Degree Structure
College
Computing and Informatics
Department
Computer Engineering
Level
Undergraduate
Study System
Courses
Total Credit Hours
132 Cr. Hrs.
Duration
4 Years
Intake
Fall and Spring
Language
English
Study Mode
Full Time
Begin your academic journey with our user-friendly online application platform.
Important Dates
Get access to expert guidance.

Degree Overview
The proposed program enables the students to build solid technical foundation in cybersecurity engineering. During the study, students take courses on essential computer engineering topics and courses on data breaches, software and hardware vulnerabilities and possible solutions to improve security of various computer systems from cyberattacks. In the final year, students will develop senior capstone projects in line with the latest industry needs for building cyber-resilient systems. Senior students are required to perform practical training in industrial or governmental organization to improve their understanding of cybersecurity risks in real work environment and the measures to mitigate them.
What You Will Learn
The Bachelor of Science in Cybersecurity program will prepare you for careers in the network security industry. Students will learn best practices for the design of secure modern networks and software systems as well as advanced techniques for security engineering, digital forensics, applied offensive and defensive security, and applied cryptography. Students will learn about evolving threats and the proper use of specific security tools. Both security theory and hands-on practice are stressed and emphasize
University Requirements
The university requirements consist of 18 compulsory credit hours and 6 elective credit hours selected from 2 baskets; students select one elective from each basket. The program requires students to take 24 credit hours, 18 of which are compulsory and the 6 are electives. Seven domains are covered: Every student should take one course from Domain A, one course from Domain B, "Islamic Culture" the sole course in Domain C, "UAE Society" the sole course in Domain D, "Fundamentals of Innovation & Entrepreneurship" the sole course in Domain E, "Introduction to Information Technology" the sole course in Domain F, one course from Domain G, and one course from Domain H.
Compulsory Requirements (18 credit hours); Domains A-F:
Domain A: English Language
General Education & Course Domain | Course Titles | Courses Number | Cr.Hrs |
English Language | Basic English | 0202111 | 3 |
English for Academic Purposes | 0202112 | 3 | |
English for Medical Sciences | 0202121 | 3 |
Domain B: Arabic Language
General Education & Course Domain | Course Titles | Courses Number | Cr.Hr |
Arabic Language | Arabic Language | 0201102 | 3 |
Arabic Language for Non Arabic Speakers | 0201105 | 3 |
Domain C: Islamic Studies
General Education & Course Domain | Course Title | Course Number | Cr.Hrs |
Islamic Studies | Islamic Culture | 0104100 | 3 |
Domain D: UAE Studies
General Education & Course Domain | Course Titles | Courses Number | Cr.Hrs |
UAE Studies | UAE Society | 0204102 | 3 |
Domain E: Innovation & Entrepreneurship
General Education & Course Domain | Course Titles | Courses Number | Cr.Hrs |
Innovation & Entrepreneurship | Fundamentals of Innovation & Entrepreneurship | 0302200 | 3 |
Domain F: Information Technology
General Education & Course Domain | Course Title | Courses Number | Cr.Hrs . |
Information Technology | Introduction to Information Technology | 1501100 | 3 |
Elective Requirements (6 credit hours); Domains G-H:
Domain G: Humanities and Arts
General Education & Course Domain | Courses Title | Courses Number | Cr.Hrs |
Humanities Social and Arts | Islamic Civilization | 0203100 | 3 |
Human Rights in Islam and International Declarations | 0602246 | 3 | |
Introduction to Arabic Literature | 0201140 | 3 | |
History of the Sciences among Muslims | 0203200 | 3 | |
History of the Arabian Gulf | 0203102 | 3 | |
History of Medical & Health Sciences | 0900107 | 3 | |
Arts & Medicine | 0710109 | 3 | |
French Language | 0202130 | 3 | |
Fundamentals of Islamic Education | 0206102 | 3 | |
Introduction to Psychology | 0206103 | 3 | |
Introduction to Economics * | 0308150 | 3 | |
Introduction to Business Administration * | 0302150 | 3 | |
Media in Modern Societies ** | 0800107 | 3 | |
Personal Finance | 0308131 | 3 | |
Analytical Biography of the Prophet | 0104130 | 3 | |
Islamic System *** | 0103103 | 3 |
Domain H: Natural and Health Sciences
General Education & Course Domain | Courses Titles | Courses Number | Cr.Hrs . |
Natural & Health Sciences | Astronomy and Space Sciences | 1430101 | 3 |
Man and the Environment * | 0401142 | 3 | |
Health Awareness and Nutrition ** | 0507101 | 3 | |
Fitness and Wellness *** | 0505101 | 3 | |
Biology and Society | 1450100 | 3 |
Domain A: English Language
Domain B: Arabic Language
Domain C: Islamic Studies
Domain D: UAE Studies
Domain E: Innovation & Entrepreneurship
Domain F: Information Technology
Domain G: Humanities and Arts
Domain H: Natural and Health Sciences
College Requirements
Degree Requirements
A minimum of 132 credit hours are required to complete the program including 99 credit hours of major core requirements and 9 credit hours of major electives. In addition to the University courses for general education.
