First year courses |
|||||
Second Semester |
First semester |
||||
The number of hours |
Course Name |
M |
The number of hours |
Course Name |
M |
2 |
culture Islamic |
2 |
Arabic Language |
1 |
|
2 |
language English For computer |
2 |
English language |
2 |
|
3 |
Programming Computer 2 |
2 |
The Arab-Israeli conflict |
3 |
|
3 |
Security and technology basics the information |
3 |
Computer programming 1 |
4 |
|
3 |
Mathematics 2 |
3 |
Mathematics 1 |
5 |
|
2 |
Thinking Cash And solve Problems . |
3 |
Computer basics |
6 |
|
2 |
National culture |
7 |
|||
2 |
Arabic language 2 |
||||
19 |
Total |
15 |
Total |
||
Second year courses |
|||||
Second Semester |
First semester |
||||
The number of hours |
Course Name |
M |
The number of hours |
Course Name |
M |
3 |
Statistics and probability |
3 |
Introduction to databases |
1 |
|
3 |
Computer architecture |
3 |
Web technology |
2 |
|
3 |
Data structures and algorithms |
3 |
Object-oriented programming |
3 |
|
3 |
Advanced computer networks |
3 |
Cross mathematics |
4 |
|
3 |
Advanced web development |
3 |
Principles of computer networks |
5 |
|
3 |
Visual programming |
2 |
Cyber security |
6 |
|
2 |
communication skills |
7 |
|||
2 |
administration Systems linux |
||||
22 |
Total |
17 |
Total |
||
Third year courses |
|||||
Second Semester |
First semester |
||||
The number of hours |
Course Name |
M |
The number of hours |
Course Name |
M |
3 |
Scientific research methods |
3 |
Principles of operating systems |
1 |
|
3 |
Mobile application development |
3 |
Information security and policies |
2 |
|
3 |
Network security and management |
3 |
Network security |
3 |
|
3 |
Reverse Engineering |
3 |
encryption |
4 |
|
3 |
Wireless network security |
3 |
Web security |
5 |
|
3 |
Network programming |
3 |
Risk Management |
6 |
|
1 |
field traning |
7 |
|||
19 |
Total |
18 |
Total |
||
Fourth year courses |
|||||
The number of hours |
Course Name |
M |
The number of hours |
Course Name |
M |
3 |
Graduation project 2 |
3 |
Graduation project 1 |
1 |
|
3 |
Server management and security |
3 |
Digital forensic investigation |
2 |
|
3 |
Optional 2 |
3 |
The Internet of things |
3 |
|
3 |
Cloud computing security and technology |
3 |
the pirate Ethical and testing Penetration |
4 |
|
2 |
Ethics And law Security Cyber |
3 |
Optional 1 |
5 |
|
14 |
Total |
15 |
Total |