[email protected] 092311337

Cybersecurity Technology

The Cybersecurity Technology program aims to equip students with the integrated knowledge and skills needed to protect computer systems and networks in organizations and institutions against cyber threats. The program focuses on developing graduates’ competencies in several key areas, including:

  • Contributing to the development of institutional security and protection policies.
  • Managing user access and implementing security systems.
  • Conducting penetration testing and identifying network vulnerabilities.
  • Designing and building wired and wireless computer networks.
  • Managing computer networks and user accounts centrally through specialized server operating systems.
  • Writing code for specialized computer applications.

Graduates of the Cybersecurity Technology program will be able to:

  • Analyze computing problems and apply computing principles and related disciplines to identify effective solutions.
  • Evaluate computing-based solutions to meet technical and security requirements.
  • Communicate effectively within diverse professional teams.
  • Recognize professional responsibilities and make informed judgments in computing practices based on legal and ethical principles.
  • Work effectively as team members or leaders in program-related activities.
  • Apply security principles and practices to hardware, software, and human components of systems.
  • Analyze and evaluate systems to ensure operational continuity in the presence of risks and threats.

Graduates of the Cybersecurity Technology program are expected to find career opportunities in the following fields:

  • Cloud support services.
  • IT support and administration.
  • Software and application development.
  • Network monitoring and intrusion detection.
  • Cybersecurity analysis and operations.
  • Network security administration.
  • Investigating, documenting, and reporting security breaches.
  • Assisting end-users with security products and procedures.
  • Contributing to the development of organizational security strategies.
  • Employment in institutions applying information systems and requiring the design or implementation of information security systems across relevant sectors, ministries, government agencies, and private companies.