{"id":2790,"date":"2016-04-14T05:34:25","date_gmt":"2016-04-14T05:34:25","guid":{"rendered":"http:\/\/caas.du.edu.om\/?page_id=2790"},"modified":"2026-02-24T05:01:22","modified_gmt":"2026-02-24T05:01:22","slug":"cs-details","status":"publish","type":"page","link":"https:\/\/caas.du.edu.om\/ar\/cs-details\/","title":{"rendered":"\u0642\u0633\u0645 \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0648\u0628 \u0627\u0644\u062a\u0641\u0627\u0635\u064a\u0644"},"content":{"rendered":"<div class=\"u_row\">\n        \t<div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h1 style=\"font-size: 20px;color: #46a5e5;text-align: left\" class=\"vc_custom_heading\" ><\/p>\n<div>\u0642\u0633\u0645 \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0648\u0628<\/div>\n<p><\/h1><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_shadow vc_sep_pos_align_left vc_separator_no_text vc_sep_color_sky\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span  class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span  class=\"vc_sep_line\"><\/span><\/span>\n<\/div><div class=\"vc_tta-container\" data-vc-action=\"collapse\"><div class=\"vc_general vc_tta vc_tta-tabs vc_tta-color-sky vc_tta-style-classic vc_tta-shape-square vc_tta-spacing-1 vc_tta-tabs-position-left vc_tta-controls-align-left vc_tta-controls-size-md\"><div class=\"vc_tta-tabs-container\"><ul class=\"vc_tta-tabs-list\"><li class=\"vc_tta-tab vc_active\" data-vc-tab><a href=\"#1460617216570-ab17eacd-2ba6\" data-vc-tabs data-vc-container=\".vc_tta\"><span class=\"vc_tta-title-text\">\u0627\u0644\u062f\u0631\u062c\u0627\u062a \u0627\u0644\u0645\u0642\u062f\u0645\u0629<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab><a href=\"#1460621159674-6f924fb1-b856\" data-vc-tabs data-vc-container=\".vc_tta\"><span class=\"vc_tta-title-text\">Diploma in Computer Science<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab><a href=\"#1684222666613-a6b83a01-5134\" data-vc-tabs data-vc-container=\".vc_tta\"><span class=\"vc_tta-title-text\">Diploma in Computer Science for Students with Hearing Impairments<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab><a href=\"#1460621573295-14354078-6065\" data-vc-tabs data-vc-container=\".vc_tta\"><span class=\"vc_tta-title-text\">Bachelor in Computer Science<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab><a href=\"#1711603083038-3083a16a-bbd1\" data-vc-tabs data-vc-container=\".vc_tta\"><span class=\"vc_tta-title-text\">Master of Computer Science in Cybersecurity<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab><a href=\"#1460617314704-4efeaec5-62d1\" data-vc-tabs data-vc-container=\".vc_tta\"><span class=\"vc_tta-title-text\">Department Research<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab><a href=\"#1460620481669-99d05d6f-3da3\" data-vc-tabs data-vc-container=\".vc_tta\"><span class=\"vc_tta-title-text\">\u0645\u062a\u0637\u0644\u0628\u0627\u062a<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab><a href=\"#1460617312479-5d947108-03a0\" data-vc-tabs data-vc-container=\".vc_tta\"><span class=\"vc_tta-title-text\">Diploma Plan's of Study (POS)<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab><a href=\"#1461572386443-ef04848e-54b9\" data-vc-tabs data-vc-container=\".vc_tta\"><span class=\"vc_tta-title-text\">Bachelor Plan's of Study (POS)<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab><a href=\"#1606714152779-6a6797a5-eb06\" data-vc-tabs data-vc-container=\".vc_tta\"><span