جامعة النجاح الوطنية
An-Najah National University
Cyber Security
Duration: 48 Months (4 Years)
Degree Awarded: Bachelor
Student must complete 126 credit hours

University Requirements Student must complete 19 credit hours

Course Code Course Name Credit Hours Prerequests
0
Remedial English (E10032100) is a three-hour non-credited English course offered to students who score poorly (i.e. below 50%) on the placement test. Since the major concern of this course is to improve the students? proficiency before starting their ordinary university English basic courses and major courses taught in English, special emphasis has been placed on enhancing the students? ability to effectively acquire the four language skills: reading, writing, listening, and speaking. Specifically, the course attempts to ensure an academically acceptable performance on the part of the students at the level of the English basic courses. Moreover, the course aims at expanding students? vocabulary needed for various tasks.
3
This course aims to establish the concept of Islamic culture and its position among the other international cultures, its position in the Muslim life, its sources, its bases and its characteristics. It also aims to introduce the Islamic culture in faith, worship, relations, morals, and knowledge, to discuss the clash between cultures in addition to Globalization, Human Rights, Woman Rights, Democracy and other contemporary issues.
3
This course aims to improve the level of students in language skills and various literary, read and absorb and express written, and oral and tasted literary, through texts flags authors and poets in different eras, lessons in grammar and spelling, and brief definition months dictionaries and Arab old ones the modern and how to use them. This course aims to implement the Arabic language in the areas of reading and expression of both types oral and written communication.
3
University English I (E11000103) is a three credit-hour university-required English language course designed for students who need to work on the four skills of the language: reading, writing, listening, and speaking. The development of vocabulary and skills of comprehension are integral parts of the course. In addition, various reading strategies (making predictions, identifying main ideas, reading for details, relating information in the text to life experience) are introduced and developed through a wide range of topics for reading and writing. The course encourages a more analytical and independent approach to study and helps prepare the students for any subsequent exam preparation.
3
The course is mandatory for university students from various disciplines, so it provides students with knowledge and `information about the Palestinian reality and in particular the political developments of the Palestinian cause since its inception until the present day in line social and economic developments and political which constitute the main pillars for the study of the Palestinian political reality. This course aims to study Palestinian issue from its begging until present day in social, economic and political issue.
1
This course aims to familiarize students with community institutions and their contribution through voluntary efforts to serve these institutions to achieve the SDGs. Students are required to complete a minimum of 50 hours of community service to successfully pass the course. Additionally, students must attend 6 guidance sessions on volunteer work and participate in intensive training for selected community service programs if they choose to engage in such programs.
1
The course aims to assist students in acquiring modern concepts in the field of communication and understanding the essential skills for effective communication with oneself and others. This is achieved through the use of effective teaching methods that rely on student engagement and motivation to learn through training and self-directed learning. The course emphasizes skill development through teamwork and interactive methods, helping students improve their verbal and non-verbal communication skills by learning public speaking and the fundamentals of oration. Additionally, it helps students develop active listening skills, and contributes to enhancing their abilities in dialogue and persuasion, overcoming public speaking anxiety, self-promotion, negotiation, job interviews, presentation and delivery, and writing. The course also provides students with knowledge about innovative and creative ideas that can be implemented, as well as how to write a resume. Furthermore, the course aims to refine students' personalities through participation in group presentations.
2
This course aims to enrich students with the basic computer skills alongside with the theoretical and practical backgrounds behind those skills. First of all, software and hardware components of a computer are discussed. This forms the substrate from which a student can realize the practical applications of a computer, especially in Artificial Intelligence (AI). Thereafter, the student awareness for the security vulnerabilities of a computer system is improved through discussing the threats associated with the absolute dependability on the Internet in storing critical data. This is conducted with presenting the basic secure Internet frameworks for students with emphasis on scientific research platforms (ResearchGate, Google Scholar, LinkedIn,?etc). Finally, word processing, statistical analysis and presentation software are discussed with practical applications in the lab.
3
University English II is a three-credit hour university-required English language course which is offered to students majoring in Sciences, Engineering, Agriculture, Veterinary, and Information Technology ... etc. Students in this course will be exposed to a range of science-based writings in English that supply students with samples of the kind of academic English they are likely to encounter in their textbooks. Exercises on grammar, vocabulary and textual organization are geared towards developing students? observational and analytical skills that aid comprehension. The course uses an integrated approach which allows for communicative interaction in the class to actively test and broaden the listening and speaking abilities of the students. Furthermore, the acquisition of vocabulary items will be reinforced through their use in written sentences. Additional training in writing will be given through questions and answers, summaries of principal ideas in a reading passage and the preparation of reports.

