OverviewThe proposed program enables the students to build solid technical foundation in cybersecurity engineering. During the study, students take courses on essential computer engineering topics and courses on data breaches, software and hardware vulnerabilities and possible solutions to improve security of various computer systems from cyberattacks. In the final year, students will develop senior capstone projects in line with the latest industry needs for building cyber-resilient systems. Senior students are required to perform practical training in industrial or governmental organization to improve their understanding of cybersecurity risks in real work environment and the measures to mitigate them.
IntroductionThis program is designed using the credit hour system. Program is established to deliver 132 credit hours of courses that are divided into general education (24 credit hours) and specialized cybersecurity engineering subjects (108 credit hours). All technical courses are designed carefully for engineering degree with professional international curriculum standards. Both theoretical and practical aspects of the subjects will be covered and demonstrated. The courses provide both breadth and depth in secured computer architecture and hardware embedded systems, digital forensics, secured software development, cryptography and data hiding and more of the topics in both secured hardware and software of computer systems.
Program GoalsThe goals of the program are to:
- Maintain the knowledge and skills necessary for a lifelong career in cybersecurity engineering to provide quality services to the community.
- Remain globally competent and effective leaders.
- Continue to develop, through lifelong learning opportunities, their knowledge for using modern design tools and new technologies in the practice of cybersecurity engineering.
- Secure admission to and succeed in graduate study in internationally recognized universities.
Program Learning OutcomesUpon the successful completion of the program, student will be able to:
- Identify, formulate, and solve complex problems in cybersecurity engineering or related fields by applying principles of engineering, science, and mathematics.
- Apply engineering design to produce solutions that meet specified needs with consideration of public health, safety, and welfare, as well as global, cultural, social, environmental, and economic factors.
- Communicate effectively with a range of audiences.
- Describe ethical and professional responsibilities in engineering situations, including cyber security threats and attacks, and make informed judgments, which must consider the impact of engineering solutions in global, economic, environmental, and societal contexts.
- Function effectively on a team whose members together provide leadership, create a collaborative and inclusive environment, establish goals, plan tasks, and meet objectives.
- Conduct appropriate experimentation, analyze and interpret data, and use engineering judgment to draw conclusions.
- Apply new knowledge as needed, using appropriate learning strategies
Curriculum and Coursework Program Structure
Requirements | Compulsory | Elective | Total |
| Courses | Credit Hours | Courses | Credit Hours | Courses | Credit Hours |
University Requirements | 6 | 18 | 2 | 6 | 8 | 24 |
Program Requirements | 37
| 99 | 3 | 9 | 40 | 108 |
Total Credit Hours | 117 | 15 | 132 |
Program Requirements
Study Plan: Course List
1.Compulsory courses (99 credit hours)
The Cybersecurity Engineering core courses are listed in the table below.
Course # | Title
| Credits | Pre-/Co-requisites |
0402340 | Engineering Computation and Linear Algebra | 3 | 1501116; 1440261 |
1430115 | Physics I | 3 | Placement Test or 1430106 Pre/Co1440133 |
1430116 | Physics I Lab | 1 | Pre/Co1430115 |
1430117 | Physics II | 3 | 1430115
|
1430118 | Physics II Laboratory | 1 | 1430116; Pre/Co 1430117 |
