• USTF Announcement: BETA VERSION 2.0

Bachelor of Science in Information Technology Cyber Security

Bachelor of Science in Information Technology Cyber Security

Information Technology Program:

Introduction

The Department of Information Technology offers a Bachelor of Science in Information Technology degree, which is a 4-years program that requires the completion of 123 credit hours The Information Technology curriculum comprises two concentrations: Cyber Security and Data Analytics. The program is accredited by the Ministry of Higher Education.

Mission

The mission of the Information Technology program is to:

  • Provide quality education in the field of emerging technologies based on internationally recognized standards for undergraduate programs;
  • Produce information technology professionals who can deploy efficiently IT technologies and implement IT solutions according to market and society needs, particularly in the UAE and Gulf region; and
  • Prepare graduates for lifelong learning and research.

Program Educational Goals

Graduates of the Bachelor of Science in Information Technology program with two concentrations will have the following characteristics within few years of graduation:

  • Apply acquired knowledge and skills in information technology and implement their skills in public, private sectors, academic or international information Technology functional activities.
  • Act as information systems professional leaders in performing related skills in technical, business, or ethical duties.
  • Engage in life-long learning and professional development in pursuing additional graduate degrees, professional development and self-studies.

Programs Offered

The Bachelor of Science in Information Technology has the following two concentrations:

  • Bachelor of Science in Information Technology/Cuber Security
  • Bachelor of Science in Information Technology/Data Analytics

All Program Goals are aligned with the needs of program constituencies as follows:

  • IT Students: They are to be developed as qualified Information Technology who can be gainfully employed after their graduation and can proceed for graduate studies in UAE or abroad.
  • IT Alumni of both concentrations: They are graduates of IT program and working in the market. They should be competent team members and leaders in their profession, able to update and adapt their knowledge and skills, and engage with community at all levels in an ethical and professional manner.
  • IT Department Faculty: They are primarily responsible to provide quality education to students equipping them with theoretical knowledge and practical skills. It is their responsibility to contribute and promote the achievement of IT program objectives.
  • Employers of IT Graduates from both concentrations: The employers require productive and competent Information technology who can effectively contribute in their professional fields.

Program Learning Outcomes

There are six Learning Outcomes related to the Information Technology program and one learning outcome associated to each concentration. Graduates will be able to:

Common Programs Learning Outcomes

       NQF Strands

PLO1

Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.

·       Knowledge.

·       Skills.

PLO2

Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements and user needs in the context of the program’s discipline.

·       Knowledge.

·       Skills.

PLO3

Communicate effectively in a variety of professional contexts,

·       Skills.

·       Autonomy and Responsibility.

PLO4

Recognize professional responsibilities, and make judgments based on legal and ethical principles.

·       Autonomy and Responsibility.

·       Role in Context.

·       Self-Development.

PLO5

Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.

·       Autonomy and Responsibility.

·       Role in Context.

PLO6

Identify and analyze user needs and to take them into account in the selection, creation, integration, evaluation, and administration of computing-based systems.

·       Knowledge.

·       Skills.

·       Autonomy and Responsibility.

Concentration in Cyber Security

Common Programs Learning Outcomes

       UAEQF Strands

PLO8

Apply security principles and practices to maintain operations in the presence of risks and threats.

 

·       Skill.

·       Autonomy and Responsibility.

·       Role in Context.

Admission Requirements

  • Emirati General Secondary School Certificate (or its equivalent).
  • Elite Track: A minimum score of (60%).
  • Advanced Track: A minimum score of (65%)
  • General Track: A minimum score of (70%)
  • EmSAT English (1100) OR Academic IELTS (5) (or its equivalent)
  • A minimum score in Mathematics for Elite Track and Advanced Track (60). For General Track Track a minimum score of (65) (OR) A score of (700) in EmSAT Mathematics.
  • A minimum score in ONLY OME of Physics, Biology, and Chemistry for Elite Track and Advanced Track (60). For General Track a minimum score of (65) (OR) A score of (700) in EmSAT of the same subjects.

 

Career Opportunities 

Graduates of BSc. information Technology/Cyber Security are qualified for employment as Security Analyst, Security Architect, Security Software Developer, Security Engineer, Security Administrator, Cryptographer, Security Consultant

Graduates of BSc. information Technology/Data Analytics are qualified for employment as Data Scientist, Data Engineer, Data Analytics Consultant, IT Systems Analyst, Healthcare Data Analyst, Machine Learning Engineer, Big Data Engineer.

Graduation requirements

Students at the University of Science and Technology of Fujairah (USTF) are eligible for a bachelor in Information Systems after completion of 123 credits hours, which normally takes eight semesters. The minimum cumulative grade point average for graduation is 2.0 for 123 total credit hours.

