The mission of the Information Technology program is to:
Provide quality education in the field of information technology based on internationally recognized standards for undergraduate programs; Produce information technology professionals who can deploy efficiently IT technologies and implement IT solutions according to market and society needs, particularly in the UAE and Gulf region; and Prepare individuals for lifelong learning and research.
The program educational objectives (Goals) of BSIT are as follows:
Graduates of the Bachelor of Science in Information Technology program will have the following characteristics within few years of graduation:
Dr. Qussai Yaseen (Profile)
Note: If Subject Proficiency EmSAT requirement is unmet, the following options will be accepted:
Equivalent qualifications from other educational systems are accepted, see Student Handbook for more details.
For further information, please refer to the university admissions policy.
Students are eligible for a Bachelor of Science degree in Information Technology/Networking & Security after the completion of 123 credit hours, which normally takes eight semesters (not counting summer semesters). In addition, students must undertake 16 weeks of internship experience (can be divided into two 8-week periods) with at least 30 contact hours per week) which is equivalent to 3 credit hours. The minimum accumulative grade point average for graduation is 2.0.
Graduates of the Information Technology/Networking & Security program can undertake a variety of job positions at both the technical and managerial levels. Cybersecurity and networking jobs are in high demand, and Job opportunities may include but not limited to: network administrator, network architect, network support specialist, network security architect, cybersecurity engineer, malware analyst, ethical hacker, computer forensics analyst, IT security consultant, cloud security specialist. Additional job opening may include: information security officer, IT resources management, professional IT consultant, professional teacher or trainer, marketing of software and hardware, and pursuing postgraduate study and research.
The B.Sc. degree in Information Technology requires the completion of 120 credit hours. In addition, the student is required to complete an internship program for 16 weeks at the end of the program. This internship experience is equivalent to three credit hours making the total completion requirement 123 credit hours.
The Information Technology program, Networking and Security concentration, has adopted ABET Student Learning Outcomes verbatim as its Program Learning Outcomes to comply with ABET requirements as the Information Technology Department plans to apply for ABET accreditation once the program obtain full accreditation status from the CAA as directed by the CAA. The new PLOs read as follows:
Graduates of the program will be able to:
PLO#1: Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
PLO#2: Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
PLO#3: Communicate effectively in a variety of professional contexts.
PLO#4: Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
PLO#5: Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
PLO#6: Use systemic approaches to select, develop, apply, integrate, and administer secure computing technologies to accomplish user goals.
PLO#7: Discuss innovation, entrepreneurship, and sustainability practices in computing.
PLO#8: Apply security principles and practices to maintain operations in the presence of risks and threats.
This course covers the essential mathematical topics that students specialized in information technology needs. Topics covered are plane analytic geometry; matrices and determinants; solution of a system of linear equations; real functions limits, continuity, differentiation and applications; integration; and graphs.
This course provides knowledge and skills in problem-solving and introductory programming using Java programming language. Topics cover the problem-solving process; data types; variables, constants, scope, and memory locations; basic input/output; selection and repetition control structures; arrays and strings; and user-defined methods.
The major role of information technology (IT) is to support organizational personnel, regardless of their functional area or level in the organization. The aim of this course is to provide students with solid grounding in business uses of information technology in a rapidly changing environment, and to provide discussion of critical issues surrounding the use of IT in organizations. This course covers a range of general information technology topics that will make the student appreciate the role of IT in business. Topics include: information technology fundamentals; information technologies; computer networks and security; business applications; development processes; and ethical, societal and security issues.
The primary objective of this course is to introduce the concepts of object-oriented programming: classes, objects, system and user-defined methods, inheritance, polymorphism, and composition. The course also covers recursive algorithms and exception handling. This course is not meant as a comprehensive introduction to all Java concepts such as applets and socket programming.
This course introduces Discrete Mathematics skills to Information Technology, Information Systems, Computer Engineering, and BSDA students. These skills enhance their ability to both analyze and describe mathematically many of the algorithms and data structure performance characteristics. Topics covered include propositional logic, predicate logic, inference, mathematical induction & other proof techniques, counting, sets, functions, recursion, relations, graphs, and trees.
