January 23, 2025
100% online
courses
Interactive
Virtual Labs
Personalized pace with regular deadlines
$4,200

Pave your way towards a career in Cybersecurity, one of the fastest growing fields in Tech.
The online graduate professional diploma in Cybersecurity will equip you with essential highly in demand technical skills needed to take on cybersecurity roles confidently.
The program will cover a broad range of the current and emerging areas of cybersecurity, including computer and network security, software security, data and information security, cloud security, mobile platform security, and IoT security, as well as applied cryptography and computer forensics.

Unleash Your Cybersecurity Potential

Enjoy both self-paced learning modules and interactive virtual labs featuring hands-on cybersecurity experiments.
Become a specialized industry professional helping organizations manage the increasing challenges of creating and maintaining secure online systems.

Unique Benefits Tailored to Your Needs!

Gain job-ready cybersecurity skills that are highly in-demand across the region.
Earn a professional diploma from AUB, the #1 university in the region for employability.
Benefit from an engaging & experiential program through hands-on cybersecurity experiments and virtual labs.
Prepare for the CEH and ISC2 certifications
Get certified in less than a year
Benefit from direct support by English & Arabic speaking teaching assistants

Who Is This Program For?

You are
  • Young IT professionals, network engineers, & system administrators eager to take on cybersecurity roles
  • Fresh graduates of computer science or computer engineering keen on gaining highly in-demand skills
  • Working professionals with a knowledge of programming and an interest in shifting to a career in cybersecurity
You have
  • An undergraduate bachelor's degree from a recognized institution of higher learning.
  • Basic knowledge of computer programming (at least one programming language)
  • The English Language Proficiency Requirement (ELPR), for more information check out the FAQ.

What Skills Will You Gain?

Hands-on Network Security
Threat Management
Identity and Access Management
Risk Management
Data & Host Security
Cryptography and Public Key Infrastructure (PKI)

Curriculum

Course Details

This course introduces students to cybersecurity fundamental topics that are essential for other diploma’s courses. It introduces cybersecurity terminologies and gives a quick overview of the CIA triad, the usability triangle, The Bell-La Padula Model, Biba model, basic coverage of security attack vectors, threat actors, Pyramid of Pain, Identification and prevention frameworks such as Cyber Kill Chain, phases of attacks frameworks such as the Unified Kill Chain, the Diamond model & MITRE. It offers overview of basic networking concepts, types of networks, and networking devices, underpinned by a dive into the OSI and TCP/IP models. In addition, it covers basic operating systems concepts. On a practical level, the course covers scripting languages useful for other courses such as Python, Linux terminal and BASH scripting, Windows Command line usage and PowerShell.

This course covers threats, attacks and vulnerabilities. The objectives of this course are to ensure that students can understand and explain different types of security compromises, the types of actors involved, and the concepts of penetration testing and vulnerability scanning.

This course provides an overview of encryption techniques. It covers block ciphers and the data encryption standard, finite fields, advanced encryption standard, confidentiality using symmetric encryption, public-key cryptography, key management, hash and MAC algorithms, digital signatures, and authentication applications.

This course covers the fundamentals of ethical hacking and penetration testing. It includes topics such as reconnaissance & Open-Source Intelligence, enumeration, scanning, and a myriad of exploitation & post exploitation techniques, as well as countermeasures to protect systems from threats. It provides hands-on exercises and labs with real-world examples and scenarios. The course introduces many tools & techniques such as port scanners, vulnerability scanners, password cracking, ARP spoofers, keyloggers, backdoors, SQL/Command injection, XSS, CSRF, IDOR, Denial of Service Attacks (DOS), traffic redirection, session hijacking among many others. Students will learn how to set a hacking environment using Kali Linux & will practice penetration testing on a myriad of victim virtual machines. The course covers as well reporting and the ethical aspect of hacking as well as most important legal considerations.

This course focuses on creating Network Administrators who are trained on protecting, detecting and responding to threats on the network. It covers the fundamentals of creating a secure networking environment using firewalls (traditional and next-generation), IDS, IPS, VPNs. Students will know how to use standard security tools to locate and fix security leaks in a computer network and will understand a variety of cryptographic algorithms and protocols underlying network security applications.

This course covers advanced topics in network security such as network virtualization security, cloud and wireless network security and network/traffic indicators of compromise, attacks and exposures. This course also explores the necessary tools, techniques, and concepts of threat intelligence and incident response. It addresses both emerging technologies and research topics.

Choose Your Ideal Study Plan!

6 months | full-time study plan
Starting January 2025
Ideal for ambitious individuals with a strong determination to complete their studies, recommended for those who have no other commitments, allowing them to dedicate themselves fully on their educational goals.
1 year | part-time study plan
Created for working individuals, this part-time study plan provides the balance needed between pursuing your studies and managing your professional commitments, by taking only one course per semester.
Next
Start
Date
January 23, 2025
Join our upcoming Cybersecurity online diploma!

Deadline to apply is January 9, 2025! Hurry!
Need more information?
Want to learn more about this program? Interested in a personalized 1-on-1 session with our enrollment coaches? Schedule a session today!

Flexible Tuition Fees

Select the payment method that suits you best!
Pay as you go
Pay for the courses you register each term.
Base price per course: $700
Early Bird
Pay in full and benefit from a 10% reduction on tuition fees.
Total program tuition: $4,200 $3,780
Corporate tuition rates are available, contact us for more information.
Contact us

Instructors

Hussein Bakri

Lecturer in the Department of ECE
Expert in offensive cyber security and software engineering. Extensive lecturing expertise in ethical hacking, data structures, programming languages, artificial Intelligence, algorithms,  and database systems

Ali Chehab

Professor and Chairperson of ECE
Ph.D. in Computer Engineering
Expert in Cryptography, Network and Telecom Security, Software Development

Khaled Dessouki

PhD in Cybersecurity
Expert in software development, cybersecurity and networking with more than 17 years of professional experience
Founder of Ubility, a startup providing SaaS software for automating and securing cloud infrastructure

Iman Ghalayini

Expert in securing network, information assets, apps, websites, databases and online services
Certified in CEH, ECIH, CISSP, CISA, Web Application Penetration Testing, Advanced Network Penetration Testing

Ayman Tajeddine

Ph.D. in Electrical & Computer Engineering
Expert in the areas of cybersecurity, digital forensics, networking, reputation, and trust

Hussein Bakri

Lecturer in the Department of ECE
Expert in offensive cyber security and software engineering. Extensive lecturing expertise in ethical hacking, data structures, programming languages, artificial Intelligence, algorithms,  and database systems

Ali Chehab

Professor and Chairperson of ECE
Ph.D. in Computer Engineering
Expert in Cryptography, Network and Telecom Security, Software Development

Khaled Dessouki

PhD in Cybersecurity
Expert in software development, cybersecurity and networking with more than 17 years of professional experience
Founder of Ubility, a startup providing SaaS software for automating and securing cloud infrastructure

Iman Ghalayini

Expert in securing network, information assets, apps, websites, databases and online services
Certified in CEH, ECIH, CISSP, CISA, Web Application Penetration Testing, Advanced Network Penetration Testing

Ayman Tajeddine

Ph.D. in Electrical & Computer Engineering
Expert in the areas of cybersecurity, digital forensics, networking, reputation, and trust

You might also be interested in