Bachelor of Science in Information Technology Cyber Security

Bachelor of Science in Information Technology Cyber Security

Information Technology Program:

Introduction

The Department of Information Technology offers a Bachelor of Science in Information Technology degree, which is a 4-years program that requires the completion of 123 credit hours The Information Technology curriculum comprises two concentrations: Cyber Security and Data Analytics. The program is accredited by the Ministry of Higher Education.

Mission

The mission of the Information Technology program is to:

  • Provide quality education in the field of emerging technologies based on internationally recognized standards for undergraduate programs;
  • Produce information technology professionals who can deploy efficiently IT technologies and implement IT solutions according to market and society needs, particularly in the UAE and Gulf region; and
  • Prepare graduates for lifelong learning and research.

Program Educational Goals

Graduates of the Bachelor of Science in Information Technology program with two concentrations will have the following characteristics within few years of graduation:

  • Apply acquired knowledge and skills in information technology and implement their skills in public, private sectors, academic or international information Technology functional activities.
  • Act as information systems professional leaders in performing related skills in technical, business, or ethical duties.
  • Engage in life-long learning and professional development in pursuing additional graduate degrees, professional development and self-studies.

Programs Offered

The Bachelor of Science in Information Technology has the following two concentrations:

  • Bachelor of Science in Infornmation Technology/Cuber Security
  • Bachelor of Science in Infornmation Technology/Data Analytics

All Program Goals are aligned with the needs of program constituencies as follows:

  • IT Students: They are to be developed as qualified Information Technology who can be gainfully employed after their graduation and can proceed for graduate studies in UAE or abroad.
  • IT Alumni of both concentrations: They are graduates of IT program and working in the market. They should be competent team members and leaders in their profession, able to update and adapt their knowledge and skills, and engage with community at all levels in an ethical and professional manner.
  • IT Department Faculty: They are primarily responsible to provide quality education to students equipping them with theoretical knowledge and practical skills. It is their responsibility to contribute and promote the achievement of IT program objectives.
  • Employers of IT Graduates from both concentrations: The employers require productive and competent Information technology who can effectively contribute in their professional fields.

Program Learning Outcomes

There are six Learning Outcomes related to the Information Technology program and one learning outcome associated to each concentration. Graduates will be able to:

Common Programs learning Outcomes

       NQF Strands

PLO1

Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.

·       Knowledge.

·       Skills.

PLO2

Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements and user needs in the context of the program’s discipline.

·       Knowledge.

·       Skills.

PLO3

Communicate effectively in a variety of professional contexts,

·       Skills.

·       Autonomy and Responsibility.

PLO4

Recognize professional responsibilities, and make judgments based on legal and ethical principles.

·       Autonomy and Responsibility.

·       Role in Context.

·       Self-Development.

PLO5

Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.

·       Autonomy and Responsibility.

·       Role in Context.

PLO6

Identify and analyze user needs and to take them into account in the selection, creation, integration, evaluation, and administration of computing-based systems.

·       Knowledge.

·       Skills.

·       Autonomy and Responsibility.

Concentration in Cyber Security

Common Programs learning Outcomes

       UAEQF Strands

PLO7

Analyze and manage the challenges of large scale data analytics in different application domains

 

·       Skill.

·       Autonomy and Responsibility.

·       Role in Context.

Admission Requirements

  1. A minimum high school average of 70% for Elite or Advanced Track or 75% for General Track or equivalent in starndarized international systems.
  2. EMSAT score of 1100 for English Language or an equivalent English Proficiency Test approved by CAA.
  3. EMSAT score of 600 for Arabic Language. Alternatively, on-Arab students can register in a non-credit Introduction Arabic language course at USTF.

Career Opportunities 

Graduates of BSc. information Technology/Cyber Security are qualified for employment as Security Analyst, Security Architect, Security Software Developer, Security Engineer, Security Administrator, Cryptographer, Security Consultant

Graduates of BSc. information Technology/Data Analytics are qualified for employment as Data Scientist, Data Engineer, Data Analytics Consultant, IT Systems Analyst, Healthcare Data Analyst, Machine Learning Engineer, Big Data Engineer.

