Program Overview
The Bachelor of Science in Cybersecurity (BScCYS) is a 4-year program preparing students for careers in network, web and applications security. The program equips students with experience in network and cyber-attacks, AI-driven solutions and how to defend and prevent them, as well as the ethical implications of security. Graduates are in high demand in various industries due to the UAE's focus on diversifying its economy. Graduates can pursue roles such as Chief Information Security Officer, Forensic Computer Analyst, and Cyber Security Engineer.
Benefits
The BSc. in Cybersecurity program aligns with the UAE Vision by fostering a generation of skilled professionals equipped to protect the nation's digital infrastructure. As the UAE continues to advance its smart government and digital economy initiatives, cybersecurity expertise becomes crucial in safeguarding sensitive information and ensuring the resilience of critical systems. Graduates of this program will be well-prepared to address the evolving threats in the cyber realm, contributing to the nation's goal of becoming a global leader in innovation, security, and technological excellence. This program not only enhances individual career prospects but also strengthens the UAE's position as a secure and competitive digital hub on the global stage.
Career Opportunities
Graduates of this program will have a wealth of industries to choose from and often go on to become:
- Cybersecurity Analyst
- Information Security Manager
- Penetration Tester (Ethical Hacker)
- Network Security Engineer
- Security Consultant
- Forensic Computer Analyst
- Security Software Developer
- Compliance and Risk Analyst
Graduates can also pursue advanced studies, such as a Master’s or PhD in Cybersecurity or related fields, to specialize further and enhance career prospects, including academic and high-level research roles.
The program has been awarded the accreditation by Ministry of Education UAE on December 09, 2020.
The graduates of the Bachelor of Science in Cyber Security program, within a few years of their graduation, will have:
- Pursued successful careers or postgraduate studies in cyber security and related fields.
- Contributed to building UAE capacity for cyber security specialists with breadth and depth of knowledge, knowledge of methodologies, and the skills to analyze, design, test, and implement security solutions in strategic information and communication technologies.
- Met workplace expectations, including analytical and critical thinking, effective communication, leadership, team spirit, and adaptability.
- Developed awareness of the societal, economic, and environmental challenges facing the cyber security profession and who are committed to the highest standards of ethical practice, including confidentiality and privacy.
- Shown commitment to lifelong learning and training to stay current with emerging technologies and future cyber security trends.
Upon successful completion of the Bachelor of Science in Computer Science program, the graduates of the program will be able to:
- PLO 1: Demonstrate knowledge of relevant theories and principles of computing-related solutions in specialized domains.
- PLO 2: Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
- PLO 3: Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
- PLO 4: Communicate effectively in a variety of professional contexts.
- PLO 5: Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
- PLO 6: Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
- PLO 7: Apply security principles and practices to maintain operations in the presence of risks and threats.
- PLO 8: Assimilate new knowledge and skills into their practice by learning from experiences gained in different contexts of Cyber Security.
The BScCYS program is being offered at the CUD Campus as a full-time regular study mode program. The program is completed in 8 semesters (4 academic years) and the maximum duration of completion of the program is eight academic years.
The BScCYS degree shall be awarded to a student upon completing the following requirements:
- Students enrolled in the program must have passed 127 credit hours.
- Students must achieve a CGPA of not less than 2.0 on a scale of 4.0 points.
- Students must have earned at least 50% of credits at CUD.
- Students must complete Internship and Graduation Project work must at CUD.
