Advanced Diploma in Cybersecurity Program offered by Canadian College of Excellence

Advanced Diploma in Cybersecurity Program 
 
(24 Month, 104 Weeks) 100% Remote Program

Section 1: Program Overview

1.1 Introduction

Cybersecurity is a critical and rapidly evolving field, essential for safeguarding digital assets and privacy in an increasingly interconnected world. Our 2-year diploma in Cybersecurity is meticulously crafted to equip students with the knowledge and skills needed to navigate the complex landscape of cyber threats and defenses. The Advanced Diploma in Cybersecurity program is a comprehensive two-year program designed to equip students with the knowledge, skills, and practical experience required to address the evolving challenges and threats in the field of cybersecurity. Through a combination of theoretical coursework, hands-on training, and real-world projects, students will develop expertise in areas such as network security, digital forensics, ethical hacking, risk management, and regulatory compliance. The program is tailored to meet the specific needs of students in Dubai, considering the local cybersecurity landscape and industry demands.

Goals:

  • Cybersecurity Proficiency: To provide students with advanced knowledge and practical skills in cybersecurity, enabling them to identify, analyze, and mitigate cybersecurity threats effectively.
  • Industry-Relevant Training: To align the curriculum with industry standards and best practices, ensuring that graduates are equipped with the latest tools, techniques, and methodologies used in the field of cybersecurity.
  • Critical Thinking and Problem-Solving: To cultivate critical thinking, analytical reasoning, and problem-solving skills in students, enabling them to assess complex cybersecurity issues and develop innovative solutions.
  • Professionalism and Ethical Conduct: To instill professionalism, ethical values, and a strong sense of responsibility in students, emphasizing the importance of ethical behavior and compliance with legal and regulatory standards in cybersecurity practices.

Objectives:

  • Advanced Technical Skills: Students will acquire advanced technical skills in areas such as network security, cryptography, penetration testing, incident response, and secure software development.
  • Risk Assessment and Management: Students will learn to assess cybersecurity risks, develop risk management strategies, and implement controls to protect information assets and systems from threats.
  • Digital Forensics Proficiency: Students will develop proficiency in digital forensics techniques, including evidence collection, analysis, and preservation, to investigate cybersecurity incidents and support legal proceedings.
  • Compliance and Regulatory Knowledge: Students will gain an understanding of cybersecurity laws, regulations, and compliance frameworks relevant to the Dubai region, including GDPR, NESA, and ISO standards.
  • Cybersecurity Governance and Strategy: Students will learn about cybersecurity governance models, strategic planning, and policy development to establish effective cybersecurity programs within organizations.
  • Secure System Design and Development: Students will learn principles of secure system design and development, including threat modeling, secure coding practices, and software security testing.
  • Cybersecurity Awareness and Training: Students will develop skills in cybersecurity awareness training and education, enabling them to promote a culture of security within organizations and educate end-users about cybersecurity best practices.

Intended Learning Outcomes:

  • Upon completion of the Advanced Diploma in Cybersecurity program, students will be able to:
  • Identify vulnerabilities and assess risks in computer systems, networks, and applications, employing a variety of cybersecurity tools and techniques.
  • Plan, implement, and manage security controls and countermeasures to protect information assets and infrastructure from cybersecurity threats and attacks.
  • Conduct digital forensics investigations, analyze evidence, and present findings in a clear and legally defensible manner.
  • Interpret and comply with cybersecurity laws, regulations, and industry standards applicable to the Dubai region, ensuring organizational compliance and risk mitigation.
  • Develop and implement cybersecurity policies, procedures, and guidelines to establish a secure computing environment and mitigate security risks effectively.
  • Design and develop secure software applications, considering security requirements, coding best practices, and common vulnerabilities.
  • Communicate effectively with stakeholders, including technical and non-technical audiences, to raise awareness about cybersecurity risks and promote a culture of security within organizations.
  • Demonstrate professionalism, integrity, and ethical conduct in all aspects of cybersecurity practice, adhering to ethical standards and legal principles.

 

 

1.2 Program Structure and Curriculum

The curriculum is structured to provide students with a strong foundation in cybersecurity fundamentals in the first year, followed by advanced topics and practical experience in the second year. Total Credits: The program consists of a total of 80 credits, spread over two years of study.

