{"id":140971,"date":"2025-09-29T06:21:20","date_gmt":"2025-09-29T06:21:20","guid":{"rendered":"https:\/\/www.paluniv.edu.ps\/eng\/?page_id=140971"},"modified":"2025-09-29T06:27:35","modified_gmt":"2025-09-29T06:27:35","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.paluniv.edu.ps\/eng\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/3&#8243;][vc_raw_html css=&#8221;&#8221;]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[\/vc_raw_html][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_tta_tabs][vc_tta_section title=&#8221;Program Overview&#8221; tab_id=&#8221;1708254181810-d94c473a-4c72&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p>The Cybersecurity program aims to prepare specialized professionals capable of protecting digital systems and organizational infrastructures from cyberattacks and intrusions. The program emphasizes advanced skills in network security, device security, cloud computing, Internet of Things (IoT), and embedded systems. It also provides students with strong knowledge in cybercrime, digital forensics, malware analysis, and cybersecurity awareness, enabling them to effectively address cyber threats at both local and international levels.<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Program Objectives&#8221; tab_id=&#8221;1708254181810-99f30ad0-5df4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p><strong>The program aims to:<\/strong><\/p>\n<ol>\n<li>Provide students with advanced theoretical and practical knowledge in cybersecurity and information protection.<\/li>\n<li>Develop students\u2019 abilities in vulnerability assessment, risk management, and design effective security strategies.<\/li>\n<li>Enable students to use modern cybersecurity tools and technologies such as intrusion detection systems, digital forensics, and cloud security solutions.<\/li>\n<li>Enhance students\u2019 skills in scientific research and technological innovation in cybersecurity and smart systems.<\/li>\n<li>Supply the local and regional job market with experts capable of competing globally in cybersecurity careers.<\/li>\n<\/ol>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Target Group&#8221; tab_id=&#8221;1708254236017-41fe11d9-224d&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p><strong>\u00a0<\/strong><strong>The program targets:<\/strong><\/p>\n<ol>\n<li>High school graduates from Scientific, Industrial, and Technological streams are interested in cybersecurity studies.<\/li>\n<li>Employees in public and private institutions seeking to enhance their skills in information security.<\/li>\n<li>Individuals are interested in digital system protection and combating cybercrime.<\/li>\n<li>Technicians and engineers working in IT wish to obtain specialized qualifications in cybersecurity.<\/li>\n<\/ol>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Graduate Profile&#8221; tab_id=&#8221;1708254237129-79e1f6ea-5cd1&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p><strong>\u00a0<\/strong><strong>Graduates of the program are expected to:<\/strong><\/p>\n<ol>\n<li>Analyze security risks and vulnerabilities and design innovative technical solutions.<\/li>\n<li>Design and implement advanced protection systems for networks and applications.<\/li>\n<li>Gain practical expertise in managing and securing operating systems and digital infrastructures.<\/li>\n<li>Use malware analysis tools and conduct penetration testing effectively.<\/li>\n<li>Demonstrate a deep understanding of legal and ethical aspects of IT and cybersecurity.<\/li>\n<li>Conduct research and development in cybersecurity and smart systems.<\/li>\n<li>Work efficiently within multidisciplinary teams and communicate effectively.<\/li>\n<\/ol>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Intending learning outcomes&#8221; tab_id=&#8221;1708254238201-271090ee-97c3&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p><strong>\u00a0<\/strong><strong>Graduates of this program are expected to achieve the following outcomes:<\/strong><\/p>\n<ol>\n<li><strong> Knowledge and Understanding:<\/strong><br \/>\u2022 Acquire comprehensive knowledge in networking, computing, cloud systems, and cybersecurity.<br \/>\u2022 Understand current trends in cybercrime, digital forensics, and smart systems.<br \/>\u2022 Comprehend security management techniques and data\/infrastructure protection.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol>\n<li><strong> Technical and Practical Skills:<\/strong><br \/>\u2022 Design secure information systems based on security requirements analysis.<br \/>\u2022 Use advanced tools such as IDS, digital forensics, and penetration testing.<br \/>\u2022 Develop and secure web applications, embedded devices, and mobile applications.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li><strong> Critical Thinking and Problem-Solving:<\/strong><br \/>\u2022 Analyze security threats and propose innovative practical solutions.