This course covers the organization of the von Neumann machine, explains how instructions are fetched from memory and executed, how numerical values are represented in digital computers, identifies the main types of memory, addressing modes and formats, processor structure and functions, RISC and CISC architectures, and Control Unit.
Introduction to computer networks and the Internet: Components of data communication, data flow, data communication system, network criteria, types of connections, topologies, transmission media, parallel and serial transmission, network types, protocol and standards, protocol layers and the OSI model. Physical layer: Data and Signals, Nyquist Bit Rate and Shannon Capacity. Data Link Layer: Error detection and correction, multiple access, MAC addressing, switches, ARP, MAC Frame (IEEE 802.3 protocol), Wired LAN Ethernet and WLAN (IEEE 802.11 protocol). Network Layer: Network Devices, Virtual circuits, routers, IP Addresses, subnetting, IP protocols and routing algorithms, NAT, IP header format, ARP, and DHCP. Transport layer: UDP, TCP and congestion control. Application layer: HTTP, FTP, SMTP, POP3, DNS and peer-to-peer applications.
This course introduces the fundamentals of client Web systems technologies to students. Topics covered include: XHTML, CSS, XML, and JavaScript, Students will apply this knowledge to generate essential web components like basic browser controls (buttons, links, and menus), forms and frames.
The course covers concepts of program performance (time and space complexity); recursion; definitions, operations, and implementations of the list, stack, queue, tree, binary search tree, priority queue, heap, hash table, and graph data structures and their applications; sorting; and searching.
This course covers the principles and concepts of modern operating systems. Topics include operating system services; operating systems structures; operating system processes: threads, synchronization, CPU scheduling, deadlocks; memory management: main memory, virtual memory; storage management: storage structures, file-system interface, and file-system implementation; and operating protection and security.
The course emphasizes object-oriented techniques and the use of the Unified Modelling Language (UML). Topics covered in this course include an overview of the software engineering process, software process models, UML syntax and semantics, software requirement analysis, software design principles and models, component-level design, software testing techniques, software effort estimation, and software sustainability.
This course is designed to give a theoretical and practical background in database techniques. It covers database concepts, data models, data dictionary, entity-relationship (ER) and enhanced entity relationship (EER) diagrams, and the relational data model, converting an E-R model to a relational model, Structured Query Language (SQL), normalization, and physical database design. Oracle software is used in the Lab.
This course aims at introducing fundamental security concepts to students. Main security threats and related countermeasures are presented. students will learn the importance of protecting information stored on computer systems from unauthorized access. topics covered include cryptography, authentication, access control, database security, malicious software, denial of service, network security, security management and risk assessment, security controls, plans, and procedures, and legal and ethical aspects of information security.
This course will examine the ethical issues that arise in the use of computers, and the responsibilities of those who work with computers, either as computer science professionals or as end users. Topics covered include: legal, social and ethical issues surrounding computer technology and its use; privacy; intellectual property rights and copy right laws; information technology code of ethics; issues of privacy and confidentiality; risks of using computers; and computer crime: computer viruses, hacking, phishing & pharming, and scams.
This course covers the characteristics of IT Project management, initiating an IT project; project planning; defining and managing project scope, structuring a project, project schedule and budget, managing project risk, project communication, tracking, and reporting, IT project quality management, ethics and professional practices, entrepreneurship and innovation, sustainability, and project implementation.
This course aims to introduce students to the theory and practice of cloud computing. Topics include parallel and distributed systems; deployment and service models; cloud infrastructure; applications and paradigms; resource virtualization; resources management and scheduling; networking support; cloud storage systems; cloud security, and sustainability in a cloud environment.
This course introduces students to the concepts, methods, theories and guidelines of user interface design (UID). Topics covered include usability measures, usability motivations, and universal usability; interface design; design case studies; evaluation and the user experience; interaction styles; design issues; response time; and information search.
