For Consultation, Mentorship, Training, or Collaboration, You May Press The Contact Button
Department of Computer Science and Cybersecurity
Malware (10687488)
Total Credits 3
Course Type: Major compulsory
Prerequisites 10681371, 10686331, 10686235
Course Contents
This course provides a comprehensive understanding of malware: its types, life cycle, propagation mechanisms, and defensive strategies. Topics include viruses, worms, trojans, ransomware, spyware, rootkits, and fileless malware. Students will learn how malware evades detection, spreads across networks, and persists in systems. The course also covers endpoint protection, antivirus/EDR (Endpoint Detection and Response) technologies, threat intelligence, and incident response. Hands‑on labs include using sandboxes, analyzing malware behavior (without deep reverse engineering), and implementing defensive controls.
Description of Intended Learning Outcomes (ILO's)
Classify malware families and explain their infection vectors and payloads.
Analyze malware propagation techniques (email, drive‑by downloads, removable media).
Describe evasion techniques (packing, obfuscation, anti‑sandbox, fileless).
Use behavioral analysis tools (sandboxes, ProcMon, Wireshark) to identify malicious activity without reverse engineering.
Implement endpoint protection (AV, EDR, whitelisting)
Respond to a malware incident: containment, eradication, recovery, and reporting.
Textbook and/or References
• Malware: Fighting Malicious Code, Ed Skoudis, Prentice Hall, 1st edition (main textbook).
• The Malware Handbook, J. Williams, CRC Press, 1st edition.
• Understanding and Defending Against Malware, S. Northcutt, SANS Press.
• NIST SP 800-83: Guide to Malware Incident Prevention and Handling.
Assessment Criteria Percent (%)
Midterm Exam 30%
Assignments & Project 30%
Final Exam 40%
Course Plan
Week Topic
1 · Malware History and Evolution.
2 · Malware Taxonomy: Viruses, Worms, Trojans, Ransomware, Spyware, Adware, Rootkits, Bootkits.
3 · Infection Vectors: Phishing, Drive‑by Downloads, Removable Media, Supply Chain Attacks.
4 · Malware Persistence Mechanisms (Registry, Scheduled Tasks, WMI, Bootkit).
5 · Evasion Techniques: Packers, Crypters, Obfuscation, Anti‑Sandbox, Anti‑VM.
6 · AI based Malware-related Topics
7 · Behavioral Analysis Lab: Using Sandboxes (Cuckoo, Any.Run), ProcMon, RegShot, NetMon.
8 · Network‑Based Malware Detection: DNS Tunneling, C2 Communication, Beaconing.
9 · Endpoint Protection: Antivirus (Signature, Heuristic), EDR, Next‑Gen AV, Application Control.
10 · Fileless Malware and Living‑off‑the‑Land (LotL) Attacks.
11 · Midterm Exam.
12 · Ransomware Deep Dive: Encryption Algorithms, Double Extortion, Ransomware‑as‑a‑Service.
13 · Incident Response for Malware: Preparation, Detection, Containment, Eradication, Recovery.
14 · Project Presentations.
15 · Threat Intelligence: IOCs, YARA Rules, Malware Information Sharing (MISP).
16 · Final Exam.
Cybersecurity Program Learning Outcomes (PLOs)
A. Understand the mathematical and physical fundamentals required for Information Technology and
Cybersecurity.
B. Master programming principles and application development in various languages, with a focus on
security.
C. Analyze and design computer architecture and networks, and understand operating systems.
D. Apply information security concepts, privacy policies, and ethical standards.
E. Manage databases and ensure their security, protecting them from cyber threats.
F. Understand cryptography techniques, network security, and cyber-attacks.
G. Develop security policies and procedures, and manage risks.
H. Conduct penetration testing and ethical hacking, and assess vulnerabilities.
I. Analyze digital forensic evidence and handle malware.
J. Secure web applications, mobile applications, artificial intelligence systems, and cloud services.
K. Manage networks and systems securely while meeting high-quality service requirements.
L. Demonstrate technical communication, teamwork, and the ability to prepare information security
reports.
