Bachelor of Science in Cybersecurity Engineering
Welcome to the future of cybersecurity—where cutting-edge technology meets innovative education. The Bachelor of Science in Cybersecurity Engineering at the American University in the Emirates (AUE) is more than just a degree; it’s a launchpad for aspiring professionals who want to lead the global battle against cyber threats in a fast-evolving digital era.
In today’s hyperconnected world, where nearly every aspect of our lives depends on technology, cybersecurity has become a critical cornerstone of global security, business continuity, and societal stability. Organizations and governments are facing an unprecedented surge in sophisticated cyberattacks, making the demand for skilled cybersecurity engineers higher than ever before. This is where you come in.
The Bachelor of Science in Cybersecurity Engineering program at AUE offers an unmatched opportunity to become a key player in safeguarding the digital infrastructure that powers our modern lives. This program is designed to prepare students to excel in one of the most dynamic, high-growth, and impactful professions of the 21st century. Combining a robust foundation in engineering, computer science, and Science with specialized training in cybersecurity, this program equips you with the knowledge and skills to identify, prevent, and mitigate cyber threats across industries.
What Makes Our Program Unique?
At AUE, we go beyond teaching the fundamentals of cybersecurity. We empower our students to become leaders, innovators, and problem-solvers. Here’s what sets our program apart:
Future-Focused Curriculum: Designed with input from industry experts, our curriculum blends theory with practice, addressing real-world challenges in areas like cryptography, ethical hacking, artificial intelligence, digital forensics, and IoT security.
Experiential Learning: Our program emphasizes hands-on experience through advanced labs, simulated attack-defense scenarios, and real-world internships with leading companies and government organizations.
Interdisciplinary Approach: Cybersecurity doesn’t exist in a vacuum. Students gain expertise in programming, network security, data analysis, and ethical decision-making, ensuring they have the skills to solve complex problems in diverse industries.
Capstone Projects & Internships: Engage in meaningful, real-world projects that allow you to apply your knowledge to developing innovative cybersecurity solutions. An internship requirement ensures you graduate job-ready with experience in the field.
Global Perspective, Ethical Foundation: You will develop not only technical expertise but also a deep understanding of the ethical, societal, and legal dimensions of cybersecurity, preparing you to lead responsibly in a globalized digital economy.
Who Should Join This Program?
Do you dream of being on the frontlines of digital defense? Are you passionate about solving complex problems and using technology for the greater good? If so, The Bachelor of Science in Cybersecurity Engineering at AUE is for you. Whether you are a tech enthusiast, a problem-solver, or someone inspired by the challenge of protecting digital ecosystems, this program will help you turn your passion into a rewarding career.
The Cybersecurity Advantage
A Degree with Global Demand: The world is facing a well-documented shortage of skilled cybersecurity professionals. According to Cybersecurity Ventures, there will be over 3.5 million unfilled cybersecurity jobs globally by 2025, highlighting the unprecedented demand for experts in this field. Similarly, the (ISC)² Cybersecurity Workforce Study reports that organizations across industries are struggling to fill critical roles in cybersecurity, making it one of the most secure and lucrative career paths today.
Endless Career Opportunities: With a degree in Cybersecurity Engineering, you’ll be prepared to step into roles such as:
Cybersecurity Analyst
Ethical Hacker
Digital Forensics Specialist
Cybersecurity Architect
Network Security Engineer
Cyber Threat Intelligence Specialist
Whether it’s protecting critical national infrastructure, securing multinational corporations, or innovating new tools to counteract cybercrime, the opportunities are limitless.
Competitive Edge: Graduates of AUE’s Cybersecurity Engineering program will be ready to meet the needs of industries ranging from finance and healthcare to government, defense, and tech startups.
Why AUE?
When you choose AUE’s College of Engineering and Technology (CET), you’re not just enrolling in a program—you’re joining a university committed to excellence, innovation, and student success.