Core Courses: These are mandatory courses that provide foundational knowledge and skills in cybersecurity.

  • Introduction to Cybersecurity (4 credits): An overview of cybersecurity concepts, principles, and terminology. Topics include threat landscape, risk management, cryptography, and security controls.
  • Network Security (4 credits): In-depth study of network security principles, protocols, and technologies. Topics include firewalls, intrusion detection/prevention systems, VPNs, and secure network design.
  • Cyber Threat Intelligence (4 credits): Exploration of cyber threat intelligence concepts, sources, and analysis techniques. Students learn to gather, analyze, and interpret threat data to enhance security posture.
  • Digital Forensics (4 credits): Introduction to digital forensics methodologies, tools, and procedures. Topics include evidence acquisition, analysis, preservation, and chain of custody.
  • Ethical Hacking and Penetration Testing (4 credits): Hands-on training in ethical hacking techniques, penetration testing methodologies, and vulnerability assessment. Students learn to identify and exploit security vulnerabilities ethically.
  • Security Operations and Incident Response (4 credits): Study of security operations center (SOC) functions, incident response procedures, and incident handling techniques. Emphasis on incident detection, analysis, containment, and recovery.
  • Cybersecurity Governance and Compliance (4 credits): Examination of cybersecurity governance frameworks, compliance requirements, and regulatory standards. Topics include risk management, security policies, legal aspects, and regulatory compliance.
  • Secure Software Development (4 credits): Overview of secure software development lifecycle (SDLC) practices, secure coding principles, and software security testing techniques. Emphasis on identifying and mitigating software vulnerabilities.

Elective Options: Students may choose elective courses based on their interests and career goals. Elective options may include:

  • Cloud Security
  • Mobile Security
  • IoT Security
  • Malware Analysis
  • Blockchain Security

Specialized Tracks or Concentrations: The program may offer specialized tracks or concentrations to allow students to focus on specific areas of cybersecurity. Examples of specialized tracks include:

  • Digital Forensics and Incident Response
  • Network Security and Penetration Testing
  • Governance, Risk, and Compliance

Curriculum Alignment with Industry Standards and Emerging Trends:

The curriculum is designed to align with industry standards, best practices, and emerging trends in the cybersecurity field. This alignment is achieved through:

Industry Certification Preparation: Course content is aligned with industry certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), and Certified Information Systems Security Professional (CISSP). Students are prepared to sit for these certifications upon graduation.

Integration of Emerging Technologies: The curriculum incorporates emerging technologies such as cloud computing, IoT, blockchain, and artificial intelligence (AI) into relevant courses to address the evolving cybersecurity landscape.

Industry Partnerships and Advisory Boards: Collaboration with industry partners and advisory boards ensures that the curriculum remains up-to-date and relevant to industry needs. Input from industry experts helps identify emerging trends and tailor the curriculum accordingly.

The core courses in the program include:

  1. Introduction to Cyber Security
  2. Computer Networking Fundamentals
  3. Cyber Security Policies and Compliance
  4. Operating Systems Security
  5. Windows Server: Installation and Storage
  6. Linux Fundamentals
  7. Introduction to Cryptography
  8. Cyber Security Threats and Vulnerabilities
  9. Secure Systems Architecture
  10. Cyber Security Tools and Techniques
  11. Network Security
  12. Advanced Cryptography
  13. Information Security Governance and Risk Management
  14. Cyber Security Management
  15. Web Application Security
  16. Mobile Security
  17. Ethical Hacking and Penetration Testing
  18. Cloud Security
  19. Wireless Security

In addition to the core courses, students are required to complete a capstone project in their final semester, where they apply their knowledge and skills to solve real-world cybersecurity challenges.

The curriculum is designed to align with industry standards and emerging trends in the field of cybersecurity. It provides students with a well-rounded education that prepares them for a variety of cybersecurity roles, including security analysts, network security engineers, and cybersecurity consultants.

