Al-Ahliyya Amman University
COURSE DESCRIPTION
Course Code | Course Name | Credit hours | Description |
---|---|---|---|
A0347140 | Blockchain technology | 3 | |
A0347133 | Cyber Threat and Incident Response | 3 | |
A0347131 | Advanced Digital Forensics | 3 | |
A0347143 | Cloud Computing Security | 3 | |
A0347141 | Legal governance and Compliance | 3 | |
A0347101 | Research Methodologies | 3 | This course will prepare students for advanced research by examining how to plan, conduct and report of empirical investigations. The course will cover techniques applicable to each of the steps of a research project, including formulating research questions, theory building, data analysis (using both qualitative and quantitative methods), building evidence, assessing validity, and publishing. There will be a semester-long project in which students select, design, and execute research project and present the result at the end of the semester. |
A0347130 | Advanced Cryptography | 3 | |
A0347132 | Advanced Networks Security | 3 |
Course Code | Course Name | Credit hours | Description |
---|---|---|---|
A0347142 | Offensive and Defensive Techniques | 3 | |
A0347144 | Cyber-Physical System and Security | 3 | |
A0347125 | Selected Topics in Cybersecurity | 3 | |
A0347126 | Applications of Artificial Intelligence in Cybersecurity | 3 | |
A0347145 | Quantum Cryptography | 3 | |
A0347146 | Current Emerging Trends in Cybersecurity | 3 | |
A0347111 | Information Systems Risk Management | 3 | This course introduces and defines the main types of risks that the information system in organizations may face and need to consider to ensure their security and business continuity. This course focuses on the identification and assessment of assets, threats and vulnerability in order to plan the appropriate information system security in the organization. It will survey preventive and containment techniques available to address the potential risk areas. Topics include cyber system architecture, security risks, and vulnerabilities, security management practices, intrusion detection and prevention systems, a cyber-risk mitigation strategy, disaster recovery, and business continuity plans. |