State-of-the-Art Facilities: Our cutting-edge cybersecurity labs provide an ideal environment for learning and innovation.
Expert Faculty: Learn from industry leaders and researchers with extensive experience in the field.
Global Connections: Benefit from AUE’s partnerships with top-tier organizations, giving you access to internships, research opportunities, and a strong professional network.
Support for Lifelong Learning: The program equips you with skills not only for today’s challenges but also for evolving technologies and threats of tomorrow.
Become a Digital Defender
The Bachelor of Science in Cybersecurity Engineering at AUE is your pathway to becoming a leader in one of the most critical and high-demand professions of our time. With a curriculum designed to address real-world cybersecurity challenges and a commitment to fostering innovation and ethical responsibility, this program ensures you graduate ready to protect, innovate, and lead in a digital-first world.
Step into the future. Become a trusted guardian of the digital age. Join The Bachelor of Science in Cybersecurity Engineering program at AUE today.
State-of-the-Art Facilities: Our cutting-edge cybersecurity labs provide an ideal environment for learning and innovation.
Expert Faculty: Learn from industry leaders and researchers with extensive experience in the field.
Global Connections: Benefit from AUE’s partnerships with top-tier organizations, giving you access to internships, research opportunities, and a strong professional network.
Support for Lifelong Learning: The program equips you with skills not only for today’s challenges but also for evolving technologies and threats of tomorrow.
Program Mission
To empower students with cutting-edge knowledge and practical expertise to excel in the ever-evolving field of cybersecurity. The program fosters innovation, critical thinking, and technical excellence, enabling graduates to design secure systems, mitigate advanced cyber threats, and lead in safeguarding digital infrastructures. Through an emphasis on hands-on learning, interdisciplinary collaboration, and a forward-looking curriculum, the program prepares future-ready professionals to shape the resilience and security of tomorrow’s digital world.
Program Educational Objectives (PEOs)
- Excel in Professional Careers: Graduates will excel as cybersecurity engineers, utilizing their expertise to secure complex digital systems and networks across diverse industries while adapting to evolving challenges and technologies.
- Design and Implement Secure Solutions: Graduates will lead and contribute to the development of innovative, secure computing systems and processes that address technical, societal, and ethical challenges effectively.
- Contribute to Global Cybersecurity Efforts: Graduates will uphold professional and ethical standards, contributing to the global advancement of secure and sustainable digital infrastructures by addressing security risks and threats.
- Engage in Lifelong Learning: Graduates will commit to continuous professional development and education, staying current with emerging cybersecurity technologies, tools, and practices.
- Lead Multidisciplinary Teams: Graduates will communicate effectively and work collaboratively in multidisciplinary teams, demonstrating leadership in designing, implementing, and managing cybersecurity solutions.
Program Learning Outcomes
- Identify, formulate, analyze, and solve complex cybersecurity engineering problems by applying principles of computing, engineering, mathematics, and science in the context of secure systems and networks.
- Design, apply, implement, and evaluate secure computing systems, processes, and programs by integrating knowledge from cybersecurity, computer science, mathematics, and engineering to meet desired needs, considering security requirements, user experience, legal, ethical, and societal implications.
- Utilize appropriate techniques, skills, and modern tools necessary for secure computing, cryptography, data analysis, and risk management, applying scientific and mathematical principles in developing and defending against cyber threats.
- Develop and conduct appropriate experiments, simulations, and testing protocols related to cybersecurity systems, analyze and interpret data, and use engineering and scientific judgment to draw conclusions and improve security measures.
- Communicate effectively in both written and oral forms with diverse audiences, including technical and non-technical stakeholders, to ensure that cybersecurity risks, solutions, and impacts are clearly understood, fostering collaboration across multidisciplinary teams.
- Recognize ethical and professional responsibilities in cybersecurity and computer science, and make informed decisions that consider global, economic, legal, environmental, and societal impacts of security measures and breaches.