class=\"vc_tta-title-text\">Master Plan's of Study (POS)<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab><a href=\"#1460625247344-fbc153b3-eba7\" data-vc-tabs data-vc-container=\".vc_tta\"><span class=\"vc_tta-title-text\">\u0623\u0639\u0636\u0627\u0621 \u0627\u0644\u0647\u064a\u0626\u0629<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab><a href=\"#1460617311407-10d6bd6c-e158\" data-vc-tabs data-vc-container=\".vc_tta\"><span class=\"vc_tta-title-text\">Facilities &amp; Resources<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab><a href=\"#1460618263889-9ce15277-563a\" data-vc-tabs data-vc-container=\".vc_tta\"><span class=\"vc_tta-title-text\">\u0627\u0644\u0641\u0631\u0635 \u0627\u0644\u0648\u0638\u064a\u0641\u064a\u0629 \u0644\u0644\u062e\u0631\u064a\u062c\u064a\u0646<\/span><\/a><\/li><\/ul><\/div><div class=\"vc_tta-panels-container\"><div class=\"vc_tta-panels\"><div class=\"vc_tta-panel vc_active\" id=\"1460617216570-ab17eacd-2ba6\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1460617216570-ab17eacd-2ba6\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">\u0627\u0644\u062f\u0631\u062c\u0627\u062a \u0627\u0644\u0645\u0642\u062f\u0645\u0629<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>\u0627\u0644\u062f\u0631\u062c\u0627\u062a \u0627\u0644\u0645\u0642\u062f\u0645\u0629<\/h4>\n<p>The department offers the following Diploma, Bachelor, and Master programs:<\/p>\n<ol>\n<li><strong>Diploma<\/strong>\n<ul>\n<li><a href=\"https:\/\/caas.du.edu.om\/cs-details\/#1460621159674-6f924fb1-b856\">Diploma in Computer Science (60 Credits \u2013 2 Years)<\/a><\/li>\n<li><a href=\"https:\/\/caas.du.edu.om\/cs-details\/#1684222666613-a6b83a01-5134\">Diploma in Computer Science for students with Hearing Impairments (60 Credits &#8211; 2 Years)<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>Bachelors<\/strong>\n<ul>\n<li><a href=\"https:\/\/caas.du.edu.om\/cs-details\/#1460621573295-14354078-6065\">Bachelor of Science in Computer Science with specialization in Cybersecurity or Data Science (120 Credits \u2013 4 Years)<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>Masters<\/strong>\n<ul>\n<li><a href=\"https:\/\/caas.du.edu.om\/cs-details\/#1711603083038-3083a16a-bbd1\">Master of Science in Cyber Security (33 Credits \u2013 2 Years)<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>\u064a\u063a\u0637\u064a \u0628\u0631\u0646\u0627\u0645\u062c \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0648\u0628 \u0627\u0644\u0645\u062c\u0627\u0644\u0627\u062a \u0627\u0644\u0622\u062a\u064a\u0629:<\/p>\n<ul>\n<li>\u0627\u0644\u0628\u0631\u0645\u062c\u0629.<\/li>\n<li>\u0642\u0648\u0627\u0639\u062f \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a.<\/li>\n<li>\u0627\u0644\u0634\u0628\u0643\u0627\u062a.<\/li>\n<li>\u0647\u0646\u062f\u0633\u0629 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a.<\/li>\n<li>\u062a\u0635\u0645\u064a\u0645 \u0623\u0646\u0638\u0645\u0629.<\/li>\n<li>\u062a\u0635\u0645\u064a\u0645 \u0627\u0644\u0645\u0648\u0627\u0642\u0639 \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629.<\/li>\n<li>\u0623\u0646\u0638\u0645\u0629 \u0627\u0644\u062a\u0634\u063a\u064a\u0644.<\/li>\n<li>\u0631\u0633\u0648\u0645\u0627\u062a \u0627\u0644\u062d\u0627\u0633\u0648\u0628.<\/li>\n<li>\u0627\u0644\u0630\u0643\u0627\u0621 \u0627\u0644\u0627\u0635\u0637\u0646\u0627\u0639\u064a.