Speciality Requirements Student must complete 91 credit hours

Course Code Course Name Credit Hours Prerequests
3
This course is given to non-physics students, it includes the following topics: - Classical mechanics: Motion and Newton's Laws, Circular motion and applications, Energy transfer, and Linear and angular momentum. - Fluid mechanics, vibrations and wave motion - Thermodynamics - Electricity and magnetism: Gauss law, electric circuits, and Sources of magnetic fields. - Light and lasers. - Microscopes.
3
This Course begins with an introduction to computers, hardware and software and problem-solving. This Course also includes an introduction to programming using C/C++ including: I/O; expressions and arithmetic; if, while and for statements; one-dimensional arrays, string handling, functions, scope, recursion and matrices.
3
    • 10671101
This Course covers more advanced C/C++ Programming Features including: pointers, dynamic memory, structures, text files, binary files, classes and objects.
10671103 Principles of Practical Programming I 0
10671104 Principles of Praactical Programming II 0
    • 10671101
    • 10671103
3
    • 11000103
This Course focuses on Report-Writing Skills. It is designed to equip students with the principles of Scientific and Business Writing. By the end of the Course, students are expected to have mastered the process of Professional Report-Writing.
3
    • 10671102
The course includes methods for creating dynamic websites, and covers programming techniques for different websites, as well as the MySQL information storage and retrieval language.
3
    • 10671102 or
    • 10221111
In this Course, students are introduced to: Boolean Algebra, the minimization of Boolean functions using Karnaugh Map and Quine-Mc-Cluskey methods, the design of Combinatorial Circuits, the design of Complex Digital Circuits, Sequential Circuits, State Assignment and Minimization, the design of a simple computer incorporating general registers, common addressing modes and conditional instructions.
3
    • 10687210 or
    • 10681210
Introduction to computer organization. Computer instruction set. Machine language. Data processing. Arithmetic unit: Carry look-ahead adders, Subtractors, and shifters. Logic unit. Combinational and sequential multipliers and dividers. Floating-point number representation and arithmetic.
10681220 Database Design & Programming 3
    • 10681102
10681307 Software Engineering 3
    • 10681220
10681345 Computer Networks 3
3
This course gives an introduction to calculus. Topics include a review of algebra and functions, mathematical modeling with elementary functions, rates of change, inverse functions, logarithms and exponential functions, the derivative, differential equations, and Euler's method, review of trigonometry, modeling with trigonometric functions, geometric sums and series, and the Fundamental Theorem of Calculus
3
    • 10686111 or
    • 10671231
Probability principles and sets theory, random variables, operations on random variables, various distribution functions, introduction to random processes, weak stationary, correlation functions, linear processing, and estimation, Poisson processes and Markov chains, queuing analysis
3
    • 10686213
Covers the concepts of information assurance, explicit and implicit policy design, use of basic computer security mechanisms, authentication, access control, policy types. Topics include: Design and use of basic network security mechanisms, asset identification and valuation, determining threats to assets and their vulnerabilities, prioritizing and selecting countermeasures, implementing and deploying countermeasures, and continuing maintenance and assessment of security mechanisms. In addition it covers cyber ethical standards for information system users and administrators, and their role as a driver in developing information system security policies.
3
    • 10681345
    • 10686235