1.3 Admission Requirements

To be admitted to the Diploma in Cyber-Security program, students must meet the following admission requirements:

Admission to the Advanced Diploma in Cybersecurity program is subject to rigid criteria aimed at selecting candidates with the aptitude and academic background necessary to succeed in the program. Prospective students are required to meet minimum academic qualifications and may undergo additional assessments or interviews to evaluate their readiness for the program. This rigorous selection process ensures that students admitted to the program possess the foundation to excel in the challenging and dynamic field of Cybersecurity.

Educational Qualifications:

  • Applicants should have completed secondary education or its equivalent, such as a high school diploma or an international baccalaureate (IB) diploma.
  • A strong background in mathematics, science, and computer science may be advantageous for an AI diploma program.
  • English is the primary language of instruction in Canadian College of Excellence, Dubai, applicants may need to demonstrate proficiency in English through standardized tests such as the TOEFL or IELTS if the English score in high school diploma or its equivalence is below 60%. 
  • Interview: CCE, Dubai interviews all eligible applicants, before their provincial letter of admission, test applicant academic readiness, academic and technical proficiency, Interest, and passion in the program-subject chosen, communication skills, problem solving and critical thinking skills and ability to collaborate with peer group and Faculty to successfully complete their academic program. 

 

 

Section 2: Program Evaluation

2.1 Learning Outcomes

Upon completion of the Diploma in Cybersecurity program, students will be able to:

  • Demonstrate a thorough understanding of cybersecurity principles, concepts, and best practices.
  • Analyze and assess common cyber threats, vulnerabilities, and attack vectors.
  • Design and implement effective cybersecurity policies, strategies, and compliance frameworks.
  • Apply cryptographic techniques and protocols to secure data and communications.
  • Configure and secure operating systems, servers, and network devices.
  • Implement network security measures, including secure network design and monitoring.
  • Utilize cybersecurity tools and techniques for incident response, forensic analysis, and risk management.
  • Develop secure systems architecture, considering threat modeling and risk assessment.
  • Evaluate and apply ethical hacking and penetration testing methodologies.
  • Manage and secure cloud computing environments, including identity and access management.
  • Identify and mitigate security risks in web and mobile applications.
  • Apply principles of information security governance and risk management.
  • Lead cybersecurity initiatives, including policy development, security awareness, and program evaluation.
  • Present findings and recommendations effectively, both orally and in writing, to diverse stakeholders.
  • Collaborate effectively in multidisciplinary teams to address cybersecurity challenges.

These learning outcomes are designed to equip students with the knowledge, skills, and competencies required to excel in diverse cybersecurity roles and contribute effectively to the security of digital systems and information.

 

 

 

 

 

 

 

2.2 Curriculum Mapping

The program's courses and learning activities are designed to align with the defined learning outcomes. Each course contributes to the achievement of specific learning outcomes as follows:

Course

Weekly Coverage

Reference Books

Introduction to Cyber Security

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Introduction to cybersecurity, its importance, and basic concepts.

Week 2: Cybersecurity principles and best practices.

Week 3: Common cyber threats and attack vectors.

Week 4: Introduction to cybersecurity tools and technologies.

Week 5: Cybersecurity career paths and opportunities.

Cybersecurity: The Beginner's Guide

by Dr. Erdal Ozkaya

Computer Networking Fundamentals

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Introduction to networking basics, including OSI model and TCP/IP.

Week 2: Network protocols and communication.

Week 3: Network devices and technologies.

Week 4: Network security concepts and practices.

Week 5: Network troubleshooting and maintenance.

Computer Networking: A Top-Down Approach 

by James F. Kurose and Keith W. Ross

Cyber Security Policies and Compliance

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Introduction to cybersecurity policies and compliance frameworks.

Week 2: Legal and regulatory requirements for cybersecurity.

Week 3: Developing and implementing cybersecurity policies.

Week 4: Auditing and assessing cybersecurity compliance.

Week 5: Case studies and best practices in cybersecurity compliance.

Cybersecurity Policy, Strategy, and Politics: An Integrated Approach 

by George Ledin Jr. and Alan R. Shark

Operating Systems Security

 

Hours: 100

Weeks: 5

Credits: 4

 

 

 

 

Week 1: Introduction to operating system security concepts.

Week 2: Hardening operating systems against security threats.

Week 3: Securing user accounts and permissions.

Week 4: Patch management and software updates.

Week 5: Monitoring and logging for security purposes.

