Name
|
Academic Rank
|
Website
|
||
1
|
Maram Bani Younes
|
Associate Professor
|
||
2
|
Hasan Mohammad Al-Refai
|
Assistant Professor
|
||
3
|
Firas M.H S Najjar
|
Assistant Professor
|
||
4
|
Bassil khader ali al-masri
|
Assistant Professor
|
||
5
|
Fadi Mohammad Al-Shimat
|
Assistant Professor
|
||
6
|
Ahmad AbdulRahim Musleh Musleh
|
Lecturer
|
Program Learning Outcomes
A- knowledge and understanding
A1) Lists knowledge of concepts, terminology, principles, and methods of information security and cyberspace.
A2) Discusses the wide range of technologies, available tools, and practical approaches in information security and cyberspace.
A3) Expresses professional responsibilities and make judgments based on legal and ethical principles in the context of computing practice.
A4) Identifies the needs of users in the field of developing information systems and building secure computer networks.
A5) Identify ethical responsibilities and professional certifications in the labor market for Information and Cyber security like) ECCSA - EC-Council Certified Security Analyst, CISM - Certified Information Security Management, CISSP - Certified Information Security Systems Professionals, CEH - Certified Ethical Hacker).
B- Intellectual skills
B1) Distinguishes a set of solutions for modern and advanced methods of penetrating and attacking data and computer networks.
B2) Assesses gaps and weaknesses in information systems and computer networks.
B3) Estimates the time and cost of handling damage resulting from any attack on an information system or enterprise.
B4) Evaluates appropriate tools and techniques to treat damage caused by security breaches.
B5) Support the policies, procedures and plans necessary to manage and ensure the security of enterprises.
B6) Propose e-courses for self-learning to be ready for professional certifications.
C- Practical skills
C1) Applies different protocols for information and network secrecy.
C2) Applies the principles of design, development, and management in creating computer networks.
C3) Uses various networking protocols.
C4) Constructs secure computer information systems and networks.
C5) Demonstrates technical reports in a coherent, structured, verbal and written manner.
C6) Uses best practices and standards in the field of protecting information and networks for various organizations.
C7) Operates solutions for various types of violations and accidents on computer networks and information systems.
C8) Demonstrates vulnerabilities and sources of attack and intrusion by monitoring the performance of computer networks and information systems.
C9) Uses and develops encryption and information security software.
D- Transferable skills
D1) Combines an information security teams actively.
D2) Organizes and communicates ideas in oral and documented manner.
D3) Sets up information technology skills to protect information and networks.
D4) Prepares to work independently and with others.
D5) Manages learning and self-development, including time management and organizational skill development.
D6) Combines practical training that takes place in relevant institutions and companies.
D7) Participates in continuing professional development and recognizes the need for lifelong learning.
The Bachelor of Information Security and Cybersecurity program aims to:
VISION AND MISSION
Department vision:
The Department aims to excel in teaching, learning, scientific research, and community service according to intentional standards.
Department Mission:
Chairman: Dr. Firas Najjar | |
Tel: +96264799000 Ext. 2263 | |
E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it. |
Welcome to the Information Security and Cybersecurity Department…
Welcome to the homepage of the Information Security and Cybersecurity Department at the Philadelphia University. Our department was established in 2020 to graduate specialists with the ability to preserve information from attacks. The science of information security and cybersecurity is one of the most vital sciences in the information technology sector. It is concerned with securing transmitting information over the Internet from various attacks, and developing technology and means of storing information and exchange it in various ways. The data and information security has become an obsession and a very important vital issue especially for transferring data over connected networks.
From a legal point of view, information security and Cybersecurity focus on finding laws and instructions to protect the integrity and confidentiality of the information. They also work to resist the activities of attacking information or exploiting its systems in committing electronic crimes. Therefore, governments have worked to develop legislation on Internet crimes to protect information from illegal activities that target information. The information security specialization is considered a vital and renewed discipline due to its association with more than one specialization in an effective and influential manner. Therefore, we welcome students wishing to choose the information security and Cybersecurity department. We encourage them to contact the head of the department in the Faculty of Information Technology at Philadelphia University. Thus, they can obtain all the information necessary to properly continue their studies.
Jarash Road, 20 KM out of Amman, Amman Jordan
dummy P.O.Box: 1 Amman - Jordan 19392
dummy +96264799000
dummy +96264799040
dummy info@philadelphia.edu.jo