Master of Science in Information Security
Al Ain, United Arab Emirates
DURATION
2 Years
LANGUAGES
English
PACE
Full time, Part time
APPLICATION DEADLINE
Request application deadline *
EARLIEST START DATE
Request earliest startdate
TUITION FEES
AED 2,400 / per credit **
STUDY FORMAT
On-Campus
* applications opens on 28th September 2021
** per credit hour
Scholarships
Explore scholarship opportunities to help fund your studies
Introduction
Overview
The Master of Science in Information Security program, offered by the College of Information Technology, is designed to develop expertise in leadership and operations in the area of information security. The program is geared towards meeting the growing need for information technology specialists in information security. The program provides graduates with depth courses designed to enhance their skill set and knowledge in information security as well as breadth information technology courses.
The program provides the needed technical and managerial expertise to plan, acquire, operate, manage and evaluate an organization's information security system of operations. Students enrolled in this program are expected to pursue a plan of study to assure professional competence and breadth of knowledge in the field of information security. The emphasis of this specialization is on applying proven and innovative practices for building industry-standard secure systems, applications, and networks. This program is for highly motivated groups of working professionals and recent Bachelor's degree graduates. The program is designed to impart knowledge and develop the skills needed to meet current and future information security needs of the government and corporate organizations, as well as preparing students to pursue a PhD in information security or related areas.
Gallery
Admissions
Curriculum
Degree Requirements
Required Credit Hours: minimum of 30 hours
College of Information Technology
Required Courses (9 hours) | Credit Hours | |
ITCO601 | Current Emerging Trends in Information Technology | 3 |
ITCO602 | Management and Leadership in Information Technology | 3 |
ITCO603 | System Analysis, Modeling & Design | 3 |
Information Security
Required Courses (12 hours) | Credit Hours | |
SECB621 | Information Security Fundamentals | 3 |
SECB622 | Advanced Network Security | 3 |
SECB623 | Cryptography and Secure Communications | 3 |
SECB624 | Software Security | 3 |
Elective Courses - 3CH for Thesis option and 6CH Non-Thesis option (6 hours) | Credit Hours | |
ECBP614 | Mobile Commerce | 3 |
SECB626 | Secure Electronic Commerce | 3 |
SECB627 | Ethics, Law and Policy in Cyberspace | 3 |
SECB628 | Computer Crimes and Forensics | 3 |
ITPG698 | Special Topics in Information Technology | 3 |
Project or Thesis
Required Course (6 hours) | Credit Hours | |
ITPG690 | Practicum Project 1 | 6 |
1: Required 6 CH for Thesis & 3 CH for Non--Thesis |
Merit Fellowship Award
To receive the Merit Award, students are expected to have high academic credentials and maintain their academic success at the UAEU. The Merit Fellowship Award offers a financial assistance in form of partial tuition waiver to qualified students. Students in STEM and strategic areas of the country (renewable energy, transportation, health, water resources, technology, space) will have priority.
Student Eligibility:
- Have Excellent Academic Standing (GPA ≥ 3.6/4.0).
- Maintain a GPA ≥3.6/4.0 during study at UAEU.
- Have no other financial sponsorship or award.
Benefits:
- 50% discount on tuition fees.
Duration:
- Valid until graduation as long as the student is abiding with the Student Eligibility conditions.
More information
Useful links
Rankings
UAEU now ranks #1 in the UAE based on the Times Higher Education Ranking! We are also #5 in the Middle East, #49th in Asia and #70 in the Young University Rankings of 2019.
Program Outcome
- Identify and effectively use techniques and tools necessary in information security practice.
- Develop project management and leadership skills to secure enterprise IT architectures.
- Apply security principles, legal and ethical responsibilities to the development, and deployment of information security policies.
- Improve skills and expand knowledge for life-long learning and professional growth.
- Comply with international information security standard and local regulatory policies.
Program Learning Outcomes
Upon successful completion of this program, students will be able to:
- Apply information security knowledge and effective security strategies and standards.
- Design effective security solutions based on given requirements.
- Evaluate in-depth enterprise security systems.
- Execute ethically project work or research that contributes significantly to the information security discipline.
- Demonstrate advanced oral and written communication skills individually and collectively.
- Analyze critically emerging information security concepts, models, techniques, and solutions.