<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><div class=\"vc_tta-panel\" id=\"1460621159674-6f924fb1-b856\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1460621159674-6f924fb1-b856\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">Diploma in Computer Science<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Diploma in Computer Science<\/h4>\n<p style=\"text-align: justify;\">The Diploma in Computer Science is a 60-credit-hour program distributed over two years of study.<br \/>\nIt is competency oriented as required by the IT industry standards with emphasis on the following concepts:<\/p>\n<ul>\n<li>\u0645\u0646\u0635\u0627\u062a \u0627\u0644\u0643\u0645\u0628\u064a\u0648\u062a\u0631<\/li>\n<li>\u062a\u062d\u0644\u064a\u0644 \u0627\u0644\u0646\u0638\u0627\u0645<\/li>\n<li>\u0627\u0644\u0628\u0631\u0645\u062c\u0629.<\/li>\n<li>\u062a\u0635\u0645\u064a\u0645 \u0642\u0627\u0639\u062f\u0629 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a<\/li>\n<li>Personal Skills Development<\/li>\n<\/ul>\n<p align=\"justify\">The program strikes a balance between theory and practice. Although it emphasizes practical work,it also covers the theoretical foundations in order to establish adequate links with education at a higher level and keep the students abreast of current knowledge in the field. Students will have hands-on experience with computer hardware, software, and methodologies of software evaluation and development of computer applications with strong emphasis on developing programming skills, including programming for the World Wide Web. In addition, the program follows a modern liberal arts approach by exposing the students to a sound knowledge of general sciences, the arts, study of the Omani culture, mastery of general computing skills, and efficient usage of Arabic and English languages.<\/p>\n<p align=\"justify\">Although the Diploma holders may exit the university education with this degree, they will also have opportunities to continue their education to complete a Bachelor of Science in Computer Science if they satisfy the requirements for admission to that program, then most of the credits successfully completed in the diploma program are transferable to the B.Sc program.<\/p>\n<p align=\"justify\">For the Plan of Study, Click the link below:<br \/>\n<b><a href=\"https:\/\/caas.du.edu.om\/wp-content\/uploads\/2020\/11\/CS-Diploma-POS.pdf\" target=\"_blank\" rel=\"noopener\">Diploma in Computer Science &#8211; Plan of Study<\/a><\/b><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><div class=\"vc_tta-panel\" id=\"1684222666613-a6b83a01-5134\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1684222666613-a6b83a01-5134\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">Diploma in Computer Science for Students with Hearing Impairments<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 style=\"text-align: right;\">Diploma in Computer Science for Students with Hearing Impairments<\/h4>\n<p><img decoding=\"async\" class=\"size-full wp-image-5741 alignright\" src=\"https:\/\/caas.du.edu.om\/wp-content\/uploads\/2024\/12\/Diploma-CS-Student-with-Hearing-Imparements.jpg\" alt=\"\" width=\"595\" height=\"800\" srcset=\"https:\/\/caas.du.edu.om\/wp-content\/uploads\/2024\/12\/Diploma-CS-Student-with-Hearing-Imparements.jpg 595w, https:\/\/caas.du.edu.om\/wp-content\/uploads\/2024\/12\/Diploma-CS-Student-with-Hearing-Imparements-223x300.jpg 223w, https:\/\/caas.du.edu.om\/wp-content\/uploads\/2024\/12\/Diploma-CS-Student-with-Hearing-Imparements-9x12.jpg 