Course Code |
Course Name |
Credit hours |
Description |
A0871103 |
Principles of Renewable Energy |
3 |
Introduction to renewable Energy include Photovoltaic, Wind power, Micro hydropower, Biomass energy, Waste power, Solar thermal power, Geothermal power, Ocean energy (tidal, tide-flow and wave), Ocean energy (OTEC), , Comparison of characteristics and cost of renewables. How we can use the sun, wind, biomass, geothermal resources, and water to generate more sustainable energy. It explains the fundamentals of energy, including the transfer of energy, as well as the limitations of natural resources. Starting with solar power, the text illustrates how energy from the sun is transferred and stored; used for heating, cooling, and lighting; collected and concentrated; and converted into electricity |
A0110168 |
Digital Literacy and Artificial Intelligence |
3 |
|
A1321100 |
Sport and Health |
3 |
Defining health and fitness: physical education, health education; the cognitive, emotional, skill-oriented, and social goals of physical education; the history of physical education: ancient, medieval, and modern ages, the Olympics, Athletics in Jordan: nutrition and exercising; athletic injuries: bone, joint , muscle, skin injuries; special exercises for figure deformation; diseases related to lack of exercise: diabetes, obesity, being underweight, back pain, cancer; hooliganism: causes and recommended solutions for hooliganism. |
A0110167 |
Critical Thinking Skills |
3 |
|
A0110281 |
Society Health |
3 |
|
Course Code |
Course Name |
Credit hours |
Description |
A0341311 |
Networks and Cybersecurity Essentials |
3 |
The course studies the basic of computer networks: types of networks, main devices, Ethernet technology, principles and structure of IP addressing; overview of the common protocols such as: TCP, UDP, HTTP, HTTPS, POP, IMAP, SMTP, DNS, FTP, DHCP; basic security measures and tools: malware, general means of authentication, password-based authentication, physical security, firewall basics; cryptography: symmetric and asymmetric algorithms, hash functions, basics of digital signature and steganography. |
A0331202 |
Introduction to Programming |
3 |
Sequential execution: program structure, command line arguments, string literals, output, Limerick layout; Program errors: syntactic errors, semantic errors, compile time errors, runtime errors; Types, variables and expressions: string, double and integer types, hard-coded data, assignment statement, arithmetic expressions and associativity, type conversions, parsing input data, integer division, grouping expression terms and long statements layout; Conditional and repeated execution: choice and iteration statements, Boolean expressions, relational operators, program design using pseudo code, lists of command line arguments, comments, standard classes; Control statements nested in loops: declaring variables in compound statements, conditional expression operator; |
A0334600 |
Ethical and Professional Issues in Computing |
1 |
An overview of ethics, Professional ethics of workers and users in the field of information technology, Cyberattacks and Cybersecurity, Privacy, Intellectual property, Ethical decisions in software development. |
A0312201 |
Object Oriented Programming |
3 |
Introduction to Object Oriented Programming Concepts using Java language: Classes, Objects, Constructors, Encapsulation: Visibility Modifiers; Packages; Overloading; using this keyword; using static keyword; Array of objects: Store and Process objects in array; Relationships between Classes: Composition, Inheritance: Superclasses and Subclasses, using super keyword, Constructor Chaining, Overriding, Polymorphism, Preventing Extending and Overriding, The Object Class and its toString() Method; Abstract Classes; Interfaces; Exception Handling; introduction to GUI programming. |
A0311101 |
Discrete Mathematics |
3 |
Logic, relations, functions, basic set theory, countability and counting arguments, proof techniques, mathematical induction, graph theory, combinatorics, discrete probability, recursion, recurrence relations, and number theory. The fundamental mathematical tools used in computer engineering as: sets, relations, and functions; propositional logic, predicate logic, and inductive proofs; summations, recurrences, and elementary asymptotic; counting and discrete probability; undirected and directed graphs; introductory linear algebra, with applications in computer engineering.
