Bachelor of Science in Information Technology (Cyber Security Concentration)
Information Technology Program:
Introduction
The Department of Information Technology offers a Bachelor of Science in Information Technology (BSIT) degree, which is a 4-years program that requires the completion of 123 credit hours The Information Technology curriculum comprises one concentration (Cyber Security). The program is accredited by the Ministry of Higher Education.
Mission
The mission of the BSIT program is to equip graduates with a solid foundation in the principles and practices of Information Technology, focusing on areas such as Cybersecurity, Cloud Infrastructure, Information Systems, Database Management, Web and Mobile Development, and IT Project Management. The program aims to foster innovation, problem-solving, and applied research skills that empower students to design, implement, secure, and manage IT solutions that address the evolving needs of local and regional industries in both the public and private sectors.
The program educational Goals of the BSIT with one concentration (Cybersecurity) is as follows:
|
No |
Program Goals |
|
PG1 |
Apply acquired knowledge and skills in information technology and implement their skills in public, private sectors, academic or international information systems functional activities. |
|
PG2 |
Act as information technology professional leaders and team member in performing related skills in technical, business, or ethical duties. |
|
PG3 |
Engage in life-long learning and professional development in pursuing additional graduate degrees, professional development and self-studies. |
Program Educational Objectives
The Program Educational Objectives of the BSIT define the accomplishments that graduates are expected to attain within four years of graduation. These objectives are aligned with the program’s mission and goals and reflect the competencies needed to succeed in dynamic IT environments.
Specifically, graduates will be able to:
· Apply core IT knowledge and skills to analyze, design, implement, and manage reliable and secure information systems across public, private, academic, and global organizations.
· Perform effectively as IT professionals, demonstrating technical proficiency, business awareness, and ethical responsibility in a range of IT-related functions.
· Lead and collaborate in multidisciplinary teams, functioning effectively as leaders or contributing team members in diverse work environments.
· Communicate technical concepts clearly and professionally to various audiences through written reports, presentations, and digital communication tools.
· Engage in lifelong learning and professional development through self-study, industry-recognized certifications, and/or the pursuit of graduate education.
· Adapt to emerging technologies and evolving industry trends, while continuously enhancing their ability to develop innovative IT solutions that serve societal and organizational needs.
Programs Offered
The Bachelor of Science in Information Technology has the following two concentrations:
All Program Goals are aligned with the needs of program constituencies as follows:
Program Learning Outcomes
There are six Learning Outcomes related to the Information Technology program and one learning outcome associated to the Cyber Security concentration. Graduates will be able to:
|
Upon completion of the program, the graduates will be able to: |
|
|
1. Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions. |
|
|
2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline. |
|
|
3. Communicate effectively in a variety of professional contexts. |
|
|
4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles. |
|
|
5. Function effectively as a member or leader of a team engaged in activities appropriate to the Computer Science discipline |
|
|
6. Use systemic approaches to select, develop, apply, integrate, and administer secure computing technologies to accomplish user goals. |
|
|
7. Apply security principles and practices to maintain operations in the presence of risks and threats. |
Admission Requirements
Career Opportunities
Graduates of BSc. information Technology/Cyber Security are qualified for employment as Security Analyst, Security Architect, Security Software Developer, Security Engineer, Security Administrator, Cryptographer, Security Consultant.
Graduation requirements
Students at the Fujairah University are eligible for a Bachelor of Science in Information Technology after completion of 123 credits hours, which normally takes eight semesters. The minimum cumulative grade point average for graduation is 2.0 for 123 total credit hours.
Degree requirement
The B.Sc. degree in Information Technology for requires the completion of a 123 Cr. Hrs. distributed according to the following plan. The study plan is designed so that the normal duration for completing the degree requirements is 4 years but should not exceed 8 years.
|
Type of Courses |
Cr. Hrs. |
|
1. University General Education Requirements (Compulsory Courses) |
18 |
|
2. Information Technology Program Compulsory Core Courses |
90 |
|
(a) BSIT Program General Requirements |
9 |
|
(b) BSIT Program Core Courses (Including Internship) |
78 |
|
(c) BSIT Program Elective Courses |
3 |
|
3. Information Technology Program Concentration Courses |
15 |
|
Total Credit Hours |
123 |
1.1. University General Education Requirements (18 Cr. Hrs.)
|
Course Code |
Course Name |
Credit hours |
|
GE101 |
Advanced English Academic Writing and Rhetoric 1 |
3 |
|
GE102 |
Advanced English Academic Writing and Rhetoric 2 |
3 |
|
GE103 |
UAE Society |
3 |
|
GE104 |
Innovation, Entrepreneurship and Sustainability |
3 |
|
GE106 |
Introduction to Information Technology |
3 |
|
GE107 |
Algorithms and Problem Solving |
3 |
1.2. Information Technology Program Compulsory Core Courses
9.2a: IT Program General Requirements (9 Cr. Hrs.)