Graduation requirements

Students at University of Science and Technology of Fujairah (USTF) are eligible for a bachelor in Information Systems after completion of 123 credits hours, which normally takes eight semesters. The minimum cumulative grade point average for graduation is 2.0 for 123 total credits hours.

Degree requirement

The B.Sc. degree in Information Technology for each concentration requires the completion of a 123 Cr. Hrs. distributed according to the following plan. The study plan is designed so that the normal duration for completing the degree requirements is 4 years but should not exceed 8 years.

Type of Courses

Cr. Hrs.

1. University General Education Courses

24

(a) University Compulsory Courses

21

(b) University Elective Courses

3

2. Information Technology Program Compulsory Common Core Courses

84

(a) IT Program General Requirements

9

(b) IT Program Core Courses

72

(c) Internship

3

3. Information Systems Program Concentration Courses

15

Total Credit Hours

123

University General Education Requirements

(a) University Required Courses (21 Cr. Hrs.)

Course Code

Course Name

Credit hours

ISL112

Islamic Culture (Non Arabs)

3

EMS111

Emirates Society (English)

3

ENG111

English Communication Skills

3

IES112

Innovation, Entrepreneurship and Sustainability (English)

3

STA113

Statistics (English)

3

COM112

IT Fundamentals (English)

3

ARB112

Communication Skills in Arabic Language

3

University Elective Courses (3 Cr. Hrs.)

Course Code

Course Name

Credit hours

ISH213

Islamic Civilization

3

THI213

Critical Thinking

3

PSY101

Introduction to Psychology

3

LAW100

Introduction to Law

3

ARC211

Principles of Architecture & Art

3

ART111

Introduction to Art

3

BID111

Introduction to Interior Design

3

ART113

Introduction to Aesthetics

3

ARB113

The Art of Writing Expression

3

ENV112

Environmental Science

3

SSW101

Introduction to Sociology

3

DER118

Introduction to Public Relations & Advertising

3

SOC112

Communication Between Cultures

3

MGT200

Introduction to Management

3

IT Program General Requirements (9 Cr. Hrs.)

Course No.

Course Title

Contact and Credit Hrs.

Prerequisite

Lec

Lab

Tut

Cr. Hrs.

INT103

Information Technology in Business

3

0

0

3

-

MTH102

Discrete Mathematics

3

0

2

3

INT101

INT101

Calculus for IT

3

0

2

3

-

IT Program Core Courses and Internship (75 Cr. Hrs.)

Course No.

Course Title

Contact and Credit Hrs.

Prerequisite

Lec

Lab

Tut

Cr. Hrs.

INT100

Introductory Programming

2

2

0

3

-

INT201

Object Oriented Programming

2

2

0

3

INT100

INT202

System Analysis and Design

3

0

0

3

INT103

INT203

Computer Organization

3

0

0

3

Com111

INT204

Data Structure

3

0

2

3

INT201

INT205

Fundamentals of Data Communications and Networking

2

2

0

3

INT203

INT206

Fundamentals of Web Systems

2

2

0

3

INT201

INS207

Leadership and Teamwork

3

0

0

3

INT 103

INT209

Fundamentals of Data Science

3

0

2

3

INT101-INT201

INT301

Operating Systems

2

2

0

3

INT203

INT302

Database Management Systems

2

2

0

3

INT201

INT303

Fundamentals of Information Security

3

0

0

3

INT205

INT305

Internet of Things

2

2

0

3

INT204-INT205

INT306

Computer Ethics and Professional Practices

3

0

0

3

INT303

INT307

Information Technology Project Management

2

2

0

3

INT202

INT309

Cloud Computing

2

2

0

3

INT205-INT206

INT313

User Interface Design

3

0

0

3

INT202

INT323

Big Data Technologies

3

0

0

3

INT302

INT324

Dynamic Web Design and Development

2

2

0

3

INT206

INS402

Business Intelligence and Data Warehousing

3

0

0

3

INT323

INT404

Internship

-

-

-

3

90 Cr.Hrs

INT429

Mobile Applications Development

2

2

0

3

INT201-INT301

INT430

Artificial Intelligence

2

2

0

3

INT204-INT209

INT431

Graduation Project I

1

4

0

3

90 Cr.Hrs

INT432

Graduation Project II

1

4

0

3

INT431

Cyber Security Concentration - Compulsory Concentration Courses (21 Cr. Hrs.)