Dr. Tamer Mohamed Abdellatif Mohamed
Assistant Professor
Email: tamer.mohamed@cud.ac.ae
Phone: +971(04)7096822
Office: HUB First Floor - Office 50
Program Structure
Requirements | Compulsory
Credit Hours |
Elective
Credit Hours |
Total
Credit Hours |
---|---|---|---|
University Requirements (GE Courses) | 21 | 6 | 27 |
Program Core Requirements (Core Courses) | 64 | - | 64 |
Program Major Requirements | 33 | 3 | 36 |
Total | 118 | 9 | 127 |
Course Code | Course Title | Prerequisite | Credit Hours | |
---|---|---|---|---|
Compulsory Courses (21 Credits) | ||||
LNG | 181 | English I for Engineering and Computing | None | 3 |
LNG | 182 | English II for Engineering and Computing | LNG 181 | 3 |
GED | 196E | Communication Skills in Arabic 1 | None | 3 |
GED | 198E | Islamic Culture | None | 3 |
GED | 199E | UAE Society | None | 3 |
ENT | 141 | Fundamentals of Innovation and Entrepreneurship 1 | None | 2 |
ENT | 142 | Fundamentals of Innovation and Entrepreneurship 2 | ENT 141 | 1 |
ENT | 241 | Entrepreneurship 1 | ENT 142 | 2 |
ENT | 242 | Entrepreneurship 2 | ENT 241 | 1 |
Elective Courses (6 Credit Hours) | ||||
BIO | 102 | Biology I | None | 3 |
SHS | 103 | Chemistry | None | 3 |
SCI | 210 | Modern Physics | None | 3 |
Course Code | Course Title | Prerequisite | Credit Hours | |
---|---|---|---|---|
BCS | 101 | Elements of Computing | None | 3 |
BCS | 102 | Introduction to Computing Science I | BCS 101 | 3 |
MTH | 112 | Calculus I | Pass Math Placement Test or MTH 012 | 3 |
MTH | 113 | Calculus II | MTH 112 | 3 |
MTH | 114 | Linear Algebra | MTH 112 | 3 |
MTH | 120 | Discrete Mathematics | None | 3 |
MTH | 130 | Probability and Statistics | MTH 112 | 3 |
MTH | 203 | Discrete Mathematics for Computing Science | BCS 102, MTH 120 | 3 |
BCS | 201 | Logic for Computing Science | MTH 120 | 3 |
BCS | 202 | Introduction to Computing Science II | BCS 102 | 3 |
BCS | 203 | Software Specifications | BCS 201, BCS 202 | 3 |
BCS | 222 | Programming Paradigms | BCS 202, BCS 201 | 3 |
BCS | 206 | Information Structures | BCS 202, MTH 203 | 3 |
ENG | 210 | Computer Architecture | BCS 202 or ENG 101 | 4 |
BCS | 305 | Software Architecture | BCS 203, BCS 206 | 3 |
BCS | 306 | Database Management Systems | BCS 201, BCS 202 | 3 |
BCS | 309 | Algorithms I | BCS 201, BCS 206 | 3 |
BCS | 311 | Scientific Computing | BCS 102, MTH 114 | 3 |
BCS | 323 | System-Level Programming | BCS 102 | 3 |
BCS | 401 | Ethics for Computing Professionals | None | 3 |
ENG | 420 | Internship | 90 Credit Hours & CGPA ≥ 2.0 | 3 |
Course Code | Course Title | Prerequisite | Credit Hours | |
---|---|---|---|---|
Program Major Requirement – Compulsory Courses (33 Credit Hours) | ||||
BCS | 301 | Operating Systems | ENG 210, BCS 206 | 4 |
BCS | 303 | Security Principles and Practices | BCS 308 | 4 |
BCS | 221 | Communication Networks | BCS 102 | 3 |
CYS | 311 | Security Threats and Risk Analysis | BCS 303 | 3 |
CYS | 312 | Cryptographic Algorithms and Protocols | BCS 203, BCS 204, BCS 303, BCS 309 (co) | 3 |
BCS | 405 | Artificial Intelligence | BCS 206, BCS 205 | 3 |
BCS | 410 | Computer Science Project | Completed 90 Cr. Hrs. | 6 |
CYS | 411 | Engineering Secure Software | CYS 312 | 3 |
CYS | 412 | Mobile and Wireless Security | CYS 411, BCS 308 | 4 |
Course Code | Course Title | Prerequisite | Credit Hours | |
---|---|---|---|---|
SWS | 215 | Web Development | BCS 306 | 3 |
CYS | 413 | Web Application Security and Testing | CYS 411 | 3 |
CYS | 414 | Penetration Testing and Ethical Hacking | CYS 411 | 3 |
CYS | 415 | Malicious Software | CYS 411 | 3 |
CYS | 416 | Human and Organizational Security | BCS 303 | 3 |