- Recognize the need for continuous learning and professional development by engaging in lifelong learning strategies to stay current with emerging technologies in cybersecurity, computer science, mathematics, and related fields
Program Goals
Goal 1. Excel in Professional Careers: Graduates will excel as cybersecurity engineers, utilizing their expertise to secure complex digital systems and networks across diverse industries while adapting to evolving challenges and technologies.
Goal 2. Design and Implement Secure Solutions: Graduates will lead and contribute to the development of innovative, secure computing systems and processes that address technical, societal, and ethical challenges effectively.
Goal 3. Contribute to Global Cybersecurity Efforts: Graduates will uphold professional and ethical standards, contributing to the global advancement of secure and sustainable digital infrastructures by addressing security risks and threats.
Goal 4. Engage in Lifelong Learning: Graduates will commit to continuous professional development and education, staying current with emerging cybersecurity technologies, tools, and practices.
Goal 5. Lead Multidisciplinary Teams: Graduates will communicate effectively and work collaboratively in multidisciplinary teams, demonstrating leadership in designing, implementing, and managing cybersecurity solutions.
ADMISSION REQUIREMENTS
- High School Average: 80%
- Subject-specific Competencies: Mathematics 80%, Physics 80%, one subject from (Chemistry 80% or Biology 80%).
- IELTS: Minimum band score of 5.0 or TOEFL iBT: Minimum score of 61 or ITB 500
- Placement Tests: All applicants are required to complete placement tests in mathematics, physics, information technology, and English (writing) to assess readiness for the program’s technical coursework.
- Admission Interviews: Prospective students may be invited for an interview to evaluate their motivation, technical background, and alignment with program goals.
ACCREDITATION
PROGRAM STRUCTURE
Course Category
Total Number of Courses
Total Number of Credit Hours
General Education Courses
10
30
College Mathematics and Science Courses
9
27
Cybersecurity Engineering Core
24
72
Cybersecurity Engineering Electives
2
6
Total
45
135 Credit Hours
GENERAL EDUCATION COURSES
30 CREDIT HOURS
A: University Core Requirements
The student selects 6 credit hours (2 courses) from the list below:
B: Languages and Communication Studies
The student selects 9 credit hours (3 courses) from the list below:
Students must take all of the following courses:
This course provides students with advanced writing skills in English so that they can successfully pursue their studies in various academic specializations. It helps students to develop, improve, and upgrade their writing and structure skills, and it also acquaints students with technical writing, research papers, and essays since brief research methods are applied in student projects and assignments.
Students must take one of the following Arabic Language courses:
C: The Natural sciences or Mathematics
The student selects 6 credit hours (2 courses) from the list below:
D: The Social or Behavioral Sciences
The student selects 3 credit hours (1 course) from the list below:
E: The Humanities or Arts
The student selects 3 credit hours (1 course) from the list below:
F: Islamic Studies
The student selects 3 credit hours (1 course) from the list below
G: UAE Studies
The student selects 3 credit hours (1 course) from the list below
College Mathematics and Science Courses
27 CREDIT HOURS
This course provides a foundational exploration of differential and integral calculus, offering an in-depth understanding of fundamental mathematical concepts. Starting with a review of essential functions, the curriculum transitions to the pivotal concept of limits in functions. Subsequently, the course focuses on the study of derivatives, exploring their diverse applications across mathematical landscapes. Additionally, addresses the area problem and the exploration of the definite integral.
This course is a continuation of the foundational calculus concepts introduced in Calculus I, focusing on advanced techniques in integration, the study of differential equations, and applications in real-world problem-solving. The course covers methods for solving definite and indefinite integrals, applications of integration (such as areas, volumes, and physical applications), and introduces first-order differential equations and their use in modeling dynamic systems. A key component of the course is the use of computational tools, such as MATLAB, to solve complex problems and analyze systems using coordinate transformations. This course is essential for students pursuing careers in engineering, physics, and applied sciences, where calculus plays a critical role in modeling and solving problems.