9w, https:\/\/caas.du.edu.om\/wp-content\/uploads\/2024\/12\/Diploma-CS-Student-with-Hearing-Imparements-255x343.jpg 255w, https:\/\/caas.du.edu.om\/wp-content\/uploads\/2024\/12\/Diploma-CS-Student-with-Hearing-Imparements-15x20.jpg 15w\" sizes=\"(max-width: 595px) 100vw, 595px\" \/><\/p>\n\n\t\t<\/div>\n\t<\/div>\n    \t<a class=\"btn button-374 btn-primary\" href=\"https:\/\/caas.du.edu.om\/wp-content\/uploads\/2023\/05\/Plan-of-Study-of-Diploma-CS-with-HI.pdf\" data-delay=\"0\"  target=\"_blank\" >\r\n        Download &#8211; Plan of Study&nbsp;&nbsp;<i class=\"fa fa-angle-right\"><\/i>        <\/a>\r\n        \t\t\t<style scoped=\"scoped\">\r\n\t\t\t\t.button-374{\r\n\t\t\t\t\t\t\t\t\t\tbackground-color: #1e73be;\r\n\t\t\t\t\t\t\t\t\t\tborder-color: #1e73be\t\t\t\t}\r\n\t\t\t<\/style>\r\n\t\t<\/div><\/div><div class=\"vc_tta-panel\" id=\"1460621573295-14354078-6065\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1460621573295-14354078-6065\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">Bachelor in Computer Science<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Bachelor in Computer Science<\/h4>\n<ol>\n<li>Bachelor in Computer Science with Specialization in Cybersecurity<\/li>\n<li>Bachelor in Computer Science with Specialization in Data Science<\/li>\n<\/ol>\n<h5><strong><u>Bachelor of Computer Science with Specialization in Cybersecurity<\/u><\/strong><\/h5>\n<p align=\"justify\">The B.Sc in Computer Science with specialization in Cybersecurity is a four-year, 120 Credit Hours program designed to enable its holders to contribute to improving and modernizing the lifestyle and work culture through the computerization and automation of a wide range of processes in the industries and the society. The program content is very much in line with the current standards and guidelines established by the Association of Computing Machinery (ACM).<\/p>\n<p align=\"justify\">To graduate with a Bachelor of Science in Computer Science degree, students must satisfactorily complete the program of study with an overall minimum average of 65 percent, and a cumulative average of 70 percent in all computer science courses.<\/p>\n<p>For the Plan of Study Click the Link below:<\/p>\n<p><b><a href=\"https:\/\/caas.du.edu.om\/wp-content\/uploads\/2024\/11\/POS-CS-Cybersecurity.pdf\">Cyerbsecurity &#8211; Plan of Study<\/a><\/b><\/p>\n<h5><strong><u>Bachelor of Computer Science with Specialization in Data Science<\/u><\/strong><\/h5>\n<p align=\"justify\">The B.Sc in Computer Science with specialization in Data Science is a four-year, 120 Credit Hours program designed to enable its holders to contribute to improving and modernizing the lifestyle and work culture through the computerization and automation of a wide range of processes in the industries and the society. The program content is very much in line with the current standards and guidelines established by the Association of Computing Machinery (ACM).<\/p>\n<p align=\"justify\">To graduate with a Bachelor of Science in Computer Science degree, students must satisfactorily complete the program of study with an overall minimum average of 65 percent, and a cumulative average of 70 percent in all computer science courses.