<br \/>\u2022 Evaluate the effectiveness of protection systems and recommend improvements.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol>\n<li><strong> Personal and Professional Skills:<\/strong><br \/>\u2022 Collaborate effectively within multidisciplinary technical teams.<br \/>\u2022 Adhere to professional ethics and social responsibility.<br \/>\u2022 Think like an entrepreneur to develop innovative cybersecurity startups and projects.<\/li>\n<\/ol>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Job Opportunities&#8221; tab_id=&#8221;1759058390537-8ee8be23-483a&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p><strong>Graduates of the program can work in:<\/strong><\/p>\n<ol>\n<li>Governmental institutions and ministries to secure systems and infrastructures.<\/li>\n<li>Banks and financial organizations protect data and transactions.<\/li>\n<li>Telecommunications companies and cloud service providers.<\/li>\n<li>Cybersecurity firms as security analysts or penetration testers.<\/li>\n<li>Healthcare institutions to safeguard digital medical systems.<\/li>\n<li>Insurance companies and media organizations.<\/li>\n<li>Research centers and academia as instructors or security researchers.<\/li>\n<li>Freelancing in cybersecurity consulting or launching startups.<\/li>\n<\/ol>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Admission requirements&#8221; tab_id=&#8221;1759058355316-333563ee-9836&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p><strong>Students are eligible for admission if they:<\/strong><strong><br \/><\/strong><\/p>\n<ol>\n<li>Achieve 65% or higher in the General Secondary Examination (Tawjihi) in the Scientific, Industrial, or Technological streams (or as per updated Ministry regulations).<\/li>\n<li>Meet the admission standards set by the Ministry of Education and Higher Education.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Study Plan&#8221; tab_id=&#8221;1759058600740-bd7a78c8-0f3b&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td colspan=\"8\" width=\"100%\">First Year<\/td>\n<\/tr>\n<tr>\n<td colspan=\"4\" width=\"48%\">First Semester<\/td>\n<td colspan=\"4\" width=\"51%\">Second Semester<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">Course Number<\/td>\n<td width=\"26%\">Course Name<\/td>\n<td width=\"4%\">C.H.<\/td>\n<td width=\"7%\">Pre-request<\/td>\n<td width=\"10%\">Course Number<\/td>\n<td width=\"27%\">Course Name<\/td>\n<td width=\"4%\">C.H.<\/td>\n<td width=\"9%\">Pre-request<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">110101<\/td>\n<td width=\"26%\">Arabic Language Skills I<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">110102<\/td>\n<td width=\"27%\">Arabic Communication Skills<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">110101<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">120101<\/td>\n<td width=\"26%\">English Language Skills I<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">120102<\/td>\n<td width=\"27%\">English Language Skills II<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">120101<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">410131<\/td>\n<td width=\"26%\">Fundamentals of Computer &amp; Programming<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">310100<\/td>\n<td width=\"27%\">Principles of Management<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">410141<\/td>\n<td width=\"26%\">Calculus<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">410132<\/td>\n<td width=\"27%\">Introduction to Information Technology<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">410131<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">151102<\/td>\n<td width=\"26%\">Islamic Culture<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">113200<\/td>\n<td width=\"27%\">Palestinian Cause<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">&#8211;<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">130300<\/td>\n<td width=\"26%\">Community Service<\/td>\n<td width=\"4%\">1<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">410104<\/td>\n<td width=\"27%\">Computer Programming<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">&#8211;<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">\u00a0<\/td>\n<td width=\"26%\">\u00a0<\/td>\n<td width=\"4%\">\u00a0<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">410105<\/td>\n<td width=\"27%\">Computer Programming Lab<\/td>\n<td width=\"4%\">1<\/td>\n<td width=\"9%\">410104<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"35%\">Total<\/td>\n<td colspan=\"2\" width=\"12%\">16<\/td>\n<td colspan=\"4\" width=\"51%\">19<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td colspan=\"8\" width=\"100%\">Second Year<\/td>\n<\/tr>\n<tr>\n<td colspan=\"4\" width=\"48%\">First Semester<\/td>\n<td colspan=\"4\" width=\"51%\">Second Semester<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">Course Number<\/td>\n<td width=\"26%\">Course Name<\/td>\n<td width=\"4%\">C.H.