The aim of this course is to teach building web applications using java and other related technologies. Topics discussed include web application structure; Applets; Servlets; Java Server Pages (JSP); tags and function libraries; filters; WebSockets; Spring Model View Controller Framework; RESTful and Simple Object Access Protocol web services; Java Persistence Application Programming Interface; Hibernate Object-Relational Mapping; Mapping Entities to Tables; Spring Framework Repositories; Spring security; using authorization tags and annotations; and Securing RESTful web services with OAuth. Students will have hands-on experience in using Java web application technologies in the lab.
The aim of the course is to introduce students to the techniques, tools, and technologies used for big data analytics using appropriate programming language. Topics covered in this course include: statistical evaluation of data, clustering techniques, linear regression, logistic regression, classification methods, MapReduce, Apache Hadoop, Pig, Hive, Hbase, and NoSQL.
This course aims to give students the opportunity to work collaboratively in teams between 2 and 4 students to investigate a problem by making use of information technology knowledge, techniques, and methodologies acquired in the previous semesters to provide a suitable solution to an IT problem. The course also aims to enhance communication skills, both oral and written as well as ethical issues involved. A faculty member is assigned to each team to supervise and evaluate in part their work.
The internship familiarizes students with actual working environments. It gives students the opportunity to integrate their knowledge and skills learned in the course by applying it to real world problems encountered in business and industry. The internship also gives the student a feeling of what is involved in working on actual information technology problems and develop communication and team-work skills as well as address ethical and professional issues applicable to computing practice.
This course is designed to introduce the theory and techniques of AI to students. The course covers knowledge representation schemes; heuristic search techniques; inferencing; machine learning; intelligent agents, and robots; AI techniques used in computer vision, natural language understanding, and speech recognition; and ethical, economic, and social issues arising from the adoption of AI. The PROLOG language is also covered to enable students to represent, manipulate, and reason with knowledge.
This course will cover the principles of networking with a focus on algorithms, protocols, and implementations for advanced networking services. We will examine a variety of ideas that were proposed to enhance the Internet, and why some of these enhancements were successful while others were not. The emphasis in this course is on topics, such as medium access techniques, wireless technologies and related concepts, mobile IP and IPv4 to IPv6 transition, routing protocols, transport layer (reliability, flow, and congestion control), data centre networks, advanced networking concepts, and network security.
This course covers security concepts related to the protection of a network from known threats and attacks. This includes digital signatures, authentication protocols, IP & Web security and e-mail security. Advanced cryptographic algorithms are also discussed in details such as DES and AES. Determine common network security threats and countermeasures.
This course presents the student with the latest in wireless technologies. Topics include wireless internetworking concepts, architecture and protocols (IEEE802.11 MAC protocols), Mobile IP and a mobile ad hoc routing protocol, Mobility support for the Internet Protocol, Wireless Security, Spatial multiplexing and diversity in MIMO, MIMO capacity, interference alignment, and the performance of a wireless local area network.
This course covers the principles of network design and management. It includes Top-Down Network Design Methodology and Designing a Network Topology. It also covers selecting switching and routing protocols, developing network security strategies, developing network management strategies, physical network design, and selecting technologies and devices for enterprise networks.
Students learn how attacks are launched on computers and networks, and how to protect them from such attacks to have a secure network. Additionally, the course introduces the human behavior in terms of data protection, privacy, and threat mitigation. This course also investigates the impact of cybersecurity on society and its related ethical aspects.
This course aims at monitoring and documentation networks, locking down networks, thwart malware, prevent hacks by improving visibility into the environment, using the power of data and security. It helps students to get the needed security skills for monitoring, detecting, investigating, analyzing and responding to security events, which help in protecting systems from cybersecurity risks, threats and vulnerabilities. The course covers topics such as how to monitor computer networks, acquire and prepare security data, correlate security events, use simple statistical methods to detect malware and predict rogue behaviors. Furthermore, this course consists of a set of laboratory experiments that provides hands-on experience in this topic.
This website uses cookies to enhance the user's experience. By using this website, you indicate consent to our privacy policy.