This course provides a comprehensive introduction to the fundamental principles of statistics and their application in data analysis. Students will explore key concepts such as data collection, descriptive statistics, probability theories, random variables, sampling distributions, and hypothesis testing. The course also covers advanced topics like regression analysis, multiple regression, and analysis of variance. Throughout the course, students will develop skills in interpreting and analyzing statistical data, enabling them to draw meaningful conclusions and make informed decisions. By the end of the course, students will be equipped with a solid foundation in statistical methods, preparing them for practical data analysis in various fields.
This course introduces the fundamental concepts and techniques of linear algebra, emphasizing applications in engineering and computer science. Topics include matrix operations, determinants, and systems of linear equations, alongside vector spaces, eigenvalues, and orthogonality. Students will learn to apply computational tools (e.g. MATLAB) for matrix computations and visualizations. Through a blend of theory and practical exercises, this course enhances analytical thinking and problem-solving skills essential for advanced studies in engineering.
This course provides a comprehensive exploration of differential equations, covering both ordinary differential equations (ODEs) and partial differential equations (PDEs). Students will delve into fundamental concepts such as first-order ODEs, second and higher-order linear ODEs, and systems of ODEs. Additionally, the curriculum includes advanced topics like Laplace transforms, Fourier series, and selected applications in PDEs. Emphasis is placed on real-world problem-solving and engineering applications to ensure a practical understanding of the mathematical principles introduced in the course.
This course introduces the fundamental numerical methods used to solve engineering problems. Students will explore mathematical modeling, investigate roundoff and truncation errors, and apply various root-finding algorithms. The course will explore techniques for solving linear systems, such as Gauss elimination and LU factorization, alongside regression analysis, interpolation methods, and numerical integration and differentiation. Practical applications are emphasized, with hands-on experience using software tools to reinforce theoretical concepts.
The physics course introduces the basic concepts, theories and terminologies of the scientific method in the context of the science of physics. Students will reinterpret and express ideas and views of our physical world from the basic principles of physics. This course allows students to differentiate between the various multitudes of measurement, learn kinematics including translational and rotational motion together with the motion of projectiles, interpret forces and torque, and then apply Newton’s Laws to analyze objects situations. Students will be able to set up equations related to energy conservation, work and momentum conservation.
This course explores the physical concepts of electrostatics and electromagnetism. These subjects benefit the students to develop solid background of the electricity and magnetism fundamentals. Topics include electric charge and matter, electric field, Coulomb’s law, Gauss law, electric potential, capacitors and dielectrics, electromotive force and electric circuits, magnetic field, Ampere’s law, Kirchhoff’s rules, Faraday’s law of induction, and self-induction. Various lab experiments are given to emphasize the addressed topics.
Cybersecurity Engineering Core
72 CREDIT HOURS
This foundational course introduces students to programming using Python, with no prior programming experience required. The course focuses on developing problem-solving skills through computational thinking, algorithmic design, and practical coding exercises. Students will learn core programming concepts such as variables, data types, control structures (conditionals and loops), functions, recursion, and file handling. Emphasis will be placed on best practices in programming, including clear communication, code documentation, and debugging techniques. Through a combination of lectures and lab sessions, students will gain hands-on experience in implementing Python programs to solve real-world problems.
networks, networking protocols, hardware, remote access, and security. Students will learn about the OSI model, network technologies, and their applications in real-world scenarios. Emphasis is placed on configuring, troubleshooting, and managing network communication to ensure efficient data transmission. Students will gain practical experience in implementing network configurations that include redundancy and load balancing to improve network reliability and performance. The course also fosters collaboration, with students working in groups to design, develop, and maintain secure and effective network solutions.