Course No.

Course Title

Contact and Credit Hrs.

Prerequisite

Lec

Lab

Tut

Cr. Hrs.

INT444

Wireless and Mobile Networks security

3

0

0

3

INT205-INT303

INT442

Cryptography

2

2

0

3

INT204-MTH102

INT441

Digital Forensics

3

0

0

3

INT303

INT443

Ethical Hacking

2

2

0

3

INT442-INT441

INT447

Selected Topics in Cyber Security

3

0

0

3

INT301

Study Plan

Study Plan

 

Information Technology Program Courses Descriptions

INT100 Introductory Programming

This course provides knowledge and skills of problem solving and introductory programming using Java programming language. Topics cover: the problem- solving process; data types; variables, constants, and scope; simple sequential programs; basic input/output; selection and repetition control structures; arrays and strings; user-defined methods, and Input/output file processing.

INT101 Calculus for Information Technology

This course covers the essential mathematical topics that students specialized in information technology need. The first part of the course deals with plane analytic geometry. The second part covers the basic knowledge about matrices and determinants. The third part is designed to provide students with notions of real functions: limits, continuity, differentiability, and integration with applications on simple derivatives and integrals.

MTH102 Discrete Mathematics

The course introduces students to fundamentals of discrete mathematics and statistics that IT professionals should acquire. The course covers relevant topics in sets, functions, relations, number systems, logic, hypothesis, vector and matrices, and statistical sampling. The course also introduces students to basic terminologies of trees, and graph theory.

INT104 Information Technology in Business

The major role of information technology (IT) is to support organizational personnel, regardless of their functional area or level in the organization. The aim of this course is to provide students with solid grounding in business uses of information technology in a rapidly changing environment, and to provide discussion of critical issues surrounding the use of IT in organizations. This course covers a range of general information technology topics that will make the student appreciate the role of IT in business. Topics include: information technology fundamentals; information technologies; computer networks and security; business applications; development processes; and ethical, societal and security issues.

INT201 Object Oriented Programming

The primary objective of this course is to introduce the concepts of object-oriented programming: classes, objects, methods, object interaction, encapsulation, inheritance, polymorphism, composition, recursive algorithms, and exception handling. This course is not meant as a comprehensive introduction to all of Java concepts such as applets and socket programming.

INT 202 Systems Analysis and Design

This course introduces the phases of the System Development Life Cycle. Topics covered include: Systems Development Methodologies, System Project Planning; Requirement Analysis; System Design; Human Computer Interaction Layer Design; Physical Architecture Layer Design; and Implementation Phase. Systems analysis and design using UML will be discussed theoretically.

INT203 Computer Organization

This course is designed to give students a comprehensive knowledge of computer architecture at the hardware and software levels. The students will learn the fundamentals of computer organization and architecture, covering the topics related to operating system, processor, memory locations and operations, addressing modes, instruction types, number representation, digital logic, CPU Basics, Registers, Control Unit, Cache Memory, Input/output and parallel systems.

INT204 Data Structure

The course covers the Abstract Data Types (ADT), as well as the design and implementation of data structures such as arrays, stacks, queues, linked lists, binary search trees, and graphs along with algorithms that make use of such structures including algorithms for sorting, searching, and recursive solutions will be studied.  Algorithms will be analyzed in terms of time complexity will be considered as well. Students will write programs that embody these data structures and algorithms.

