Course Title: Introduction to Cybersecurity
Course Code: SE1752
Program: Bachelor of Software Engineering
Department: Software Engineering
College: Faculty of Computers and Informatics
Institution: Al-Baha University
Version: 1.0
Last Revision Date: 23/4/2024
Table of Contents
A. General information about the course: ................................................................ 3
B. Course Learning Outcomes (CLOs), Teaching Strategies and Assessment
Methods .................................................................................................................... 4
C. Course Content ...................................................................................................... 6
D. Students Assessment Activities ............................................................................ 6
E. Learning Resources and Facilities .......................................................................... 7
F. Assessment of Course Quality ............................................................................... 7
G. Specification Approval .......................................................................................... 7
2
A. General information about the course:
1. Course Identification
1. Credit hours: ( ……… )
2. Course type
A. ☐University ☐College ☒ Department ☐Track ☐Others
B. ☒ Required ☐Elective
3. Level/year at which this course is offered: ( 9 )
4. Course general Description:
Overview of the evolving cyberspace ecosystem, the interoperability of physical
and social networks, and methods and techniques in securing that ecosystem.
Explore briefings of the ethical, legal, and technical aspects of cybercrime and
methods of prevention, detection, response and recovery. The value of strong
moral character, integrity, and trust as prized attributes of cybersecurity
practitioners will be highlighted. Essential cybersecurity topics overview including
operating system models and mechanisms for mandatory and discretionary
controls, data models, basic cryptography and its applications, security in
computer networks and distributed systems, inspection and protection of
information assets, detection of and reaction to threats to information assets, and
examination of pre- and postincident procedures, technical and managerial
responses, information security planning and staffing functions, data mining and
data science, and policy and assurance issues. Being prepared as life-long learner
tailored to their academic/career goals.
5. Pre-requirements for this course (if any):
Software Security (SE1507)
6. Pre-requirements for this course (if any):
none
7. Course Main Objective(s):
3
Teaching Cybersecurity fundamentals to be motivated to begin career as
Cybersecurity professional.
2. Teaching mode (mark all that apply)
No Mode of Instruction Contact Hours Percentage
1 Traditional classroom 3 100%
2 E-learning
Hybrid
3 • Traditional classroom
• E-learning
4 Distance learning
3. Contact Hours (based on the academic semester)
No Activity Contact Hours
1. Lectures 33
2. Laboratory/Studio
3. Field
4. Tutorial
5. Others (specify)
Total 33
B. Course Learning Outcomes (CLOs), Teaching Strategies and Assessment
Methods
Course Learning Code of CLOs aligned Teaching Assessment
Code
Outcomes with program Strategies Methods
1.0 Knowledge and understanding
Recognize K1
knowledge of Course lectures,
cybersecurity tutorials,
1.1 Quiz, Exam
concepts and HomeWorks, term
terminology as well project
as get idea
4
Course Learning Code of CLOs aligned Teaching Assessment
Code
Outcomes with program Strategies Methods
about digital
forensics and
available tools to
serve its
applications.
Describe needs to K2
secure information
Course lectures,
while preserving
tutorials,
1.2 legal and regulatory Quiz, Exam
HomeWorks, term
requirements in
project
Saudi Arabia and
Internationally.
Describe generally K3
Course lectures,
the vulnerabilities
tutorials,
1.3 and sources of Quiz, Exam
HomeWorks, term
attack risking digital
project
systems.
2.0 Skills
Employ basic S1
security principles
and practices
integrated to
knowledge of
Tutorial
2.1 computing and HomeWorks
Term project
information
technologies to
serve against
cybersecurity
problems
Analyze in very S2
simplified manner
the cyber
Tutorial
2.2 computing-based HomeWorks
Term project
solution to protect
information under
risks situations.
Analyze generally S3
Tutorial
2.3 the legal and HomeWorks
Term project
regulatory
5
Course Learning Code of CLOs aligned Teaching Assessment
Code
Outcomes with program Strategies Methods
requirements
related to
cybersecurity
computer systems
and digital evidence.
Function orally to S4 Open Related
Oral
accomplish common Topic General
presentation
goals. Coverage
3.0 Values, autonomy, and responsibility
Engage in lifelong V1
learning for Open Related
Oral
3.1 continued Topic General
presentation
professional Coverage
excellence.
C. Course Content
No List of Topics Contact Hours
1. Introduction to Cybersecurity specialization 5
2. Cybersecurity Fundamentals and CIA 5
3. Cyberthreat Prevention, Detection, Recovery 6
4. Enterprise Architecture and Components 6
5. Information System Governance and Risk Assessment 6
6. Incident Management 5
Total 33
D. Students Assessment Activities
Assessment
Percentage of Total
No Assessment Activities * timing
Assessment Score
(in week no)
1. Quizzes 3, 8 10%
2. Midterm 6 25%
3. HomeWorks 10 10%
4. Oral presentation 10 20%
5. Final Exam 12 35%
*Assessment Activities (i.e., Written test, oral test, oral presentation, group project, essay, etc.).
6
E. Learning Resources and Facilities
1. References and Learning Resources
Introduction to Cyber Security: Fundamentals By Ugo Ekpo, 2018
Essential References
- ISBN: 978-1728711621
Supportive References N/A
Electronic Materials Rafid
Other Learning Materials N/A
2. Required Facilities and equipment
Items Resources
facilities Classroom
(Classrooms, laboratories, exhibition rooms,
simulation rooms, etc.)
Technology equipment Data show, Software
(projector, smart board, software)
Other equipment N/A
(depending on the nature of the specialty)
F. Assessment of Course Quality
Assessment Areas/Issues Assessor Assessment Methods
Effectiveness of teaching - Student - Survey
Effectiveness of
- Lecturer - Annual report
Students assessment
- Survey
- Evaluation of test
Quality of learning resources - Program Coordinator
- Models
Standard sample
The extent to which CLOs have
been achieved
Other
Assessors (Students, Faculty, Program Leaders, Peer Reviewer, Others (specify)
Assessment Methods (Direct, Indirect)
G. Specification Approval
COUNCIL /COMMITTEE Curriculum Committee
REFERENCE NO.
7
DATE 28 April 2024