<\/td>\n<td width=\"7%\">Pre-request<\/td>\n<td width=\"10%\">Course Number<\/td>\n<td width=\"27%\">Course Name<\/td>\n<td width=\"4%\">C.H.<\/td>\n<td width=\"9%\">Pre-request<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">\u00a0<\/td>\n<td width=\"26%\">Free Elective<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">\u00a0<\/td>\n<td width=\"27%\">Introduction to Computer Architecture<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">410321<\/td>\n<td width=\"26%\">Object Oriented Programming<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">410222<\/td>\n<td width=\"27%\">Data Structure<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">410322<\/td>\n<td width=\"26%\">Object Oriented Programming Lab<\/td>\n<td width=\"4%\">1<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">410223<\/td>\n<td width=\"27%\">Data Structure Lab<\/td>\n<td width=\"4%\">1<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">410292<\/td>\n<td width=\"26%\">Discrete Mathematics<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">410333<\/td>\n<td width=\"27%\">Software Engineering<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">410471<\/td>\n<td width=\"26%\">Fundamentals of Cybersecurity<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">410331<\/td>\n<td width=\"27%\">Operating Systems<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">110200<\/td>\n<td width=\"26%\">Life Skills<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">410147<\/td>\n<td width=\"27%\">Probability &amp; Statistics<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">410211<\/td>\n<td width=\"26%\">Critical Thinking Skills<\/td>\n<td width=\"4%\">1<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">410220<\/td>\n<td width=\"27%\">Advanced Programming<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"35%\">Total<\/td>\n<td colspan=\"2\" width=\"12%\">17<\/td>\n<td colspan=\"4\" width=\"51%\">19<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td colspan=\"8\" width=\"100%\">Third Year<\/td>\n<\/tr>\n<tr>\n<td colspan=\"4\" width=\"48%\">First Semester<\/td>\n<td colspan=\"4\" width=\"51%\">Second Semester<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">Course Number<\/td>\n<td width=\"26%\">Course Name<\/td>\n<td width=\"4%\">C.H.<\/td>\n<td width=\"7%\">Pre-request<\/td>\n<td width=\"10%\">Course Number<\/td>\n<td width=\"27%\">Course Name<\/td>\n<td width=\"4%\">C.H.<\/td>\n<td width=\"9%\">Pre-request<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">420132<\/td>\n<td width=\"26%\">Introduction To Networks<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">410325<\/td>\n<td width=\"27%\">Database Management Systems\/ Introduction to Database<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">\u00a0<\/td>\n<td width=\"26%\">Computer Networks Lab<\/td>\n<td width=\"4%\">1<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">\u00a0<\/td>\n<td width=\"27%\">Introduction to Cloud Systems and Security<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">\u00a0<\/td>\n<td width=\"26%\">Internet and Mobile Applications Development<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">\u00a0<\/td>\n<td width=\"27%\">Introduction to Artificial Intelligence &amp; Machine Learning<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">\u00a0<\/td>\n<td width=\"26%\">Applications and Operating System Security<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">\u00a0<\/td>\n<td width=\"27%\">University Elective<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">\u00a0<\/td>\n<td width=\"26%\">Digital Forensics<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">410204<\/td>\n<td width=\"27%\">Research Methodology<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">470601<\/td>\n<td width=\"26%\">Big Data Analytics and Security<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">\u00a0<\/td>\n<td width=\"27%\">\u00a0<\/td>\n<td width=\"4%\">\u00a0<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"35%\">Total<\/td>\n<td colspan=\"2\" width=\"12%\">16<\/td>\n<td colspan=\"4\" width=\"51%\">15<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Summer Semester: \u00a0(3 C.H Field Training)<\/p>\n<p>&nbsp;<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td colspan=\"8\" width=\"100%\">Fourth Year<\/td>\n<\/tr>\n<tr>\n<td colspan=\"4\" width=\"48%\">First Semester<\/td>\n<td colspan=\"4\" width=\"51%\">Second Semester<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">Course Number<\/td>\n<td width=\"26%\">Course Name<\/td>\n<td width=\"4%\">C.H.<\/td>\n<td width=\"7%\">Pre-request<\/td>\n<td width=\"10%\">Course Number<\/td>\n<td width=\"27%\">Course Name<\/td>\n<td width=\"4%\">C.H.