1440133 | Calculus I for Engineers | 3 | None |
1440161 | Calculus II for Engineers | 3 | 1440133 |
1440261 | Differential Equations for Engineers | 3 | 1440161 |
1501116 | Programming I | 4 | None |
1501211 | Programming II | 3 | 1501116 |
1501215 | Data Structures | 3 | Pre/Co 1502111 |
1502111 | Discrete Mathematics for Engineers | 3 | Pre/Co 1501116 |
1502170 | Introduction to Cybersecurity | 3 | None |
1502201 | Digital Logic Design | 3 | Second year standing |
1502202 | Digital Logic Design Laboratory | 1 | Pre: 1502201 |
1502220 | Introduction to Probability and Data Analysis for Engineers | 3 | Second year standing
|
1502232 | Microprocessors and Assembly Language | 4 | 1502201 |
1502250 | Introduction to Computer Electronics | 3 | Pre/Co: 1430117, 1440261 |
1502251 | Introduction to Computer Electronics Lab | 1 | Pre: 1430118 Pre/Co: 1502250 |
1502270 | Database Security | 3 | Pre:1502111 |
1502271 | Introduction to Cryptography | 3 | Pre: 1502170, 1502111 |
1502300 | Professional, Societal, and Ethical Issues in Engineering | 1 | 3rd Year Standing |
1502310 | Artificial Intelligence for Engineers | 3 | Pre: 0402241 or 0402343 0405221 or 0402242 1502220 |
1502314 | Advanced Discrete Mathematics for Engineers | 3 | 1502111 |
1502326 | Computer System Architecture | 3 | 1502232 |
1502340 | Data Communications | 3 | 0402241 |
1502346 | Computer Communications and Networks | 3 | Pre/Co 0402241 or 1502220
|
1502347 | Computer Communications and Networks Laboratory | 1 | 1502346 |
1502370 | Secure Operating Systems | 3 | 1501215 |
1502371 | Secure Software Design and Development | 3 | 1502170 |
1502372 | Introduction to Digital Forensics | 3 | 1502170 |
1502373 | Information Security Management | 3 | 1502170 |
1502444 | Computer & Network Security | 3 | 1501215, 1502346 |
1502450 | Introduction to Hardware Security
| 3 | Pre: 1502250 ,1502170, 1502201
|
1502494 | Security Capstone I | 1 | 1502170 |
1502495 | Security Capstone II | 3 | 1502494 |
1502496 | Practical Training Cybersecurity Engineering | 3 | 16 Weeks
|
2.Elective Courses (9 credit hours)
As part of the program for the Bachelor of Science in Cybersecurity Engineering, the student is required to study some technical elective courses. These courses allow the student to focus on a specific area for in depth knowledge and deep understanding. The student can also mix and match elective courses from the different areas to get a wider exposure to the different Cybersecurity Engineering disciplines. The student should select, in cooperation with his/her academic advisor, the list of electives that best meet his/her needs and aspirations. It is highly recommended that the student registers for these courses after completing all department required courses.
The following table shows the list of elective courses.
Course # | Title
| Credits | Pre-/Co-requisites |
1502442 | Network Programming | 3 | 1502346 |
1502461 | S. T. in Cyber Security | 3 | Senior Standing |
1502470 | Data Confid. and Cloud Secur. | 3 | 1411352, 1502170 |
1502471 | Internet and Web Security
| 3 | 1502271 |
1502473 | Ethical Hacking | 3 | 1502170 |
1502474 | Data Hiding and Steganography | 3 | Senior standing |
3.University RequirementsThe university requirements consist of 18 compulsory credit hours and 6 elective credit hours selected from 2 baskets; students select one elective from each basket.The program requires students to take 24 credit hours, 18 of which are compulsory and the 6 are electives. Seven domains are covered:
Every student should take one course from Domain A, one course from Domain B, "Islamic Culture" the sole course in Domain C, "UAE Society" the sole course in Domain D, "Fundamentals of Innovation & Entrepreneurship" the sole course in Domain E, "Introduction to Information Technology" the sole course in Domain F, one course from Domain G, and one course from Domain H.
