<h5 align="center" style="text-align:center"><span style="font-size:10pt"><span style="font-family:"Times New Roman",serif"><span style="font-weight:bold"><span style="font-size:18.0pt"><span style="color:#5d250a">Bachelor in Computer Engineering program</span></span></span></span></span></h5>

<p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><u><span style="font-size:16.0pt"><span style="line-height:107%"><span style="color:black">Mission:</span></span></span></u></b></span></span></span></p>

<p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span lang="EN-GB" style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">To provide an environment for producing highly qualified computer engineers capable of solving problems and assuming the leadership to make a significant contribution to knowledge society.</span></span></span></span></span></span></span></p>

<p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><u><span style="font-size:16.0pt"><span style="line-height:107%"><span style="color:black">PEOs: Program Education Objectives</span></span></span></u></b></span></span></span></p>

<p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span lang="EN-GB" style="font-size:12.0pt"><span style="background:white"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">In line with the achievements of its mission and vision, the Computer Engineering Program aims to produce Computer Engineering Graduates with solid fundamentals and skills in the relevant sciences and technology who can contribute to society through training, invention, research, enterprise, and leadership. The Program outcomes believe the graduates to attain the following during their study time:</span></span></span></span></span></span></span></span></p>

<p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span lang="EN-GB" style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">PEO1: Practice professionally as individuals, team members, or leaders in computer engineering and related disciplines.</span></span></span></span></span></span></span></p>

<p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span lang="EN-GB" style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">PEO2: Advance successfully in their career or post graduate studies.</span></span></span></span></span></span></span></p>

<p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span lang="EN-GB" style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">PEO3: Engage in lifelong learning or professional activities to develop their skills. &nbsp;</span></span></span></span></span></span></span></p>

<p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><u><span lang="EN-GB" style="font-size:16.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">Student Outcomes:</span></span></span></span></u></b></span></span></span></p>

<ol>
<li style="margin-left:8px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span lang="EN-GB" style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">An ability to identify, formulate, and solve complex engineering problems by applying principles of engineering, science, and mathematics.</span></span></span></span></span></span></span></li>
<li style="margin-left:8px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span lang="EN-GB" style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">An ability to apply engineering design to produce solutions that meet specified needs with consideration of public health, safety, and welfare, as well as global, cultural, social, environmental, and economic factors.</span></span></span></span></span></span></span></li>
<li style="margin-left:8px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span lang="EN-GB" style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">An ability to communicate effectively with a range of audiences.</span></span></span></span></span></span></span></li>
<li style="margin-left:8px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span lang="EN-GB" style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">An ability to recognize ethical and professional responsibilities in engineering situations and make informed judgments, which must consider the impact of engineering solutions in global, economic, environmental, and societal contexts.</span></span></span></span></span></span></span></li>
<li style="margin-left:8px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span lang="EN-GB" style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">An ability to function effectively on a team whose members together provide leadership, create a collaborative and inclusive environment, establish goals, plan tasks, and meet objectives.</span></span></span></span></span></span></span></li>
<li style="margin-left:8px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span lang="EN-GB" style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">An ability to develop and conduct appropriate experimentation, analyze and interpret data, and use engineering judgment to draw conclusions.</span></span></span></span></span></span></span></li>
<li style="margin-left:8px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span lang="EN-GB" style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">An ability to acquire and apply new knowledge as needed, using appropriate learning strategies.</span></span></span></span></span></span></span></li>
</ol>

<p style="margin-left:48px">&nbsp;</p>

<p style="margin-bottom:11px; margin-left:48px">&nbsp;</p>

<p style="margin-bottom:11px">&nbsp;</p>

<p style="margin-bottom:11px">&nbsp;</p>

<p style="margin-left:27px; text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="direction:rtl"><span style="unicode-bidi:embed"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span dir="LTR" style="font-size:18.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:#5d250a">Master of Engineering in Cybersecurity program</span></span></span></span></b></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:18.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:#5d250a">About the program</span></span></span></span></b></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">We welcome you, dear visitor, and we are pleased to provide you with a brief introduction about the Master of Engineering in Cybersecurity program. This program was prepared in the College of Computer Engineering and Sciences as one of the distinguished postgraduate programs at Prince Sattam bin Abdulaziz University, as the admission of male and female students began in the academic year 1440-1441 H (2019-2020). The following points summarize the importance of the program, the community's need for it, and its general objectives.</span></span></span></span></span></span></span></p>

<p dir="RTL" style="margin-right:27px; margin-bottom:11px; text-align:justify">&nbsp;</p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:18.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:#5d250a">Importance of the program</span></span></span></span></b></span></span></span></p>