M. Possess the ability to generate new knowledge in cybersecurity and prepare and publish research at an
international level.
N. Be capable of transforming ideas into innovative practical applications that solve real-world problems
based on community needs.
O. Apply knowledge through graduation projects and practical training to solve real cybersecurity
problems.
Department of Computer Science and Cybersecurity
Web Security (10687327)
Total Credits 3
Course Type: Major compulsory
Prerequisites 10681204, 10686331
Course Contents
This course covers the fundamental principles of web application security, including common vulnerabilities, attack techniques, and defensive measures. Topics include the OWASP Top 10, injection flaws (SQL, NoSQL, command), cross‑site scripting (XSS), cross‑site request forgery (CSRF), broken authentication, sensitive data exposure, security misconfigurations, and API security. Students will learn to identify, exploit (in controlled environments) and remediate vulnerabilities using tools like Burp Suite, OWASP ZAP, and modern security headers.
Description of Intended Learning Outcomes (ILO's)
Explain the OWASP Top 10 vulnerabilities and their real‑world impact.
Identify and exploit injection flaws (SQLi, NoSQLi, command injection) in lab environments.
Detect and mitigate cross‑site scripting (XSS) and cross‑site request forgery (CSRF
Implement secure authentication, session management, and access controls.
Use automated scanners and manual testing tools (Burp Suite, OWASP ZAP).
Perform a comprehensive web application security assessment and present findings.
Textbook and/ or References
• The Web Application Hacker's Handbook, D. Stuttard & M. Pinto, Wiley, 2nd edition (main textbook).
• OWASP Testing Guide (latest version) – online.
• Web Security for Developers, M. McDonald, No Starch Press, 1st edition.
• Real‑World Bug Hunting, P. Yaworski, No Starch Press, 1st edition.
• OWASP ASVS (Application Security Verification Standard).
Assessment Criteria Percent (%)
Midterm Exam 30%
Assignments & Project 30%
Final Exam 40%
Course Plan
Week Topic
1 · Introduction to Web Security: HTTP/HTTPS, Headers, Cookies, Same‑Origin Policy.
2 · OWASP Top 10 Overview and Web Application Testing Methodologies.
3 · SQL Injection (Classic, Blind, Out‑of‑Band) & NoSQLi.
4 · Cross‑Site Scripting (Reflected, Stored, DOM‑based).
5 · Cross‑Site Request Forgery (CSRF) and Server‑Side Request Forgery (SSRF).
6 · AI-based Tools for Web Security.
7 · Broken Authentication & Session Management (JWT, Cookies).
8 · Security Misconfigurations, Directory Traversal, File Inclusion (LFI/RFI).
9 · XML External Entity (XXE) and Insecure Deserialization.
10 · API Security (REST, GraphQL) – OWASP API Top 10.
11 · Midterm Exam.
12 · Web Application Firewalls (WAF), CSP, and Secure Headers.
13 · Automated Scanning (Burp Suite, ZAP) and Manual Penetration Testing.
14 · Project Presentations.
15 · Capture The Flag (CTF) Challenges and Real‑World Case Studies (Equifax, Facebook).
16 · Final Exam.
Cybersecurity Program Learning Outcomes (PLOs)
A. Understand the mathematical and physical fundamentals required for Information Technology and
Cybersecurity.
B. Master programming principles and application development in various languages, with a focus on
security.
C. Analyze and design computer architecture and networks, and understand operating systems.
D. Apply information security concepts, privacy policies, and ethical standards.
E. Manage databases and ensure their security, protecting them from cyber threats.
F. Understand cryptography techniques, network security, and cyber-attacks.
G. Develop security policies and procedures, and manage risks.
H. Conduct penetration testing and ethical hacking, and assess vulnerabilities.
I. Analyze digital forensic evidence and handle malware.
J. Secure web applications, mobile applications, artificial intelligence systems, and cloud services.
K. Manage networks and systems securely while meeting high-quality service requirements.
L. Demonstrate technical communication, teamwork, and the ability to prepare information security
reports.