a) Compulsory Requirements (18 credit hours); Domains A-F:Domain A: English Language

Domain B: Arabic Language

Domain C: Islamic Studies

Domain D: UAE Studies

Domain E: Innovation & Entrepreneurship

Domain F: Information Technology
b) Elective Requirements (6 credit hours); Domains G-H: Domain G: Humanities and Arts

Domain H: Natural and Health Sciences

Domain A: English Language
Domain B: Arabic Language
Domain C: Islamic Studies
Domain D: UAE Studies
Domain E: Innovation & Entrepreneurship
Domain F: Information Technology
Domain G: Humanities and Arts
Domain H: Natural and Health Sciences
Course Distribution First YearCourse # | Course Title | Type | Cr.Hr | Course # | Course Title | Type | Cr.Hr |
0201102 | Arabic Language | C | 3 | 1501100 | Introduction to IT | C | 3 |
1430115 | Physics I | C | 3 | 1501211 | Programming II | C | 3 |
1430116 | Physics I Lab
| C | 1 | 1440161 | Calculus II for Engineers | C | 3 |
1440133 | Calculus I for Engineers | C | 3 | 1430117 | Physics II | C | 3 |
0202112 | English for Academic Purposes | C | 3 | 1430118 | Physics II Lab | C | 1 |
1501116 | Programming I | C | 4 | 1502170 | Introduction to Cybersecurity | C | 3 |
Total | 17 | Total | 16 |
Second YearCourse # | Course Title
| Type | Cr.Hr | Course # | Course Title | Type | Cr.Hr |
1502220
| Introduction to Probability and Data Analysis for Engineers | C | 3 | 1502250 | Introduction to Computer Electronics | C | 3 |
1440261 | Differential Equations for Engineers | C | 3 | 1502271 | Introduction to Cryptography | C | 3 |
1502201 | Digital Logic Design | C | 3 | 1502202 | Digital Logic Design Lab | C | 1 |
1501215 | Data Structures | C | 3 | 1502232 | Microprocessors & Assembly Language | C | 4 |
1502111 | Discrete Mathematics for Engineers | C | 3 | 1502314 | Advanced Discrete Mathematics for Engineers | C | 3 |
| | | | XXXXXXX | University Elective 1 | E | 3 |
Total | 15 | Total | 17 |
Third YearCourse # | Course Title | Type | Cr.Hr | Course # | Course Title | Type | Cr.Hr |
1502346 | Computer Communications and Networks
| C | 3 | 1502496
Summer | Practical Training Cybersecurity Engineering | C | 3 |
1502251 | Introduction to Computer Electronics Lab | C | 1 | 1502372 | Introduction to Digital Forensics | C | 3 |
1502340 | Data Communications | C | 3 | 1502371 | Secure Software Design and Development | C | 3 |
1502326 | Computer System Architecture | C | 3 | 1502373 | Information Security Management | C | 3 |
0402340 | Engineering Computations & Linear Algebra | C | 3 | 1502370 | Secure Operating Systems | C | 3 |
1502270 | Database security | C | 3 | 1502444 | Computer and Network Security | C | 3 |
Total | 16 | Total | 18 |
Fourth YearCourse # | Course Title
| Type | Cr.Hr | Course # | Course Title | Type | Cr.Hr |
1502347 | Computer Communications & Networks Laboratory
| C
| 1
| 1502300 | Professional, Social and Ethical Issues in Engineering | C | 1
|
1502450 | Introduction to Hardware Security | C | 3
| 0302200 | Fundamentals of Innovation | C | 3 |
XXXXXXX | Department Elective 1
| E | 3 | 0204102 | UAE Society | C | 3 |
XXXXXXX | University Elective 2 | E | 3 | 1502495 | Security Capstone II | C | 3 |
0104100 | Islamic Culture
| C | 3 | XXXXXXX | Department Elective 2 | E | 3 |
1502494 | Security Capstone I | C | 1 | XXXXXXX | Department Elective 3 | E | 3 |
1502310 | Artificial Intelligence for Engineers | C | 3 | | | | |
Total | 17 | Total | 16 |
Course type:C: Compulsory
E: Elective
Course Description
Courses in the proposed program that are offered in the department of Computer Engineering start with (1502). The program of study contains courses that are offered by other colleges. Consistent with the university policies, CE courses in the program will be assigned numbers of the form (1502ABC) where:
A | Year (level)
|
B | Areas (as follows) 0: General Cybersecurity Engineering 1: Electromechanical and Power 2: Electromagnetism 3: Control & Instrumentation 4: Communications & Signal Processing 5: Electronics 6: Special Topics 9: Projects and Seminars |
C | Course sequence in area |
1502111 | Discrete Mathematics for Engineers | (3-0:3) |
In this course, the propositional logic, predicates, and quantifiers are defined. The sets, and its operations, functions are introduced. Different algorithms and their complexity are explored. Proof strategy, induction, recursion; relations, and equivalence relations are explained. Basic counting techniques are demonstrated.
Prerequisites: Pre/Co: 1501116-Programming I.
|
1502170 | Introduction to Cybersecurity Engineering | (3-0:3) |
This course will introduce all aspects of cyber-security including business, policy and procedures, communications security, network security, security management, legal issues, political issues, technical issues, job and market prospects in cyber security. This serves as the introduction to the cyber security track in computer engineering department. Prerequisites: None. |
1502201 | Digital Logic Design | (3-0:3) |
This course covers topics related to number systems and conversion between systems based on different radices. The course introduces Boolean algebra and its application in the analysis and design of logic circuits. Then, common logic gates and their operation is introduced. The course then goes through different techniques for analysis and synthesis of combinational and sequential logic systems.
