Bachelor of Cybersecurity
Admission to Program
Admission to the program is explained in the HCT Admission Policy described in the Academic Policies section of this Catalogue.
Program Mission
Prepare graduates to be successful Information and Communication Technology (ICT) professionals in technical leadership roles, embracing innovation and discovery and striving for professional growth through life-long learning in the field of Information Technology and associated domains.
Program Description
The Bachelor of Cybersecurity program prepares students to respond to the needs of the workforce for knowledgeable and skilled IT professionals who can apply ethical values to complex and unpredictable problems and to plan, design, implement, evaluate and manage IT solutions.
The program provides students with the broad technical education necessary for employment in the public or private sector, and it enables them to develop an understanding of fundamentals and current issues important for future development. Students also develop professional work competencies to complement their technical skills and apply high-level special administrative responsibilities.
The program is structured as a set of core, elective, general studies, and specialized courses. In the core courses, students will acquire the core knowledge, skills, and competencies needed for IT. Through specialized courses, students will develop up-to-date knowledge and skills in the field of Cyber Security to meet the industry requirement. Students are eligible for one year apprenticeship during their study.
Program Goals
- Equip graduates with the technical knowledge and skills required by the industry to design, develop, and maintain secure computing systems to the highest level of industry standards, incorporating advanced cybersecurity measures.
- Prepare graduates for a successful career as effective decision makers with strong communication and teamwork skills and an understanding of global, ethical and social implications of the industry and Cybersecurity profession.
- Prepare graduates with technical and entrepreneurial leadership qualities, who support the development of innovative computing solutions in response to local, regional, or global challenges.
- Provide graduates with strong commitment to lifelong learning, continuing education, and professional growth.
Program Learning Outcomes
- Demonstrate an understanding of critical analysis, research methods, and problem-solving techniques in computing, with an emphasis on current and emerging research sources.
- Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions.
- Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
- Communicate effectively in a variety of professional contexts.
- Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
- Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
- Apply security principles and practices to maintain operations in the presence of risks and threats.
Completion Requirements
Students must successfully complete a minimum of 120 credits, including:
Code | Title | Credit Hours |
---|---|---|
CIS Core Courses | 36 | |
Cybersecurity Specialisation Courses | 60 | |
Elective Courses | 6 | |
General Studies | 18 | |
Total Credits | 120 |
To qualify for the bachelor's degree, a student is required to:
- Successfully complete the required number of credits and courses specific to the program with a minimum cumulative GPA of 2.0.
- Complete 100 hours of volunteering.
- Meet the residency requirement that a minimum of 50% of the program credit requirements have been completed at the HCT.
Code | Title | Credit Hours |
---|---|---|
CIS Core Courses | ||
Required Credits: 36 | ||
CIS 1313 | Introduction to Computer Systems and Networks | 3 |
CIS 1203 | Web Technologies | 3 |
CIS 1603 | Programming I | 3 |
CIS 1213 | Introduction to Information Security | 3 |
CIS 1303 | Database Systems | 3 |
CIS 1613 | Programming II | 3 |
