Introduction:
The master of information security (MIS) program at IT department was established in 2019. The MIS program welcomed its first batch of students in the academic year 2019/2020. The primary objective of establishing the MIS program was to cater to the needs of the Tabuk region by preparing highly skilled graduates that are specialized in various aspects of information security.
The National Cybersecurity Authority evaluated the MIS program and approved it as a program aligned with the Saudi Framework for Higher Education in Cybersecurity (Cyber-Education) for a period of five years, starting in November 2024.
Program Mission:
Provide a stimulating academic environment that graduates Information Security professionals equipped with the necessary knowledge, skills, and professional ethics to meet labor market needs, advance their careers, serve the community, and engage in scientific research.
Program Goals:
1. Equip graduates with the knowledge and skills to plan, design, and implement comprehensive security policies and services for organizations.
2. Prepare graduates with the technical skills and ethical principles required to excel as information security professionals.
3. Develop graduates' ability to plan, analyze, and apply modern security methods and tools to protect organizational assets and information systems effectively.
4. Train graduates to implement and manage robust security strategies that address the evolving security needs of the digital era and meet the needs of society and industry standards.
5. Instill in graduates a commitment to professional ethics and social responsibility in the field of information security.
6. Encourage graduates to engage in lifelong learning, professional development, and research, staying current with emerging technologies and adapting to the dynamic cybersecurity landscape.
Learning Outcomes:
Knowledge and Understanding:
K1. Recognize and explain principles, approaches, tools and facts that are associated to the theoretical and technical topics in the information security field.
K2. Define and describe cutting-edge research and theories in information security domains.
K3. Identify and interpret the impact of information security processes and practices on securing information systems, mitigating attacks, and facilitating efficient recovery.
Skills:
S1. Utilize the appropriate and contemporary tools, methods, practices, policies, standards, and procedures in the field of information security.
S2. Develop comprehensive policies, procedures, standards, response plans, and governance models for effective security management.
S3. Construct and implement integral solutions, models, applications, and projects in the Information Security field, as well as appraise the resulting outcomes and contributions.
S4. Design, conduct, and evaluate state-of-the-art research and advanced projects in the field of information security.
S5. Formulate and conduct inclusive risk assessments and security management processes to identify potential threats to information assets and implement effective mitigation strategies.
S6. Communicate effectively and skillfully in a range of professional contexts within the realm of information security.
Values, Autonomy, and Responsibility:
V1. Communicate effectively and skillfully in a range of professional contexts within the realm of information security.
V2. Demonstrate professional and ethical practices and responsibilities within the domain of information security.
V3. Practice effective, ethical, and professional leadership and communication in all duties, tasks, projects, and teamwork within the field of information security.
Admission Requirements
- The applicant must hold a Bachelor's degree in Computer Science or a related field.
- The applicant's overall GPA must be at least "Good".
- The applicant must have passed the General Aptitude Test for University Students.
- The following courses must be covered in the Bachelor degree: Programming, Data Structures and Algorithms, Databases, Computer Networks, and Operating Systems.
- Efficiency in English: An applicant must either submit proof of having completed their bachelor's degree with English as the medium of instruction or provide evidence of English proficiency through standardized tests such as IELTS, TOEFL, STEP, etc.
Program Specification, Handbook and Study Plan
For further information about the program, you can read:
§ Study plan that can be found at the following link (Link to study plan)
§ Program Handbook that can be found at the following link (Link to program Handbook)
§ MIS program Specification can be found at the following link (Link to Program Specification)
Program Design
To obtain a master's degree in information security from Information Technology Department, the student must complete 43 credit hours as follows:
1. 38 credits that include 10 Information Security Courses:
Applied Cryptography, Database Security, Security Policies and Risk Management, Seminars, Network Security, Operating System Security, Secure Software Systems, Biometrics and Access Control, Selected Topics in Computer Security, Penetration Testing and Ethical Hacking.
2. 5 credits: Capstone Project 1 (2 credits) and Capstone Project 2 (3 credits).
Student Counseling Services
Each student will be assigned an academic advisor who will act as a mentor, providing academic and career advice, and general counseling. Students are encouraged to meet their advisor at least once a month, during the semester. The Department will provide support to the students in the form of hosting extracurricular activities, field trips, and seminars by inviting guest speakers and providing an interactive learning environment. The Head of the Department is available to meet the students and listen to their academic problems and concerns. The faculty clubs are formed to help students undertake their activities.
Professions/jobs for which students are qualified:
Based on the unified Saudi classification of professions:
o 252105: Data security specialist
o 251105: Systems security analyst
o 242208: Data protection specialist
In General:
o Network Security Engineer
o Security Architect
o Security Administrator
o Security Software Developer
o Security Consultant
o Penetration Tester (Ethical Hacker)
o Cryptographer
o Security Risk Manager
Graduate Attributes:
o Technical Expertise: Graduates will have advanced technical proficiency in information security, including encryption, access control, network security, and secure software development.
o Critical Thinkers: Graduates will be adept critical thinkers and problem solvers, capable of analyzing complex security challenges and proposing effective solutions.
o Research and Analytical Skills: Graduates will have strong research and analytical skills, enabling them to conduct in-depth research and analyze trends and emerging threats in information security.
o Effective Communication: Graduates will be proficient in written and oral communication, able to convey complex technical information clearly and concisely, especially when presenting research findings.
o Team Players: Graduates will have the ability to work effectively in multidisciplinary teams and collaborate with colleagues, stakeholders, and external partners.
o Ethical Awareness: Graduates will have a deep understanding of ethical considerations in information security, privacy concerns, and legal and regulatory aspects.
o Leadership and Management: Graduates will be prepared to take on leadership roles and manage information security teams and strategies at the organizational level.
o Adaptability: Graduates will be adaptable and open to continuous learning, staying updated with emerging threats, technologies, and best practices.
o Information Assurance: Graduates will be experts in ensuring the confidentiality, integrity, and availability of information and information systems.
o Risk Management: Graduates will be skilled in risk assessment, developing risk management strategies, and implementing risk mitigation measures.
o Cryptography: Graduates will be proficient in cryptographic techniques, including encryption, digital signatures, and key management.
o Security Policy and Governance: Graduates will have a deep understanding of security policy development and information security governance.
o Security Architecture and Design: Graduates will be capable of designing secure systems and networks.
o Privacy and Data Protection: Graduates will be skilled in protecting sensitive data and managing privacy concerns in accordance with relevant laws and regulations.
o Cybersecurity Awareness: Graduates will have a strong awareness of current cybersecurity threats and the ability to assess vulnerabilities and potential attacks.
o Continuous Improvement: Graduates will be committed to ongoing professional development and improvement, keeping up with evolving security technologies and practices.
o Problem Solvers: Graduates will excel in troubleshooting and solving real-world security issues, implementing solutions that enhance an organization's security posture.
Program Achievements
- National Alig nment: The MIS program achieved full alignment with the Saudi Framework for Higher Education in Cybersecurity for five years, commencing November 2024.
- Research Collaboration: Faculty and students actively collaborated on research, leading to publications in international journals and competition awards.
- Professional Development: Department members consistently participated in professional development activities such as workshops, seminars, and conferences.
- Community Engagement: The program actively engaged in community service through various initiatives and collaborations.
- Annual International Conference: FCIT successfully organizes an annual international conference on computing and information technology.