Degree requirement

The B.Sc. degree in Information Technology for each concentration requires the completion of a 123 Cr. Hrs. distributed according to the following plan. The study plan is designed so that the normal duration for completing the degree requirements is 4 years but should not exceed 8 years.

Type of Courses

Cr. Hrs.

1. University General Education Courses

24

(a) University Compulsory Courses

21

(b) University Elective Courses

3

2. Information Technology Program Compulsory Common Core Courses

84

(a) IT Program General Requirements

9

(b) IT Program Core Courses

72

(c) Internship

3

3. Information Systems Program Concentration Courses

15

Total Credit Hours

123

University General Education Requirements

(a) University Required Courses (21 Cr. Hrs.)

Course Code

Course Name

Credit hours

ISL111

Islamic Culture

3

EMS112

Emirates Society (English)

3

ENG111

English Communication Skills

3

IES112

Innovation, Entrepreneurship, and Sustainability (English)

3

STA113

Statistics (English)

3

COM101

Introduction to Computer Sciences (English)

3

ARB111

Communication Skills in Arabic Language

3

(b) University Elective Courses (3 Cr. Hrs.)

Humanities and Society (3 Cr. Hrs.)

Course Code

Course Name

Credit hours

ISH211

Islamic Civilization

3

THI211

Critical Thinking

3

PSY101

Introduction to Psychology

3

LAW100

Introduction to Law

3

MGT200

Introduction to Management

3

ARC210

Principles of Architecture

3

ART110

Introduction to Art (Arabic)

3

ART111

Introduction to Art (English)

3

ART112

Introduction to Aesthetics

3

ARB113

The Art of Written Expression

3

ENV111

Environmental Science

3

SSW151

Introduction to Sociology

3

DER118

Introduction to Public Relations and Advertising

3

SOC112

Communication Between Cultures

3

INF211

Information Society

3

ETH110

Academic and Technological Ethics

3

DES205

Digital Photography

3

MKT211

Introduction to Digital Marketing

3

 

IT Program General Requirements (9 Cr. Hrs.)

Course No.

Course Title

Contact and Credit Hrs.

Prerequisite

Lec

Lab

Tut

Cr. Hrs.

INT104

Information Technology in Business

3

0

0

3

COM101

MTH102

Discrete Mathematics

3

0

2

3

INT101

INT101

Calculus for IT

3

0

2

3

-

 

IT Program Core Courses and Internship (75 Cr. Hrs.)

Course No.

Course Title

Contact and Credit Hrs.

Prerequisite

Lec

Lab

Tut

Cr. Hrs.

INT100

Introductory Programming

2

2

0

3

-

INT201

Object Oriented Programming

2

2

0

3

INT100

INT202

System Analysis and Design

3

0

0

3

INT104

INT203

Computer Organization

3

0

0

3

COM101

INT204

Data Structure

3

0

2

3

INT201

INT205

Fundamentals of Data Communications and Networking

2

2

0

3

INT203

INT206

Fundamentals of Web Systems

2

2

0

3

INT201

INS207

Leadership and Teamwork

3

0

0

3

INT 104

INT209

Fundamentals of Data Science

3

0

2

3

INT101-INT201

INT301

Operating Systems

2

2

0

3

INT203

INT302

Database Management Systems

2

2

0

3

INT201

INT303

Fundamentals of Information Security

3

0

0

3

INT205

INT305

Internet of Things

2

2

0

3

INT204-INT205

INT306

Computer Ethics and Professional Practices

3

0

0

3

INT303

INT307

Information Technology Project Management

2

2

0

3

INT202

INT309

Cloud Computing

2

2

0

3

INT205-INT206

INT313

User Interface Design

3

0

0

3

INT202

INT323

Big Data Technologies

3

0

0

3

INT302

INT324

Dynamic Web Design and Development

2

2

0

3

INT206

INS402

Business Intelligence and Data Warehousing

3

0

0

3

INT323

INT404

Internship

-

-

-

3

90 Cr.Hrs

INT429

Mobile Applications Development

2

2

0

3

INT201-INT301

INT430

Artificial Intelligence

2

2

0

3

INT204-INT209

INT445

Graduation Project I

1

4

0

3

90 Cr.Hrs

INT446

Graduation Project II

1

4

0

3

INT445

Cyber Security Concentration - Compulsory Concentration Courses (15 Cr. Hrs.)

Course No.

Course Title

Contact and Credit Hrs.

Prerequisite

Lec

Lab

Tut

Cr. Hrs.

INT444

Wireless and Mobile Networks Security

3

0

0

3

INT205-INT303

INT442

Cryptography

2

2

0

3

INT204-MTH102

INT441

Digital Forensics

3

0

0

3

INT303

INT443

Ethical Hacking

2

2

0

3

INT442-INT441

INT447

Selected Topics in Cyber Security

3

0

0

3

INT301

 

Study Plan

Study Plan