This course aims at introducing object-oriented programming (OOP) concepts and design principles, using Python programming language. The course aims to equip students with the fundamental knowledge and skills needed to develop software applications using OOP. The course covers abstraction, information hiding, classes, methods, attributes, inheritance, polymorphism, file processing, overloading, exception handling, reading, and writing from text files using Python’s built-in handling functions. The course includes hands-on exercises that will help students develop the skills required to develop Object-Oriented functioning programs to solve real-world computing problems. Students will collaborate with peers to deliver a functioning object-oriented program that applies the principles of Object-Oriented Programming concepts, error handling, and files handling.
This course provides a comprehensive understanding of data structures and algorithms, using Python for implementation. Key topics include algorithm analysis and complexity (using Big-O notation), searching and sorting algorithms, and essential data structures. The course begins with a review of Python essentials, followed by an introduction to algorithm analysis, enabling students to implement and evaluate the performance of various algorithms to select the most efficient algorithm for a given problem. Students will explore both linear and non-linear data structures, including Stacks, Queues, Deques, Linked Lists, Recursion, Trees (such as Binary Search Trees), and Graphs, with a focus on their applications and algorithms like breadth-first and depth-first search. Students will apply their learning through Python-based hands-on. Finally, students will collaborate within groups to apply the gained knowledge through the course to address, design, and implement solutions for real-world problems.
This course provides an in-depth exploration of data communication principles and network technologies. Students will learn the fundamentals of data transmission, network models, and communication standards, with a focus on both wired and wireless media. Topics include signal encoding, error detection and correction, network protocols, IP addressing, routing, switching techniques, and advanced concepts such as MPLS, QoS, and load balancing. The course also covers modern wireless standards, access networks, and backbone network design. Through hands-on labs and projects, students will gain practical experience configuring network protocols, implementing scalable and redundant network designs, and optimizing network performance. Students will work in teams to design and present comprehensive network solutions that integrate the latest technologies.
This course provides an introduction to the essential principles of cybersecurity, covering topics such as risk management, cybersecurity laws and policies, and technical fundamentals in network security. Students will learn to analyze and defend against cyber threats such as malware and phishing, understand key computer science concepts relevant to cybersecurity, and explore security frameworks and incident response. Through lab exercises and team projects, students will gain practical experience in developing comprehensive cybersecurity strategies for real-world scenarios.
This course offers a comprehensive understanding of information security principles, focusing on the confidentiality, integrity, and availability (CIA) triad. Students will learn about key security frameworks such as ISO/IEC 27001, NIST, and COBIT, as well as risk management and access control models. The course also emphasizes ethical issues, decision-making frameworks, and professional codes of conduct in the field of cybersecurity. Through practical exercises, case studies, and discussions, students will develop the ability to apply security concepts effectively while making informed ethical decisions in real-world information security scenarios.
This course provides a comprehensive introduction to the fundamental principles and practices of cryptography. Students will explore both symmetric and asymmetric cryptographic techniques, including stream ciphers, block ciphers (DES, AES), and public-key cryptosystems like RSA and Elliptic Curve Cryptography (ECC). The course also covers cryptographic hash functions, digital signatures, and message authentication codes (MACs) used to ensure data integrity and authenticity. In addition, students will examine modern cryptographic challenges and emerging technologies such as post-quantum cryptography. Through hands-on labs and projects, students will apply cryptographic algorithms in real-world scenarios to secure data and communication systems.
This course teaches students the fundamental principles and practices of network security. They will learn how to identify security threats and apply appropriate countermeasures to data link layer security threats. Students will also implement security protocols and standards at the network layers to mitigate risks. They will use security tools and technologies such as IDPS and VPN to secure network endpoints and systems. Throughout the course, students will work with their peers on a group project to implement a network security solution, applying the knowledge and skills they have acquired.
This course provides an in-depth examination of mobile and wireless security issues and techniques, covering both theoretical and practical aspects. In this course, students learn to recognize the impact of mobile network development on communication and networking. They will also assess wireless and mobile network security threats and apply appropriate security measures. Advanced security technologies will be implemented to enhance WLAN security measures, and effective security strategies will be used to mitigate risks in wireless WANs and mobile devices. In addition, students will participate in a group project to deliver a mobile and wireless security solution.