CIS 2033 | User Centered Design | 3 |
CIS 2023 | Applied Discrete Mathematics | 3 |
CIS 2213 | Full-stack Web Application Development | 3 |
CIS 2113 | Introduction to Software Engineering | 3 |
CIS 3603 | Project Management | 3 |
CIS 3503 | Technopreneurship | 3 |
Code | Title | Credit Hours |
---|---|---|
Cybersecurity Specialisation Courses | ||
Required Credits: 60 | ||
CYB 2413 | Advanced Networking | 3 |
CYB 2423 | Cryptography and Data Protection | 3 |
CIS 3303 | System Architecture and Integration | 3 |
CIS 2903 | Operating Systems | 3 |
CYB 3513 | Switching, Routing and Wireless Essentials | 3 |
CYB 3523 | Virtualization and Cloud Technologies | 3 |
CYB 3533 | Penetration Testing and Ethical Hacking | 3 |
CYB 3543 | Digital Forensics and Investigation | 3 |
CYB 3613 | Secure Software Architecture and Coding | 3 |
CYB 3623 | Enterprise Networking, Security and Automation | 3 |
CYB 3633 | Security Operation and Threat Intelligence | 3 |
CYB 3643 | Cloud Architecting | 3 |
CYB 4733 | Capstone Project I | 3 |
CYB 4833 | Capstone Project II | 3 |
CYB 4723 | Cyberspace Law and Ethics | 3 |
CYB 4823 | Cybersecurity Governance, Risk and Compliance | 3 |
CYB 4716 | Apprenticeship I (*) | 6 |
CYB 4816 | Apprenticeship II (*) | 6 |
*Apprenticeship courses |
Code | Title | Credit Hours |
---|---|---|
Elective Courses | ||
Required Credits: 6 | ||
CIS 4703 | Blockchain Technology | 3 |
CIS 4013 | Data Analytics for IT Professionals | 3 |
CIS 4003 | Green Computing | 3 |
Code | Title | Credit Hours |
---|---|---|
General Studies | ||
Required Credits: 18 | ||
LSM 1013 | Mathematics for Computing | 3 |
LSC 1103 | Professional Written Communication | 3 |
CIS 1703 | Introductory Statistics and Probability | 3 |
LSS 1133 | Critical Thinking and Research Skills | 3 |
CIS 2603 | Artificial Intelligence Foundations | 3 |
AES 1003 | Emirati Studies | 3 |
Description | Data |
---|---|
Total Required Credits | 120 |
Maximum Duration of Study | 6 years |
Minimum Duration of Study | 4 years |
Cost Recovery Program | No |
Program Code | BACYB |
Major Code | CYB |
Recommended Sequence of Study
Year 1 | ||
---|---|---|
Semester 1 | Credit Hours | |
CIS 1313 | Introduction to Computer Systems and Networks | 3 |
CIS 1203 | Web Technologies | 3 |
CIS 1603 | Programming I | 3 |
LSM 1013 | Mathematics for Computing | 3 |
LSC 1103 | Professional Written Communication | 3 |
Credit Hours | 15 | |
Semester 2 | ||
CIS 1213 | Introduction to Information Security | 3 |
CIS 1303 | Database Systems | 3 |
CIS 1613 | Programming II | 3 |
CIS 1703 | Introductory Statistics and Probability | 3 |
LSS 1133 | Critical Thinking and Research Skills | 3 |
Credit Hours | 15 | |
Year 2 | ||
Semester 3 | ||
CIS 2033 | User Centered Design | 3 |
CIS 2023 | Applied Discrete Mathematics | 3 |
CIS 2213 | Full-stack Web Application Development | 3 |
CIS 2113 | Introduction to Software Engineering | 3 |
CIS 2603 | Artificial Intelligence Foundations | 3 |
Credit Hours | 15 | |
Semester 4 | ||
CYB 2413 | Advanced Networking | 3 |
CYB 2423 | Cryptography and Data Protection | 3 |
CIS 3303 | System Architecture and Integration | 3 |
CIS 2903 | Operating Systems | 3 |
AES 1003 | Emirati Studies | 3 |
Credit Hours | 15 | |
Year 3 | ||
Semester 5 | ||
CYB 3513 | Switching, Routing and Wireless Essentials | 3 |
CYB 3523 | Virtualization and Cloud Technologies | 3 |
CYB 3533 | Penetration Testing and Ethical Hacking | 3 |
CYB 3543 | Digital Forensics and Investigation | 3 |
CIS 3603 | Project Management | 3 |
Credit Hours | 15 | |
Semester 6 | ||
CYB 3613 | Secure Software Architecture and Coding | 3 |
CYB 3623 | Enterprise Networking, Security and Automation | 3 |
CYB 3633 | Security Operation and Threat Intelligence | 3 |
CYB 3643 | Cloud Architecting | 3 |
CIS 3503 | Technopreneurship | 3 |
Credit Hours | 15 | |
Year 4 | ||
Semester 7 | ||
CYB 4716 | Apprenticeship I | 6 |
CYB 4723 | Cyberspace Law and Ethics | 3 |
CYB 4733 | Capstone Project I | 3 |
