Advanced Diploma in Cybersecurity Program
(24 Month, 104 Weeks) 100% Remote Program
Section 1: Program Overview
1.1 Introduction
Cybersecurity is a critical and rapidly evolving field, essential for safeguarding digital assets and privacy in an increasingly interconnected world. Our 2-year diploma in Cybersecurity is meticulously crafted to equip students with the knowledge and skills needed to navigate the complex landscape of cyber threats and defenses. The Advanced Diploma in Cybersecurity program is a comprehensive two-year program designed to equip students with the knowledge, skills, and practical experience required to address the evolving challenges and threats in the field of cybersecurity. Through a combination of theoretical coursework, hands-on training, and real-world projects, students will develop expertise in areas such as network security, digital forensics, ethical hacking, risk management, and regulatory compliance. The program is tailored to meet the specific needs of students in Dubai, considering the local cybersecurity landscape and industry demands.
Goals:
Objectives:
Intended Learning Outcomes:
1.2 Program Structure and Curriculum
The curriculum is structured to provide students with a strong foundation in cybersecurity fundamentals in the first year, followed by advanced topics and practical experience in the second year. Total Credits: The program consists of a total of 80 credits, spread over two years of study.
Core Courses: These are mandatory courses that provide foundational knowledge and skills in cybersecurity.
Elective Options: Students may choose elective courses based on their interests and career goals. Elective options may include:
Specialized Tracks or Concentrations: The program may offer specialized tracks or concentrations to allow students to focus on specific areas of cybersecurity. Examples of specialized tracks include:
Curriculum Alignment with Industry Standards and Emerging Trends:
The curriculum is designed to align with industry standards, best practices, and emerging trends in the cybersecurity field. This alignment is achieved through:
Industry Certification Preparation: Course content is aligned with industry certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), and Certified Information Systems Security Professional (CISSP). Students are prepared to sit for these certifications upon graduation.
Integration of Emerging Technologies: The curriculum incorporates emerging technologies such as cloud computing, IoT, blockchain, and artificial intelligence (AI) into relevant courses to address the evolving cybersecurity landscape.
Industry Partnerships and Advisory Boards: Collaboration with industry partners and advisory boards ensures that the curriculum remains up-to-date and relevant to industry needs. Input from industry experts helps identify emerging trends and tailor the curriculum accordingly.
The core courses in the program include:
In addition to the core courses, students are required to complete a capstone project in their final semester, where they apply their knowledge and skills to solve real-world cybersecurity challenges.
The curriculum is designed to align with industry standards and emerging trends in the field of cybersecurity. It provides students with a well-rounded education that prepares them for a variety of cybersecurity roles, including security analysts, network security engineers, and cybersecurity consultants.
1.3 Admission Requirements
To be admitted to the Diploma in Cyber-Security program, students must meet the following admission requirements:
Admission to the Advanced Diploma in Cybersecurity program is subject to rigid criteria aimed at selecting candidates with the aptitude and academic background necessary to succeed in the program. Prospective students are required to meet minimum academic qualifications and may undergo additional assessments or interviews to evaluate their readiness for the program. This rigorous selection process ensures that students admitted to the program possess the foundation to excel in the challenging and dynamic field of Cybersecurity.
Educational Qualifications:
Section 2: Program Evaluation
2.1 Learning Outcomes
Upon completion of the Diploma in Cybersecurity program, students will be able to:
These learning outcomes are designed to equip students with the knowledge, skills, and competencies required to excel in diverse cybersecurity roles and contribute effectively to the security of digital systems and information.
