S.No |
Code |
Course Title |
CLO |
Bloom’s level |
PLO |
1 |
CY312 |
Cryptography |
Understand the basics of cryptography, cryptanalysis, number theory, algebra, and complexity theory. |
C2 |
1 |
Understand cryptographic protocols and algorithms in different application areas |
C2 |
1 |
Evaluate security and performance of cryptographic algorithms and propose improvements |
C5 |
4 |
Implement fundamental public key and symmetric key cryptographic algorithms |
C3 |
2 |
2 |
CY313 |
Cryptanalysis |
Understand and analyze the objectives, environment, and limitations of academic cryptanalysis |
C4 |
1, 3 |
Use Knowledge of cipher structures and cryptanalysis techniques to solve and extract secret information |
C3 |
1, 2 |
Implement the cryptanalysis techniques using tools and programming languages |
C3 |
5 |
Assess the weakness of the cryptosystem against any break |
C5 |
4 |
3 |
CY426 |
Wireless Networks Security |
Discuss existing law that can be applied to the peculiarities of cyber operations |
C2 |
1 |
Explain the security features and limitations of modern mobile operating systems |
C1 |
1, 2 |
Understand how a secure channel is set up in a wireless environment that uses the 802.11 or WAP standards |
C2 |
3, 4 |
Analyze vulnerabilities and risks in wireless and mobile systems |
C5 |
3, 6 |
4 |
CY447 |
Cyber Warfare |
Discuss existing law that can be applied to the peculiarities of cyber operations |
C2 |
8, 9 |
Discuss elements of general international law that governs the recourse to armed force and international humanitarian law in the specific context of cyber warfare and perspectives on internet governance |
C5 |
7,8 |
Explain warfare activities and cybercrime in the global information society, sociological and criminological perspectives on these crimes |
C3 |
8 |
Analyze cyber-related decisions as they apply to national and military strategy from social, ethical, legal, and political viewpoints |
C5 |
8, 9 |
5 |
CY324 |
IoT Security |
Understand the fundamentals of the Internet of Things and key components |
C2 |
1 |
Analyze the security features and limitations of IoT devices and networks |
C3 |
5 |
Examine a complete and working IoT system for vulnerabilities and risks |
C5 |
3, 4 |
6 |
CY351 |
Web Application Security |
Understand the fundamentals of web and browser security |
C2 |
1 |
Discuss the latest emerging attacks facing the Internet |
C2 |
1 |
Use web application vulnerability scanning and testing tools |
C3 |
5 |
Explain web application lifecycle maintenance and defense techniques |
C2 |
1 |
7 |
CY353 |
Cyber Security Tool Development |
Understand modern programming language, i.e., Python |
C2 |
1 |
Analyze open-source cyber security tool |
C4 |
3 |
Design and develop cyber security tools using a modern programming language |
C3 |
4, 5 |
Evaluate recent research advances in cyber security tool development and incorporate in locally developed tool |
C5 |
10 |
8 |
CY353 |
Operating System Security |
Understand the fundamentals of operating systems and |
C2 |
1 |
Explain the interaction of operating systems, new storage devices, and virtualization |
C2 |
3 |
Analyze current state-of-the-art OS-level mechanisms and policies designed to help protect systems against sophisticated attacks |
C4 |
2, 3 |
9 |
CY458 |
Cyber Security for AI & AI for Cyber Security |
Understand basics of AI and explain baseline machine learning and deep learning algorithms used to solve cyber security problems |
C2 |
2, 3 |
Understand basics of AI and explain baseline machine learning and deep learning algorithms used to solve cyber security problems |
C4 |
3 |
Compare different AI algorithms for solving security-related problems |
C2 |
3 |
10 |
CY458 |
Embedded Systems Security |
Understand and interact with embedded systems components and protocols |
C2 |
1 |
Understand concepts, issues, principles, and mechanisms in embedded systems security such as embedded security trends, software vulnerabilities, physical attacks, and security policies |
C2 |
1 |
Conduct attacks on embedded systems protocols and systems |
C3 |
4, 5 |
Design embedded systems and architectures that are resilient to attack |
C3 |
4, 5 |
Evaluate recent research advances in embedded systems security and prepare for graduate research in embedded systems security |
C6 |
10 |
11 |
CY464 |
Security of Control Systems |
Understand the fundamentals of hardware, software, and network protocols used in industrial control systems |
C2 |
1 |
Understand the vulnerabilities and threats to industrial control systems |
C2 |
1 |
Analyze the information assets within an automation or control systems environment, classify them by value, and determine the risk that they face |
C4 |
3 |
Develop and implement comprehensive mitigation strategies as well as effective administrative and technical risk management controls to protect and secure assets in a process control system |
C3 |
4, 8 |
12 |
CY464 |
Security of Control Systems |
Understand the fundamentals of hardware, software, and network protocols used in industrial control systems |
C2 |
7 |
Understand the vulnerabilities and threats to industrial control systems |
C3 |
8, 9 |
Analyze the information assets within an automation or control systems environment, classify them by value, and determine the risk that they face |
C3 |
9, 10 |
Develop and implement comprehensive mitigation strategies as well as effective administrative and technical risk management controls to protect and secure assets in a process control system |
C3 |
3 |
13 |
CY446 |
Cyber Security Professional Ethics |
Gain the ability to enhance key factors of interpersonal relations |
C2 |
7 |
Perform all professional activities and duties in accordance with the highest ethical principles |
C3 |
8, 9 |
Carry out all times in accordance with existing laws, association values, and exercising the highest moral principles without compromising organization principles and without hurting others’ interests |
C3 |
9, 10 |
Prepare and maintain an appropriate level of confidentiality, integrity, and availability of sensitive information in any course of professional activities |
C3 |
3 |
Demonstrate safe cyber security practices |
C3 |
8,9 |