Skip Ribbon Commands
Skip to main content
A Bridge Towards Knowledge
605343 Cryptography Theory                                                         (3:3-0)
Prerequisite: 604361
This course serves as the introduction to cryptography. The focus is on definitions, theoretical foundations, and rigorous proofs of security. Topics covered: classical cryptography and its limitations, define a notion of perfect security, an introduction to computational security, number theory and computational hardness, deterministic  testing and computational hardness, one-way functions from number theory, pseudorandom generators (PRGs) and pseudorandom functions (PRFs) and their uses, private-key encryption and PRFs,  message authentication codes, perfect message authentication, algorithmic number theory, public-key encryption (PKE), Diffie-Hellman problems,  the El Gamal encryption scheme, hybrid encryption, trapdoor permutations and PKE, signature schemes,  signature schemes for multiple messages, and any advance and new topics in cryptography.
605400 Field Training                                                                      (3:3-0)
Prerequisite: Dept. Approval
This course provides the ability to practice on using computer tools and applications in various fields, either in a public or private sectors under the supervision of the department members. The purpose of the supervised field training experiences is for students to synthesize the knowledge and skills developed during the academic portion of the program in a practical setting. Field training is both a learning experience for students and contributes to the work undertaken by the field training site. The expectation is that the field training will provide learning opportunities unavailable in a classroom setting.
 605341 Digital Forensic Investigation                                           (3:3-0)
Prerequisite: 604361
Evaluate The Principles of Digital Forensic Analysis and Appreciate Where and How These Principles Should Be Applied; Critically Discuss the Nature of Digital Evidence and The Interpretations of That Evidence Obtained from Computer Forensics Investigations; Evaluate The Legal and Procedural Issues and Be Aware of the Documentary and Evidentiary Standards; Understanding the Digital Forensics Techniques : Data Acquisition, Working with Windows and CLI Systems, Current Digital Forensics Tools, Recovering Graphics Files, Email and Social Media Investigations, Mobile Device Forensics, Cloud Forensics.
605440 Information Security Protocols Investigation                  (3:3-0)
Prerequisite: 604360
This course discusses the Information Security Protocols within Internet Protocol (IP) Suite. Topics covered: protocol principles and architecture; Secure File Transfer Protocol (SFTP), Secure Hypertext Transfer Protocol (HTTPS), digital signatures, IP security, secure socket layer (SSL), intrusion detection, authentication, firewalls, denial of service (DoS), spam, email viruses, and phishing.
605449 Secured e-Transactions Environment                               (3:3-0)
Prequisite: 604361
This course introduces the four essential elements of safe e-Commerce: the data transaction, the server, the client, and the host network. Topics covered: encryption, firewalls, transaction security, securing Web commerce, and Web security risk management. Theoretical and practical foundation in the field of information security, E-Commerce and the Internet needed to better design, develop and manage E-Commerce resources. Define and describe the infrastructure components of E-Commerce, identify and describe the risks and vulnerabilities of E-Commerce.
605442 Database security                                                              (3:3-0)
Prerequisite: 602281 + 605342
This course introduces the security challenges and threats in database systems and provide an understanding of the state-of-the art security technologies. In addition to the security issues, the course addresses issues related to distributed databases and current technologies, such as service-oriented architecture. Access control in relational databases; grant/revoke model; cascading and non-cascading revoke; timestamp-based revoke; security by views; query modification; Oracle VPD; Truman and non-Truman models; auditing in databases; information warfare in databases; multi-level database security. 
605445 Ethical Hacking and Intrusion Detection & Prevention     (3:3-0)
Prerequisite: 605440
This course will use hacking techniques used by malicious, black hat hackers as a means to learn best defense from these same hackers. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization.  Students will learn about the entire penetration testing process including planning, reconnaissance, scanning, exploitation, post-exploitation, and result reporting.
605499 Graduation Project                                                             (3:3-0)
Prerequisite: 602302 + 603392
This course gives the students the chance to demonstrate their intellectual, technical and creative abilities through developing a project in one of information technology fields. The Graduation Project challenges students to go beyond the learning that occurs as the result of their prescribed educational program. Students shall complete their projects in areas of concentrated study under the direction and supervision of faculty members. The projects will demonstrate the students' ability to: apply, analyze, synthesize, evaluate information, and communicate significant knowledge and comprehension.
605444 Security of Mobile & Wireless Networks                           (3:3-0)
Prerequisite: 605440
This course focuses on aspects of information and network security that arise in this challenging and ever-evolving space of mobile and wireless networks, primarily focusing on smart phones and mobile telecommunication systems, aspects of mobile ad hoc networks (MANETs), and sensor networks. Topics covered includes: security standards, network security vulnerabilities; smart phone security; mobile Internet security; mobile location privacy; and ad hoc, mesh, and sensor network security.
605408 Selected Topics in Information Security                           (3:3-0)
Prerequisite: Dept. Approval
This course provides topics that are selected by instructors according to the interest of the department and students and cover the novel areas in current advancements in various information technology fields. Suggested topics includes: advance-programming languages not included in the degree plan, advance topics in networks, advance topics in database, management information system, advanced topics in internet and web, case study in different areas.
605446 Biometrics Systems                                                           (3:3-0)
Prerequisite: 604361 + 601451
Biometrics is capturing and using physiological and behavioral characteristics for personal identification. It is set to become the successor to the PIN. This course will introduce computational methods for the implementation of various biometric technologies including face and voice recognition, fingerprint, iris identification and DNA matching.
605342 Secure Business Architecture                                            (3:3-0)
Prerequisite: 604361
The high-level goal of this course is to discuss the appropriate system design and business responsiveness to technical/architectural decisions which impact the organization’s information security.
605448 Information Security Management                                   (3:3-0)
Prerequisite: 604361
This course examines the fundamental principles of computer security as applied to information technology. The course covers foundations, prevention, detection, human factors, technical considerations, management processes, future considerations for the security of information technology, and practical aspects of security such as risk analysis, vulnerability testing, writing security policies, implementing access controls, and performing security audits.
605447 Information Systems Risk Management                          (3:3-0)
Prerequisite: 605341
This course introduces and defines the main types of risks that the information system in organizations may face and need to consider to ensure their security and business continuity. This course focuses on the identification and assessment of assets, threats and vulnerability in order to plan the appropriate information system security in the organization. It will survey preventive and containment techniques available to address the potential risk areas. The contingency planning, incident response planning, business continuity planning and disaster recovery will be covered too.
605441 Cloud Computing Security                                                 (3:3-0)
Prerequisite: 605342
The principles, theory, hardware and software architecture, and programming of cloud computing. The security aspects including policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.
605344 Network Security Programming                                        (3:3-0)
Prerequisite:604361  + 601221
This course provides students programming skills in the field of information and network security, students will learn to implement different ciphering algorithms using python and java. They also will learn to use built-in security libraries in python and java. This course also provides introduction to hacking techniques and understanding how to protect systems from hackers using python.
Department Chair's Message, Dr. Mohammad Alauthman
Event Calendar
<October 2023>