INT205 Fundamentals of Data Communications and Networking

This course provides an introduction to computer networks and the Internet. It also introduce students to Protocol layers and the OSI model, Network models, Network Performance, Switching and Network Devices. Data Link Layer: ARP, Error Detection and Correction, Data-link Control, Medium Access, Ethernet, WLANs, Network Layer: IP and Routing Algorithms, Transport Layer: UDP, TCP, Congestion Control, Application Layer: Web, FTP, e-mail, DNS and P2P..

INT206 Fundamentals of Web Systems

This course introduces the fundamentals of client Web systems technologies to students. Topics covered include: XHTML, CSS, XML, and JavaScript, Students will apply this knowledge to generate essential web components like basic browser controls (buttons, links, and menus), forms and frames.

INS207 Leadership and Teamwork

This course builds on students’ soft skills attained throughout the university years including written and oral communications, the ability to apply technology in learning, critical thinking and problem solving in order to lead a group of people or an organization to achieve a short term goal related to a project or a generic mid-term goal. Student will apply feedback elicitation to gauge success of approach and make amendments as necessary to achieve more effective results; both peer feedback and instructor feedback will be utilized for this purpose. The course will also involve the students in discussions, debate, presentations and seminars in order to create opportunities to assess each other’s work and give feedback. There will be a final report/essay and presentation that reflects and summarizes the benefits of successful activities and lessons learnt from others.

INT209 Fundamentals of Data Sciences

This course will introduce the basic concepts and skills needed to extract knowledge from data. The students will learn the basics of statistical interference and machine learning needed to analyze the data. Students will learn concepts, algorithms and tools they need to deal with various facets of data science, including data exploratory analysis, data science process, feature generation and feature extraction, data visualization, and the ethics of data science.

INT301 Operating Systems

This course covers the principles and concepts of modern operating systems. Operating system services: processes and process management, memory management, file systems, Input/Output and device control, deadlocks, and case studies. To introduce the student to the principles and practice of operating systems with respect to effective and convenient management and operation of a computer operating system.

INT302 Database Management Systems

This course is designed to give a theoretical and practical background in database techniques. It covers database concepts, data models, data dictionary, entity relationship diagrams, and the relational data model, converting E-R models to relational model, SQL language, normalization, and physical database design. Oracle software is used in the Lab.

INT303 Fundamentals of Information Security

This course aims at introducing fundamental security concepts to students. Basic security concepts such as CIA model and cryptography techniques in security information system will be introduced. Other topics include: Authentication, Access Control, Database Security, Malicious Software, Denial of Services Attack, and Network Security. Students will also learn the legal and ethical aspects of information security.

INT305 Internet of Things

This course will introduce students to the new type of Internet application that endeavors to make the thing’s information (whatever that may be) available on a global scale. The course covers the building blocks of Internet of Things (IoTs) and their characteristics. A Taxonomy of IoT systems is proposed comprising of various IoT levels with increasing levels of complexity. The student will be able to describe domain specific Internet of Things and their real-world applications. The course covers the programming aspects of Internet of Things and packages, frameworks and cloud services. Student will examine various IoT domains.

INT306 Computer Ethics and Professional Practices

This course will examine the ethical issues that arise in the use of computers, and the responsibilities of those who work with computers, either as computer science professionals or as end users. Topics covered include: legal, social and ethical issues surrounding computer technology and its use; privacy; intellectual property rights and copy right laws; information technology code of ethics; issues of privacy and confidentiality; risks of using computers; and computer crime: computer viruses, hacking, phishing & pharming, scams.

INT307 Information Technology Project Management

This course covers concepts and issues related to information technology project management. Main topics of the course include: Project management processes and integration, Project management scope, time, cost, quality, human resource, communication, risk and procurement management. Students will be able to apply appropriate legal and ethical standards in any IT related project.

INT309 Cloud Computing

This course aims to introduce students to theory and practice of cloud computing. Topics include: parallel and distributed systems; deployment and service models; cloud infrastructure; applications and paradigms; resource virtualization; management and scheduling; networking support; cloud storage systems; and cloud security.

