Loading...
2025/07/31 - 06:31 ص06/صفر/1447 - 09:31
هل كانت هذه الصفحة مفيدة؟
0% من المستخدمين قالو نعم من 0 تعليقا.
من فضلك أخبرنا بالسبب(يمكنك اختيار خيارات متعددة)
The master of information security (MIS) program at IT department was established in 2019. The MIS program welcomed its first batch of students in the academic year 2019/2020. The primary objective of establishing the MIS program was to cater to the needs of the Tabuk region by preparing highly skilled graduates that are specialized in various aspects of information security.
The National Cybersecurity Authority evaluated the MIS program and approved it as a program aligned with the Saudi Framework for Higher Education in Cybersecurity (Cyber-Education) for a period of five years, starting in November 2024.
Provide a stimulating academic environment that graduates Information Security professionals equipped with the necessary knowledge, skills, and professional ethics to meet labor market needs, advance their careers, serve the community, and engage in scientific research.
K1. Recognize and explain principles, approaches, tools and facts that are associated to the theoretical and technical topics in the information security field.
K2. Define and describe cutting-edge research and theories in information security domains.
K3. Identify and interpret the impact of information security processes and practices on securing information systems, mitigating attacks, and facilitating efficient recovery.
Skills:
S1. Utilize the appropriate and contemporary tools, methods, practices, policies, standards, and procedures in the field of information security.
S2. Develop comprehensive policies, procedures, standards, response plans, and governance models for effective security management.
S3. Construct and implement integral solutions, models, applications, and projects in the Information Security field, as well as appraise the resulting outcomes and contributions.
S4. Design, conduct, and evaluate state-of-the-art research and advanced projects in the field of information security.
S5. Formulate and conduct inclusive risk assessments and security management processes to identify potential threats to information assets and implement effective mitigation strategies.
S6. Communicate effectively and skillfully in a range of professional contexts within the realm of information security.
Values, Autonomy, and Responsibility:
V1. Communicate effectively and skillfully in a range of professional contexts within the realm of information security.
V2. Demonstrate professional and ethical practices and responsibilities within the domain of information security.
V3. Practice effective, ethical, and professional leadership and communication in all duties, tasks, projects, and teamwork within the field of information security.
For further information about the program, you can read:
§ Study plan that can be found at the following link (Link to study plan)
§ Program Handbook that can be found at the following link (Link to program Handbook)
§ MIS program Specification can be found at the following link (Link to Program Specification)
To obtain a master's degree in information security from Information Technology Department, the student must complete 43 credit hours as follows:
5 credits: Capstone Project 1 (2 credits) and Capstone Project 2 (3 credits).
Each student will be assigned an academic advisor who will act as a mentor, providing academic and career advice, and general counseling. Students are encouraged to meet their advisor at least once a month, during the semester. The Department will provide support to the students in the form of hosting extracurricular activities, field trips, and seminars by inviting guest speakers and providing an interactive learning environment. The Head of the Department is available to meet the students and listen to their academic problems and concerns. The faculty clubs are formed to help students undertake their activities.
Based on the unified Saudi classification of professions:
o 252105: Data security specialist
o 251105: Systems security analyst
o 242208: Data protection specialist
In General:
o Network Security Engineer
o Security Architect
o Security Administrator
o Security Software Developer
o Security Consultant
o Penetration Tester (Ethical Hacker)
o Cryptographer
o Security Risk Manager
o Technical Expertise: Graduates will have advanced technical proficiency in information security, including encryption, access control, network security, and secure software development.
o Critical Thinkers: Graduates will be adept critical thinkers and problem solvers, capable of analyzing complex security challenges and proposing effective solutions.
o Research and Analytical Skills: Graduates will have strong research and analytical skills, enabling them to conduct in-depth research and analyze trends and emerging threats in information security.
o Effective Communication: Graduates will be proficient in written and oral communication, able to convey complex technical information clearly and concisely, especially when presenting research findings.
o Team Players: Graduates will have the ability to work effectively in multidisciplinary teams and collaborate with colleagues, stakeholders, and external partners.
o Ethical Awareness: Graduates will have a deep understanding of ethical considerations in information security, privacy concerns, and legal and regulatory aspects.
o Leadership and Management: Graduates will be prepared to take on leadership roles and manage information security teams and strategies at the organizational level.
o Adaptability: Graduates will be adaptable and open to continuous learning, staying updated with emerging threats, technologies, and best practices.
o Information Assurance: Graduates will be experts in ensuring the confidentiality, integrity, and availability of information and information systems.
o Risk Management: Graduates will be skilled in risk assessment, developing risk management strategies, and implementing risk mitigation measures.
o Cryptography: Graduates will be proficient in cryptographic techniques, including encryption, digital signatures, and key management.
o Security Policy and Governance: Graduates will have a deep understanding of security policy development and information security governance.
o Security Architecture and Design: Graduates will be capable of designing secure systems and networks.
o Privacy and Data Protection: Graduates will be skilled in protecting sensitive data and managing privacy concerns in accordance with relevant laws and regulations.
o Cybersecurity Awareness: Graduates will have a strong awareness of current cybersecurity threats and the ability to assess vulnerabilities and potential attacks.
o Continuous Improvement: Graduates will be committed to ongoing professional development and improvement, keeping up with evolving security technologies and practices.
o Problem Solvers: Graduates will excel in troubleshooting and solving real-world security issues, implementing solutions that enhance an organization's security posture.