Introduction to the principles of number theory and the practice of network security and cryptographic algorithms. Topics include: Divisibility and the Greatest Common Divisor, Euclidean Algorithm, modular arithmetic and discrete logarithm, Primes, primality testing, Chinese Remainder Theorem, cipher) Conventional or symmetric encryption (DES, IDEA, Blowfish, Twofish, Rijndael) and public key or asymmetric encryption (RSA, Diffie-Hellman), key management and exchange, hash functions (MD5, SHA-1, RIPEMD-160, HMAC), digital signatures, certificates and authentication protocols (X.509, DSS, Kerberos), electronic mail security (PGP, S/MIME), web security and protocols for secure electronic commerce (IPSec, SSL, TLS, SET).
1
    • 10686331
This course provides in-depth laboratory exercises using commercial-off-the-shelf (COTS) technology. Topics include: eavesdropping, implementing the attacks against ARP, IP, ICMP, TCP, and UDP protocols, exploiting DNS vulnerabilities to launch Pharming attacks, exploiting cross-site scripting vulnerabilities and buffer overflow, implementing a simplified version of IPSec protocol. In addition students will configure network servers, routers, hubs, firewalls and intrusion detection devices to discover the effect each device can have on overall system security.
3
    • 10686331
Principles of wireless communications and how they differ from wired communications. Fundamental concepts including transmission and mitigation techniques (e.g., modulation and coding, propagation, interference, and antennas) for wireless systems, multiplexing techniques, wireless system architectures, mobility management, security, protocols, and location technology. Systems include cellular phone networks (e.g., cdma2000, UMTS), wireless local area networks (e.g., IEEE 802.11g), personal area networks (e.g., Bluetooth), fixed-point broadband wireless (e.g., WiMAX) and satellite systems.
3
    • 10686235
    • 10681345
This course covers how to identify emerging security risks and implement highly secure networks to support organizational goals. Discussion of methodologies for identifying, quantifying, mitigating and controlling risks. Students implement a comprehensive IT risk management plans (RMP) that identify alternate sites for processing mission-critical applications, and techniques to recover infrastructure, systems, networks, data and user access. The course also discusses related topics such as: disaster recovery, handling information security; protection of property, personnel and facilities; protection of sensitive and classified information, privacy issues, and criminal terrorist and hostile activities.
3
The student will enroll the intustry to have a practical training for 320 hours. The student is expected to practice what he/she has learned theoritically during his previous courses. The student can enroll this course after finishing 90 credit hours. The student will be supervised by the practical training center as well as by his/her advisor in the department.
3
In Fourth year, students are required to make a complete investigation, analysis, troubleshooting, and implementation of a selected system. The students are required to deliver a presentation and demonstrate their work in front of a 3 person committee from the department.
3
    • 10686235
    • 10681371
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
3
    • 10686331
Teaches the student the basic design of firewalls and provides actual hands-on experience with a popular enterprise firewall. The need for firewalls is also covered.
10687210 Data Structure 3
    • 10671102
10687246 Computer Basics Lab. 1
10687247 Neworks Lab. 1
    • 10687346
10687327 Web Security 3
    • 10681204
    • 10686331
10687341 Network Administration 3
    • 10681345
10687342 Network Adminstration Lab. 1
    • 10687341
10687346 Advanced Networks 3
    • 10681345
10687472 Reverse Engineering 3
    • 10687488
10687481 Cloud Computing and its Security 3
    • 10687327
10687488 Malware 3
    • 10681371
    • 10686331
    • 10686235
10687489 Forenisci Evidence Analysis 3
    • 10686487