Students will learn about operating systems without getting into detail about internal algorithms. Case studies involving operating systems and networks are used by students to gain an understanding of how operating systems work and their role in Computers. The course covers structures of operating systems, processes and process synchronization, main memory, storage structure mass, file systems, operating system protection and security, virtual machine and UNIX flavors. Students learn to monitor, secure and configure an operating system using a UNIX flavors.
This course introduces students to the principles of cybersecurity risk management, focusing on identifying, assessing, and mitigating cybersecurity threats. Students will learn how to develop risk management strategies, implement business continuity and disaster recovery plans, and use industry-standard tools like SIEM for real-time threat detection. The course includes hands-on exercises and team projects, providing practical experience in creating cybersecurity policies, responding to incidents, and managing risks in industrial control systems and network environments. By the end of the course, students will be equipped with the skills needed to manage cybersecurity risks effectively in various organizational settings.
This course provides the student with a comprehensive introduction to the uses of computers in the world of digital forensics. Through this course the student will get familiar with the known methods of computer investigations and digital evidence, the requirements of work and lab environments of computer forensics, the techniques of data acquisition and data analysis used today in computer forensics, and the legal aspects of forensics investigations. The course serves as an essential primer to digital forensics investigations. It covers the well-known techniques and tools used by investigators for acquiring, comparing, and analyzing digital evidence in computer in private and public investigations. General legal issues such as handling evidence, chain of custody, admissibility, search warrants, and working with law enforcement are also covered. Several hands-on lab exercises that include working, analyzing, and examining digital images and evidence will be carried out throughout this course.
This course provides an in-depth exploration of malware, covering its lifecycle, classification, and the techniques used to analyze and reverse-engineer malicious software. Students will learn how to set up secure environments for malware analysis, apply both static and dynamic analysis techniques, and perform reverse engineering to understand malware behavior. The course also covers advanced topics such as memory forensics, network-based malware analysis, and malware evasion techniques. In addition to individual lab work, students will collaborate in teams to analyze malware samples, generate reports, and present findings, fostering real-world collaboration skills. The course concludes with a discussion of the legal and ethical implications of malware research and incident response. By the end of the course, students will be equipped with practical, hands-on skills in malware analysis and teamwork, preparing them for roles in cybersecurity.
This course offers a comprehensive exploration of the techniques and methodologies employed in ethical hacking practices. Beginning with an introduction to the ethical hacking landscape, students delve into essential skills such as footprinting, reconnaissance, network scanning, and enumeration. The curriculum progresses to cover system hacking, malware threats, and exploits, addressing sniffing, spoofing, and the intricacies of social engineering. The latter half explores advanced topics including web application hacking, wireless network security, SQL injection, and database hacking. The course will also cover tools and techniques for password cracking, web application testing, and wireless network security testing. Moreover, students will collaborate in a group to implement security solutions that meet security needs
This course prepares students for the final-year Capstone project by emphasizing project planning and preparation within the Cyber security field. Students will identify a technical industry challenge, analyze it, and define both functional and non-functional requirements to propose an innovative, computing-based solution. Students will work in groups of 2-4 members to foster collaboration, and each group will be assigned an academic supervisor and an external industry practitioner to guide topic selection, ensuring alignment with industry needs and student interests. Throughout the course, groups will collaboratively develop a comprehensive project proposal that includes objectives, a literature review, research design, intellectual property considerations, as well as budget and schedule management. The course culminates in a group proposal defense conducted in an oral format, with individual contributions assessed through reflective papers documenting each student’s involvement and learning experiences. Emphasizing project management, teamwork, collaboration, and presentation skills, this course equips students with the practical skills necessary to tackle real-world challenges in the field of cyber security.