4000 Level Elective | 3 | |
Credit Hours | 15 | |
Semester 8 | ||
CYB 4816 | Apprenticeship II | 6 |
CYB 4823 | Cybersecurity Governance, Risk and Compliance | 3 |
CYB 4833 | Capstone Project II | 3 |
4000 Level Elective | 3 | |
Credit Hours | 15 | |
Total Credit Hours | 120 |
Abdelrahman Abdelgader, Ph.D Computer Science, Universiti Teknologi Malaysia, Malaysia
Abraham George, Ph.D, Computer Science, University of Louisville, United States
Ahmad Manasrah, Ph.D, Network Security, University Sains Malaysia, Malaysia
Akhtar Khalil, Ph.D, Information & Comm Technology, Loughborough University, United Kingdom
Ali Abu Romman, Master's Degree, Information System Security and Digital Criminology, Princess Sumaya University for Technology, Jordan
Ashraf Alkaraki, Master of Engineering, Cybersecurity and Cloud Computing, Mutah University, Jordan
Atiq Ur Rahman, Ph.D, Information Technology, Universiti Teknologi Petronas, Malaysia
Aws Mohammad Alawneh, MSc, Computer Networking, Wichita State University, USA
Ayman Ahmed, Master of Science, Telecommunications, DePaul University, United States
Azmi Alazzam, Ph.D, Industrial & System Engineering, State University of New York, United States
Benson Raj, Ph.D, Information Communication, Anna University, India
Dana Alhajjar, Masters, Information Technology Management, University of Wollongong, United Arab Emirates
Dimitrios Xanthidis, Ph.D, E-Commerce, University of London, United Kingdom
Eraj Khan, Ph.D, Communication Systems and Cybersecurity, Lancaster University, United Kingdom
Filsia Mohamed Manzil, MSc, Security and Forensics, Edinburgh Napier University, United Kingdom
Gideon Bibu, Master of Science, Computer Science, University of Ibadan, Nigeria
Hani Qusa, Ph.D, Computer Science & Engineering, Sapienza University of Rome, Italy
Hassan Osman Ali, Ph.D, Information Systems, Universiti Teknologi Malaysia, Malaysia
Hassan Shama, Master of Science, Computer Network Technology, Middlesex University, United Arab Emirates
Hicham El Zabadani, Ph.D, Computer Engineering, University of Florida, USA
Hussain AlAqrabi, PhD, Computer Networks and Security, University of Derby, United Kingdom
Israr Ahmed, Master of Science, Network & Computer Security, New York Institute of Technology, United States
J Ines Gervacio, Master in Computer Science, Information Security, National Polytechnic Institute, Mexico
Ja'far Alqatawna, Ph.D, Information and Communication Systems Security, Sheffield Hallam University, United Kingdom
Jamal Diab, Master of Science, Computer Science, Abu Dhabi University, Abu Dhabi, UAE
Jero Sayco, Master of Science, Management Engineering, University of Santo Tomas, Philippines
Jinesh Padikkapparambil, Master of Technology, IT - Networking, VIT University, India
Khalid Anjum, Master of Science, Computer Networking, Middlesex University, United Kingdom
Khalifa Al Amer, Master of Science, Mathematical & Computer Science, University of Salford, United Kingdom
Khawla Abdulla Saif Mohammed Al Shehhi, Master of Applied Science, Information System Management, Higher Colleges of Technology, United Arab Emirates
Moataz Salhab, Master of Science, E-Commerce, Coventry University, United Kingdom
Mohamad Jaber, PhD, Computer Science, University of Nice, France
Mohamed Said Elsersy, Ph.D, Computer Engineering, Memorial University of Newfoundland, Canada
Mohamed Trojet, Ph.D, Computer Science, University of Aix-Marseille, France
Mohammad Deebajah, MSc, Networking professional, Sheffield Hallam University, United Kingdom
Mohammed Al-Saleh, Ph.D, Computer Science, University of New Mexico, United States
Mohammed Alshehhi, MSc, Data Science, Birmingham University, Dubai
Mohammed Saleh, Ph.D, Electrical & Computer Engineering, Victoria University, Australia
Mohsin Iftikhar, Ph.D, Mathematical Computer Science, University of Sydney, Australia
Mouna Sleiman Chebli, MSc Information Technology, Cyber Security, Zayed University, United Arab Emirates
