Ì©¹ú²ÊƱ

Cybersecurity Online Graduate Professional Diploma
April 14, 2025
100% online
courses
Interactive
Virtual Labs
Personalized pace with regular deadlines
$4,200

Upskill yourself in one of the most highly in-demand fields regionally and globally and unleash your cybersecurity potential!

As more businesses move online and more devices become connected to the internet, the rise in cybercrime highlights the urgent demand for cybersecurity experts.

In the Middle East, this need has become a priority for organizations…so much so that the Cybersecurity market is expected to grow to a whopping $31 billion by 2030.

Now is the time to take action.

Unique Benefits Tailored to Your Needs!

Gain job-ready cybersecurity skills that are highly in-demand across the region.
Earn a professional diploma from AUB, the #1 university in the region for employability.
Benefit from an engaging & experiential program through hands-on cybersecurity experiments and virtual labs.
Prepare for the CEH and ISC2 certifications
Get certified in less than a year
Benefit from direct support by English & Arabic speaking teaching assistants

Who Is This Program For?

  • Young IT professionals, network engineers, & system administrators eager to take on cybersecurity roles
  • Fresh graduates of computer science or computer engineering keen on gaining highly in-demand skills
  • Working professionals with a knowledge of programming and an interest in shifting to a career in cybersecurity

What Skills Will You Gain?

Hands-on Network Security
Threat Management
Identity and Access Management
Risk Management
Data & Host Security
Cryptography and Public Key Infrastructure (PKI)

Curriculum

Course Details

This course introduces students to cybersecurity fundamental topics that are essential for other diploma’s courses. It introduces cybersecurity terminologies and gives a quick overview of the CIA triad, the usability triangle, The Bell-La Padula Model, Biba model, basic coverage of security attack vectors, threat actors, Pyramid of Pain, Identification and prevention frameworks such as Cyber Kill Chain, phases of attacks frameworks such as the Unified Kill Chain, the Diamond model & MITRE. It offers overview of basic networking concepts, types of networks, and networking devices, underpinned by a dive into the OSI and TCP/IP models. In addition, it covers basic operating systems concepts. On a practical level, the course covers scripting languages useful for other courses such as Python, Linux terminal and BASH scripting, Windows Command line usage and PowerShell.

This course covers threats, attacks and vulnerabilities. The objectives of this course are to ensure that students can understand and explain different types of security compromises, the types of actors involved, and the concepts of penetration testing and vulnerability scanning.

This course provides an overview of encryption techniques. It covers block ciphers and the data encryption standard, finite fields, advanced encryption standard, confidentiality using symmetric encryption, public-key cryptography, key management, hash and MAC algorithms, digital signatures, and authentication applications.

This course covers the fundamentals of ethical hacking and penetration testing. It includes topics such as reconnaissance & Open-Source Intelligence, enumeration, scanning, and a myriad of exploitation & post exploitation techniques, as well as countermeasures to protect systems from threats. It provides hands-on exercises and labs with real-world examples and scenarios. The course introduces many tools & techniques such as port scanners, vulnerability scanners, password cracking, ARP spoofers, keyloggers, backdoors, SQL/Command injection, XSS, CSRF, IDOR, Denial of Service Attacks (DOS), traffic redirection, session hijacking among many others. Students will learn how to set a hacking environment using Kali Linux & will practice penetration testing on a myriad of victim virtual machines. The course covers as well reporting and the ethical aspect of hacking as well as most important legal considerations.

This course focuses on creating Network Administrators who are trained on protecting, detecting and responding to threats on the network. It covers the fundamentals of creating a secure networking environment using firewalls (traditional and next-generation), IDS, IPS, VPNs. Students will know how to use standard security tools to locate and fix security leaks in a computer network and will understand a variety of cryptographic algorithms and protocols underlying network security applications.

This course covers advanced topics in network security such as network virtualization security, cloud and wireless network security and network/traffic indicators of compromise, attacks and exposures. This course also explores the necessary tools, techniques, and concepts of threat intelligence and incident response. It addresses both emerging technologies and research topics.
First Name*
Last Name*
Email*
Phone*
How did you hear about this program? *
Please specify:
Select your preferred way to be contacted*