M. Possess the ability to generate new knowledge in cybersecurity and prepare and publish research at an
international level.
N. Be capable of transforming ideas into innovative practical applications that solve real-world problems
based on community needs.
O. Apply knowledge through graduation projects and practical training to solve real cybersecurity
problems.
Department of Computer Science and Cybersecurity
Reverse Engineering (10687472)
Total Credits 3
Course Type: Major compulsory
Prerequisites 10687488
Course Contents
This course introduces the principles and practices of software reverse engineering. Topics include binary analysis, disassembly, debugging, unpacking, anti‑reverse techniques, and malware analysis. Students will learn to use industry‑standard tools (IDA Pro, Ghidra, x64dbg, OllyDbg) to analyze compiled code, understand program behavior without source code, and identify vulnerabilities. Legal and ethical considerations are emphasized.
Description of Intended Learning Outcomes (ILO's)
Explain the fundamentals of reverse engineering and its ethical/legal context.
Analyze binary executables using static and dynamic analysis techniques.
Use disassemblers (IDA, Ghidra) and debuggers (x64dbg, gdb) to reverse compiled code.
Recover high‑level program structures (loops, conditionals, functions) from assembly.
Identify and bypass common anti‑reverse techniques (packing, obfuscation, anti‑debug).
Analyze real‑world malware samples in a sandboxed environment and present findings
Textbook and/or References
• Practical Binary Analysis, Dennis Andriesse, No Starch Press, 1st edition (main textbook).
• The IDA Pro Book, Chris Eagle, No Starch Press, 2nd edition.
• Reverse Engineering for Beginners, Dennis Yurichev, free online book.
• Practical Malware Analysis, Michael Sikorski, No Starch Press, 1st edition.
Assessment Criteria Percent (%)
Midterm Exam 30%
Assignments & Project 30%
Final Exam 40%
Course Plan
Week Topic
1 · Introduction to Reverse Engineering: Ethics & Law.
2 · x86/x64 Assembly Review for Reverse Engineering.
3 · PE and ELF File Formats: Structure and Parsing.
4 · Static Analysis with IDA Pro and Ghidra.
5 · Dynamic Analysis with x64dbg, OllyDbg, and gdb.
6 · AI-based Reverse Engineering-related Topics.
7 · Reconstructing Control Flow and Data Structures.
8 · Unpacking and Deobfuscation Techniques.
9 · Anti‑Debugging and Anti‑Disassembly Methods.
10 · Introduction to Malware Analysis (Lab Setup).
11 · Midterm Exam.
12 · Analyzing Ransomware, Rootkits, and Botnets.
13 · Scripting for Reverse Engineering (Python, IDAPython).
14 · Project Presentations.
15 · Advanced Topics: Firmware, Mobile RE, and Binary Patching.
16 · Final Exam.
Cybersecurity Program Learning Outcomes (PLOs)
A. Understand the mathematical and physical fundamentals required for Information Technology and
Cybersecurity.
B. Master programming principles and application development in various languages, with a focus on
security.
C. Analyze and design computer architecture and networks, and understand operating systems.
D. Apply information security concepts, privacy policies, and ethical standards.
E. Manage databases and ensure their security, protecting them from cyber threats.
F. Understand cryptography techniques, network security, and cyber-attacks.
G. Develop security policies and procedures, and manage risks.
H. Conduct penetration testing and ethical hacking, and assess vulnerabilities.
I. Analyze digital forensic evidence and handle malware.
J. Secure web applications, mobile applications, artificial intelligence systems, and cloud services.
K. Manage networks and systems securely while meeting high-quality service requirements.
L. Demonstrate technical communication, teamwork, and the ability to prepare information security
reports.
