About Us

About Our

Diploma Degree

This course has collaborated and integrated with Philadelphia University and Green Circle company which is available on the web, through live videos sessions and, virtual labs which each student will be with instructors that respond on the students so, contains important information for students undertaking the Applied Training Diploma in Cyber Security.


Your degree program is subject to regulations contained in the University Students Guide. This departmental handbook interprets the regulations and your tutors may give advice, but the University Students Guide defines the regulations.


The mission of offering this applied diploma is to:

Provide students with the necessary theoretical knowledge, qualifications, and practical applied skills in the field of cyber security.

The preparation of qualified and specialized human personnel in the professions related to analysis, design, development, operation, management, monitoring, and examination of safe systems and software.

Enable students to adapt to future rapid developments in the field of cybersecurity by providing them with solid foundations in their basic concepts, principles, methods, and methodologies. 

Preparing students to serve their communities as individuals, groups, or organizations by ensuring secure information, programs, and applications for them.

Enable students to develop research skills, teamwork, problem-solving, career advancement, and lifelong independent learning.


The preparation of graduates in the field of cyber security, equipped with specialized practical knowledge and skills, and motivated by lifelong learning and the ability to keep up with the requirements of the times

Learning Outcomes

Learning outcomes describe what you should know and be able to do if you make full use of the opportunities for learning that we provide. All these skills are described in the following areas (A, B). In the individual module syllabi, the categories of learning outcomes (A, B) and the individual learning outcomes appropriate to the module are identified.

Knowledge and Understanding

A1) Know and understand the essential mathematics relevant to cybersecurity.

A2) Understand and apply a wide range of principles and tools available to the cyber professional, such as design methodologies, choice of algorithm, and penetration testing techniques.

A3) Know and understand the principles of various current applications and research areas of the subject including artificial intelligence, databases, software engineering, net-centric, and

A4) Know and understand a wide range of software and hardware used to secure systems.

A5) Recognise the professional and ethical responsibilities of the practicing cyber professional including understanding the need for quality, security, and computer ethics.

Intellectual (thinking) skills - able to

B1) analyze a wide range of problems and provide solutions related to the design and configuration of information systems through suitable appropriate methods.

B2) identify a range of solutions and critically evaluate them and justify proposed design solutions.

B3) practice self-learning by using the e-courses.

distributed systems.


As soon as you are enrolled in the Program, a tutor will be assigned for you. This tutor is one of the academic staff members in the Department who will guide and help you throughout your course