Bachelor of Cybersecurity

Admission to Program

Admission to the program is explained in the HCT Admission Policy described in the Academic Policies section of this Catalogue.

Program Mission

Prepare graduates to be successful Information and Communication Technology (ICT) professionals in technical leadership roles, embracing innovation and discovery and striving for professional growth through life-long learning in the field of Information Technology and associated domains.

Program Description

The Bachelor of Cybersecurity program prepares students to respond to the needs of the workforce for knowledgeable and skilled IT professionals who can apply ethical values to complex and unpredictable problems and to plan, design, implement, evaluate and manage IT solutions.

The program provides students with the broad technical education necessary for employment in the public or private sector, and it enables them to develop an understanding of fundamentals and current issues important for future development. Students also develop professional work competencies to complement their technical skills and apply high-level special administrative responsibilities.

The program is structured as a set of core, elective, general studies, and specialized courses. In the core courses, students will acquire the core knowledge, skills, and competencies needed for IT. Through specialized courses, students will develop up-to-date knowledge and skills in the field of Cyber Security to meet the industry requirement. Students are eligible for one year apprenticeship during their study.

Program Goals

  • Equip graduates with the technical knowledge and skills required by the industry to design, develop, and maintain secure computing systems to the highest level of industry standards, incorporating advanced cybersecurity measures.
  • Prepare graduates for a successful career as effective decision makers with strong communication and teamwork skills and an understanding of global, ethical and social implications of the industry and Cybersecurity profession. 
  • Prepare graduates with technical and entrepreneurial leadership qualities, who support the development of innovative computing solutions in response to local, regional, or global challenges.
  • Provide graduates with strong commitment to lifelong learning, continuing education, and professional growth. 

Program Learning Outcomes

  1. Demonstrate an understanding of critical analysis, research methods, and problem-solving techniques in computing, with an emphasis on current and emerging research sources. 
     
  2. Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions.
     
  3. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
     
  4. Communicate effectively in a variety of professional contexts.
     
  5. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
     
  6. Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline. 
     
  7. Apply security principles and practices to maintain operations in the presence of risks and threats. 

Completion Requirements

  Students must successfully complete a minimum of 120 credits, including:

CIS Core Courses 36
Cybersecurity Specialisation Courses60
Elective Courses6
General Studies 18
Total Credits 120

  To qualify for the bachelor's degree, a student is required to: 

  • Successfully complete the required number of credits and courses specific to the program with a minimum cumulative GPA of 2.0. 
  • Complete 100 hours of volunteering. 
  • Meet the residency requirement that a minimum of 50% of the program credit requirements have been completed at the HCT.
CIS Core Courses
Required Credits: 36
CIS 1313Introduction to Computer Systems and Networks3
CIS 1203Web Technologies3
CIS 1603Programming I3
CIS 1213Introduction to Information Security3
CIS 1303Database Systems3
CIS 1613Programming II3
CIS 2033User Centered Design3
CIS 2023Applied Discrete Mathematics3
CIS 2213Full-stack Web Application Development3
CIS 2113Introduction to Software Engineering3
CIS 3603Project Management3
CIS 3503Technopreneurship3
Cybersecurity Specialisation Courses
Required Credits: 60
CYB 2413Advanced Networking3
CYB 2423Cryptography and Data Protection3
CIS 3303System Architecture and Integration3
CIS 2903Operating Systems3
CYB 3513Switching, Routing and Wireless Essentials3
CYB 3523Virtualization and Cloud Technologies3
CYB 3533Penetration Testing and Ethical Hacking3
CYB 3543Digital Forensics and Investigation3
CYB 3613Secure Software Architecture and Coding3
CYB 3623Enterprise Networking, Security and Automation3
CYB 3633Security Operation and Threat Intelligence3
CYB 3643Cloud Architecting3
CYB 4733Capstone Project I3
CYB 4833Capstone Project II3
CYB 4723Cyberspace Law and Ethics3
CYB 4823Cybersecurity Governance, Risk and Compliance3
CYB 4716Apprenticeship I (*)6
CYB 4816Apprenticeship II (*)6
*Apprenticeship courses
Elective Courses
Required Credits: 6
CIS 4703Blockchain Technology3
CIS 4013Data Analytics for IT Professionals3
CIS 4003Green Computing3
General Studies
Required Credits: 18
LSM 1013Mathematics for Computing3
LSC 1103Professional Written Communication3
CIS 1703Introductory Statistics and Probability3
LSS 1133Critical Thinking and Research Skills3
CIS 2603Artificial Intelligence Foundations3
AES 1003Emirati Studies3
Description Data
Total Required Credits 120
Maximum Duration of Study 6 years
Minimum Duration of Study 4 years
Cost Recovery Program No
Program Code BACYB
Major Code CYB