Requirements | Compulsory | Elective | Total | |||
- | Courses | Credit Hours | Courses | Credit Hours | Courses | Credit Hours |
University Requirements | 6 | 18 | 2 | 6 | 8 | 24 |
Program Requirements | 37 | 99 | 3 | 9 | 40 | 108 |
Total Credit Hours | 117 | 15 | 132 |
Course Description
Courses in the proposed program that are offered in the department of Computer Engineering start with (1502). The program of study contains courses that are offered by other colleges. Consistent with the university policies, CE courses in the program will be assigned numbers of the form (1502ABC) where:
A | Year (level) |
B | Areas (as follows) 0: General Cybersecurity Engineering 1: Electromechanical and Power 2: Electromagnetism 3: Control & Instrumentation 4: Communications & Signal Processing 5: Electronics 6: Special Topics 9: Projects and Seminars |
C | Course sequence in area |
1502111 | DiscreteMathematicsforEngineers | (3-0:3) |
In this course, the propositional logic, predicates, and quantifiers are defined. The sets, and its operations, functions are introduced. Different algorithms and their complexity are explored. Proof strategy, induction, recursion; relations, and equivalence relations are explained. Basic counting techniques are demonstrated. Prerequisites:Pre/Co: 1501116-Programming I. |
1502170 | IntroductiontoCybersecurityEngineering | (3-0:3) |
This course will introduce all aspects of cyber-security including business, policy and procedures, communications security, network security, security management, legal issues, political issues, technical issues, job and market prospects in cyber security. This serves as the introduction to the cyber security track in computer engineering department. Prerequisites: None. |
1502201 | DigitalLogicDesign | (3-0:3) |
This course covers topics related to number systems and conversion between systems based on different radices. The course introduces Boolean algebra and its application in the analysis and design of logic circuits. Then, common logic gates and their operation is introduced. The course then goes through different techniques for analysis and synthesis of combinational and sequential logic systems. Prerequisites:Second year Standing |
1502202 | DigitalLogicDesignLaboratory | (0-3:1) |
This course presents the operation of basic logic gates as well as some combinational and sequential circuits. The course illustrates how to design and implement different logic circuits such as adders, subtractors, decoders, encoders, flip-flops, counters, and shift registers. The design and implementation of the logic circuits will be accomplished practically in the lab by using Hardware Description Language (HDL) and circuit boards. Prerequisites:1502201 DigitalLogic Design. |
1502220 | Introduction to Probability and Data Analysis for Engineers | (3-0:3) |
This course introduces the students to the role of probability theory, statistics and data analysis in engineering. From the probability theory side, the course covers basic probability concepts and calculations, discrete random variables and probability distributions, continuous random variables and probability distributions, and joint random variables and probability distributions. From the statistics and data analysis side, the course covers descriptive statistics, parameter estimation and linear regression. Prerequisites:Second year standing |
1502250 | Introduction to Computer Electronics |
(3-0:3) |
Introduction to basic electrical and electronic circuit analysis. The course covers operations of circuits comprised of resistors, capacitors, inductors, and independent and dependent sources. Circuits will be considered under static and transient operation as well as under DC and AC excitation. The course will also introduce basic concepts of MOSFET transistors, amplifier circuits, and time and frequency design and analysis of electronic circuits. Finally, the course will introduce basic concepts of analog and digital circuits. Prerequisites:1430117- Physics II , 1440261 -Differential Equations for Engineers |
1502251 | Introduction to Computer Electronics Lab | (1-0:1) |
Fundamentals of DC circuits. Experiments about the behavior of DC networks under transient and steady state excitations. Modelling of circuits using SPICE as well as the use of test and measurement equipment such as function generators and oscilloscopes. Determining the characteristics and DC biasing circuits for MOS transistor. Spice simulation of MOSFET based digital circuits and experiments using discrete components and transistor arrays. Prerequisites: 1430118 - Physics II Lab |
1502270 | Database Security | (3-0:3) |
The course covers basic concepts of database management systems and known security threats on the data confidentiality and integrity. The topics include database models, SQL, mandatory and recommended access controls mechanisms, design of database with security in mind, protecting the integrity of data, protecting the security of database transactions, and database integrity rules. Topics on security of distributed databases and cloud databases will also be addressed. Prerequisites:1502111 - Discrete Mathematics for Engineers |
1502271 | Introduction to Cryptography | (3-0:3) |
The course focuses on how to secure computer systems. More specifically, students learn how to design and deploy confidentiality services, integrity verification services and access control services to both computer and communication systems. Cryptographic hashing, symmetric and public key cryptosystems are covered in details. Mathematical principles underlying encryption and various codebreaking techniques are also covered. The course also covers the deployment of cryptographic products and protocols in digital systems and metrics to quantify their effectiveness in protecting the system. Prerequisites:1502170 - Introduction to Cyber Security, 1502111 - Discrete Mathematics for Engineers |