<\/td>\n<td width=\"9%\">Pre-request<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">\u00a0<\/td>\n<td width=\"26%\">Introduction to Blockchain Technology<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">\u00a0<\/td>\n<td width=\"27%\">Artificial Intelligence for Cybersecurity<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">\u00a0<\/td>\n<td width=\"26%\">Legal &amp; Ethical Issues in Information Security<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">112101<\/td>\n<td width=\"27%\">\n<table>\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td>Physical Education<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<td width=\"4%\">1<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">\u00a0<\/td>\n<td width=\"26%\">Cyber threat hunting<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">\u00a0<\/td>\n<td width=\"27%\">Introduction to Computer Design<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">\u00a0<\/td>\n<td width=\"26%\">Program Elective<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">\u00a0<\/td>\n<td width=\"27%\">Graduation Project<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">410202<\/td>\n<td width=\"26%\">Innovation &amp; Entrepreneurshi<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">\u00a0<\/td>\n<td width=\"27%\">\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Program Elective<\/p>\n<\/td>\n<td width=\"4%\">3<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"9%\">\u00a0<\/td>\n<td width=\"26%\">Graduation Project Proposal<\/td>\n<td width=\"4%\">1<\/td>\n<td width=\"7%\">\u00a0<\/td>\n<td width=\"10%\">\u00a0<\/td>\n<td width=\"27%\">\u00a0<\/td>\n<td width=\"4%\">\u00a0<\/td>\n<td width=\"9%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"35%\">Total<\/td>\n<td colspan=\"2\" width=\"12%\">16<\/td>\n<td colspan=\"4\" width=\"51%\">13<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Course description&#8221; tab_id=&#8221;1759058544997-82aeb50e-f357&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p><strong>Arabic Language Skills I<\/strong><br \/>Develop fundamental Arabic skills: reading, writing, listening, and speaking, with focus on effective communication, dictionary use, and grammar understanding.<\/p>\n<p><strong>Arabic Communication Skills <\/strong><br \/>Enhances writing and speaking, preparing CVs, meeting minutes, official documents, and using Arabic in diverse contexts.<\/p>\n<p><strong>English Language Skills I<\/strong><br \/>Develops reading, writing, listening, and speaking skills, with emphasis on communication purposes.<\/p>\n<p><strong>English Language Skills II<\/strong><br \/>Enhances conversation, listening, and academic writing skills.<\/p>\n<p><strong>Fundamentals of Computer &amp; Programming<\/strong><br \/>Introduction to computers and programming, including hardware, OS, algorithms, big data, Internet, AI, and smart devices. Tools: Python, Java.<\/p>\n<p><strong>Principles of Management<\/strong><br \/>Covers management fundamentals, planning, organizing, directing, and controlling resources.<\/p>\n<p><strong>Calculus<\/strong><br \/>Covers derivatives, integrals, analytical geometry, and infinite series.<\/p>\n<p><strong>Introduction to Information Technology<\/strong><br \/>Covers computing concepts, information systems, software, and IT tools.<\/p>\n<p><strong>Islamic Culture<\/strong><br \/>Covers culture, sources, cultural security, contemporary Islamic thought, creed, Sunnah, and scholars\u2019 contributions.<\/p>\n<p><strong>Palestinian Cause<\/strong><br \/>Covers historical roots, developments, civilizations, British mandate, and international support.<\/p>\n<p><strong>Community Service<\/strong><br \/>Engagement activities to enhance social responsibility.<\/p>\n<p><strong>Computer Programming<\/strong><br \/>Software development using modern languages like Python or Java.<\/p>\n<p><strong>Computer Programming Lab<\/strong><br \/>Hands-on coding, testing, and debugging.<\/p>\n<p><strong>Free Elective<\/strong><br \/>Optional courses to enhance knowledge outside major.<\/p>\n<p><strong>Introduction to Computer Architecture<\/strong><br \/>Covers computer architecture fundamentals, data processing, memory, CPU, instruction organization. Tools: Logisim, MARIE simulator.<\/p>\n<p><strong>Object Oriented Programming<\/strong><br \/>Covers classes, objects, methods, inheritance, polymorphism, and software reuse. Tools: Java, Python, Eclipse, IntelliJ IDEA.<\/p>\n<p><strong>Object Oriented Programming Lab<\/strong><br \/>Hands-on OOP implementation and projects.<\/p>\n<p><strong>Data Structures<\/strong><br \/>Covers arrays, linked lists, stacks, queues, trees, graphs, search and sort algorithms.<\/p>\n<p><strong>Data Structure Lab<\/strong><br \/>Practical implementation of data structures. Tools: Python, C++, Java.<\/p>\n<p><strong>Discrete Mathematics<\/strong><br \/>Covers logic, sets, relations, functions, graphs, probability, and modeling.<\/p>\n<p><strong>Software Engineering<\/strong><br \/>Software lifecycle, development models, requirements, design, testing, project management. Tools: JIRA, Git, UML tools.