<\/p>\n<p align=\"justify\">For the Plan of Study Click the Link below:<\/p>\n<p><b><a href=\"https:\/\/caas.du.edu.om\/wp-content\/uploads\/2024\/11\/POS-CS-Data-Science.pdf\">Data Science &#8211; Plan of Study<\/a><\/b><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><div class=\"vc_tta-panel\" id=\"1711603083038-3083a16a-bbd1\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1711603083038-3083a16a-bbd1\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">Master of Computer Science in Cybersecurity<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Master of Computer Science in Cybersecurity<\/h4>\n<p align=\"justify\">This is a two-year program consisting of 33 Credit Hours designed and offered by DU to prepare students with undergraduate degrees in technology disciplines for responsible leadership roles in the technology-based and information-based workplaces. The Master of Science in Cybersecurity degree equips technology professionals to assess the security needs of information and network systems and then to manage the implementation and maintenance of the recommended security solutions.<\/p>\n<p><strong><u>\u0634\u0631\u0648\u0637 \u0627\u0644\u0642\u0628\u0648\u0644<\/u><\/strong><br \/>\nAdmission to the Master of science in cybersecurity requires the candidate to have:<\/p>\n<ul>\n<li>A Bachelor\u2019s degree in Computer Science or related domain recognized by MoHERI, Sultanate of Oman<\/li>\n<li>A minimum CGPA with Good score or equivalent in Bachelors in Computer Science or a related domain.<\/li>\n<li>A minimum CGPA of 65% or equivalent could be considered as eligible with a minimum of 2 years of work experience<\/li>\n<li>Have an IELTS score of minimum 6.00 or equivalent.<\/li>\n<\/ul>\n<p>Students with bachelor degree from other majors must study and pass minimum of 4 bridging courses (12 credits) and maximum of 8 (24 credits) bridging courses in Computer Science recommended by the interview panel with a grade not less than C.<\/p>\n<p><strong><u>\u0623\u0647\u062f\u0627\u0641 \u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062c:<\/u><\/strong><\/p>\n<p style=\"text-align: justify;\">The objectives of the Master of Science in Cybersecurity are to:<\/p>\n<ul>\n<li style=\"text-align: justify;\">Develop capability in the students to protect institutional computer systems and networks.<\/li>\n<li style=\"text-align: justify;\">Prepare students to apply, manage and observe cybersecurity technology to ensure the fortification of institutional Information Technology infrastructure.<\/li>\n<li style=\"text-align: justify;\">Inculcate skills in the students to be able to critically recognize, analyze and assess the critical and remedial security breaches and attacks.<\/li>\n<li style=\"text-align: justify;\">Integrate state of the art technology to solve critical issues in the field of Cybersecurity.<\/li>\n<li style=\"text-align: justify;\">Recognize, articulate, and analyse issues in Cybersecurity through latest state of the art tools and techniques applicable in the field.<\/li>\n<li style=\"text-align: justify;\">Rationally manage ethical issues emerging in practiced Cybersecurity undertakings.<\/li>\n<li style=\"text-align: justify;\">Communicate effectively cybersecurity related issues by reporting orally and in written.<\/li>\n<\/ul>\n<p><strong><u>Intended learning outcomes<\/u><\/strong><\/p>\n<ul>\n<li style=\"text-align: justify;\">Demonstrate knowledge of best practices in cybersecurity management.<\/li>\n<li style=\"text-align: justify;\">Understand ethical challenges that confront a cybersecurity professional.<\/li>\n<li style=\"text-align: justify;\">Demonstrate knowledge of the fundamental and advanced concepts of operating systems, networks, and cloud computing.