1502300 | Professional,SocietalandEthicalIssues inEngineering | (1-0:1) |
An examination of the social impact of engineering and technology and its relationship to ethics, with the objective of identifying and clarifying obligations that might arise in technological research and its applications. The course will survey a variety of moral theories, as well as engineering codes of ethics. The case study method will be used: source will include the history of science and technology, and reports from professional societies. Topics covered include whistle blowing, environmental, safety, and privacy issues. Prerequisites:3rd year standing. |
1502472 |
Artificial Intelligence and Data Analytics for Security |
(3-0:3) |
This course will focus on employing Data Analytics models to solve engineering problems in Cyber Security. Such models are developed using Artificial Intelligence and statistical techniques such as fuzzy logic, neural networks, decision trees and regression analysis. These models will be evaluated empirically using real data and appropriate statistical tests. MATLAB, Weka, Minitab, R and similar tools will be used in this course. Prerequisites:0402241 Random Signal Theory |
1502340 | Data Communications | (3-0:3) |
This course introduces students to the basic principles of how to represent, manipulate, and transmit communication signals. Students will be exposed to the time-domain and frequency-domain representation and processing of data signals, as well as the building blocks of communication systems. Topics covered in this course include analog modulation techniques, digitization of analog signals, digital data transmission and modulation techniques, and an introduction to information theory. Prerequisites:1502220 - Introduction to Probability and Data Analysis for Engineers |
1502346 | ComputerCommunicationsandNetworks | (3-0:3) |
This course focuses on protocols, mechanisms and technologies for computer and communication networks, with a focus on the Internet. Topics related to protocols and technologies include Ethernet, the Internet protocol (IP), and the Transmission Control Protocol (TCP). Topics related to network mechanisms include layered network architecture, error-control, medium access control, switching and routing, addressing, subnetting and congestion control. Prerequisites:0402241 Random Signal Theory or 1502220 - Introduction to Probability and Data Analysis for Engineers |
1502347 | Computer Communications and Networks Laboratory | (0-3:1) |
This laboratory provides hands-on experience essential to the real understanding of computer networking and the devices used in building these networks. The goal is to give the student practical aspects of network topologies, network operating systems including the setup of dynamic host configuration (DHCP) and domain name system (DNS) services, peer to peer and server based networking, switch setup and VLANs, basics of IP addressing, subnetting and router configuration. Lab experiments are conducted in teams of students. Prerequisites:1502346 Computer Communications and Networks. |
1502373 | Information Security Management | (3-0:3) |
This course provides students with an insight into the fundamentals of managing modern information systems and their security operations. Topics include security policies and procedures, models and programs for designing and implementing security, risk management, access management and investigation, as well as legal and ethical implications of security management. Prerequisites:1502170 - Introduction to Cyber Security |
1502370 | Secure Operating Systems | (3-0:3) |
This course covers various topics in operating systems with a focus on the security aspect of operating system components. Topics include overview of basic concepts related to operating systems such as resource management, processes and their interaction, scheduling, synchronization, multithreading and file system along with the main algorithms used in modern operating systems. The course also covers the detection of threats posed against various components of operating systems and defense strategies adopted to counteract these threats. The course also includes case studies of contemporary operating systems and aproject. Prerequisites:1501215 - Data Structures |
1502371 | Secure Software Design and Development | (3-0:3) |
This course covers the design and implementation of secure software. Some of the topics covered are the characteristics of secure software, the role of security in the development lifecycle, designing secure software, and best security programming practices. Security for web and mobile applications will be covered. Prerequisites:1502170 - Introduction to Cyber Security |
1502372 | Introduction to Digital Forensics | (3-0:3) |
This course introduces digital forensics and cybercrime investigations. It covers the basic steps to conduct a digital forensic investigation, such as evidence gathering, preservation and analysis and presenting digital evidence to legal authorities. It also presents the tools used to find and analyze digital evidence on a variety of devices. Topics also cover laws and regulations in digital forensics. Prerequisites:1502170 - Introduction to Cyber Security |
1502444 | ComputerandNetworkSecurity | (3-0:3) |
