Al-Ahliyya Amman University
COURSE DESCRIPTION
Course Code | Course Name | Credit hours | Description |
---|---|---|---|
A0347133 | Cyber Threat and Incident Response | 3 | |
A0347131 | Advanced Digital Forensics | 3 | |
A0347101 | Research Methodologies | 3 | This course will prepare students for advanced research by examining how to plan, conduct and report of empirical investigations. The course will cover techniques applicable to each of the steps of a research project, including formulating research questions, theory building, data analysis (using both qualitative and quantitative methods), building evidence, assessing validity, and publishing. There will be a semester-long project in which students select, design, and execute research project and present the result at the end of the semester. |
A0347132 | Advanced Networks Security | 3 | |
A0347130 | Advanced Cryptography | 3 |
Course Code | Course Name | Credit hours | Description |
---|---|---|---|
A0347142 | Offensive and Defensive Techniques | 3 | |
A0347140 | Blockchain technology | 3 | |
A0347126 | Applications of Artificial Intelligence in Cybersecurity | 3 | |
A0347145 | Quantum Cryptography | 3 | |
A0347125 | Selected Topics in Cybersecurity | 3 | |
A0347143 | Cloud Computing Security | 3 | |
A0347144 | Cyber-Physical System and Security | 3 | |
A0347141 | Legal governance and Compliance | 3 | |
A0347146 | Current Emerging Trends in Cybersecurity | 3 | |
A0347111 | Information Systems Risk Management | 3 | This course introduces and defines the main types of risks that the information system in organizations may face and need to consider to ensure their security and business continuity. This course focuses on the identification and assessment of assets, threats and vulnerability in order to plan the appropriate information system security in the organization. It will survey preventive and containment techniques available to address the potential risk areas. Topics include cyber system architecture, security risks, and vulnerabilities, security management practices, intrusion detection and prevention systems, a cyber-risk mitigation strategy, disaster recovery, and business continuity plans. |