Prerequisites: Second year Standing
|
1502202 | Digital Logic Design Laboratory | (0-3:1) |
This course presents the operation of basic logic gates as well as some combinational and sequential circuits. The course illustrates how to design and implement different logic circuits such as adders, subtractors, decoders, encoders, flip-flops, counters, and shift registers. The design and implementation of the logic circuits will be accomplished practically in the lab by using Hardware Description Language (HDL) and circuit boards.
Prerequisites: 1502201 Digital Logic Design.
|
1502220 | Introduction to Probability and Data Analysis for Engineers | (3-0:3) |
This course introduces the students to the role of probability theory, statistics and data analysis in engineering. From the probability theory side, the course covers basic probability concepts and calculations, discrete random variables and probability distributions, continuous random variables and probability distributions, and joint random variables and probability distributions. From the statistics and data analysis side, the course covers descriptive statistics, parameter estimation and linear regression. Prerequisites: Second year standing
|
1502250 | Introduction to Computer Electronics
| (3-0:3) |
Introduction to basic electrical and electronic circuit analysis. The course covers operations of circuits comprised of resistors, capacitors, inductors, and independent and dependent sources. Circuits will be considered under static and transient operation as well as under DC and AC excitation. The course will also introduce basic concepts of MOSFET transistors, amplifier circuits, and time and frequency design and analysis of electronic circuits. Finally, the course will introduce basic concepts of analog and digital circuits. Prerequisites: 1430117- Physics II , 1440261 -Differential Equations for Engineers
|
1502251 | Introduction to Computer Electronics Lab | (1-0:1) |
Fundamentals of DC circuits. Experiments about the behavior of DC networks under transient and steady state excitations. Modelling of circuits using SPICE as well as the use of test and measurement equipment such as function generators and oscilloscopes. Determining the characteristics and DC biasing circuits for MOS transistor. Spice simulation of MOSFET based digital circuits and experiments using discrete components and transistor arrays. Prerequisites: 1430118 - Physics II Lab
|
1502270 | Database Security | (3-0:3) |
The course covers basic concepts of database management systems and known security threats on the data confidentiality and integrity. The topics include database models, SQL, mandatory and recommended access controls mechanisms, design of database with security in mind, protecting the integrity of data, protecting the security of database transactions, and database integrity rules. Topics on security of distributed databases and cloud databases will also be addressed. Prerequisites: 1502111 - Discrete Mathematics for Engineers |
1502271 | Introduction to Cryptography | (3-0:3) |
The course focuses on how to secure computer systems. More specifically, students learn how to design and deploy confidentiality services, integrity verification services and access control services to both computer and communication systems. Cryptographic hashing, symmetric and public key cryptosystems are covered in details. Mathematical principles underlying encryption and various codebreaking techniques are also covered. The course also covers the deployment of cryptographic products and protocols in digital systems and metrics to quantify their effectiveness in protecting the system. Prerequisites: 1502170 - Introduction to Cyber Security, 1502111 - Discrete Mathematics for Engineers
|
1502300 | Professional, Societal and Ethical Issues in Engineering | (1-0:1) |
An examination of the social impact of engineering and technology and its relationship to ethics, with the objective of identifying and clarifying obligations that might arise in technological research and its applications. The course will survey a variety of moral theories, as well as engineering codes of ethics. The case study method will be used: source will include the history of science and technology, and reports from professional societies. Topics covered include whistle blowing, environmental, safety, and privacy issues.