Recommended Sequence of Study

Plan of Study Grid
Year 1
Semester 1Credit Hours
CIS 1313 Introduction to Computer Systems and Networks 3
CIS 1203 Web Technologies 3
CIS 1603 Programming I 3
LSM 1013 Mathematics for Computing 3
LSC 1103 Professional Written Communication 3
 Credit Hours15
Semester 2
CIS 1213 Introduction to Information Security 3
CIS 1303 Database Systems 3
CIS 1613 Programming II 3
CIS 1703 Introductory Statistics and Probability 3
LSS 1133 Critical Thinking and Research Skills 3
 Credit Hours15
Year 2
Semester 3
CIS 2033 User Centered Design 3
CIS 2023 Applied Discrete Mathematics 3
CIS 2213 Full-stack Web Application Development 3
CIS 2113 Introduction to Software Engineering 3
CIS 2603 Artificial Intelligence Foundations 3
 Credit Hours15
Semester 4
CYB 2413 Advanced Networking 3
CYB 2423 Cryptography and Data Protection 3
CIS 3303 System Architecture and Integration 3
CIS 2903 Operating Systems 3
AES 1003 Emirati Studies 3
 Credit Hours15
Year 3
Semester 5
CYB 3513 Switching, Routing and Wireless Essentials 3
CYB 3523 Virtualization and Cloud Technologies 3
CYB 3533 Penetration Testing and Ethical Hacking 3
CYB 3543 Digital Forensics and Investigation 3
CIS 3603 Project Management 3
 Credit Hours15
Semester 6
CYB 3613 Secure Software Architecture and Coding 3
CYB 3623 Enterprise Networking, Security and Automation 3
CYB 3633 Security Operation and Threat Intelligence 3
CYB 3643 Cloud Architecting 3
CIS 3503 Technopreneurship 3
 Credit Hours15
Year 4
Semester 7
CYB 4716 Apprenticeship I 6
CYB 4723 Cyberspace Law and Ethics 3
CYB 4733 Capstone Project I 3
4000 Level Elective 3
 Credit Hours15
Semester 8
CYB 4816 Apprenticeship II 6
CYB 4823 Cybersecurity Governance, Risk and Compliance 3
CYB 4833 Capstone Project II 3
4000 Level Elective 3
 Credit Hours15
 Total Credit Hours120

