Target audiences
- High school students or those who have not had a chance at the secondary school exam, as well as interested graduates of engineering and information technology.
PROGRAMME OVERVIEW
Cyber security has never been more important, and the demand for qualified cyber security professionals is huge. This conversion course is designed for individuals who don’t have a cybersecurity background but want to pursue a career in this exciting field.
As a Cyber professional it will be your role to create and execute secure network solutions, providing security against cyber-attacks and hackers. You’ll also monitor and test those systems on a regular basis to make sure the systems and networks are updated and working perfectly.
Program Structure
The system of study at Philadelphia University is the course system that depends on the credit hours. Each academic year consists of two semesters and an optional semester (the summer semester). An individual course of lectures is known as a “course unit ” or a “module“. Each module has one or more prerequisite modules. The curriculum contains modules that are from University Requirements, Faculty Requirements, Department Requirements, and Supportive Requirements. Each module has 3 credit hours per week. However, some modules are supported by tutorials and some continuous assessment, such as seminars or laboratory work, usually amounting to 1 hour per week.
Aims, vision, mission, goal, and value
After completing this Diploma, you will have gained an understanding of cybersecurity fundamentals and how to protect IT systems from common cyberattacks. During the course you will gain practical experience of applying fundamental Red Team Blue Team cybersecurity. The practical modules will introduce you to exploitation techniques. Each module consists of multiple exercises. At one side, during the Red Team exercises you will be performing an exploit; and, at the other side, during the Blue Team exercises you will be applying preventative measures to prevent that exploit from happening. The initial Red Team exploit can then be repeated to check whether the measures you have put in place have been successful. Aim: The Applied Diploma at Philadelphia University and gives you the opportunity to: • Understand cybersecurity fundamentals and how to protect IT systems from common cyberattacks. • You will gain practical experience of applying fundamental Red Team Blue Team cybersecurity. • Given the increasing need for strong cybersecurity measures and the skills shortage in this area, this course is designed to make you an attractive candidate in this sector. • Develop your capacity to learn and participate in society as competent professionals. • Prepare you for the world of work and develop self-confidence and problem-solving abilities. • Be a graduate who can adapt to changing technology and have the ability to recognize technological and human trends. • Be a graduate who meets the industry standard in cyber security world and have experience in the use of general tools and technologies used in the design and implementation of security. • Provide different study opportunities, which are comparable with national, and international academic qualifications.
Vision:
The preparation of graduates in the field of cyber security, equipped with specialized practical knowledge and skills, and motivated by lifelong learning and the ability to keep up with the requirements of the times
Mission:
The mission of offering this applied diploma is to:
Provide students with the necessary theoretical knowledge, qualifications, and practical applied skills in the field of cyber security.
The preparation of qualified and specialized human personnel in the professions related to analysis, design, development, operation, management, monitoring and examination of safe systems and software.
Enable students to adapt to future rapid developments in the field of cyber security by providing them with solid foundations in their basic concepts, principles, methods and methodologies.
Preparing students to serve their communities as individuals, groups or organizations by ensuring secure information, programs and applications for them.
Enable students to develop research skills, teamwork, problem solving, career advancement and lifelong independent learning.
Certificates & Accreditation
The certificates are issued by the University of Philadelphia School of Information Technology and certified by the Jordanian Ministry of Higher Education and Scientific Research.1.Certified Ethical Hacker (CEH)CertifiedEthicalHackerCEHwillteachyouthelatestcommercial-gradehacking
tools,techniques,andmethodologiesusedbyhackersandinformationsecurity
professionalstolawfullyhackanorganization.2.Security+Security+ is a global certification that validates the baseline skills necessary to
performcoresecurityfunctionsandpursueanITsecuritycareer.3.Offensive Security Certified Professional – Penetration Testing (OSCP)This online ethical hacking course is self-paced. It introduces penetration testing
tools and techniques via hands-on experience. PWK trains not only the skills, but
also, the mindset required to be a successful penetration tester.4.Certified SOC Analyst (CSA)CSA is a training and credentialing program that helps the candidate acquire
trending and in-demand technical skills through instruction by some of the most
experienced trainers in the industry.