Get in Touch

For more information about master’s degree programs and scholarships offered, the application procedure, or to receive brochures, please complete the form below:

Get in Touch

For more information about master’s degree programs and scholarships offered, the application procedure, or to receive brochures, please complete the form below:

Solve security challenges in the latest technologies through research and innovation.


Admission is Open for Spring 2025

Get in Touch

For more information about master’s degree programs and scholarships offered, the application procedure, or to receive brochures, please complete the form below:

Download Program Brochures

Please provide us with your details to download the master’s degree program brochures.

Solve security challenges in the latest technologies through research and innovation.

Admission is open for Spring 2024

Get in Touch

For more information about master’s degree programs and scholarships offered, the application procedure, or to receive brochures, please complete the form below:

Download Program Brochures

Please provide us with your details to download the master’s degree program brochures.

Solve security challenges in the latest technologies through research and innovation.

Admission is Open for Spring 2025

Get in Touch

For more information about master’s degree programs and scholarships offered, the application procedure, or to receive brochures, please complete the form below:

Download Program Brochures

Please provide us with your details to download the master’s degree program brochures.

Master of Science in Information

Technology (Cyber Security)

College of Technological Innovation

Acquire the knowledge and develop the skills and expertise to become proficient in the areas of network/internet security, database security, digital forensics, ethical hacking, information security management and cyber-criminal behavior.

Get in Touch

For more information about master’s degree programs and scholarships offered, the application procedure, or to receive brochures, please complete the form below:

Get in Touch

To schedule an appointment with the graduate student recruitment and admissions team or request a campus visit, please complete the form below:

Key Facts

Program Duration

4 Semesters (On Average)

Location

Abu Dhabi and Dubai

Language of Instruction

English

Credit Hours

30

Cost Per Credit Hour

AED 3,200

Application Deadline

9 December 2024

Key Facts

Program Structure and Content

Year One
Year Two

SEC601 Research Methods

SEC605 Information Security

SEC610 Information Security, Policy, Ethics and Law

SEC615 Network and Internet Security

SEC630 Cyber Forensics

SEC620 Information Security Management

SEC638 Small Scale Digital Device Forensics

SEC675 Cyber Criminal Behavior

SEC699 Research Thesis

SEC699 Research Thesis

Students have the option to choose between a thesis and a non-thesis study track. In both tracks, students complete a set of security courses.

Thesis Study Track

Students choosing the thesis study track will gain essential research skills to support their academic careers.

SEC699 Research Thesis

SEC699 Research Thesis

Non-Thesis Study Track

Students choosing the non-thesis study track will enrich their cyber security skills from the technical and management perspectives.

SEC640 Database and Enterprise Application Security

SEC645 Penetration Testing and Advanced Hacking Techniques

Download the Study Plan

Please provide us with your details to download the study plan.

Meet the Program Conveners

Dr Hussein Fakhry

Associate Professor

Chair, Department of Computing and Applied Technology

College of Technological Innovation

Dr Asad Khattak

Professor

Graduate Program Coordinator

College of Technological Innovation

What Will You Learn?

Upon successful completion of this program, you will be able to:

What Will You Learn?

Upon successful completion of the program, you will be able to:

Who Should Pursue a Master of Science in Information Technology (Cyber Security)?

Job seekers with bachelor's degrees who want to enter the workforce after graduation.

Mid-career professionals who want to make a career change, use the degree for career advancement, enhance their skills in their current positions or pursue a doctoral degree.

Admission Requirements

Admission is open to males and females of all nationalities. Applicants must have earned a four-year baccalaureate degree with a CGPA of 3.0 (or 2.5 for conditional admission) or higher from an accredited university and demonstrate sufficient English proficiency to manage a challenging, fast-paced graduate program. An admissions interview is required.

Career Opportunities

Graduates can find employment as information security experts in a variety of upper-level positions in organizations such as information security management, cyber security specialist, network/internet security specialist, digital forensic analyst and information security analyst.

Additional employment opportunities include the following areas:

Secure Web-Based e-Services

Financial Institutions

Information Security Audit/Consultancy Firms

Data Analyst/Scientist

Government Organizations (Where National Security Needs are A Priority)

Who Should Pursue a Master of Science in Information Technology (Cyber Security)?

Job seekers with bachelor's degrees who want to enter the workforce after graduation.

Mid-career professionals who want to make a career change, use the degree for career advancement, enhance their skills in their current positions or pursue a doctoral degree.

Admission Requirements

Admission is open to males and females of all nationalities. Applicants must have earned a four-year baccalaureate degree with a CGPA of 3.0 (or 2.5 for conditional admission) or higher from an accredited university and demonstrate sufficient English proficiency to manage a challenging, fast-paced graduate program. An admissions interview is required.

Career Opportunities

Graduates can find employment as information security experts in a variety of upper-level positions in organizations such as information security management, cyber security specialist, network/internet security specialist, digital forensic analyst and information security analyst.

Additional employment opportunities include the following areas:

Secure Web-Based e-Services

Financial Institutions

Information Security Audit/Consultancy Firms

Data Analyst/Scientist

Government Organizations (Where National Security Needs are A Priority)

3 Reasons Why You Should Choose Zayed University’s College of Technological Innovation

Accreditation and Recognition

National and international accreditation will guarantee you a globally recognized graduate degree.

Rigor and Research

The combination of research-oriented and strong skill-based components will provide you with advanced theoretical knowledge and practice based learning that is focused on employability.

Financial Support Options

Teaching and research assistantships will help you develop vital skills and give you the opportunity to network with experts that will expand your professional experience in your field of interest.

3 Reasons Why You Should Choose Zayed University’s

College of Business

Why Should You Pursue a Master of Science in Information Technology (Cyber Security)?


Get in Touch

For more information about master’s degree programs and scholarships offered, the application procedure, or to receive brochures, please complete the form below:

Graduate Blog

Discover Financial Support Options

Please provide us with your details to view the financial support options.

Deanship of Graduate Studies

Zayed University Abu Dhabi & Dubai, United Arab Emirates

Website

www.zu.ac.ae

Accredited by


Copyright @ 2024 Zayed University / Privacy Policy