Operating System Security 

by Trent Jaeger

Windows Server: Installation and Storage

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Introduction to Windows Server installation and configuration.

Week 2: Managing disk storage in Windows Server.

Week 3: Implementing file and share access controls.

Week 4: Configuring Windows Server security features.

Week 5: Windows Server backup and recovery strategies.

Windows Server 2019 Administration Cookbook 

by Jordan Krause

Linux Fundamentals

 

Hours: 100

Weeks: 5

Credits: 4

Week 1: Introduction to Linux operating system and basic commands.

Week 2: Linux file system and permissions.

Week 3: User and group management in Linux.

Week 4: Linux networking and security.

Week 5: Advanced Linux security features and practices.

How Linux Works: What Every Superuser Should Know 

by Brian Ward

Introduction to Cryptography

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Basic principles of cryptography and encryption.

Week 2: Symmetric and asymmetric encryption algorithms.

Week 3: Digital signatures and certificates.

Week 4: Cryptographic protocols and standards.

Week 5: Practical applications of cryptography in cybersecurity.

 

Cryptography and Network Security: Principles and Practice

 by William Stallings

Cyber Security Threats and Vulnerabilities

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Overview of common cybersecurity threats.

Week 2: Types of vulnerabilities and their exploitation.

Week 3: Methods of identifying and assessing threats and vulnerabilities.

Week 4: Mitigation strategies for cyber threats and vulnerabilities.

Week 5: Incident response and recovery planning.

 

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

 by Thomas J. Mowbray

Secure Systems Architecture

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Principles of secure system design.

Week 2: Threat modeling and risk assessment.

Week 3: Secure coding practices and secure software development lifecycle.

Week 4: Network security architecture and design.

Week 5: Case studies and best practices in secure systems architecture.

Security Engineering: A Guide to Building Dependable Distributed Systems by Ross J. Anderson

Cyber Security Tools and Techniques

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Introduction to cybersecurity tools and their categories.

Week 2: Network security tools and techniques.

Week 3: Application security tools and techniques.

Week 4: Incident response and forensic tools.

Week 5: Emerging trends in cybersecurity tools and techniques.

Cybersecurity: A Comprehensive Approach 

by J. David Thornton

Network Security

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Overview of network security concepts and principles.

Week 2: Secure network design and architecture.

Week 3: Network security protocols and technologies.

Week 4: Network security monitoring and intrusion detection.

Week 5: Advanced topics in network security.

Network Security Essentials: Applications and Standards 

by William Stallings

Advanced Cryptography

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Review of basic cryptographic concepts.

Week 2: Advanced encryption algorithms and protocols.

Week 3: Cryptanalysis and cryptology.

Week 4: Quantum cryptography and future trends.

Week 5: Practical applications of advanced cryptography.

Cryptography Engineering: Design Principles and Practical Applications

 by Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno

Information Security Governance and Risk Management

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Introduction to information security governance.

Week 2: Risk management frameworks and methodologies.

Week 3: Implementing security controls and measures.

Week 4: Business continuity and disaster recovery planning.

Week 5: Case studies and best practices in information security governance.

Information Governance: Concepts, Strategies, and Best Practices

by Robert F. Smallwood

Cyber Security Management

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Overview of cybersecurity management principles.

Week 2: Cybersecurity policy development and implementation.

Week 3: Security awareness training and education.

Week 4: Incident response planning and management.

Week 5: Cybersecurity program evaluation and improvement.

Cybersecurity Leadership: Powering the Modern Organization 

by Mansur Hasib

Web Application Security

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Introduction to web application security.

Week 2: Common web application vulnerabilities and exploits.

Week 3: Web application security testing and assessment.

Week 4: Securing web application development lifecycle.

Week 5: Best practices in web application security.

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 

by Dafydd Stuttard and Marcus Pinto

Mobile Security

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Introduction to mobile security threats and vulnerabilities.

Week 2: Secure mobile application development practices.

Week 3: Mobile device management and security.

Week 4: Mobile security testing and assessment.

Week 5: Emerging trends in mobile security.

 

 

Mobile Security and Privacy: Advances, Challenges and Future Research Directions 

by Man Ho Au and Raymond Choo

Ethical Hacking and Penetration Testing

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Introduction to ethical hacking and penetration testing.