M. Possess the ability to generate new knowledge in cybersecurity and prepare and publish research at an
international level.
N. Be capable of transforming ideas into innovative practical applications that solve real-world problems
based on community needs.
O. Apply knowledge through graduation projects and practical training to solve real cybersecurity
problems.
Department of Computer Science and Cybersecurity
Cloud Computing and Its Security (10687481)
Total Credits 3
Course Type Major compulsory
Prerequisites 10687327
Course Contents
This course provides a comprehensive introduction to cloud computing paradigms, deployment models, service models (IaaS, PaaS, SaaS), and virtualization technologies. The second half focuses on security challenges specific to cloud environments including data breaches, identity management, compliance, encryption, and secure cloud architecture. Students will learn to design, deploy, and secure cloud‑based applications using industry‑standard platforms and security frameworks.
Intended Learning Outcomes (ILO's) Student Outcomes (SO's) - PLO Contribution
1 Explain cloud computing fundamentals, architectures, and deployment models. A, J 10%
2 Compare and contrast IaaS, PaaS, and SaaS service models with use cases. C,J 15%
3 Implement virtualization and containerization techniques (e.g., Docker, VMware). C,K 15%
4 Identify and analyze cloud security threats, vulnerabilities, and attack vectors. F,J 20%
5 Apply encryption, IAM, and compliance controls to secure cloud deployments. D,F,J 15%
6 Design and present a secure cloud solution for a real‑world scenario. L,N,O 15%
7 Evaluate cloud provider security offerings (AWS, Azure, GCP). G,J 10%
Textbook and/ or References
• Cloud Computing: Concepts, Technology & Architecture, Thomas Erl, Prentice Hall, 1st edition (main textbook).
• Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Ronald L. Krutz, Wiley, 1st edition.
• AWS Certified Security Study Guide, D. B. Jones, Sybex, 2021.
• NIST SP 800-210: General Access Control Guidance for Cloud Systems.
Assessment Criteria Percent (%)
Midterm Exam 30%
Assignments & Project 30%
Final Exam 40%
Course Plan
Week Topic
1 · Introduction to Cloud Computing: History and Evolution.
2 · Cloud Architecture: Deployment Models (Public, Private, Hybrid, Community).
3 · Service Models: IaaS, PaaS, SaaS – Deep Dive.
4 · Virtualization Technologies: Hypervisors, Containers.
5 · Cloud Storage and Data Management.
6 · AI-based Cloud Computing-related Topics.
7 · Cloud Security Fundamentals: CIA Triad in Cloud.
8 · Identity and Access Management (IAM) for Cloud.
9 · Data Encryption and Key Management in Cloud.
10 · Cloud Compliance, Legal Issues, and Auditing.
11 · Midterm Exam.
12 · Cloud Security Architectures and Best Practices.
13 · Cloud Penetration Testing and Incident Response.
14 · Project Presentations.
15 · Review and Emerging Trends (Serverless, Edge Computing).
16 · Final Exam.
Cybersecurity Program Learning Outcomes (PLOs)
A. Understand the mathematical and physical fundamentals required for Information Technology and
Cybersecurity.
B. Master programming principles and application development in various languages, with a focus on
security.
C. Analyze and design computer architecture and networks, and understand operating systems.
D. Apply information security concepts, privacy policies, and ethical standards.
E. Manage databases and ensure their security, protecting them from cyber threats.
F. Understand cryptography techniques, network security, and cyber-attacks.
G. Develop security policies and procedures, and manage risks.
H. Conduct penetration testing and ethical hacking, and assess vulnerabilities.
I. Analyze digital forensic evidence and handle malware.
J. Secure web applications, mobile applications, artificial intelligence systems, and cloud services.
K. Manage networks and systems securely while meeting high-quality service requirements.
L. Demonstrate technical communication, teamwork, and the ability to prepare information security
reports.
M. Possess the ability to generate new knowledge in cybersecurity and prepare and publish research at an
international level.