Prerequisites: 3rd year standing.
|
1502472
| Artificial Intelligence and Data Analytics for Security
| (3-0:3) |
This course will focus on employing Data Analytics models to solve engineering problems in Cyber Security. Such models are developed using Artificial Intelligence and statistical techniques such as fuzzy logic, neural networks, decision trees and regression analysis. These models will be evaluated empirically using real data and appropriate statistical tests. MATLAB, Weka, Minitab, R and similar tools will be used in this course. Prerequisites: 0402241 Random Signal Theory
|
1502340 | Data Communications | (3-0:3) |
This course introduces students to the basic principles of how to represent, manipulate, and transmit communication signals. Students will be exposed to the time-domain and frequency-domain representation and processing of data signals, as well as the building blocks of communication systems. Topics covered in this course include analog modulation techniques, digitization of analog signals, digital data transmission and modulation techniques, and an introduction to information theory. Prerequisites: 1502220 - Introduction to Probability and Data Analysis for Engineers
|
1502346 | Computer Communications and Networks | (3-0:3) |
This course focuses on protocols, mechanisms and technologies for computer and communication networks, with a focus on the Internet. Topics related to protocols and technologies include Ethernet, the Internet protocol (IP), and the Transmission Control Protocol (TCP). Topics related to network mechanisms include layered network architecture, error-control, medium access control, switching and routing, addressing, subnetting and congestion control. Prerequisites: 0402241 Random Signal Theory or 1502220 - Introduction to Probability and Data Analysis for Engineers
|
1502347 | Computer Communications and Networks Laboratory | (0-3:1) |
This laboratory provides hands-on experience essential to the real understanding of computer networking and the devices used in building these networks. The goal is to give the student practical aspects of network topologies, network operating systems including the setup of dynamic host configuration (DHCP) and domain name system (DNS) services, peer to peer and server based networking, switch setup and VLANs, basics of IP addressing, subnetting and router configuration. Lab experiments are conducted in teams of students. Prerequisites: 1502346 Computer Communications and Networks.
|
1502373 | Information Security Management | (3-0:3) |
This course provides students with an insight into the fundamentals of managing modern information systems and their security operations. Topics include security policies and procedures, models and programs for designing and implementing security, risk management, access management and investigation, as well as legal and ethical implications of security management. Prerequisites: 1502170 - Introduction to Cyber Security
|
1502370 | Secure Operating Systems | (3-0:3) |
This course covers various topics in operating systems with a focus on the security aspect of operating system components. Topics include overview of basic concepts related to operating systems such as resource management, processes and their interaction, scheduling, synchronization, multithreading and file system along with the main algorithms used in modern operating systems. The course also covers the detection of threats posed against various components of operating systems and defense strategies adopted to counteract these threats. The course also includes case studies of contemporary operating systems and a project.
Prerequisites: 1501215 - Data Structures
|
1502371 | Secure Software Design and Development | (3-0:3) |
This course covers the design and implementation of secure software. Some of the topics covered are the characteristics of secure software, the role of security in the development lifecycle, designing secure software, and best security programming practices. Security for web and mobile applications will be covered. Prerequisites: 1502170 - Introduction to Cyber Security
|
1502372 | Introduction to Digital Forensics | (3-0:3) |
This course introduces digital forensics and cybercrime investigations. It covers the basic steps to conduct a digital forensic investigation, such as evidence gathering, preservation and analysis and presenting digital evidence to legal authorities. It also presents the tools used to find and analyze digital evidence on a variety of devices. Topics also cover laws and regulations in digital forensics. Prerequisites: 1502170 - Introduction to Cyber Security
|
1502444 | Computer and Network Security | (3-0:3) |
Concepts and techniques for access to computer systems and network resources. Identification and authentication. Protection of information against intentional and unintentional attacks and threats. Cryptography and encryption of data. Encryption algorithms and their information theory foundations. Computer hardware and software for data encryption. Prerequisites: 1501215 - Data Structures; Pre/Co: 1502346 - Computer Communications and Networks.
|
1502450 | Introduction to Hardware Security | (3-0:3) |
Fundamentals of hardware security for electronic circuits. Cryptographic hardware, invasive and noninvasive attacks, side-channel attacks, physically unclonable functions (PUFs), true random number generation (TRNG), FPGA security, watermarking of Intellectual Property (IP) blocks, counterfeit hardware, hardware Trojans in electronic circuits. Prerequisites: 1502250 - Introduction to Computer Electronics, 1502170 - Introduction to Cyber Security, 1502201 - Digital Logic Design
|
1502494 | Security Capstone I | (1-0:1) |
This is the first phase of the capstone project, which, consists of two courses Senior Design Prerequisites: Senior standing in Cybersecurity Engineering;
|
1502495 | Security Capstone II | (3-0:3) |
This is second phase of the capstone project, which consists of two courses Senior Design Project I and Senior Design Project II. During this phase, students are expected to implement.