Muhammad Adnan, Ph.D, Communication & Information Sciences, Dongguk University, South Korea
Muhammad Adnan, Ph.D, Computer Science, Glasgow Caledonian University, United Kingdom
Muhammad Ahmed, Master of Business Administration, Business Information Technology, International Islamic University, Pakistan
Muhammad Emran, Ph.D, Computer Science, Slovak University of Technology, Slovakia
Muhammad Farid, Master of Science, Computer Network Technology, Middlesex University, United Kingdom
Muhammad Mohsin Saleemi, Ph.D, Computer System Engineering, Abo Akademi University, Finland
Muhammad Nadeem, PhD in Computer Science, Cybersecurity, Mississippi State University, United States of America
Muhammad Wannous, Ph.D, Computer Science, Kumamoto University, Japan
Munther Al Hassan, Master of Science, Satellite Communication Engineering, University of Surrey, United Kingdom
Musa Shuaibu Bala, Ph.D, Science and Technology Management, University Sains Malaysia, Malaysia
Nabih Abdelmajid, Ph.D, Computer Security, University of Bradford, United Kingdom
Nafeth Al Hashlamoun, Ph.D, E-Research & Technology Enhanced Learning, University of Lancaster, United Kingdom
Najm Hassan, Ph.D, Computer Science & Engineering, University of New South Wales, Australia
Nazar Waheed, Ph.D, Cybersecurity, University of Technology Sydney, Australia
Nedaa Baker Jamil Al Barghuthi, Doctor of Philosophy in Computer Science, British University in Dubai, United Arab Emirates
Nor Azizah Hitam, Ph.D, Computer Science, International Islamic University Malaysia, Malaysia
Omar Al-Amir, Ph.D, Computer Science, Anglia Ruskin University, United Kingdom
Omar Eltaher Abuelmaatti, Ph.D, Computer & Information System, Liverpool John Moores University, United Kingdom
Osama Abdulrhman, MSc, Communication Engineering (Networking & Security), Aleppo University, Syria
Osama Abu Rahmeh, Ph.D, Computer & Communications Engineering, Liverpool John Moores University, United Kingdom
Osama Dandash, PhD, Computer Science and Information Systems, Monash University, Australia
Osama Hosameldeen, PhD, Computer Technology Engineering, Hunan University, China
Peer Azmat Shah, Ph.D, Information Technologies, Universiti Teknologi Petronas, Malaysia
Rafi Us Shan, PhD, Communication Systems, Lancaster University, United Kingdom
Raiza Borreo, Ph.D, Information Technology, AMA University, Philippines
Rajesh Thomas, Master of Science, Computational Science & Engineering, University of Technology Mauritius, Mauritius
Randy Catacutan, Master of Arts, Computer Education, AMA University, Philippines
Saleel Arrayal Parambath, Master of Science, Information Network & Communication Security, New York Institute of Technology, United States
Saleimah Al Mesmari, Ph.D, Computer Science, British University, Dubai
Samer Aoudi, Ph.D, Applied Computer Science, Northcentral University, United States
Sayed Asif, Master of Science, Information System Management, The University of Liverpool, United Kingdom
Shinju Philip, Master of Science, Computer Science, Bharathiar University, India
Sohail Gohir, MSc, Network Management & Security, London Metropolitan University, United Kingdom
Sujni Paul Arulraj, Ph.D, Computer Application, Karunya University, India
Suleiman Almasri, Ph.D, Computer Science, Anglia Ruskin University, United Kingdom
Talal Ashraf Butt, Ph.D, Computer Science, Loughborough University, United Kingdom
Thanis Ibrahim, MSc, Electrical Power and Control Engineering, Liverpool John Moore's University, United Kingdom
Vasaki Ponnusamy, Ph.D, Information Technology, Universiti Teknologi PETRONAS, Malaysia
Venkitta Hafis, Master of Science, Software Technology & Systems Management, Manonmaniam Sundaranar University, India
Waleed Al-Sit, Ph.D, Electrical & Electronic Engineering, The University of Liverpool, United Kingdom
Zahoor Khan, Ph.D, Engineering Mathematics, Dalhousie University, Canada
Zeeshan Hameed, Ph.D, Information and Communication Technology, Ajou University, South Korea