Week 2: Reconnaissance and information gathering techniques.

Week 3: Exploitation and post-exploitation techniques.

Week 4: Reporting and documentation of penetration testing results.

Week 5: Legal and ethical considerations in penetration testing.

Penetration Testing: A Hands-On Introduction to Hacking 

by Georgia Weidman

Cloud Security

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Introduction to cloud computing and its security challenges.

Week 2: Securing cloud infrastructure and services.

Week 3: Cloud identity and access management.

Week 4: Cloud security monitoring and incident response.

Week 5: Best practices in cloud security.

Cloud Security and Privacy: An Enterprise Perspective on Risks and Complianc

 by Tim Mather, Subra Kumaraswamy, and Shahed Latif

Wireless Security

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Overview of wireless communication and security risks.

Week 2: Securing wireless networks and devices.

Week 3: Wireless intrusion detection and prevention.

Week 4: Wireless security protocols and standards.

Week 5: Emerging trends in wireless security.

Hacking Exposed Wireless: Wireless Security Secrets & Solutions

by Johnny Cache, Joshua Wright, and Vincent Liu

Capstone Project 

 

Hours: 100

Weeks: 5

Credits: 4

 

Week 1: Project planning and scope definition.

Week 2: Research and analysis of project requirements.

Week 3: Design and development of project components.

Week 4: Testing and validation of project outcomes.

Week 5: Presentation

No specific book, as this course focuses on applying knowledge to real-world projects.

The curriculum is regularly reviewed and updated to ensure its alignment with the program's goals and industry standards.

2.3 Teaching and Learning Strategies

The program employs a variety of instructional methods and strategies, including lectures, case studies, group projects, and guest lectures from industry experts. These strategies support student engagement, active learning, critical thinking, and practical application of knowledge. Innovative approaches such as simulation exercises and virtual labs enhance the teaching and learning experience.

Instructional methods and strategies include:

  • Lectures and presentations for theoretical knowledge.
  • Practical exercises, role-playing, and case studies for active learning.
  • Hands-on practice sessions for skill development.
  • Group discussions and interactive sessions for critical thinking and application of knowledge.
  • Use of simulation models, diagrams, and technology to enhance learning experience.
  • Guest speakers and field visits to provide real-world insights into healthcare practices.

 

2.4 Assessment Methods

Assessment methods used in the program include formative and summative assessments to evaluate student learning and progress. These methods align with the program's learning outcomes and ensure the achievement of desired competencies.

 

Examples of assessments include assignments, projects, exams, and external certifications. 

Feedback from assessments helps students track their progress and improve their skills in Cyber-Security.

Assessment methods include:

  • Formative assessments such as quizzes, assignments, and practical exercises throughout each module.
  • Summative assessments at the end of each module to evaluate overall understanding and proficiency.
  • Practical assessments to evaluate patient care skills, communication abilities, and cultural competence.
  • Case studies and projects to assess critical thinking and application of knowledge.
  • External assessments or certifications to validate competence in specific areas, if applicable.
  • Regular review and updating of the curriculum are conducted through feedback from students, faculty, industry stakeholders, and ongoing monitoring of industry trends and best practices. Adjustments are made to ensure alignment with program goals and industry needs.

 

Section 3: Faculty and Resources

3.1 Faculty Qualifications

The Diploma in Cybersecurity program is delivered by a team of experienced faculty members who hold advanced degrees in cybersecurity, computer science, or related fields. Many faculty members also possess industry certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), and Certified Information Security Manager (CISM). Faculty members have substantial industry experience, with many having worked in roles such as cybersecurity analysts, security architects, and network security engineers.

The resume detailing the educational qualifications, professional work experience, relevant research and thesis work, laboratory experience are included along with copies of certificates for the following faculty:

  • Afrin Sadia Rumana
  • Hafez Md. Nasrullah
  • Dr. Md. Morshedul Islam
  • Mahudun Nabi
  • Md. Ashraful Islam
  • McVern Gall

To ensure the ongoing professional development of faculty, the institution supports participation in conferences, workshops, and training programs related to cybersecurity. Faculty are also encouraged to engage in research and contribute to the field through publications and presentations.

