Thesis-Based Master’s Program
To graduate, students must successfully complete:
Non-Thesis Master’s Program
To graduate, students must successfully complete:
This course aims to develop students’ research skills, helping them plan, conduct, and present their research effectively. Topics include:
Focuses on designing, managing, and securing computer systems and networks. Topics include:
Teaches techniques and tools for analyzing network vulnerabilities and enhancing security:
Explores modern encryption technologies:
Covers digital evidence collection, analysis, and response to cyberattacks:
Provides insights into software security and threat mitigation:
Teaches risk assessment and mitigation strategies for securing information systems:
Focuses on security risks and defense strategies for wireless and ad hoc networks:
Explores legal and technical aspects of personal data protection:
Covers security challenges and solutions in cloud environments:
Focuses on securing databases and large-scale data processing systems:
A hands-on project where students conduct research on a cybersecurity topic, develop a solution, or analyze system performance
Teaches strategies for disaster recovery, business continuity, and emergency response:
Focuses on strategic planning and security governance:
Covers offensive and defensive security methodologies:
Focuses on ethical hacking and security testing:
Explores emerging cybersecurity trends such as AI security, IoT risks, blockchain vulnerabilities, and advanced threat defense mechanisms.
Students conduct original research in cybersecurity, focusing on a real-world security challenge and contributing to the field through theoretical or applied solutions.
Covers security audit frameworks and methodologies:
Teaches scientific research techniques while emphasizing ethical considerations in cybersecurity:
This program equips students with the skills to analyze, secure, and manage cybersecurity challenges, preparing them for careers in cyber defense, risk management, penetration testing, forensic analysis, and security auditing.