N. Be capable of transforming ideas into innovative practical applications that solve real-world problems
based on community needs.
O. Apply knowledge through graduation projects and practical training to solve real cybersecurity
problems.
Department of Computer Science and Cybersecurity
Forensic Evidence Analysis (10687489)
Total Credits 3
Course Type: Major compulsory
Prerequisites 10686487
Course Contents
This course covers the principles and practices of digital forensics including evidence acquisition, preservation, analysis, and reporting. Topics include file system forensics, memory forensics, network forensics, mobile device forensics, and anti‑forensics detection. Students will learn to use forensic tools (FTK, Autopsy, Volatility, Wireshark) and follow legal and ethical guidelines for handling digital evidence in investigations.
Description of Intended Learning Outcomes (ILO's)
Describe the digital forensics process, legal frameworks, and chain of custody.
Acquire and preserve digital evidence from storage media using write‑blockers and imaging.
Analyze file systems (FAT, NTFS, ext4) to recover deleted files and artifacts.
Perform memory forensics to detect rootkits and extract process artifacts.
Conduct network forensics to reconstruct attacks from packet captures and logs.
Investigate mobile devices (iOS/Android) and present forensic findings in a mock court.
Textbook and/ or References
• Digital Forensics and Incident Response, Gerard Johansen, Packt Publishing, 2nd edition (main textbook).
• File System Forensic Analysis, Brian Carrier, Addison‑Wesley, 1st edition.
• The Art of Memory Forensics, Michael Hale Ligh, Wiley, 1st edition.
• Practical Mobile Forensics, Rohit Tamma, Packt Publishing, 4th edition.
• NIST SP 800-86: Guide to Integrating Forensic Techniques into Incident Response.
Assessment Criteria Percent (%)
Midterm Exam 30%
Assignments & Project 30%
Final Exam 40%
Course Plan
Week Topic
1 · Introduction to Digital Forensics: History & Ethics.
2 · Legal Framework, Chain of Custody, and Evidence Handling.
3 · Forensic Imaging: dd, FTK Imager, Write‑Blockers.
4 · File System Forensics: FAT, NTFS, MFT Analysis.
5 · Deleted File Recovery and Carving (PhotoRec, Scalpel).
6 · AI-based Reverse Engineering- related Topics.
7 · Windows Artifacts: Registry, Event Logs, Prefetch.
8 · Linux/macOS Forensics: Logs, History, Plists.
9 · Memory Forensics with Volatility Framework.
10 · Network Forensics: PCAP Analysis with Wireshark, Zeek.
11 · Midterm Exam.
12 · Mobile Device Forensics (iOS/Android) – Acquisition.
13 · Anti‑Forensics Detection: Encryption, Steganography.
14 · Project Presentations.
15 · Forensic Reporting and Expert Testimony.
16 · Final Exam.
Cybersecurity Program Learning Outcomes (PLOs)
A. Understand the mathematical and physical fundamentals required for Information Technology and
Cybersecurity.
B. Master programming principles and application development in various languages, with a focus on
security.
C. Analyze and design computer architecture and networks, and understand operating systems.
D. Apply information security concepts, privacy policies, and ethical standards.
E. Manage databases and ensure their security, protecting them from cyber threats.
F. Understand cryptography techniques, network security, and cyber-attacks.
G. Develop security policies and procedures, and manage risks.
H. Conduct penetration testing and ethical hacking, and assess vulnerabilities.
I. Analyze digital forensic evidence and handle malware.
J. Secure web applications, mobile applications, artificial intelligence systems, and cloud services.
K. Manage networks and systems securely while meeting high-quality service requirements.
L. Demonstrate technical communication, teamwork, and the ability to prepare information security
reports.
M. Possess the ability to generate new knowledge in cybersecurity and prepare and publish research at an
international level.
N. Be capable of transforming ideas into innovative practical applications that solve real-world problems
based on community needs.