3.2 Academic Resources

The institution provides a range of academic resources to support the Diploma in Cybersecurity program. The library offers access to a comprehensive collection of cybersecurity-related books, journals, and online resources. Specialized laboratories are equipped with the latest cybersecurity tools and technologies, allowing students to gain hands-on experience in a controlled environment.

Computing facilities are equipped with industry-standard software and hardware, enabling students to develop practical skills in areas such as network security, cryptography, and ethical hacking. The institution regularly evaluates and upgrades these resources to ensure they remain aligned with the evolving needs of the program and industry standards.

The specific academic resources including eLearning/ digital content offered to students are:

  • D2L- Brightspace -Learning Management System 
  • McGraw Hill Connect
  • Pearson Higher Education Online Resource
  • eBookshelf-Vitalsource

3.3 Student Support Services

We are committed to providing comprehensive support services to ensure the success and well-being of our students throughout their academic journey. Our dedicated student support team offers personalized guidance and assistance with academic advising, course selection, and career planning. Additionally, tutoring services, workshops, and study groups are available to help students overcome academic challenges and enhance their learning outcomes. Furthermore, networking events, guest lectures, and industry partnerships facilitate connections with professionals and organizations in the cybersecurity ecosystem, providing students with valuable networking opportunities and access to internships and job placements.

Online Learning Platforms:

  • Access to online learning platforms or learning management systems (LMS) where students can find course materials, lecture notes, assignments, and supplementary resources.
  • Integration with video lecture platforms for asynchronous learning and revision.

Faculty Support:

  • Availability of experienced and knowledgeable faculty members who provide guidance, mentorship, and support to students both in and out of the classroom.
  • Office hours and consultation sessions for students to seek help with course material, assignments, and research projects.

 

Workshops and Seminars:

  • Regular workshops, seminars, and guest lectures conducted by faculty members, industry professionals, and researchers to expose students to current trends, best practices, and real-world applications of cybersecurity. 
  • Opportunities for students to present their own research findings and projects to their peers and faculty members.

Research Opportunities:

  • Access to research facilities and resources for conducting independent or collaborative research projects in technology and related disciplines.
  • Support for participation in research conferences, symposiums, and competitions to showcase research outcomes and network with peers and experts in the field.

Career Services:

  • Career counseling and guidance services to help students explore career paths, develop professional skills, and prepare for job interviews and internships in CS-related industries.
  • Job placement assistance and connections with industry partners for internship and employment opportunities.

Collaborative Spaces:

  • Collaborative spaces such as study rooms, group work areas, and project labs where students can collaborate on assignments, projects, and research activities.
  • Opportunities for interdisciplinary collaboration with students and faculty from other departments or programs.

Section 4: Continuous Improvement

4.1 Program Evaluation and Feedback Mechanisms

The Diploma in Cybersecurity program has established several mechanisms to gather feedback from various stakeholders. Students are encouraged to provide feedback through course evaluations at the end of each term. Alumni are surveyed periodically to assess the program's impact on their careers and to gather suggestions for improvement.

Faculty members are also involved in the feedback process, providing insights based on their experiences delivering the curriculum. Employers of program graduates are consulted to understand industry needs and ensure that the program remains relevant. Feedback gathered from these sources is analyzed to identify trends and areas for improvement. The program committee meets regularly to review this feedback and discuss potential changes to the curriculum or delivery methods. Suggestions for improvement are prioritized based on their impact on student learning outcomes and program effectiveness.

Student Feedback:

  • Regular course evaluations: Students are provided with opportunities to evaluate each course they undertake, typically at the end of each semester. These evaluations cover aspects such as course content, teaching quality, learning resources, and overall satisfaction.
  • Mid-term feedback sessions: Mid-way through the semester, feedback sessions may be conducted to gather input from students regarding their learning experience, challenges faced, and suggestions for improvement.
  • Student representatives: Each cohort may elect student representatives who serve as liaisons between students and faculty/administration, providing a channel for ongoing feedback and communication. 

Faculty Feedback:

  • Peer evaluations: Faculty members may participate in peer evaluation processes where they provide feedback on each other's teaching methods, course materials, and assessment strategies.
  • Faculty meetings and forums: Regular meetings and forums are held where faculty members can discuss curriculum development, teaching methodologies, and student feedback to identify areas for improvement.

