- High school students or those who have not had a chance at the secondary school exam, as well as interested graduates of engineering and information technology.
Cyber security has never been more important, and the demand for qualified cyber security professionals is huge. This conversion course is designed for individuals who don’t have a cybersecurity background but want to pursue a career in this exciting field.
As a Cyber professional it will be your role to create and execute secure network solutions, providing security against cyber-attacks and hackers. You’ll also monitor and test those systems on a regular basis to make sure the systems and networks are updated and working perfectly.
The system of study at Philadelphia University is the course system that depends on the credit hours. Each academic year consists of two semesters and an optional semester (the summer semester). An individual course of lectures is known as a “course unit ” or a “module“. Each module has one or more prerequisite modules. The curriculum contains modules that are from University Requirements, Faculty Requirements, Department Requirements, and Supportive Requirements. Each module has 3 credit hours per week. However, some modules are supported by tutorials and some continuous assessment, such as seminars or laboratory work, usually amounting to 1 hour per week.
Aims, vision, mission, goal, and valueAfter completing this Diploma, you will have gained an understanding of cybersecurity fundamentals and how to protect IT systems from common cyberattacks. During the course you will gain practical experience of applying fundamental Red Team Blue Team cybersecurity. The practical modules will introduce you to exploitation techniques. Each module consists of multiple exercises. At one side, during the Red Team exercises you will be performing an exploit; and, at the other side, during the Blue Team exercises you will be applying preventative measures to prevent that exploit from happening. The initial Red Team exploit can then be repeated to check whether the measures you have put in place have been successful. Aim: The Applied Diploma at Philadelphia University and gives you the opportunity to: • Understand cybersecurity fundamentals and how to protect IT systems from common cyberattacks. • You will gain practical experience of applying fundamental Red Team Blue Team cybersecurity. • Given the increasing need for strong cybersecurity measures and the skills shortage in this area, this course is designed to make you an attractive candidate in this sector. • Develop your capacity to learn and participate in society as competent professionals. • Prepare you for the world of work and develop self-confidence and problem-solving abilities. • Be a graduate who can adapt to changing technology and have the ability to recognize technological and human trends. • Be a graduate who meets the industry standard in cyber security world and have experience in the use of general tools and technologies used in the design and implementation of security. • Provide different study opportunities, which are comparable with national, and international academic qualifications.
The preparation of graduates in the field of cyber security, equipped with specialized practical knowledge and skills, and motivated by lifelong learning and the ability to keep up with the requirements of the times
The mission of offering this applied diploma is to:
Provide students with the necessary theoretical knowledge, qualifications, and practical applied skills in the field of cyber security.
The preparation of qualified and specialized human personnel in the professions related to analysis, design, development, operation, management, monitoring and examination of safe systems and software.
Enable students to adapt to future rapid developments in the field of cyber security by providing them with solid foundations in their basic concepts, principles, methods and methodologies.
Preparing students to serve their communities as individuals, groups or organizations by ensuring secure information, programs and applications for them.
Enable students to develop research skills, teamwork, problem solving, career advancement and lifelong independent learning.
High school students or those who have not had a chance at the secondary school exam, as well as interested graduates of engineering and information technology.Through this course you will develop your ability to implement and manage cyber defences. You will consider technical approaches as well as commercial and human factors which affect how organisations respond to cyber-attacks. Developing these technical skills and knowledge will prepare you to successfully start your cybersecurity career.Learning outcomes describe what you should know and be able to do if you make full use of the opportunities for learning that we provide. All these skills are described in the following areas (A, B, C, and D). In the individual module syllabi, the categories of learning outcomes (A, B, C, and D) and the individual learning outcomes appropriate to the module are identified.
A- Knowledge and Understanding A1) Know and understand the essential mathematics relevant to cyber security. A2) Understand and apply a wide range of principles and tools available to the cyber professional, such as design methodologies, choice of algorithm, and penetration testing techniques. A3) Know and understand the principles of various current applications and research areas of the subject including artificial intelligence, databases, software engineering, net-centric, and A4) Know and understand a wide range of software and hardware used to secure systems. A5) Recognise the professional and ethical responsibilities of the practising cyber professional including understanding the need for quality, security, and computer ethics.
B-Intellectual (thinking) skills – able to B1) analyse a wide range of problems and provide solutions related to the design and configuration of an information systems through suitable appropriate methods. B2) identify a range of solutions and critically evaluate them and justify proposed design solutions. B3) practice self-learning by using the e-courses. distributed systems.The modules described above are those modules we expect to offer in the coming year. However modules may be cancelled if they are chosen by too few students or for other necessary reasons. The portfolio of modules is reviewed every year and the availability of a particular module in the coming year is not a guarantee of availability in subsequent years.High school students or those who have not had a chance at the secondary school exam, as well as interested graduates of engineering and information technology.
Certificates & AccreditationThe certificates are issued by the University of Philadelphia School of Information Technology and certified by the Jordanian Ministry of Higher Education and Scientific Research.1.Certified Ethical Hacker (CEH)CertifiedEthicalHackerCEHwillteachyouthelatestcommercial-gradehacking
professionalstolawfullyhackanorganization.2.Security+Security+ is a global certification that validates the baseline skills necessary to
performcoresecurityfunctionsandpursueanITsecuritycareer.3.Offensive Security Certified Professional – Penetration Testing (OSCP)This online ethical hacking course is self-paced. It introduces penetration testing
tools and techniques via hands-on experience. PWK trains not only the skills, but
also, the mindset required to be a successful penetration tester.4.Certified SOC Analyst (CSA)CSA is a training and credentialing program that helps the candidate acquire
trending and in-demand technical skills through instruction by some of the most
experienced trainers in the industry.