Program Mission
The program's mission is to develop cybersecurity professionals who can effectively identify, analyze, and mitigate cyber threats and vulnerabilities. It focuses on building expertise in areas such as network security, system security, cryptography, incident response, and risk management. provide students with a solid foundation in cybersecurity principles, skills, and ethics, preparing them to address the challenges of securing information systems and networks in today's digital world.
Program Objectives
(a) Provide students with a comprehensive and well-rounded understanding of cybersecurity principles, concepts, and technologies. It focuses on building a strong foundation of knowledge in areas such as network security, operating system security, cryptography, and risk management.
(b) Develop students' technical skills necessary for effectively securing information systems and networks. This includes skills in areas such as vulnerability assessment, penetration testing, incident response, secure coding, and the use of cybersecurity tools and technologies.
(c) Emphasizes the development of critical thinking skills and problem-solving abilities in the context of cybersecurity. Students are encouraged to analyze complex cybersecurity challenges, assess risks, and develop innovative solutions to address them effectively.
(d) Promote a strong sense of ethical and legal responsibility in students. It emphasizes the importance of ethical behavior, respect for privacy, compliance with laws and regulations, and the ethical use of cybersecurity tools and techniques.
(e) Recognizes the importance of effective communication and collaboration in the field of cybersecurity. It aims to develop students' ability to communicate cybersecurity concepts clearly and concisely, collaborate effectively in team settings, and engage with stakeholders at various levels.
(f) Prepare students for industry-relevant certifications in cybersecurity. This can include certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM), among others.
(g) Seeks to foster a mindset of continuous learning and professional development among students. It aims to equip students with the skills and resources necessary to stay updated with evolving cybersecurity trends, technologies, and best practices throughout their careers.
(h) Facilitate Industry Engagement and Practical Experience: The program may strive to provide opportunities for students to engage with the industry through internships, cooperative education programs, or partnerships with cybersecurity organizations. It aims to facilitate practical, hands-on experiences that bridge the gap between theory and real-world applications.
(i) Foster Research and Innovation: Some programs may have a goal of promoting research and innovation in the field of cybersecurity. They aim to encourage students to engage in research projects, explore new approaches and technologies, and contribute to the advancement of knowledge in cybersecurity.
(j) Prepare students for successful careers in cybersecurity. It focuses on equipping students with the knowledge, skills, and competencies needed to secure employment in various cybersecurity roles and advance in their professional trajectories.
Career Opportunities
(a) Cybersecurity Analyst.
(b) Security Operations Center (SOC) Analyst.
(c) Incident Responder.(d) Security Consultant.
(e) Network Security Engineer.
(f) Penetration Tester.
(g) Security Auditor.
(h) Security Engineer.
(i) Security Administrator.
(j) Cryptographer.
Learning Outcomes
Knowledge and understanding |
||
K1 |
Solid understanding of the fundamental concepts and terminology used in cybersecurity. This includes knowledge of different types of threats, vulnerabilities, and attacks, as well as principles of defense, risk management, and incident response. |
|
K2 |
Knowledge of secure software development practices and techniques. They learn about secure coding principles, common software vulnerabilities, secure software testing, and secure software development life cycle (SDLC) methodologies. |
|
K3 |
Understanding of the legal and ethical frameworks relevant to cybersecurity. They learn about privacy laws, regulations, and compliance requirements. They also explore ethical considerations, professional codes of conduct, and the importance of responsible use of cybersecurity tools and techniques. |
|
Skills |
||
S1 |
Ability to analyze cybersecurity incidents, investigate security breaches, and determine the root cause of vulnerabilities. |
|
S2 |
Secure coding practices, software vulnerability assessment, and secure software testing techniques. |
|
S3 |
Analyzing cybersecurity data, identifying patterns and trends, and deriving insights to enhance security measures. |
|
Values, Autonomy, and Responsibility |
||
V1 |
Emphasizes the importance of ethical behavior in cybersecurity, respect privacy rights, and handle sensitive information with integrity and confidentiality. |
|
V2 |
Emphasis on collaborative work, fostering effective teamwork, and developing communication skills, students are given opportunities to work on group projects and assignments that simulate real-world cybersecurity scenarios. |
Admission Requirements
The University Council, in consultation with the College Councils and the Director of Admission and Registration, determines the number of students to be admitted each academic year. Admission requirements include:
- Holding a Saudi High School Certificate or its equivalent from the past five years, or a Diploma from a Technical or Community College for bridging program applicants. The University Council may make exceptions.
- Passing any tests or interviews deemed necessary by the University Council.
- Being medically fit and of good conduct.
- Providing a “No Objection” letter from the employer, if applicable (Admission Policy).
Specific conditions for the bridging program include (Admission Policy):
- High School Certificate suitability for the chosen college major.
- Acceptance into disciplines corresponding to the diploma specialization.
Applicants must take placement tests in English, mathematics, and computers. Those failing these tests must enroll in the preparatory year program. All submitted documents become the property of FBSU and cannot be returned (Admission Policy) .
The Admission Committee evaluates applicants based on high school grades, test results, personal interviews, and any additional acceptance tests. Admitted students are notified between August 1 and August 15 for the first semester, and January 1 and January 15 for the second semester (Admission Policy) , They receive a leaflet with registration and payment guidelines and must attend Orientation Day (Admission Policy) , (Admission of College Diploma Students). Failure to register on time without requesting deferred admission results in acceptance revocation (Admission Policy) .
Final Year Project (FYP)
Overview:
As part of their fourth year, all College of Computing students following a bachelor's program are required to carry out a significant project and submit a comprehensive technical report. This project is a substantial piece of work that demands creative activity and original thinking. Students, typically grouped in teams of three, are supervised while working on a project that accounts for 4 credits and extends over a full academic year.
Objectives:
The Final Year Project (FYP) aims to provide students with a transitional experience from the academic world to the professional world.
It serves as a platform for students to engage in meaningful design experiences requiring the solution of complex engineering design problems.
The project is important for several reasons:
1. Capstone Design Work: It is the largest single piece of design work that a student undertakes during their bachelor's degree program.
2. Specialization Opportunity: It allows students to specialize in a topic that they enjoy and are passionate about.
3. Professional Relevance: It is the work that prospective employers are most likely to inquire about during job interviews.
4. Skill Demonstration: It allows students to showcase a wide range of skills learned throughout their academic journey.
5.Comprehensive Development: Students must demonstrate their ability to deliver a product that has passed through design, analysis, testing, and evaluation stages.
Support and Resources:
1. Faculty Advisors: Each team is assigned a faculty advisor who provides guidance, feedback, and support throughout the project.
2. Workshops and Seminars: Regular sessions to assist students with various aspects of their projects, such as research methodologies, project management, and technical skills.
3. Laboratories and Equipment: Access to state-of-the-art computer labs, software tools, and other resources necessary for project development.
4. Peer Support: Opportunities for collaboration and knowledge sharing with fellow students.
Evaluation Criteria:
The FYP is evaluated based on several criteria, including:
1. Originality and Innovation: The uniqueness and creativity of the project.
2. Technical Competence: The application of technical skills and knowledge.
3. Project Management: The ability to plan, execute, and manage the project effectively.
4. Documentation: The quality and thoroughness of project documentation.
5.Presentation and Defense: The effectiveness of the oral presentation and the ability to defend the project.
Contact Information:
For more details on the Final Year Project requirements and guidelines, please contact:
-FYP Coordinator: Mrs. Hiba Alsenawi
-Email: habdelhakim@fbsu.edu.sa
-Office: Room 2033, College of Computing