Professional Documents
Culture Documents
Cyber Security Plan
Cyber Security Plan
Year 1 - Semester 1
Year 1 - Semester 2
ITCY611
Information Systems Audit and Governance 3 ------
ITCY612
s Architecture and Design 3 ------
Year 2 - Semester 3
ITCY621
Cyber Forensics and Penetration Testing 3 ------
ITCYxxx
Elective 1 3 ------
Year 2 - Semester 4
ITCY695
MSc Thesis 6 ------
Major Elective Courses
Course Description
Course Code: ITCY611 Course Title: Information Systems Audit and Governance
This course provides students with skills to ensure that the necessary structures, process and controls are in place to
achieve the objectives of the organization. This course also covers the challenges and issues in the management and
control of Information Systems. This course will focus on the following areas: Managing and monitoring of Enterprise
Information Systems to achieve and support organizational objectives; audit planning and performance management;
evaluating internal control systems; evaluating controls and practices for acquisition, development and
implementation of information systems; conducting post-implementation reviews of systems, auditing of information
security to protect and control information systems.
Course Code: ITCY612 Course Title: Cyber Security Architecture and Design
Explore the building blocks needed to implement a life-cycle security system. Instruction focuses on how to analyze
internal applications, computing platforms/network infrastructure, and corporate objectives with an eye toward
designing flexible security architecture that is best suited for the enterprise including how to define security
architecture and what security architecture describes. Case studies are used to illustrate key security architecture
concepts and methods. The latest challenges and the new default expectations of enterprise security will be explained.
Explain what the new default expectations are of the systems.
Course Code: IT603 Course Title: Research Methodology and Professional Issues
The course provides in-depth understanding of research methodology and professional issues. Topics include research
methodology, research types, scientific publishing, professional societies in the discipline and their role, legal IT issues
and IT regulations, code of ethics and plagiarism, writing scientific proposal, writing research papers, writing thesis
and presenting a project/paper to audience. Students will conduct research and report their research findings in a
research paper.
Course Code: ITCY621 Course Title: Cyber Forensics and Penetration Testing
The course explores the tools and skills necessary for digital forensics and penetration testing of online systems and
services. The purposes of the course are twofold: to learn how to draw conclusions from the available data, and to
test for any possible risks within the network. It will introduce practical examples of penetration testing of various
systems as well as data collection regarding possible vulnerabilities. Students will then use statistical, automated, and
data mining tools to identify vulnerabilities. Topics include: investigate digital artifacts, preserving, analyzing and
interpreting the evidence. Reporting digital forensic findings to a non-specialist audience. Critically evaluate digital
forensic tools and techniques. Critically analyze the complexities of jurisdiction in the cyber domain. Apply scientific
techniques and use scientific terminology appropriately in the context of digital forensic analysis.