4.2 Quality Enhancement Initiatives

The institution is committed to continuous improvement and has undertaken several initiatives to enhance the Diploma in Cybersecurity program. Recent examples include:

  • Curriculum revisions to incorporate the latest trends and technologies in cybersecurity.
  • Faculty development programs to ensure that instructors are equipped with the skills and knowledge needed to deliver high-quality education.
  • Integration of new technologies, such as virtual labs and simulation tools, to enhance hands-on learning experiences.
  • Collaborations with industry partners to provide students with opportunities for real-world experience and to ensure that the program remains aligned with industry needs.

Our dedication to quality enhancement drives us to continuously innovate and improve our program offerings. We actively engage in quality assurance processes, accreditation reviews, and benchmarking exercises to ensure that our program meets or exceeds industry standards and best practices. Faculty development initiatives, curriculum revisions, and investments in instructional technologies are prioritized to enhance the learning experience and equip students with the skills and competencies demanded by employers. Furthermore, strategic partnerships with industry leaders and research institutions facilitate knowledge exchange and collaboration, enabling us to stay at the forefront of AI education and research.

 

Proposed Strategic Partnerships in 2024:

  • Peerless College, Calgary AB Canada, -For offering student exchange programs. 
  • Canadian Institute for Advanced Education, Dhaka Bangladesh for professional development. 
  • Celestia Bookings, Calgary AB Canada -For Internship & to gain Industry experience for business students.
  • Dr. Gulshan Akter Center for Healthcare -Calgary AB Canada -Healthcare programs partnership and practicum offerings. 

These initiatives are aimed at enhancing the quality of education provided by the program and ensuring that graduates are well-prepared for careers in cybersecurity.

4.3 Program Review and Monitoring

The Diploma in Cybersecurity program undergoes regular review and monitoring to ensure its ongoing quality and relevance. The program is reviewed annually by the program committee, which includes faculty members, industry representatives, and student representatives.

During these reviews, various aspects of the program are evaluated, including course content, learning outcomes, student performance, and feedback from stakeholders. The results of these reviews are used to make improvements to the program, such as updating course materials, revising learning objectives, or introducing new courses.

In addition to annual reviews, the program is also monitored continuously throughout the year. Student performance data, course evaluations, and feedback from stakeholders are regularly analyzed to identify any issues or areas for improvement. Any necessary changes are implemented promptly to ensure that the program maintains its high standards of quality and effectiveness.

Annual Program Review:

  • The institution conducts an annual comprehensive review of the cybersecurity diploma program.
  • Program coordinators, faculty members, administrators, and relevant stakeholders participate in the review process.
  • The review covers various aspects of the program, including curriculum content, teaching methodologies, learning outcomes, student performance, and feedback received from stakeholders.

Curriculum Alignment and Relevance:

  • The curriculum is reviewed to ensure alignment with industry trends, technological advancements, and evolving job market demands in the field of cyber security. 
  • Program coordinators assess the relevance of course offerings, learning objectives, and practical components to meet the current and future needs of tech professionals in Dubai and globally.
  • Industry Engagement and Employer Feedback:
  • The institution engages with industry partners, employers, and professional associations to gather feedback on the skills and competencies needed in the cybersecurity workforce.
  • Employer feedback on the performance of graduates, their preparedness for the workforce, and areas for improvement is collected and analyzed.

Section 5: Conclusion

In conclusion, this self-evaluation report provides an overview of our program and demonstrates our commitment to maintaining high-quality educational standards. We have outlined the program's goals, structure, curriculum, and assessment methods, while highlighting the qualifications of our faculty and the resources available to support student learning. We have also emphasized our dedication to continuous improvement through feedback mechanisms and quality enhancement initiatives.

We believe that our program meets the required standards for programmatic accreditation and are confident that it prepares students for successful careers in their chosen fields. We welcome the opportunity for external review and feedback from the Accreditation Committee to further enhance our program's quality.

Thank you for considering our institution for programmatic accreditation. We look forward to the opportunity to engage in the external review process and demonstrate our commitment to providing a high-quality education.