Description
Designed to meet local labor market requirements, this Cybersecurity Diploma program is delivered over nine split training terms, each eight weeks in duration, totaling 1,760 training hours and 360 hours of practical field experience, with a maximum of 84 credit hours. The program provides specialized training in information security and online threats, enabling students to gain a comprehensive understanding of cybersecurity, identify attack methods and threats, and master the latest advanced principles and practices in the field. Throughout their studies, students learn to identify vulnerabilities in networks and electronic services and assess risks associated with data transmission, processing, and storage. The training emphasizes a strong link between theory and practice in most specialized courses by intensifying core practical exercises and implementing a cooperative training program with relevant industry sectors. Furthermore, the curriculum covers ethical and legal issues in institutional information security, the ability to evaluate and analyze local and international breaches, and the development of solutions to protect computer networks and data from threats and intrusions. Upon completion, graduates are awarded a Diploma in Cybersecurity and are prepared to work in various cybersecurity-related professional domains.
Objectives
-Explaining cryptography principles, applications, and operating systems.
-Measuring performance and troubleshooting cybersecurity systems.
-Analyzing problems and identifying the computing requirements necessary for their solutions.
-Making informed decisions in computing practices based on legal and ethical principles.
-Analyzing and evaluating the cybersecurity needs of an organization.
-Implementing cybersecurity solutions.
-Analyzing and responding to risks.
-Designing, implementing, and evaluating computer-based solutions to meet specific requirements within a cybersecurity context.
-Functioning effectively in teams to establish goals, plan tasks, meet deadlines, manage risks, and produce deliverables.
-Conducting cybersecurity risk assessments.
-Protecting systems, networks, and programs from digital attacks.
-Responding to and securely recovering from cyberattacks.
-Communicating technical information effectively to a range of audiences.
-Identifying and analyzing user needs for the selection, integration, evaluation, and management of computer-based systems.
-Measuring performance and troubleshooting cybersecurity systems.
-Analyzing problems and identifying the computing requirements necessary for their solutions.
-Making informed decisions in computing practices based on legal and ethical principles.
-Analyzing and evaluating the cybersecurity needs of an organization.
-Implementing cybersecurity solutions.
-Analyzing and responding to risks.
-Designing, implementing, and evaluating computer-based solutions to meet specific requirements within a cybersecurity context.
-Functioning effectively in teams to establish goals, plan tasks, meet deadlines, manage risks, and produce deliverables.
-Conducting cybersecurity risk assessments.
-Protecting systems, networks, and programs from digital attacks.
-Responding to and securely recovering from cyberattacks.
-Communicating technical information effectively to a range of audiences.
-Identifying and analyzing user needs for the selection, integration, evaluation, and management of computer-based systems.
- Defining the foundational logic of computer programming
- Writing core scripts and code using Python
- Designing web pages
- Proficiency in specialized cybersecurity terminology
- Participating in protecting critical organizational information and assets across all stages: input, processing, storage, transmission, and retrieval
- Educating organization users on their roles and responsibilities in protecting information systems and networks
- Analyzing threats, conducting vulnerability assessments, and deploying countermeasures
- Understanding the significance of information security in e-government
- Applying cybersecurity practices in accordance with the legal and ethical principles of the Kingdom of Saudi Arabia (KSA)
- Staying up-to-date with the latest trends and topics in the cybersecurity field
Algorithms and Logic
Information and Communication Technology (ICT)
Fundamentals of Cryptography
Operating Systems (I)
IoT and Cloud Computing Security
Operating Systems (II)
Cybersecurity Fundamentals
Internet and Computer Networks
Information and Communication Technology (ICT)
Fundamentals of Cryptography
Operating Systems (I)
IoT and Cloud Computing Security
Operating Systems (II)
Cybersecurity Fundamentals
Internet and Computer Networks