<\/li>\n<li style=\"text-align: justify;\">Demonstrate knowledge of cybersecurity regulatory environment and ethics.<\/li>\n<li style=\"text-align: justify;\">Mitigate and overcome the challenges evolved in Cyber attacks.<\/li>\n<li style=\"text-align: justify;\">Use techniques to guard the institutions security architecture and the data against attack and unlawful access.<\/li>\n<li style=\"text-align: justify;\">Analyse and evaluate networks, cybersecurity problems and apply theoretical principles of computer science and relevant disciplines to find appropriate solutions.<\/li>\n<li style=\"text-align: justify;\">Work independently and collaborate effectively in team.<\/li>\n<li style=\"text-align: justify;\">Communicate effectively, present and write professional reports.<\/li>\n<\/ul>\n<p>For the Plan of Study Click the Link below:<br \/>\n<b><a href=\"https:\/\/caas.du.edu.om\/wp-content\/uploads\/2024\/03\/POS-Cybersecurity.pdf\">Cybersecurity &#8211; Plan of Study<\/a><\/b><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><div class=\"vc_tta-panel\" id=\"1460617314704-4efeaec5-62d1\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1460617314704-4efeaec5-62d1\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">Department Research<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<table width=\"100%\">\n<tbody>\n<tr style=\"width: 100%; background-color: #46a5e5; color: white;\">\n<td width=\"218\">Faculty Name<\/td>\n<td width=\"73\">Ranking<\/td>\n<td width=\"274\">Research link<\/td>\n<\/tr>\n<tr>\n<td width=\"218\">Essam Alnatsheh<\/td>\n<td width=\"73\"><strong>Associate professor<\/strong><\/td>\n<td width=\"274\"><a href=\"https:\/\/scholar.google.com\/citations?user=gr1KnIgAAAAJ&amp;hl=en\">https:\/\/scholar.google.com\/citations?user=gr1KnIgAAAAJ&amp;hl=en<\/a><\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"218\">Biju Sayed<\/td>\n<td width=\"73\"><strong>Associate professor<\/strong><\/td>\n<td width=\"274\"><a href=\"https:\/\/scholar.google.com\/citations?user=wrX6j4kAAAAJ&amp;hl=en\">https:\/\/scholar.google.com\/citations?user=wrX6j4kAAAAJ&amp;hl=en<\/a><\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"218\">Thabit Sabbah<\/td>\n<td width=\"73\"><strong>Associate professor<\/strong><\/td>\n<td width=\"274\"><a href=\"https:\/\/scholar.google.com.my\/citations?user=tX1gppUAAAAJ&amp;hl=en\">https:\/\/scholar.google.com.my\/citations?user=tX1gppUAAAAJ&amp;hl=en<\/a><\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"218\">Hamid Jadad<\/td>\n<td width=\"73\"><strong>Assistant Professor<\/strong><\/td>\n<td width=\"274\"><a href=\"https:\/\/scholar.google.com\/citations?user=poAJooQAAAAJ&amp;hl=ar\">https:\/\/scholar.google.com\/citations?user=poAJooQAAAAJ&amp;hl=ar<\/a><\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"218\">Nurul <span style=\"text-decoration: line-through;\">A<\/span>khmal Mohd Zulkefli<\/td>\n<td width=\"73\"><strong>Assistant Professor<\/strong><\/td>\n<td width=\"274\"><a href=\"https:\/\/scholar.google.com\/citations?user=1BmNxfMAAAAJ&amp;hl=en\">https:\/\/scholar.google.com\/citations?user=1BmNxfMAAAAJ&amp;hl=en<\/a><\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"218\">Mukesh Madanan<\/td>\n<td width=\"73\"><strong>Lecturer<\/strong><\/td>\n<td width=\"274\"><a