: security standards, network security vulnerabilities; smart phone security; mobile Internet security; mobile location privacy; and ad hoc, mesh, and sensor network security.
Selected Topics in Information Security
Prerequisite: Dept. Approval
This course provides topics that are selected by instructors according to the interest of the department and students and cover the novel areas in current advancements in various information technology fields. Suggested topics includes: advance-programming languages not included in the degree plan, advance topics in networks, advance topics in database, management information system, advanced topics in internet and web, case study in different areas.
Biometrics is capturing and using physiological and behavioral characteristics for personal identification. It is set to become the successor to the PIN. This course will introduce computational methods for the implementation of various biometric technologies including face and voice recognition, fingerprint, iris identification and DNA matching.
Secure Business Architecture
The high-level goal of this course is to discuss the appropriate system design and business responsiveness to technical/architectural decisions which impact the organization’s information security.
Information Security Management
This course examines the fundamental principles of computer security as applied to information technology. The course covers foundations, prevention, detection, human factors, technical considerations, management processes, future considerations for the security of information technology, and practical aspects of security such as risk analysis, vulnerability testing, writing security policies, implementing access controls, and performing security audits.
Information Systems Risk Management
This course introduces and defines the main types of risks that the information system in organizations may face and need to consider to ensure their security and business continuity. This course focuses on the identification and assessment of assets, threats and vulnerability in order to plan the appropriate information system security in the organization. It will survey preventive and containment techniques available to address the potential risk areas. The contingency planning, incident response planning, business continuity planning and disaster recovery will be covered too.
Cloud Computing Security
The principles, theory, hardware and software architecture, and programming of cloud computing. The security aspects including policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.
Network Security Programming
This course provides students programming skills in the field of information and network security, students will learn to implement different ciphering algorithms using python and java. They also will learn to use built-in security libraries in python and java. This course also provides introduction to hacking techniques and understanding how to protect systems from hackers using python.
Cyber Security Club
Department Chair's Message, Dr. Mohammad Alauthman
Temporary Suspension of Electronic Services at University of Petra
Formation of an Athletics Team to Represent the University in Intercollegiate Championships
A Decision Regarding Working Hours on Wednesday and Thursday 31/5-1/6/2023
Independence Day Holiday 2023
"In-Person Training Course Entitled: "Community Happiness Initiatives"
Employee Attendance Control
Petra Friendly Sites
Ministry of Higher Education
The Jubilee School
University Location Map
© 2021 University Of Petra - All Rights Reserved.