|
A0110101 |
Mathematics (1) |
3 |
|
A0371201 |
Introduction to Information Technology |
3 |
Basic elements of computing: programming, computer, program, operating environment, data, file; Number systems: decimal, binary, conversion; Describing problem solution using standard flowcharting notation; Linux basics: basic commands, working with files, working with directories, file name substitution, input/output and I/O redirection; Linux shell: overview, programming tools; User-defined commands and shell variables: command files, variables, integer arithmetic; Passing arguments: $#, $#, ${n}; Decisions: exit status, test command, else, exit, elif, Null, && and || constructs; Loops: for, while, until, breaking a loop, skipping commands in a loop; Git: installation and configuration, basic commands, branching. |
Course Code |
Course Name |
Credit hours |
Description |
A0343417 |
Networks Operating Systems |
3 |
This course provides students with the knowledge and skills necessary to install and configure a stand-alone and client computer that are part of a workgroup or domain. Students will be able to describe and execute network administrator duties and utilities. They will know how to implement server organization, user rights, user addition, maintenance of security and user accounting. |
A0344512 |
Graduation Project (1) |
3 |
Students (through groups) will complete the project with some sort of field study that started in Graduation Project I ; the project will require the use of as many curricular subject materials under the supervision of one faculty member; this project is evaluated by a committee of faculty members. |
A0342315 |
Computer Networks (1) |
3 |
|
A0344513 |
Practical Training |
9 |
|
A0342313 |
Cybersecurity |
3 |
This course covers some of the main topics of protecting information and information systems such as: access control, web security, mail security, social engineering; some of the common vulnerabilities and attacks are also covered: DoS, spoofing, MitM, buffer overflow, CSS; tools related to some of the aforementioned topics will be covered as well; ethical and legal considerations related to cybersecurity are discussed such as: privacy, intellectual property, cybercrime, cyberwarfare, and the organizations involved in the formulation of such laws. |
A0344312 |
Networks Security |
3 |
This course covers the main tools and technologies that are used to protect a computer networks against common attacks including: Firewall, Intrusion Prevention Systems, Intrusion Detection Systems (IDS), Virtual Private Networks (VPNs), Access Control Lists (ACLs), AAA authentication; layer two threats and mitigations such as: ??? table attacks, DHCP attacks, address spoofing attacks, ARP attacks are also detailed. |
A0343416 |
Digital Forensics |
3 |
Principles of digital forensic analysis: where and how these principles should be applied; Windows OS forensics; data acquisition: Understanding storage formats for digital evidence determining the best acquisition method ; current digital forensics tools; recovering graphics files; e-mail and social media investigations; mobile devices investigation; network and Internet forensics. |
A0344311 |
Data and Software Security |
3 |
This course we will explore the foundations of software security. The course will consider important software vulnerabilities and attacks that exploit them, such as buffer overflows, SQL injection, and session hijacking. In addition, the course will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. |
A0344420 |
Reverse Engineering and Malware Analysis |
3 |
|
A0344411 |
Ethical Hacking |
3 |
This course is an introduction to the principles and techniques of using hacking skills for defensive purposes; topics includes: overview of penetration testing, penetration testing methodologies, gathering intelligence, network scanning, conducting vulnerability scanning, vulnerabilities exploitation, retaining access with backdoors and malware, covering hacking tracks and evading detection. |
A0343415 |
Encryption Theory |
3 |
Introduction to Cryptography: Cryptography and Steganography Terminology, Cryptography Services (CIA); Classical Encryption Techniques: Substitution Techniques, Transposition Techniques, Bit-Manipulation ciphers; Modern Encryption Techniques: DES, El-Gamal, AES; Public key Cryptography: RSA Algorithm, Diffie-Hellman key exchange; Cryptography data integrity algorithm: Hash Algorithm, Message Authentication Codes (MAC), Digital Signatures, key management; Application of Cryptography: Certificate Authority (CA), Digital Certificate. |
A0344514 |
Graduation Project (2) |
3 |
|
A0342211 |
Programming for Cybersecurity |
3 |
The student will start with an overview of Python, including how to create and run scripts, use threads, and handle exceptions. Next, the student will learn how to communicate with the network, including how to use the Python libraries for network scripting and to develop basic scripts with network functions. This material will also cover HTTP programming, security scripting, and forensic scripting. |