Speciality Optional Requirements Student must complete 12 credit hours

Course Code Course Name Credit Hours Prerequests
3
This course is designed for students of the Faculty of Engineering and IT to help them be involved in creative, innovative, entrepreneurial and corporate ventures in the future. Subjects covered include: introduction to entrepreneurship & creativity; developing successful business ideas, managing and growing an entrepreneurial firm; technical and financial feasibility studies; business models; market survey; business plan preparation.Learning Outcomes: after successful completion of this course, students will be able to:1) Demonstrate a solid theoretical understanding of the innovation process, entrepreneurship and their associated management issues in the business economy.2) Find, launch and manage high growth potential new ventures by looking for and evaluating business opportunities, preparing business plans, designing and validating business models to build successful start-ups.3)Design, implement and manage a company?s innovation strategy, network or system.
3
    • 10681345
Introduction to Network Programming, Transport Layer Protocols, TCP, UDP, and SCTP, Client-Server Model, TCP Sockets, UDP Sockets, SCTP Sockets, I/O Multiplexing, DNS and Address Conversion, Threads Programming, RPC, Raw Sockets and Datalink Access. One or more of the following Internet Application Protocols and Case Studies: TELNET, HTTP, Authd, SMTP, POP, IMAP, FTP, and Web Programming (CGI, Servlets, and XML).
3
    • 10681345
Voice over IP (VoIP) engineering and design. Topics include call and session protocols such as SIP, H.323, IAX and MGCP; VAD and PLC; common practical issues such as call redirection; codec integration and quality of service measurements.
3
    • 10681345
Optical fiber and transmission technologies. First generation optical networks (SONET). Optical access networks, broadcast and select networks. IP over optical networks, MPLS, and GMPLS. The light-path concept. Wavelength division multiplexing (WDM) technology. Wavelength routing networks, related protocols and architectures. Routing and Wavelength Assignment (RWA). Optical Time Domain Multiplexing (TDM) Networks.
3
    • 10681345
This course covers the current state-of-the-art in emerging high-speed network architectures, protocols and control algorithms. Topics include: basic architecture of packet networks and their network elements (switches, routers, bridges), and the protocols used to enable transmission of packets through the network. Network protocols: Ethernet, Internet, token rings, FDDI, Circuit-switched networks, ATM networks, switching, scheduling, naming, and addressing, routing, error control, flow control, traffic collection, modeling, and characterization, traffic management, connection admission control algorithms, and congestion control algorithms.
3
    • 10681345
This introductory course in multimedia networking explores the interaction between multimedia data and the systems that need to support multimedia data such as audio and video. Topics include: compression technologies, multimedia formats such as JPEG and MPEG, multimedia streaming over reservation-based and best-effort networks, multicasting of multimedia data, and systems support for multimedia computing.
3
    • 10687346 or
    • 10686325
This course extends routing and switching knowledge with specific attention given to emerging trends. This course focuses on the concepts of traffic shaping, advanced exterior gateway routing protocols, label switching technologies, and quality of service. The necessary perspectives of integration of these topics into enterprise networks are addresses in both lecture and laboratory.
3
    • 10686334
Provides advanced coverage of wireless networks and the special security problems they pose. Topics include measures taken to secure wireless personal area networks (PANs), wireless LANs, cellular wireless networks, and ad-hoc wireless networks. Threats, vulnerabilities and countermeasures specific to each type of network will be enumerated and studied in detail. Coverage includes the use of cryptography and cryptographic primitives in secure protocols, wireless device security, and security policy management. The treatment of ad-hoc wireless network security will cover secure routing protocols and intrusion detection systems.
3
    • 10687210 or
    • 10681210
Address requisites, mechanisms, techniques, issues and security standards for web services security. Service Oriented Architecture concepts, Service Oriented Architecture technological foundations and related standards (SOAP and WSDL), Web Service security standardization framework , Transport layer security and related standards, Message-level security and reliability, and related standards, Application-level security, access control models, and related standards, Security policies and standards, Security for Business Processes, Identity Management and related standards, Security and privacy issue in Healthcare
3
    • 10687481 or
    • 10681480
Discusses advanced topics in Client/Server systems, Distributed Systems, and Network Computing. The focus is on examining strategies and algorithms to achieve design goals such as performance, reliability, scalability, consistency, and security in a distributed system. Topics include: Parallel Processing and Scheduling; Performance Modeling; Concurrency Control, Recovery in multi-user and distributed data servers; Security and Fault Tolerance; Embedded and Real Time distributed systems; Multimedia Storage and Transmission
3
    • 10686334
Focus on information system applications that run on top of wireless infrastructure such as multimedia messaging, mobile inventory control, location aware services including wireless technologies (GSM, CDMA2000, UMTS, 802.11, Bluetooth), mobile information systems and applications (M-Business, location-based services, wireless CRN), wireless information system challenges and architectures (security, reliability, mobility, power conservation, gateways, proxies), mobile application protocols (SMS, EMS, MMS, WAP), thin and thick client mobile application development (WML, VXML, Java, J2ME, J2EE, .NETCF, C#), and business case studies of mobile applications.
3
    • 10686331
The need for intrusion detection systems (IDS) is described. Several basic IDS design approaches and implementation methods are presented. Basic attack methods employed by network attackers and the resulting signatures are explained. The business case for justifying the acquisition of IDS is explored.
3
Department Approval. Selected the current state-of-the-art topics in network and security.
3
    • 10687346 or
    • 10686427
    • 10687481 or
    • 10681480
Appreciate the need f or interoperable network management, understand general concepts and architecture behind standards based network management, understand concepts and terminology associated with SNMP and TMN, appreciate network management as a typical distributed application, get a feeling of current trends in network management technologies, understand advanced Information processing techniques such as distributed object technologies, software agents and internet, technologies used f or network management
3
    • 10687346 or
    • 10686427
This course is an introduction to the formal design, specifications, and validation of communication protocols. Topics include: structured protocol design, protocol models, protocol validation, and protocol correctness requirements. Protocol modeling techniques such as FSM models and Petri net models are considered. Protocol verification techniques: Communicating FSM, reachability analysis, verification using checking, protocol design validation. A known verification modeling language such as PROMELA is considered. Specification and Description Language (SDL) may be considered

© 2024 An-Najah National University