This Capstone Project course represents the culmination of the Bachelor of Cybersecurity Engineering program, requiring students to integrate and apply their knowledge and skills to address real-world cybersecurity challenges. Working individually or in groups of 2–4 members, students will identify a security problem, conduct in-depth research, design and implement a solution, and evaluate its effectiveness. Emphasis is placed on developing a comprehensive project proposal, executing a detailed implementation plan, and demonstrating the project outcomes through a final presentation and report. The course fosters interdisciplinary collaboration, ethical considerations, project management skills, and effective communication.
The Cybersecurity Engineering Internship program is a critical component for graduation, designed to bridge the gap between academic theories and real-world applications in the field. Students must engage in practical work experience, applying their robotics engineering skills professionally. During the internship, students are expected to submit four detailed reports, documenting their tasks, the skills they applied, and the new competencies they developed. The program culminates with an oral presentation, where students reflect on their overall performance, challenges faced, and the knowledge gained throughout their internship experience.
This course provides a comprehensive introduction to electric and electronic circuits, blending theory with hands-on labs. Students will analyze circuits using fundamental laws and advanced techniques such as nodal and mesh analysis. The course covers AC circuits, semiconductor devices like diodes, BJTs, and FETs, and operational amplifiers. Circuit simulation tools are also introduced to enhance design and analysis skills. Collaborative teamwork in labs and projects is emphasized, preparing students to apply their knowledge to real-world circuit challenges.
This course offers an introduction to electronic models with logic design and the basic concepts used in digital systems. The course covers the design and applications of combinational logic components and sequential circuits. The course includes details of how computer systems are developed by highlighting the basic concepts involved in computer theory like truth tables, binary arithmetic, and standard representation of logic functions.
This course provides a comprehensive introduction to the principles and practices of embedded systems design. Students will explore key concepts such as embedded system architecture, real-time operating systems (RTOS), sensor and actuator interfacing, communication protocols, memory management, and power optimization techniques. The course emphasizes both theoretical understanding and practical implementation, with hands-on lab work involving microcontrollers, peripherals, and debugging tools. Throughout the course, students will work in teams to design, implement, and present a complete embedded system project, integrating real-time requirements, communication protocols, and power management strategies. By the end of the course, students will be equipped with the knowledge and skills to design and troubleshoot embedded systems used in various industries.
This course provides an in-depth study of operating system concepts, focusing on the fundamental components, structures, and services that manage computer hardware and software resources. Students will explore core topics such as process and thread management, CPU scheduling, memory management, file system structures, and I/O systems. The course emphasizes the role of operating systems in maintaining system security, addressing potential vulnerabilities, and implementing secure practices. Through practical exercises and hands-on projects, students will gain experience in using various operating system techniques, such as process synchronization, deadlock detection, memory allocation, and RAID configurations. Additionally, students will develop teamwork skills by collaborating on projects that tackle real-world operating system challenges. By the end of the course, students will have a comprehensive understanding of operating system concepts and their application in building efficient computing systems.
This course discusses the main concepts of computer architecture and organization, such as the behavior and structure of different computer functional modules. Students will learn as well as how these functional modules interact to meet users’ processing needs. In addition, the course will introduce students to basic computer organization, data representation and computer arithmetic, digital components, digital logic circuits, register transfer, microprogrammed control, input-output organization, central processing unit, memory organization and pipelining.
This course introduces fundamental concepts and principles of AI, exploring its risks and benefits in various applications. Students will learn problem-solving techniques, including search algorithms, adversarial search, and game theory. The curriculum covers knowledge representation and inference, focusing on first-order logic and instrumental planning. It also addresses uncertain knowledge through probabilistic reasoning, Bayesian networks, and decision-making strategies. A significant portion of the course is dedicated to machine learning, with practical exercises that reinforce understanding. The course culminates in a group project, enabling students to apply their AI knowledge to solve real-world problems.