INT313 User Interface Design

The course introduces students to principles and guidelines needed to develop interface designs. The course covers theoretical foundations and design processes such as usability of interactives systems, user interface requirements, interaction style and evaluation and user experience.

INT323 Big Data Technologies

This is an introduction to the technologies that are used for big data. The aim of the course is to provide students with the knowledge required to use big data technologies and learn how to store, and process big data sets. Topics covered include: Big Data and Spark stack, Hadoop, Hadoop Distributed File System, Map Reduce, PIG, HIVE, SQL, HBASE, Searching for data, and Big Data Management Challenges.

INT324 Dynamic Web Development

The aim of the course is to develop practical client side and server side programming, design and management skills used in the creation and updating of dynamic content systems. This course will help students to develop a detailed understanding of the client/server architecture of web based database publishing systems, the range of databases, and scripting languages available for the development of such systems. The students will be able to identify the role of dynamic content as used by a broad spectrum of organizations across a range of industry sectors.

INS402 Business Intelligence and Data Warehousing

Today’s IT deals with gigantic amount of information. The success of any organization greatly depends on its ability to process and understand its information and extract essential knowledge to help managers take well-informed decisions. This course teaches students the basic of data warehouse and how to deal with business intelligence – an information technology approach to data collection, data storage and data analysis to support a wide variety of management tasks, from performance evaluation to trend spotting and policy making. The students learn effective modeling techniques and use them to extract business intelligence and present them to users.

INT429 Mobile Applications Development

This course introduces mobile applications development. Students will be able to learn the development of mobile applications for cell phones and tablets. Main topics of the course include: Eclipse for Android Software Development, Android applications and building a view in Android, drawing 2D and 3D graphics and handling and persisting data during the application development process.

INT430 Artificial Intelligence

This course is designed to introduce the theory and techniques of AI to students. The course covers: knowledge representation schemes, classical and heuristic search techniques, inferencing, machine learning, and agents. The PROLOG language is also covered to enable students to represent, manipulate, and reason with knowledge.

INT431 Graduation Project I

Students shall design, implement, test and demonstrate their graduation project in two semesters. Graduation Project I is to be completed in first semester in the field of specilization and it includes literature survey, action plan, design of complete project taking into account realistic constraints, computer simulation (if applicable), partial implementation and testing. The course also includes report writing and oral presentation.

INT432 Graduation Project II

This course is a continuation of Graduation Project I in the second semester. In this course, students will complete the implementation and testing of the remaining part of their solution. They will integrate the complete project, test it, and prepare a Report, oral presentation, poster presentation, and project demonstration.

Information Technology/Cyber Security Concentration Courses

INT441 Digital Forensics

This course introduces the methodology and procedures associated with digital forensic analysis in a network environment. Students will develop an understanding of the fundamentals associated with the topologies, protocols, and tools required to conduct forensic analysis in a network environment. Students will also evaluate the importance of network forensic principles, legal considerations, digital evidence controls, and documentation of forensic procedures.

INT442 Cryptography

This course introduces students to the basic concepts of classical Cryptography. Students will gain hand-on understanding and practice of the cryptography related topics included: classical encryption techniques such as symmetric Cipher model, Substitution Techniques, and Steganography.  In addition, the students will learn Asymmetric Cipher model Public-key cryptography and RSA, cryptographic data integrity algorithms, and Symmetric Key Distribution Using Symmetric Encryption.  

INT443 Ethical Hacking

This course provides the student with advanced knowledge in ethical hacking and the strengths and weaknesses of the hardware and software. Students will analyze vulnerabilities and countermeasures and propose appropriate solutions. They will also be able to identify and manipulate the same tools and techniques used by hackers. Performing penetration testing will also be introduced as a tool to prevent breaking into computer systems.

INT444 Wireless and Mobile Networks Security

This course aims at providing students with a deep understanding about the security issues related to data networks work in real context. The course covers the major topics such as WLAN security, WLAN threats, and WLAN security measures as well as mobile communication security and mobile device models. Additionally, students will be able to detect mobile malware and application-based threats and select the suitable defense solution.