A0342314 |
Protection using Linux |
3 |
Linux basic concepts: file system, commands, utilities, text editing, shell programs and word processing; Linux shells: command line syntax, properties, file name generation, redirection, piping and quote mechanisms; File system navigation: controlling access to files, file and directory naming rules and conventions, handling of files and links; Terminal control: working with vi, monitoring and controlling processes, using command line editing, replacing commands, using backup commands; Control operations: print jobs, network communication, group policy management. |
A0343413 |
Networks Management & Monitoring |
3 |
The course encompasses the technological foundations of network management used to operate large-scale networks and services; this course explores the five functional areas of network management: fault management, configuration management, accounting management, performance management, and security (FCAPS); advanced topics such as: fault diagnosis and isolation, event correlation, MIB architecture, scripting for task automation, performance monitoring, service level agreements (SLA) conformance are also discussed; network management and monitoring protocols including: SNMP, Syslog, Netflow, NTP are discussed to effectively manage a production network. |
A0343420 |
Computer Networks (2) |
3 |
|
Course Code |
Course Name |
Credit hours |
Description |
A0343421 |
Security Risk Management and Auditing |
3 |
|
A0344421 |
Blockchain Technology |
3 |
|
A0344414 |
Selected Topics in Networks and Cybersecurity (1) |
3 |
The objective of this course is to introduce advanced and new topics in one of the areas of Network and Information Security; the topics can be changed from one year to another depending on state-of-the-art topics in Network and Information Security or the instructor?s area of specialty. |
A0344415 |
Selected Topics in Networks and Cybersecurity (2) |
3 |
The objective of this course is to introduce advanced and new topics in one of the areas of Network and Information Security; the topics can be changed from one year to another depending on state-of-the-art topics in Network and Information Security or the instructor?s area of specialty. |
A0333203 |
Internet Applications Development (2) |
3 |
|
A0342316 |
Internet of Things |
3 |
|
A0343412 |
Cloud Computing & Security |
3 |
Introduction to cloud computing: basic concepts and terminology, essential cloud characteristics; cloud service and deployment models: the cloud service models, the cloud deployment models; cloud-enabling technology: multitenant technology, service technology, virtualization technology; fundamental cloud security: basic terms and concepts, cloud security threats. |
A0343422 |
E-Commerce Security |
3 |
|
A0343423 |
Cybersecurity Governance |
3 |
|
A0342411 |
Wireless Networks & Security |
3 |
Wireless technologies: Infrared (IR), Bluetooth, ZigBee, Wi-Fi (Wireless Fidelity); RF coverage: Physical layer standards, antennas; WLAN standards: 8011a, b, g, n, ac; medium access control: 802.11 Frame format, 802.11 Frame Addressing, Accessing the wireless medium, wireless frame types; Planning coverage with Wireless Aps: Tuning Cell Size with Transmit Power, Tuning Cell Size with Data Rates; managing mobility in wireless networks: Mobile IP Basics, Mobile ad hoc network; WLAN security: Wireless threats, Privacy and integrity methods. |
Course Code |
Course Name |
Credit hours |
Description |
A0312101 |
Data Structures |
3 |
Lists: static allocation, dynamic allocation; Stacks: static implementation, linked implementation, operations, applications; Recursion: applications, program stack; Queues: static implementation, linked implementation, operations, applications; General Trees; Binary Trees; Binary Search Trees: traversal, search, add and delete operations; Files: input, output; Graphs: traversal, adjacency matrix, and adjacency list. |
A0312401 |
Fundamentals of Databases |
3 |
Database Concepts; Database Design Methodologies; Data Modeling using ER and EER; Database Integrity Constraints; Relational Model: Relational algebra, Relational Calculus; Functional Dependencies and Normalization. |
A0313301 |
Operating Systems |
3 |
Fundamental Concepts of Operating Systems; Evolution of Operating System; Operating System Structure; Process: Process Management, Inter-process Communication, Process Scheduling, Deadlocks, Process Synchronization; Memory Management; File System Management; I/O Management; Secondary Storage Management; Case Studies. |
A0110201 |
Linear Algebra |
3 |
|
A0343302 |
Artificial Intelligence Techniques in Cybersecurity |
3 |
|
A0311302 |
Computer Architecture and Assembly Language |
3 |
|
A0334605 |
Communication and Technical Writing Skills |
2 |
|
A0332202 |
Internet Applications Development (1) |
3 |
|
A0110103 |
Statistics and Probability |
3 |
|