2.2 Curriculum Mapping
The program's courses and learning activities are designed to align with the defined learning outcomes. Each course contributes to the achievement of specific learning outcomes as follows:
Course |
Weekly Coverage |
Reference Books |
Introduction to Cyber Security
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Introduction to cybersecurity, its importance, and basic concepts. Week 2: Cybersecurity principles and best practices. Week 3: Common cyber threats and attack vectors. Week 4: Introduction to cybersecurity tools and technologies. Week 5: Cybersecurity career paths and opportunities. |
Cybersecurity: The Beginner's Guide by Dr. Erdal Ozkaya |
Computer Networking Fundamentals
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Introduction to networking basics, including OSI model and TCP/IP. Week 2: Network protocols and communication. Week 3: Network devices and technologies. Week 4: Network security concepts and practices. Week 5: Network troubleshooting and maintenance. |
Computer Networking: A Top-Down Approach by James F. Kurose and Keith W. Ross |
Cyber Security Policies and Compliance
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Introduction to cybersecurity policies and compliance frameworks. Week 2: Legal and regulatory requirements for cybersecurity. Week 3: Developing and implementing cybersecurity policies. Week 4: Auditing and assessing cybersecurity compliance. Week 5: Case studies and best practices in cybersecurity compliance. |
Cybersecurity Policy, Strategy, and Politics: An Integrated Approach by George Ledin Jr. and Alan R. Shark |
Operating Systems Security
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Introduction to operating system security concepts. Week 2: Hardening operating systems against security threats. Week 3: Securing user accounts and permissions. Week 4: Patch management and software updates. Week 5: Monitoring and logging for security purposes. |
Operating System Security by Trent Jaeger |
Windows Server: Installation and Storage
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Introduction to Windows Server installation and configuration. Week 2: Managing disk storage in Windows Server. Week 3: Implementing file and share access controls. Week 4: Configuring Windows Server security features. Week 5: Windows Server backup and recovery strategies. |
Windows Server 2019 Administration Cookbook by Jordan Krause |
Linux Fundamentals
Hours: 100 Weeks: 5 Credits: 4 |
Week 1: Introduction to Linux operating system and basic commands. Week 2: Linux file system and permissions. Week 3: User and group management in Linux. Week 4: Linux networking and security. Week 5: Advanced Linux security features and practices. |
How Linux Works: What Every Superuser Should Know by Brian Ward |
Introduction to Cryptography
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Basic principles of cryptography and encryption. Week 2: Symmetric and asymmetric encryption algorithms. Week 3: Digital signatures and certificates. Week 4: Cryptographic protocols and standards. Week 5: Practical applications of cryptography in cybersecurity.
|
Cryptography and Network Security: Principles and Practice by William Stallings |
Cyber Security Threats and Vulnerabilities
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Overview of common cybersecurity threats. Week 2: Types of vulnerabilities and their exploitation. Week 3: Methods of identifying and assessing threats and vulnerabilities. Week 4: Mitigation strategies for cyber threats and vulnerabilities. Week 5: Incident response and recovery planning.
|
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions by Thomas J. Mowbray |
Secure Systems Architecture
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Principles of secure system design. Week 2: Threat modeling and risk assessment. Week 3: Secure coding practices and secure software development lifecycle. Week 4: Network security architecture and design. Week 5: Case studies and best practices in secure systems architecture. |
Security Engineering: A Guide to Building Dependable Distributed Systems by Ross J. Anderson |
Cyber Security Tools and Techniques
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Introduction to cybersecurity tools and their categories. Week 2: Network security tools and techniques. Week 3: Application security tools and techniques. Week 4: Incident response and forensic tools. Week 5: Emerging trends in cybersecurity tools and techniques. |
Cybersecurity: A Comprehensive Approach by J. David Thornton |
Network Security
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Overview of network security concepts and principles. Week 2: Secure network design and architecture. Week 3: Network security protocols and technologies. Week 4: Network security monitoring and intrusion detection. Week 5: Advanced topics in network security. |
Network Security Essentials: Applications and Standards by William Stallings |
Advanced Cryptography
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Review of basic cryptographic concepts. Week 2: Advanced encryption algorithms and protocols. Week 3: Cryptanalysis and cryptology. Week 4: Quantum cryptography and future trends. Week 5: Practical applications of advanced cryptography. |
Cryptography Engineering: Design Principles and Practical Applications by Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno |
Information Security Governance and Risk Management
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Introduction to information security governance. Week 2: Risk management frameworks and methodologies. Week 3: Implementing security controls and measures. Week 4: Business continuity and disaster recovery planning. Week 5: Case studies and best practices in information security governance. |
Information Governance: Concepts, Strategies, and Best Practices by Robert F. Smallwood |
Cyber Security Management
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Overview of cybersecurity management principles. Week 2: Cybersecurity policy development and implementation. Week 3: Security awareness training and education. Week 4: Incident response planning and management. Week 5: Cybersecurity program evaluation and improvement. |
Cybersecurity Leadership: Powering the Modern Organization by Mansur Hasib |
Web Application Security
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Introduction to web application security. Week 2: Common web application vulnerabilities and exploits. Week 3: Web application security testing and assessment. Week 4: Securing web application development lifecycle. Week 5: Best practices in web application security. |
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by Dafydd Stuttard and Marcus Pinto |
Mobile Security
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Introduction to mobile security threats and vulnerabilities. Week 2: Secure mobile application development practices. Week 3: Mobile device management and security. Week 4: Mobile security testing and assessment. Week 5: Emerging trends in mobile security.