href=\"https:\/\/scholar.google.com\/citations?user=qSiJ-dwAAAAJ&amp;hl=en\">https:\/\/scholar.google.com\/citations?user=qSiJ-dwAAAAJ&amp;hl=en<\/a><\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"218\">Feras Zen Alden<\/td>\n<td width=\"73\"><strong>Assistant Professor<\/strong><\/td>\n<td width=\"274\"><a href=\"https:\/\/scholar.google.com\/citations?user=3vFaY6EAAAAJ&amp;hl=en\">https:\/\/scholar.google.com\/citations?user=3vFaY6EAAAAJ&amp;hl=en<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><div class=\"vc_tta-panel\" id=\"1460620481669-99d05d6f-3da3\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1460620481669-99d05d6f-3da3\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">\u0645\u062a\u0637\u0644\u0628\u0627\u062a<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 style=\"text-align: center;\">\u062f\u0628\u0644\u0648\u0645 \u0641\u064a \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0648\u0628<\/h4>\n<p><span style=\"text-decoration: underline;\"><strong>\u0645\u062a\u0637\u0644\u0628\u0627\u062a \u0627\u0644\u062a\u062e\u0631\u062c<\/strong><\/span><br \/>\n\u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u062f\u0628\u0644\u0648\u0645 \u0641\u064a \u0639\u0644\u0648\u0645 \u0627\u0644\u0643\u0645\u0628\u064a\u0648\u062a\u0631 \u064a\u062c\u0628 \u0639\u0644\u0649 \u0627\u0644\u0637\u0644\u0627\u0628 \u0625\u0643\u0645\u0627\u0644 60 \u0633\u0627\u0639\u0629 \u0645\u0639\u062a\u0645\u062f\u0629 \u0628\u0634\u0643\u0644 \u0645\u0631\u0636\u064d \u0645\u0648\u0636\u062d\u0629 \u0641\u064a \u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u062f\u0631\u0627\u0633\u0629 \u0628\u0645\u062a\u0648\u0633\u0637 \u0625\u062c\u0645\u0627\u0644\u064a \u0644\u0627 \u064a\u0642\u0644 \u0639\u0646 65 \u0628\u0627\u0644\u0645\u0627\u0626\u0629.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>\u0645\u062a\u0637\u0644\u0628\u0627\u062a \u0627\u0644\u062c\u0627\u0645\u0639\u0629<\/strong><\/span><br \/>\n\u064a\u062c\u0628 \u0639\u0644\u0649 \u0627\u0644\u0637\u0627\u0644\u0628 \u0627\u0644\u0630\u064a \u064a\u062f\u0631\u0633 \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u062f\u0628\u0644\u0648\u0645 \u0641\u064a \u0639\u0644\u0648\u0645 \u0627\u0644\u0643\u0645\u0628\u064a\u0648\u062a\u0631 \u0625\u0643\u0645\u0627\u0644 \u0645\u0627 \u0645\u062c\u0645\u0648\u0639\u0647 24 \u0633\u0627\u0639\u0629 \u0645\u0639\u062a\u0645\u062f\u0629 \u0645\u0646 \u0645\u062a\u0637\u0644\u0628\u0627\u062a \u0627\u0644\u062a\u0639\u0644\u064a\u0645 \u0627\u0644\u0639\u0627\u0645 (\u0627\u0644\u062c\u0627\u0645\u0639\u064a) \u0645\u0648\u0632\u0639\u0629 \u0639\u0644\u0649 \u0627\u0644\u0646\u062d\u0648 \u0627\u0644\u0622\u062a\u064a:<\/p>\n<ul>\n<li>3 \u0633\u0627\u0639\u0627\u062a \u0645\u0639\u062a\u0645\u062f\u0629 \u0644\u0644\u063a\u0629 \u0627\u0644\u0639\u0631\u0628\u064a\u0629: ARAB 101 (\u0627\u0644\u0643\u062a\u0627\u0628\u0629 \u0627\u0644\u0623\u0643\u0627\u062f\u064a\u0645\u064a\u0629 \u0628\u0627\u0644\u0644\u063a\u0629 \u0627\u0644\u0639\u0631\u0628\u064a\u0629).<\/li>\n<li>3 \u0633\u0627\u0639\u0627\u062a \u0645\u0639\u062a\u0645\u062f\u0629 \u0644\u0644\u062f\u0631\u0627\u0633\u0627\u062a \u0627\u0644\u0627\u062c\u062a\u0645\u0627\u0639\u064a\u0629 \u0648\u0627\u0644\u062b\u0642\u0627\u0641\u064a\u0629: SOCS 102 (\u0627\u0644\u0645\u062c\u062a\u0645\u0639 \u0627\u0644\u0639\u0645\u0627\u0646\u064a).