Prerequisites: 1502494 - Security Capstone I. |
Elective Courses
Descriptions of the elective courses are given below:
1502442 | Network Programming | (3-0:3) |
This course provides a review of network protocols and topologies, TCP/IP, and RFCs with a focus on communication across different network layers. It illustrates the peer-to-peer and client-server communication models and demonstrates how to programmatically implement sockets to develop network applications using either TCP streams or UDP datagrams. Moreover, the course teaches students how to develop single-threaded and multi-threaded network applications like file-sharing, chat-server, http-client-server, etc. and how to handle Inter-Process Communications, Concurrency, and Synchronization. Prerequisites: 1502346 - Computer Communications and Networks.
|
1502470 | Data Confidentiality and Cloud Security | (3-0:3) |
This course covers the basic concepts of cloud architectural principles and design practices with the focus of the Cloud Security and confidentiality. The course addresses critical requirements of secured Cloud services. The course identifies and mitigates the aspects of Cloud risks, isolation between physical and logical sides. Cloud components including compute, network and storage are all considered. The course will also explore and discuss the identity management, access control, and data protection. Prerequisites: 1411352 - Operating Systems, 1502170 - Introduction to Cyber Security |
1502461 | Special Topics in Cyber Security | (3-0:3) |
This course covers emerging and advanced topics in cyber security. The contents will vary depending on the topic. Prerequisites: Senior Standing |
1502471 | Internet and Web Security | (3-0:3) |
The course provides an overview of the methodologies for developing secure web-based applications. More specifically, the course addresses various security vulnerabilities of web applications and how to protect web-based applications from cyber-attacks. Topics covered in this course includes: web application developments, basic network security mechanisms and tools, webservers and how to secure them, and securing e-commerce applications. Additionally, security issues related to web databases applications and collaborative Web applications, will be studied. Prerequisites: 1502271 - Introduction to Cryptography |
1502473 | Ethical Hacking | (3-0:3) |
This course provides a basic understanding of penetration testing and ethical hacking techniques. In security testing, an ethical hacker with legal permissions attempts to penetrate a system or systems to find a weak link and then analyze ways to correct the security flaws. Students will learn some of the exploitation techniques and tools used for ethical hacking. The course also covers recommended solutions to correct these flaws and protect systems and networks from potential attacks. Prerequisites: 1502170 - Introduction to Cyber Security |
1502474 | Data Hiding and Steganography | (3-0:3) |
This course introduces the main properties of data hiding, steganographic and steganalysis systems. More specifically, students will learn about the embedding capacity, embedding efficiency, data payload and the traditional trade-off triangle: capacity-robustness-imperceptibility. Students will learn the differences between blind steganography and the private (non-blind) steganography. At the end of this course, students will be able to evaluate the robustness and the security of the stego-media using metrics like targeted steganalysis and statistical undetectability. Information theory fundamentals like entropy and redundancy will also be covered. Prerequisites: Senior standing |
Duration: The normal duration of the program is eight semesters (four years).
Mode of Study: Full-time
Degree Requirements: A minimum of 132 credit hours are required to complete the program including 99 credit hours of major core requirements and 9 credit hours of major electives. In addition to the University courses for general education.
Employability: Demand in the cybersecurity job market is soaring while supply is running critically low. Cyber security engineers are responsible for protecting the networks and systems of an organization against threats from adversaries in cyberspace. The functions of cyber security engineers include performing assessments and penetration testing, development and implementation of secure network solutions. Cybersecurity engineers can apply for the following jobs:
IT Security Engineer, Network Security Engineer, Cybersecurity Architect and Consultant
Entry Requirement: - attain a minimum overall average of 75% in the UAE Secondary School Science Certificate or its equivalent. Holders of UAE Industrial Secondary School Certificate or its equivalent with a minimum average of 85% may apply to join the Cybersecurity Engineering Program.
- Attain a TOEFL score of no less than 500. Applicants who do not sit for the TOEFL or who score less than 500 are admitted into the Intensive English Program (IEP). Details of the IEP program.
- The applicant should not have been expelled from the UoS or any other institution for academic or disciplinary reasons.
Contact Information: CCI : +97165050514
Email:
cci@sharjah.ac.ae