King Abdullah II School of Information Technology - The University of Jordan -

Program Specifications

Bachelor Of Cybersecurity / Program Overview

  • Background to the program and subject area:  

Cybersecurity program prepares students to become skilled professionals ca​pable of protecting digital assets, securing networks, and defending against evolving cyber threats. The curriculum integrates computer science, information technology, and security principles with a strong emphasis on ethical responsibility and critical thinking.
Students gain hands-on experience in areas such as secure software development, network defense, cryptography, digital forensics, and risk management. The program emphasizes both technical proficiency and strategic decision-making, equipping graduates to address cybersecurity challenges in government, industry, and nonprofit sectors.​

 

  Vision statements of the program:  

To be recognized as a progressive force in cybersecurity education and innovation, empowering the socio-economic and technological advancement of Jordan. We strive to be a national and regional pioneer in developing human capital and knowledge that secures digital transformation, protects communities, and elevates Jordan's role in the global cybersecurity ecosystem.  

 

 Mission statements of the program:  

To foster diverse, creative, and innovative thinkers to become world-class computer experts who drive sustainable development through impactful problem-solving, technological leadership, and entrepreneurial ventures, while actively integrating and adding real-life experience to our educational approach  


  • Student Outcomes:  

  1. Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions.
  2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program's discipline.
  3. Communicate effectively in a variety of professional contexts.
  4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  5. Function effectively as a member or leader of a team engaged in activities appropriate to the program's discipline.
  6. Apply security principles and practices to maintain operations in the presence of risks and threats.