|
Mobile Security and Privacy: Advances, Challenges and Future Research Directions by Man Ho Au and Raymond Choo |
Ethical Hacking and Penetration Testing
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Introduction to ethical hacking and penetration testing. Week 2: Reconnaissance and information gathering techniques. Week 3: Exploitation and post-exploitation techniques. Week 4: Reporting and documentation of penetration testing results. Week 5: Legal and ethical considerations in penetration testing. |
Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman |
Cloud Security
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Introduction to cloud computing and its security challenges. Week 2: Securing cloud infrastructure and services. Week 3: Cloud identity and access management. Week 4: Cloud security monitoring and incident response. Week 5: Best practices in cloud security. |
Cloud Security and Privacy: An Enterprise Perspective on Risks and Complianc by Tim Mather, Subra Kumaraswamy, and Shahed Latif |
Wireless Security
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Overview of wireless communication and security risks. Week 2: Securing wireless networks and devices. Week 3: Wireless intrusion detection and prevention. Week 4: Wireless security protocols and standards. Week 5: Emerging trends in wireless security. |
Hacking Exposed Wireless: Wireless Security Secrets & Solutions by Johnny Cache, Joshua Wright, and Vincent Liu |
Capstone Project
Hours: 100 Weeks: 5 Credits: 4
|
Week 1: Project planning and scope definition. Week 2: Research and analysis of project requirements. Week 3: Design and development of project components. Week 4: Testing and validation of project outcomes. Week 5: Presentation |
No specific book, as this course focuses on applying knowledge to real-world projects. |
The curriculum is regularly reviewed and updated to ensure its alignment with the program's goals and industry standards.
2.3 Teaching and Learning Strategies
The program employs a variety of instructional methods and strategies, including lectures, case studies, group projects, and guest lectures from industry experts. These strategies support student engagement, active learning, critical thinking, and practical application of knowledge. Innovative approaches such as simulation exercises and virtual labs enhance the teaching and learning experience.
Instructional methods and strategies include:
2.4 Assessment Methods
Assessment methods used in the program include formative and summative assessments to evaluate student learning and progress. These methods align with the program's learning outcomes and ensure the achievement of desired competencies.
Examples of assessments include assignments, projects, exams, and external certifications.
Feedback from assessments helps students track their progress and improve their skills in Cyber-Security.
Assessment methods include:
Section 3: Faculty and Resources
3.1 Faculty Qualifications
The Diploma in Cybersecurity program is delivered by a team of experienced faculty members who hold advanced degrees in cybersecurity, computer science, or related fields. Many faculty members also possess industry certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), and Certified Information Security Manager (CISM). Faculty members have substantial industry experience, with many having worked in roles such as cybersecurity analysts, security architects, and network security engineers.
The resume detailing the educational qualifications, professional work experience, relevant research and thesis work, laboratory experience are included along with copies of certificates for the following faculty:
To ensure the ongoing professional development of faculty, the institution supports participation in conferences, workshops, and training programs related to cybersecurity. Faculty are also encouraged to engage in research and contribute to the field through publications and presentations.
3.2 Academic Resources
The institution provides a range of academic resources to support the Diploma in Cybersecurity program. The library offers access to a comprehensive collection of cybersecurity-related books, journals, and online resources. Specialized laboratories are equipped with the latest cybersecurity tools and technologies, allowing students to gain hands-on experience in a controlled environment.