<ul>
<li><span style="font-size:11pt"><span style="background:white"><span style="line-height:21.0pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="font-family:"Times New Roman",serif"><span style="color:black">Protection of the process of transferring data and information through computer networks. </span></span></span></span></span></span></span></li>
<li><span style="font-size:11pt"><span style="background:white"><span style="line-height:21.0pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="font-family:"Times New Roman",serif"><span style="color:black">Secure data, information, systems, and devices distributed in different locations from attacks</span></span></span></span></span></span></span></li>
<li><span style="font-size:11pt"><span style="background:white"><span style="line-height:21.0pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="font-family:"Times New Roman",serif"><span style="color:black">Discover attacks and hacks that may be exposed to devices. Data recovery and rehabilitation of devices affected by security attacks. </span></span></span></span></span></span></span></li>
<li><span style="font-size:11pt"><span style="background:white"><span style="line-height:21.0pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="font-family:"Times New Roman",serif"><span style="color:black">Contribute to enhancing the Kingdom's national security related to cybersecurity through the use of technologies after their development and through skilled specialists in the field and well-trained trainers at the highest levels. </span></span></span></span></span></span></span></li>
<li><span style="font-size:11pt"><span style="background:white"><span style="line-height:21.0pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="font-family:"Times New Roman",serif"><span style="color:black">Transfer the concept of cybersecurity technology to students and researchers, as well as transferring it to the community.</span></span></span></span></span></span></span></li>
</ul>

<p style="margin-left:27px; text-align:justify; margin-bottom:11px">&nbsp;</p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:18.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:#5d250a">Community needs for the program</span></span></span></span></b></span></span></span></p>

<ul>
<li style="text-align:justify"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">There is an urgent need for highly trained experts who can carry out the task of ensuring the safety and security of information in the various institutions of the Kingdom, whether governmental or private. </span></span></span></span></span></span></span></li>
</ul>

<p style="margin-left:48px">&nbsp;</p>

<ul>
<li style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">There is an urgent need to educate community members about the importance and how to secure data, information and devices.</span></span></span></span></span></span></span></li>
</ul>

<p dir="RTL" style="text-align:justify; margin-bottom:11px">&nbsp;</p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:18.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:#5d250a">Program Mission</span></span></span></span></b></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif">&nbsp;<span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">To provide a suitable environment for producing highly qualified Cybersecurity engineers, capable of solving security issues and assuming leadership to make significant contribution in knowledge society.</span></span></span></span></span></span></span></p>

<p dir="RTL" style="text-align:justify; margin-bottom:11px">&nbsp;</p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:18.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:#5d250a">Program Goals</span></span></span></span></b></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">PG1: Provide graduates with an in-depth specialization knowledge in cybersecurity, selected from areas such as hardware security, network security and systems security. </span></span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">PG2: Enhance the ability of graduates to succeed in dealing with the latest developments in the field, formulate solutions to address attacks, and plan for a secure world through cybersecurity. </span></span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">PG3: Provide graduates with the necessary skills in Cybersecurity to contribute to enhancing the national security of the Kingdom of Saudi Arabia associated with cybersecurity through the adaptation of developed technologies. </span></span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">PG4: Qualify graduates to pursue more postgraduate studies and scientific research in the field of cybersecurity</span></span></span></span></span></span></span></p>

<p style="margin-left:27px; text-align:justify; margin-bottom:11px">&nbsp;</p>

<p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:18.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:#5d250a">Program Learning Outcomes (PLOs)</span></span></span></span></b></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">Graduates who successfully complete the program are expected to be able to:</span></span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">K1: Describe complex computing problems related to cybersecurity. </span></span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">K2: Recognize the principles of computing applications and optimum security solutions. </span></span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">S1: Implement and evaluate a computing-based solution to meet a given set of computing requirements in the context of cybersecurity. </span></span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">S2: Apply security principles and practices to maintain operations in the presence of risks and threats. </span></span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">V1: Communicate effectively in a variety of professional contexts. </span></span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">V2: Respect professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.</span></span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">&nbsp;V3: Function effectively as a member or leader of a team engaged in activities appropriate to cybersecurity.</span></span></span></span></span></span></span></p>

<p dir="RTL" style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="direction:rtl"><span style="unicode-bidi:embed"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:18.0pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:#5d250a">Graduate Attributes</span></span></span></span></b></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">Graduates who successfully completed the program are expected to have the following attributes: </span></span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">CSE1- Have in-depth knowledge, understanding and skills associated with Cybersecurity. </span></span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">CSE2- Have the ability for lifelong personal development and learning to be successful in society. </span></span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">CSE3- Have the ability to evaluate and draw conclusions from information, to find sustainable solutions to complex security problems and make decisions. </span></span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">CSE4- Have the ability to lead and support others by inspiring them with a clear vision and motivating them to achieve security goals. </span></span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:13.5pt"><span style="line-height:107%"><span style="font-family:"Times New Roman",serif"><span style="color:black">CSE5- Have the ability to work under pressure, where the organization’s security can be at stake if they do not work carefully and thoroughly.</span></span></span></span></span></span></span></p>

<p dir="RTL" style="text-align:right; margin-bottom:11px">&nbsp;</p>

Last Update Date For Page Content : 15/12/2024 - 11:12 Saudi Arabia Time

Do you like the content ?
Reason
Reason
btn