Program Description

Master in Cyber Security


Master


The Master’s in Cybersecurity program was established in 2021 with the goal of providing local and regional labor markets with graduates who possess advanced knowledge and practical experience in information security, risk management, and cyber defense. The program aligns with the vision of the College of Information Technology, which seeks to offer high-quality education in an innovative learning environment that keeps up with the latest developments in cybersecurity and digital

technologies. The program aims to equip graduates with technical knowledge and leadership skills that meet labor market needs and keep pace with ongoing changes in this field.

The program offers a comprehensive curriculum that combines theoretical foundations with practical applications, based on the latest technologies and methodologies used to protect information systems and digital infrastructures. Students gain in-depth skills in analyzing, assessing, and mitigating security threats across various computing environments.

The Master in Cybersecurity program focuses on advanced topics such as cryptography and secure protocols, network and system security, ethical hacking and penetration testing, digital forensics and incident response, security governance and risk management, privacy and data protection, and secure software engineering practices. Additionally, the program includes specialized research, projects, and case studies that prepare students to contribute to both academia and industry.

A key component of the program is the Master’s Thesis, where students apply research methods and security solutions to real-world problems under the supervision of faculty. Practical labs, simulations, and collaborative activities further enhance students’ readiness to protect and defend information assets in professional environments.

Upon graduation, students are equipped not only with advanced theoretical understanding but also with hands-on expertise and ethical competencies that support strategic decision-making in cybersecurity. Graduates are prepared to take on leadership roles in government agencies, private sector enterprises, critical infrastructure organizations, and research institutions, while contributing to innovation and sustainable development in the digital age.

 

Job Opportunities in Cybersecurity (After Obtaining a Master's in Cybersecurity):

 

  • Cybersecurity Analyst
    o Monitor, detect, and respond to security threats and incidents within an organization’s network and systems. Implement security measures to protect sensitive data and prevent cyber-attacks.
  • Network Security Engineer
    o Design, implement, and maintain security solutions to protect an organization’s network infrastructure from cyber threats. This includes managing firewalls, intrusion detection systems, and VPNs.
  • Information Security Manager
    o Oversee and coordinate the cybersecurity strategy and policies within an organization. Define security policies, ensure their implementation, and guide security teams to protect data and systems.
  • Incident Response Analyst
    o Handle cybersecurity incidents, such as data breaches and cyber-attacks, by investigating and gathering evidence, identifying the source, and taking steps to recover systems and protect against future incidents.
  • Penetration Tester (Ethical Hacker)
    o Simulate cyber-attacks to test the strength of networks, applications, and systems by identifying vulnerabilities and exploiting them legally to suggest solutions for improving security.
  • Chief Information Security Officer (CISO)
    o A strategic leader in an organization, responsible for overseeing the overall cybersecurity program. Ensures that all cybersecurity teams and systems adhere to best security practices.
  • Software Security Engineer
    o Focus on securing software applications throughout their lifecycle by patching security vulnerabilities, implementing security during development, and testing applications against threats.
  • Cloud Security Analyst
    o Specialize in securing cloud computing environments. Design and implement security strategies to protect data and applications hosted in the cloud.
  • Cybersecurity Consultant
    o Provide expert advice to organizations on improving their cybersecurity practices. Help businesses evaluate risks and develop strategies to protect their networks, data, and systems.
  • Data Security Engineer
    o Handle the protection of data within an organization, applying encryption technologies, securing data during transit and storage, and ensuring the protection of sensitive information.
  • Application Security Analyst
    o Analyze the security of software applications and identify vulnerabilities in the code. Implement security measures to ensure applications are not susceptible to attacks.
  • Privacy Protection Officer
    o Ensure the protection of personal data privacy within an organization. Ensure compliance with privacy laws and regulations, and monitor the organization’s data handling practices.
  • Security Operations Center (SOC) Manager
    o Oversee the operations of a Security Operations Center (SOC), leading security teams to monitor systems and respond to security threats in real-time.
  • Cryptography Engineer
    o Develop and implement encryption techniques to ensure the confidentiality of data and protect it from unauthorized access.
  • Wireless Security Analyst
    o Focus on securing wireless networks, such as Wi-Fi, from attacks. Address threats like data interception and ensure the security of connected devices.

Master in Cyber Security

Number Of Credit Hours
33

4 (1)

Thesis Track

Comprehensive Track

Al-Ahliyya Amman University

Email: Public@ammanu.edu.jo

 

© Copyright Al-Ahliyya Amman University. Amman, Jordan 19111.