<\/p>\n<p><strong>Fundamentals of Cybersecurity<\/strong><br \/>Basic cybersecurity concepts, threat detection, small network protection. Tools: Kali Linux, Wireshark, Nmap, Metasploit.<\/p>\n<p><strong>Operating Systems<\/strong><br \/>OS design, memory management, processing, storage, security. Tools: Linux, VirtualBox.<\/p>\n<p><strong>Life Skills<\/strong><br \/>Critical thinking, time management, teamwork, and communication.<\/p>\n<p><strong>Probability &amp; Statistics<\/strong><br \/>Statistics, data distributions, probability, and analysis.<\/p>\n<p><strong>Critical Thinking Skills<\/strong><br \/>Logical reasoning, evaluating arguments, evidence-based decision-making.<\/p>\n<p><strong>Advanced Programming<\/strong><br \/>Complex programming, database interaction, advanced applications.<\/p>\n<p><strong>Introduction to Networks<\/strong><br \/>Networking basics, OSI\/TCP-IP models, key protocols. Tools: Packet Tracer, Wireshark.<\/p>\n<p><strong>Computer Networks Lab<\/strong><br \/>Hands-on network setup and management.<\/p>\n<p><strong>Internet and Mobile Applications Development<\/strong><br \/>Web and mobile app development. Tools: VS Code, Node.js, Android Studio.<\/p>\n<p><strong>Applications and Operating System Security<\/strong><br \/>OS\/application security, access control, threat management. Tools: SELinux, AppArmor, Windows Security.<\/p>\n<p><strong>Digital Forensics<\/strong><br \/>Digital investigations, evidence collection, cybercrime analysis. Tools: Autopsy, FTK, EnCase.<\/p>\n<p><strong>Big Data Analytics and Security<\/strong><br \/>Analyze large datasets for security decision-making. Tools: Hadoop, Spark, Python, Splunk.<\/p>\n<p><strong>Database Management Systems \/ Introduction to Database<\/strong><br \/>Database design, SQL, administration, and security. Tools: MySQL, PostgreSQL, Oracle.<\/p>\n<p><strong>Introduction to Cloud Systems and Security<\/strong><br \/>Cloud computing, distributed storage, parallel processing, and security. Tools: AWS, Azure, Docker, Kubernetes.<\/p>\n<p><strong>Introduction to Artificial Intelligence &amp; Machine Learning<\/strong><br \/>AI concepts, machine learning, supervised\/unsupervised learning, deep learning. Tools: Python, TensorFlow, PyTorch, scikit-learn.<\/p>\n<p><strong>University Elective<\/strong><br \/>Optional courses to enhance general knowledge.<\/p>\n<p><strong>Research Methodology<\/strong><br \/>Scientific research methods, data analysis, academic writing.<\/p>\n<p><strong>Summer Field Training<\/strong><br \/>Practical work experience in IT environments.<\/p>\n<p><strong>Introduction to Blockchain Technology<\/strong><br \/>Blockchain fundamentals, cryptography, smart contracts, cryptocurrencies. Tools: Ethereum, Hyperledger, Solidity.<\/p>\n<p><strong>Legal &amp; Ethical Issues in Information Security<\/strong><br \/>Legal and ethical aspects of cybersecurity.<\/p>\n<p><strong>Cyber Threat Hunting<\/strong><br \/>Proactive threat detection and mitigation. Tools: Splunk, ELK, Wireshark, Volatility.<\/p>\n<p><strong>Program Elective<\/strong><br \/>Elective course to deepen specialized knowledge.<\/p>\n<p><strong>Artificial Intelligence for Cybersecurity<\/strong><br \/>AI applications in cybersecurity, threat analysis, intelligent solutions. Tools: Python, TensorFlow, scikit-learn, ELK.<\/p>\n<p><strong>Physical Education<\/strong><br \/>Enhances physical fitness and health.<\/p>\n<p><strong>Introduction to Computer Design<\/strong><br \/>Digital system and computer design, logic, assembly language, sequential circuits. Tools: Logisim, ModelSim.<\/p>\n<p><strong>Graduation Project<\/strong><br \/>Full project development, design, implementation, testing, presentation.<\/p>\n<p><strong>Innovation &amp; Entrepreneurship<\/strong><br \/>Develop creativity, entrepreneurial skills, innovative technical problem-solving.<\/p>\n<p><strong>Introduction to Graduation Project<\/strong><br \/>Project preparation: feasibility study, requirements analysis, planning.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-140971","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.paluniv.edu.ps\/eng\/wp-json\/wp\/v2\/pages\/140971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.paluniv.edu.ps\/eng\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.paluniv.edu.ps\/eng\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.paluniv.edu.ps\/eng\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.paluniv.edu.ps\/eng\/wp-json\/wp\/v2\/comments?post=140971"}],"version-history":[{"count":5,"href":"https:\/\/www.paluniv.edu.ps\/eng\/wp-json\/wp\/v2\/pages\/140971\/revisions"}],"predecessor-version":[{"id":140976,"href":"https:\/\/www.paluniv.edu.ps\/eng\/wp-json\/wp\/v2\/pages\/140971\/revisions\/140976"}],"wp:attachment":[{"href":"https:\/\/www.paluniv.edu.ps\/eng\/wp-json\/wp\/v2\/media?parent=140971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}