Abdelrahman Abdelgader, Ph.D Computer Science, Universiti Teknologi Malaysia, Malaysia
Abraham George, Ph.D, Computer Science, University of Louisville, United States
Ahmad Manasrah, Ph.D, Network Security, University Sains Malaysia, Malaysia
Akhtar Khalil, Ph.D, Information & Comm Technology, Loughborough University, United Kingdom
Ali Abu Romman, Master's Degree, Information System Security and Digital Criminology, Princess Sumaya University for Technology, Jordan
Ashraf Alkaraki, Master of Engineering, Cybersecurity and Cloud Computing, Mutah University, Jordan
Atiq Ur Rahman, Ph.D, Information Technology, Universiti Teknologi Petronas, Malaysia
Aws Mohammad Alawneh, MSc, Computer Networking, Wichita State University, USA
Ayman Ahmed, Master of Science, Telecommunications, DePaul University, United States
Azmi Alazzam, Ph.D, Industrial & System Engineering, State University of New York, United States
Benson Raj, Ph.D, Information Communication, Anna University, India
Dana Alhajjar, Masters, Information Technology Management, University of Wollongong, United Arab Emirates
Dimitrios Xanthidis, Ph.D, E-Commerce, University of London, United Kingdom
Eraj Khan, Ph.D, Communication Systems and Cybersecurity, Lancaster University, United Kingdom
Filsia Mohamed Manzil, MSc, Security and Forensics, Edinburgh Napier University, United Kingdom
Gideon Bibu, Master of Science, Computer Science, University of Ibadan, Nigeria
Hani Qusa, Ph.D, Computer Science & Engineering, Sapienza University of Rome, Italy
Hassan Osman Ali, Ph.D, Information Systems, Universiti Teknologi Malaysia, Malaysia
Hassan Shama, Master of Science, Computer Network Technology, Middlesex University, United Arab Emirates
Hicham El Zabadani, Ph.D, Computer Engineering, University of Florida, USA
Hussain AlAqrabi, PhD, Computer Networks and Security, University of Derby, United Kingdom
Israr Ahmed, Master of Science, Network & Computer Security, New York Institute of Technology, United States
J Ines Gervacio, Master in Computer Science, Information Security, National Polytechnic Institute, Mexico
Ja'far Alqatawna, Ph.D, Information and Communication Systems Security, Sheffield Hallam University, United Kingdom
Jamal Diab, Master of Science, Computer Science, Abu Dhabi University, Abu Dhabi, UAE
Jero Sayco, Master of Science, Management Engineering, University of Santo Tomas, Philippines
Jinesh Padikkapparambil, Master of Technology, IT - Networking, VIT University, India
Khalid Anjum, Master of Science, Computer Networking, Middlesex University, United Kingdom
Khalifa Al Amer, Master of Science, Mathematical & Computer Science, University of Salford, United Kingdom
Khawla Abdulla Saif Mohammed Al Shehhi, Master of Applied Science, Information System Management, Higher Colleges of Technology, United Arab Emirates
Moataz Salhab, Master of Science, E-Commerce, Coventry University, United Kingdom
Mohamad Jaber, PhD, Computer Science, University of Nice, France
Mohamed Said Elsersy, Ph.D, Computer Engineering, Memorial University of Newfoundland, Canada
Mohamed Trojet, Ph.D, Computer Science, University of Aix-Marseille, France
Mohammad Deebajah, MSc, Networking professional, Sheffield Hallam University, United Kingdom
Mohammed Al-Saleh, Ph.D, Computer Science, University of New Mexico, United States
Mohammed Alshehhi, MSc, Data Science, Birmingham University, Dubai
Mohammed Saleh, Ph.D, Electrical & Computer Engineering, Victoria University, Australia
Mohsin Iftikhar, Ph.D, Mathematical Computer Science, University of Sydney, Australia
Mouna Sleiman Chebli, MSc Information Technology, Cyber Security, Zayed University, United Arab Emirates
Muhammad Adnan, Ph.D, Communication & Information Sciences, Dongguk University, South Korea
Muhammad Adnan, Ph.D, Computer Science, Glasgow Caledonian University, United Kingdom
Muhammad Ahmed, Master of Business Administration, Business Information Technology, International Islamic University, Pakistan
Muhammad Emran, Ph.D, Computer Science, Slovak University of Technology, Slovakia
Muhammad Farid, Master of Science, Computer Network Technology, Middlesex University, United Kingdom
Muhammad Mohsin Saleemi, Ph.D, Computer System Engineering, Abo Akademi University, Finland
Muhammad Nadeem, PhD in Computer Science, Cybersecurity, Mississippi State University, United States of America
Muhammad Wannous, Ph.D, Computer Science, Kumamoto University, Japan
Munther Al Hassan, Master of Science, Satellite Communication Engineering, University of Surrey, United Kingdom
Musa Shuaibu Bala, Ph.D, Science and Technology Management, University Sains Malaysia, Malaysia
Nabih Abdelmajid, Ph.D, Computer Security, University of Bradford, United Kingdom
Nafeth Al Hashlamoun, Ph.D, E-Research & Technology Enhanced Learning, University of Lancaster, United Kingdom
Najm Hassan, Ph.D, Computer Science & Engineering, University of New South Wales, Australia
Nazar Waheed, Ph.D, Cybersecurity, University of Technology Sydney, Australia
Nedaa Baker Jamil Al Barghuthi, Doctor of Philosophy in Computer Science, British University in Dubai, United Arab Emirates
Nor Azizah Hitam, Ph.D, Computer Science, International Islamic University Malaysia, Malaysia
Omar Al-Amir, Ph.D, Computer Science, Anglia Ruskin University, United Kingdom
Omar Eltaher Abuelmaatti, Ph.D, Computer & Information System, Liverpool John Moores University, United Kingdom
Osama Abdulrhman, MSc, Communication Engineering (Networking & Security), Aleppo University, Syria
Osama Abu Rahmeh, Ph.D, Computer & Communications Engineering, Liverpool John Moores University, United Kingdom
Osama Dandash, PhD, Computer Science and Information Systems, Monash University, Australia
Osama Hosameldeen, PhD, Computer Technology Engineering, Hunan University, China
Peer Azmat Shah, Ph.D, Information Technologies, Universiti Teknologi Petronas, Malaysia
Rafi Us Shan, PhD, Communication Systems, Lancaster University, United Kingdom
Raiza Borreo, Ph.D, Information Technology, AMA University, Philippines
Rajesh Thomas, Master of Science, Computational Science & Engineering, University of Technology Mauritius, Mauritius
Randy Catacutan, Master of Arts, Computer Education, AMA University, Philippines
Saleel Arrayal Parambath, Master of Science, Information Network & Communication Security, New York Institute of Technology, United States
Saleimah Al Mesmari, Ph.D, Computer Science, British University, Dubai
Samer Aoudi, Ph.D, Applied Computer Science, Northcentral University, United States
Sayed Asif, Master of Science, Information System Management, The University of Liverpool, United Kingdom
Shinju Philip, Master of Science, Computer Science, Bharathiar University, India
Sohail Gohir, MSc, Network Management & Security, London Metropolitan University, United Kingdom
Sujni Paul Arulraj, Ph.D, Computer Application, Karunya University, India
Suleiman Almasri, Ph.D, Computer Science, Anglia Ruskin University, United Kingdom
Talal Ashraf Butt, Ph.D, Computer Science, Loughborough University, United Kingdom
Thanis Ibrahim, MSc, Electrical Power and Control Engineering, Liverpool John Moore's University, United Kingdom
Vasaki Ponnusamy, Ph.D, Information Technology, Universiti Teknologi PETRONAS, Malaysia
Venkitta Hafis, Master of Science, Software Technology & Systems Management, Manonmaniam Sundaranar University, India
Waleed Al-Sit, Ph.D, Electrical & Electronic Engineering, The University of Liverpool, United Kingdom
Zahoor Khan, Ph.D, Engineering Mathematics, Dalhousie University, Canada
Zeeshan Hameed, Ph.D, Information and Communication Technology, Ajou University, South Korea