loader image

Ar-Rasheed Smart University

About the Program

Degree: Bachelor degree in Cyber Security Credit Hours: 134 No of Study years: 4 Years.

Message

Prepare graduates with competing capabilities to contribute to developing cybersecurity community by providing a high-quality learning environment that encourages creative thinking and scientific research to satisfy the needs of the local and regional markets.

Program Goals

  •  Training students to practice knowledge and skills of computing, mathematics, cybersecurity, and digital forensics for solving computing problems.
  •  Developing students’ skills to apply and practice theoretical knowledge and practical applications, standard frameworks, procedures, methods, tools, and techniques for analyzing, designing, implementing, and testing, secure computing systems that meet social and business needs.
  •  Developing students’ skills to deal with digital security issues, cybersecurity threats, risks, and digital crimes by implementing security policies, tools, and techniques.
  •  Enabling students to function effectively to add valuable contributions to society by engaging in responsible and ethical cybersecurity practice.
  •  Encouraging students to enroll in lifelong learning, thinking creatively, communicating effectively, pursuing professional development and graduate studies, adapting to organizational changes, and attaining communication, leadership, and management skills.

Promising Jobs/Employments for Graduates

  • Cyber Security Analyst
  • Cyber Security Specialist
  • Cyber Investigators
  • Cyber Security System Officer
  • Penetration Testing Officer
  • Security Architect
  • Encryption Engineer
  •  Cyber Security Manager
  • Secure Software Developer
  • Secure Networks Architect

Graduate Attributes

After successfully completing undergraduate Cyber Security program, the graduate should be able to :

  • Demonstrate understanding of the theoretical and practical concepts of computing, and mathematics related to cybersecurity.
  • Select security policies, tools, and techniques required to identify and resolve risks, and vulnerabilities, and develop secure computing-based systems that meet individual and business needs.
  •  Apply the theoretical and practical concepts of computing, and mathematics related to cybersecurity.
  • Manage and monitor information system threats and risk activities to protect computing assets of organizations or individuals to maintain business continuity.
  •  Contribute to the digital forensic investigation by examining digital evidence after a cyber-attack and restoring any compromised data and files.
  •  Display efficient skills in research, leadership and effectively work individually or within a team to perform a required task.
  •  Communicate effectively in different environments and engage in lifelong self-learning to cope with emerging technology related to cybersecurity.
Scroll to Top