Concepts and techniques for access to computer systems and network resources. Identification and authentication. Protection of information against intentional and unintentional attacks and threats. Cryptography and encryption of data. Encryption algorithms and their information theory foundations. Computer hardware and software for data encryption. Prerequisites:1501215 - Data Structures; Pre/Co: 1502346 - Computer Communications and Networks. |
1502450 | Introduction to Hardware Security | (3-0:3) |
Fundamentals of hardware security for electronic circuits. Cryptographic hardware, invasive and noninvasive attacks, side-channel attacks, physically unclonable functions (PUFs), true random number generation (TRNG), FPGA security, watermarking of Intellectual Property (IP) blocks, counterfeit hardware, hardware Trojans in electronic circuits. Prerequisites: 1502250 - Introduction to Computer Electronics, 1502170 - Introduction to Cyber Security, 1502201 - Digital Logic Design |
1502494 | Security Capstone I | (1-0:1) |
This is the first phase of the capstone project, which, consists of two courses Senior Design Prerequisites:Senior standing in CybersecurityEngineering; |
1502495 | Security Capstone II | (3-0:3) |
This is second phase of the capstone project, which consists of two courses Senior Design Project I and Senior Design Project II. During this phase, students are expected to implement. Prerequisites:1502494-Security Capstone I. |
Elective Courses
Descriptions of the elective courses are given below:
1502442 | NetworkProgramming | (3-0:3) |
This course provides a review of network protocols and topologies, TCP/IP, and RFCs with a focus on communication across different network layers. It illustrates the peer-to-peer and client-server communication models and demonstrates how to programmatically implement sockets to develop network applications using either TCP streams or UDP datagrams. Moreover, the course teaches students how to develop single-threaded and multi-threaded network applications like file-sharing, chat-server, http-client-server, etc. and how to handle Inter-Process Communications, Concurrency, and Synchronization. Prerequisites:1502346 - Computer Communications and Networks. |
1502470 | Data Confidentiality and Cloud Security | (3-0:3) |
This course covers the basic concepts of cloud architectural principles and design practices with the focus of the Cloud Security and confidentiality. The course addresses critical requirements of secured Cloud services. The course identifies and mitigates the aspects of Cloud risks, isolation between physical and logical sides. Cloud components including compute, network and storage are all considered. The course will also explore and discuss the identity management, access control, and data protection. Prerequisites:1411352 - Operating Systems, 1502170 - Introduction to Cyber Security |
1502461 | Special Topics in Cyber Security | (3-0:3) |
This course covers emerging and advanced topics in cyber security. The contents will vary depending on the topic. Prerequisites:Senior Standing |
1502471 | Internet and Web Security | (3-0:3) |
The course provides an overview of the methodologies for developing secure web-based applications. More specifically, the course addresses various security vulnerabilities of web applications and how to protect web-based applications from cyber-attacks. Topics covered in this course includes: web application developments, basic network security mechanisms and tools, webservers and how to secure them, and securing e-commerce applications. Additionally, security issues related to web databases applications and collaborative Web applications, will be studied. Prerequisites:1502271 - Introduction to Cryptography |
1502473 | Ethical Hacking | (3-0:3) |
This course provides a basic understanding of penetration testing and ethical hacking techniques. In security testing, an ethical hacker with legal permissions attempts to penetrate a system or systems to find a weak link and then analyze ways to correct the security flaws. Students will learn some of the exploitation techniques and tools used for ethical hacking. The course also covers recommended solutions to correct these flaws and protect systems and networks from potential attacks. Prerequisites:1502170 - Introduction to Cyber Security |
1502474 | Data Hiding and Steganography | (3-0:3) |
This course introduces the main properties of data hiding, steganographic and steganalysis systems. More specifically, students will learn about the embedding capacity, embedding efficiency, data payload and the traditional trade-off triangle: capacity-robustness-imperceptibility. Students will learn the differences between blind steganography and the private (non-blind) steganography. At the end of this course, students will be able to evaluate the robustness and the security of the stego-media using metrics like targeted steganalysis and statistical undetectability. Information theory fundamentals like entropy and redundancy will also be covered. Prerequisites:Senior standing |
Career Path
Career paths for this program include roles such as computer systems or network designers, digital system designers, IT security officers, embedded integrated circuit designers, and software and web developers. Additionally, graduates can explore opportunities in artificial intelligence, designing models to solve complex engineering problems.

How will you make an impact?
Every student’s journey at UoS and beyond is different, which is why our Career & Professional Development team provides personalized career resources to help students make an impact for years to come.