|
Course No. |
Course Title |
Contact and Credit Hrs. |
Prerequisite |
||
|
Lec |
Lab |
Cr. Hrs. |
|||
|
INT104 |
Information Technology in Business |
3 |
0 |
3 |
- |
|
INT107 |
Discrete Mathematics |
3 |
0 |
3 |
INT101 |
|
INT101 |
Calculus for IT |
3 |
0 |
3 |
- |
9.2b:IT Program Core Courses and Internship (78 Cr. Hrs.)
|
Course No. |
Course Title |
Contact and Credit Hrs. |
Prerequisite |
||
|
Lec |
Lab |
Cr. Hrs. |
|||
|
INT100 |
Introductory Programming |
2 |
2 |
3 |
- |
|
INT201 |
Object Oriented Programming |
2 |
2 |
3 |
INT100 |
|
INT108 |
Introduction to Statistics |
2 |
2 |
3 |
- |
|
INT109 |
Physics |
2 |
2 |
3 |
- |
|
INT202 |
System Analysis and Design |
3 |
0 |
3 |
INT104 |
|
INT203 |
Computer Organization |
2 |
2 |
3 |
GES108 |
|
INT204 |
Data Structure |
3 |
1 |
3 |
INT201 |
|
INT205 |
Fundamentals of Data Communications and Networking |
2 |
2 |
3 |
INT203 |
|
INT206 |
Fundamentals of Web Systems |
2 |
2 |
3 |
INT201 |
|
INT209 |
Fundamentals of Data Science |
2 |
2 |
3 |
INT108-INT201 |
|
INT214 |
Computer Ethics and Professional Practices |
3 |
0 |
3 |
--- |
|
INT302 |
Database Management Systems |
2 |
2 |
3 |
INT201 |
|
INT303 |
Fundamentals of Information Security |
3 |
0 |
3 |
INT205 |
|
INT305 |
Internet of Things |
3 |
1 |
3 |
INT205 |
|
INT301 |
Operating Systems |
2 |
2 |
3 |
INT203 |
|
INT307 |
Information Technology Project Management |
3 |
1 |
3 |
INT302 |
|
INT314 |
Introduction to Cloud Computing |
3 |
1 |
3 |
INT205-INT206 |
|
INT312 |
Human-Computer Interaction |
3 |
1 |
3 |
INT206 |
|
INT402 |
Big Data Technologies |
2 |
2 |
3 |
INT302 -INT209 |
|
INT324 |
2 |
2 |
3 |
INT206 |
|
|
INT448 |
Business Intelligence and Data Warehousing |
3 |
0 |
3 |
INT302 |
|
INT404 |
Internship |
- |
- |
3 |
80 Cr. Hrs. |
|
INT429 |
Mobile Applications Development |
2 |
2 |
3 |
INT201-INT301 |
|
INT430 |
Artificial Intelligence |
2 |
2 |
3 |
INT402-INT209 |
|
INT445 |
Graduation Project I |
1 |
4 |
3 |
80 Cr. Hrs. |
|
INT446 |
Graduation Project II |
1 |
4 |
3 |
INT445 |
9.2c: BSIT Program Elective Courses (3 Cr. Hrs.)
|
Course No. |
Course Title |
Contact and Credit Hrs. |
Prerequisite |
||
|
Lec |
Lab |
Cr. Hrs. |
|||
|
CS0-1440 |
E-commerce Development |
2 |
2 |
3 |
INT206 |
|
CS0-0461 |
Advanced Database Design and Implementation |
2 |
2 |
3 |
INT302 |
|
CS0-1420 |
Advanced Programming |
2 |
2 |
3 |
INT201 |
|
CS0-0450 |
Multimedia Systems |
2 |
2 |
3 |
INT206 |
1.3. Cyber Security Concentration - Compulsory Concentration Courses (15 Cr. Hrs.)
|
Course No. |
Course Title |
Contact and Credit Hrs. |
Prerequisite |
||
|
Lec |
Lab |
Cr. Hrs. |
|||
|
INT444 |
Wireless and Mobile Networks security |
3 |
1 |
3 |
INT205-INT303 |
|
INT315 |
Introduction to Cryptography |
3 |
1 |
3 |
INT107-INT303 |
|
INT441 |
Digital Forensics |
3 |
1 |
3 |
INT315- INT303 |
|
INT443 |
Ethical Hacking |
2 |
2 |
3 |
INT205-INT303 |
|
INT447 |
Selected Topics in Cyber Security |
3 |
0 |
3 |
INT205- INT315 |