Computing facilities are equipped with industry-standard software and hardware, enabling students to develop practical skills in areas such as network security, cryptography, and ethical hacking. The institution regularly evaluates and upgrades these resources to ensure they remain aligned with the evolving needs of the program and industry standards.
The specific academic resources including eLearning/ digital content offered to students are:
3.3 Student Support Services
We are committed to providing comprehensive support services to ensure the success and well-being of our students throughout their academic journey. Our dedicated student support team offers personalized guidance and assistance with academic advising, course selection, and career planning. Additionally, tutoring services, workshops, and study groups are available to help students overcome academic challenges and enhance their learning outcomes. Furthermore, networking events, guest lectures, and industry partnerships facilitate connections with professionals and organizations in the cybersecurity ecosystem, providing students with valuable networking opportunities and access to internships and job placements.
Online Learning Platforms:
Faculty Support:
Workshops and Seminars:
Research Opportunities:
Career Services:
Collaborative Spaces:
Section 4: Continuous Improvement
4.1 Program Evaluation and Feedback Mechanisms
The Diploma in Cybersecurity program has established several mechanisms to gather feedback from various stakeholders. Students are encouraged to provide feedback through course evaluations at the end of each term. Alumni are surveyed periodically to assess the program's impact on their careers and to gather suggestions for improvement.
Faculty members are also involved in the feedback process, providing insights based on their experiences delivering the curriculum. Employers of program graduates are consulted to understand industry needs and ensure that the program remains relevant. Feedback gathered from these sources is analyzed to identify trends and areas for improvement. The program committee meets regularly to review this feedback and discuss potential changes to the curriculum or delivery methods. Suggestions for improvement are prioritized based on their impact on student learning outcomes and program effectiveness.
Student Feedback:
Faculty Feedback:
4.2 Quality Enhancement Initiatives
The institution is committed to continuous improvement and has undertaken several initiatives to enhance the Diploma in Cybersecurity program. Recent examples include:
Our dedication to quality enhancement drives us to continuously innovate and improve our program offerings. We actively engage in quality assurance processes, accreditation reviews, and benchmarking exercises to ensure that our program meets or exceeds industry standards and best practices. Faculty development initiatives, curriculum revisions, and investments in instructional technologies are prioritized to enhance the learning experience and equip students with the skills and competencies demanded by employers. Furthermore, strategic partnerships with industry leaders and research institutions facilitate knowledge exchange and collaboration, enabling us to stay at the forefront of AI education and research.
Proposed Strategic Partnerships in 2024:
These initiatives are aimed at enhancing the quality of education provided by the program and ensuring that graduates are well-prepared for careers in cybersecurity.
4.3 Program Review and Monitoring
The Diploma in Cybersecurity program undergoes regular review and monitoring to ensure its ongoing quality and relevance. The program is reviewed annually by the program committee, which includes faculty members, industry representatives, and student representatives.
During these reviews, various aspects of the program are evaluated, including course content, learning outcomes, student performance, and feedback from stakeholders. The results of these reviews are used to make improvements to the program, such as updating course materials, revising learning objectives, or introducing new courses.
In addition to annual reviews, the program is also monitored continuously throughout the year. Student performance data, course evaluations, and feedback from stakeholders are regularly analyzed to identify any issues or areas for improvement. Any necessary changes are implemented promptly to ensure that the program maintains its high standards of quality and effectiveness.
Annual Program Review:
Curriculum Alignment and Relevance:
Section 5: Conclusion
In conclusion, this self-evaluation report provides an overview of our program and demonstrates our commitment to maintaining high-quality educational standards. We have outlined the program's goals, structure, curriculum, and assessment methods, while highlighting the qualifications of our faculty and the resources available to support student learning. We have also emphasized our dedication to continuous improvement through feedback mechanisms and quality enhancement initiatives.
We believe that our program meets the required standards for programmatic accreditation and are confident that it prepares students for successful careers in their chosen fields. We welcome the opportunity for external review and feedback from the Accreditation Committee to further enhance our program's quality.
Thank you for considering our institution for programmatic accreditation. We look forward to the opportunity to engage in the external review process and demonstrate our commitment to providing a high-quality education.