O. Apply knowledge through graduation projects and practical training to solve real cybersecurity
problems.
Department of Computer Science and Cybersecurity
Network Transmission Technology (10686221)
Total Credits 3
Course Type: Major compulsory
Prerequisites 10687488
Course Contents
This course familiarizes students with the analog and digital transmission techniques, modulation and demodulation, transmission media, data encoding, decoding, synchronous and asynchronous transmission, digital carriers, error control, multiplexing, multi-access, circuit and packet switching, and open system standards among others.
Description of Intended Learning Outcomes (ILO's)
Explain fundamental principles of data transmission (analog/digital signals, bandwidth, data rate limits, impairments).
Describe characteristics, applications, trade‑offs of guided (twisted pair, coax, fiber) and unguided (radio, microwave, satellite) media.
Apply signal encoding and modulation techniques (NRZ, Manchester, QAM) and compare performance
Analyze multiplexing techniques (FDM, TDM, WDM, CDMA) and evaluate role in channel utilization and capacity
Justify layered network architecture (OSI, TCP/IP) and describe physical & data link layer functions
Implement error detection (CRC, checksum) and correction (ARQ) mechanisms
Analyze circuit switching, packet switching, and virtual circuit technologies
Design a basic transmission system for a given scenario (topology, capacity, hardware, security)
Textbook and/or References
• Behrouz A. Forouzan, “Data communication and networking”, 5th edition.
• William Stallings, “Data and Computer Communication”, 8th edition.
Assessment Criteria Percent (%)
Midterm Exam 30%
Assignments & Project 30%
Final Exam 40%
Course Plan
Week Topic
1- Introduction and Basic Concepts (Chapter 1): Data communication, Network Topologies, Network categories, The internet
2- Network Models (Chapter 2): Protocol Layering, TCP/IP Protocol Suite, The OSI Model
3-4 Introduction to Physical Layer (Chapter 3): Data and Signals, Periodic Analog Signals, Digital Signals, Transmission Impairment, Data Rate Limits, Performance
5-7 Digital Transmission (Chapter 4): Digital-To-Digital Conversion, Analog-To-Digital Conversion, Transmission Modes
8-10 Analog Transmission (Chapter 5): Digital-To-Analog Conversion, Analog-To-Analog Conversion
11- Bandwidth Utilization: Multiplexing and Spectrum Spreading (Chapter 6): Multiplexing, Spread Spectrum
12- Transmission Media (Chapter 7): Guided Media, Unguided Media: Wireless
Midterm Exam
13- Error Detection and Correction (Chapter 10): Block Coding, Cyclic Codes, Checksum, Forward Error Correction
14-15 Media Access Control (MAC) (Chapter 12): Random Access, Controlled Access, Channelization
16- Comprehensive review
Cybersecurity Program Learning Outcomes (PLOs)
A. Understand the mathematical and physical fundamentals required for Information Technology and
Cybersecurity.
B. Master programming principles and application development in various languages, with a focus on
security.
C. Analyze and design computer architecture and networks, and understand operating systems.
D. Apply information security concepts, privacy policies, and ethical standards.
E. Manage databases and ensure their security, protecting them from cyber threats.
F. Understand cryptography techniques, network security, and cyber-attacks.
G. Develop security policies and procedures, and manage risks.
H. Conduct penetration testing and ethical hacking, and assess vulnerabilities.
I. Analyze digital forensic evidence and handle malware.
J. Secure web applications, mobile applications, artificial intelligence systems, and cloud services.
K. Manage networks and systems securely while meeting high-quality service requirements.
L. Demonstrate technical communication, teamwork, and the ability to prepare information security
reports.
M. Possess the ability to generate new knowledge in cybersecurity and prepare and publish research at an
international level.
N. Be capable of transforming ideas into innovative practical applications that solve real-world problems
based on community needs.
O. Apply knowledge through graduation projects and practical training to solve real cybersecurity
problems.