<\/li>\n<li>9 \u0633\u0627\u0639\u0627\u062a \u0645\u0639\u062a\u0645\u062f\u0629 \u0645\u0646 \u0645\u0647\u0627\u0631\u0627\u062a \u0627\u0644\u0627\u062a\u0635\u0627\u0644 \u0628\u0627\u0644\u0644\u063a\u0629 \u0627\u0644\u0625\u0646\u062c\u0644\u064a\u0632\u064a\u0629: ENGL 101 (\u0627\u0644\u0644\u063a\u0629 \u0627\u0644\u0625\u0646\u062c\u0644\u064a\u0632\u064a\u0629 \u0627\u0644\u0623\u0643\u0627\u062f\u064a\u0645\u064a\u0629 \u0627\u0644\u0623\u0633\u0627\u0633\u064a\u0629 1) \u060c ENGL 102C (\u0627\u0644\u0644\u063a\u0629 \u0627\u0644\u0625\u0646\u062c\u0644\u064a\u0632\u064a\u0629 \u0644\u0639\u0644\u0648\u0645 \u0627\u0644\u0643\u0645\u0628\u064a\u0648\u062a\u0631 1) \u060c ENGL 203C (\u0627\u0644\u0644\u063a\u0629 \u0627\u0644\u0625\u0646\u062c\u0644\u064a\u0632\u064a\u0629 \u0623\u0648 \u0639\u0644\u0648\u0645 \u0627\u0644\u0643\u0645\u0628\u064a\u0648\u062a\u0631 2).<\/li>\n<li>3 \u0633\u0627\u0639\u0627\u062a \u0645\u0639\u062a\u0645\u062f\u0629 \u0644\u0645\u062d\u0648 \u0627\u0644\u0623\u0645\u064a\u0629 \u0627\u0644\u062d\u0627\u0633\u0648\u0628\u064a\u0629: CMPS 100B (\u0645\u0642\u062f\u0645\u0629 \u0641\u064a \u0627\u0644\u062d\u0648\u0633\u0628\u0629 \u0627\u0644\u062a\u0642\u0646\u064a\u0629 \u0644\u0644\u0639\u0644\u0648\u0645).<\/li>\n<li>3 \u0633\u0627\u0639\u0627\u062a \u0645\u0639\u062a\u0645\u062f\u0629 \u0644\u0631\u064a\u0627\u062f\u0629 \u0627\u0644\u0623\u0639\u0645\u0627\u0644: ENTR 200 (\u0631\u064a\u0627\u062f\u0629 \u0627\u0644\u0623\u0639\u0645\u0627\u0644: \u0627\u0644\u0627\u0628\u062a\u0643\u0627\u0631 \u0648\u0627\u0644\u0625\u0628\u062f\u0627\u0639).<\/li>\n<li>3 \u0633\u0627\u0639\u0627\u062a \u0645\u0639\u062a\u0645\u062f\u0629 \u0644\u0644\u0631\u064a\u0627\u0636\u064a\u0627\u062a: 199 \u0631\u064a\u0627\u0636\u064a\u0627\u062a (\u062d\u0633\u0627\u0628 \u0627\u0644\u062a\u0641\u0627\u0636\u0644 \u0648\u0627\u0644\u062a\u0643\u0627\u0645\u0644 1).<\/li>\n<\/ul>\n<p><span style=\"text-decoration: underline;\"><strong>\u0645\u062a\u0637\u0644\u0628\u0627\u062a \u0627\u0644\u0643\u0644\u064a\u0629<\/strong><\/span><br \/>\n\u064a\u062a\u0645 \u0627\u062e\u062a\u064a\u0627\u0631 \u0645\u0642\u0631\u0631 \u0645\u062f\u062a\u0647 3 \u0633\u0627\u0639\u0627\u062a \u0645\u0639\u062a\u0645\u062f\u0629 \u0645\u0646 \u0623\u064a \u062a\u062e\u0635\u0635 \u0622\u062e\u0631.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>\u0627\u0644\u0645\u0642\u0631\u0631\u0627\u062a \u0627\u0644\u062f\u0631\u0627\u0633\u064a\u0629 \u0627\u0644\u0645\u0637\u0644\u0648\u0628\u0629<\/strong><\/span><br \/>\n\u062a\u062a\u0643\u0648\u0646 \u0645\u062a\u0637\u0644\u0628\u0627\u062a \u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0645\u0646 \u0623\u062d\u062f \u0639\u0634\u0631 \u0645\u0642\u0631\u0631\u0627 \u062a\u0634\u0645\u0644 33 \u0633\u0627\u0639\u0629 \u0645\u0639\u062a\u0645\u062f\u0629 \u0645\u0648\u0632\u0639\u0629 (\u0627\u0646\u0638\u0631 \u062e\u0637\u0629 \u0627\u0644\u062f\u0631\u0627\u0633\u0629 \u0644\u0645\u0632\u064a\u062f \u0645\u0646 \u0627\u0644\u062a\u0641\u0627\u0635\u064a\u0644).<\/p>\n<hr \/>\n<h4 style=\"text-align: center;\">For Bachelor of Computer Science Program<\/h4>\n<p><strong><span style=\"text-decoration: underline;\">\u0645\u062a\u0637\u0644\u0628\u0627\u062a \u0627\u0644\u062a\u062e\u0631\u062c<\/span><\/strong><br \/>\n\u0644\u0644\u062a\u062e\u0631\u062c \u0628\u062f\u0631\u062c\u0629 \u0627\u0644\u0628\u0643\u0627\u0644\u0648\u0631\u064a\u0648\u0633 \u0641\u064a \u0639\u0644\u0648\u0645 \u0627\u0644\u0643\u0645\u0628\u064a\u0648\u062a\u0631 \u064a\u062c\u0628 \u0639\u0644\u0649 \u0627\u0644\u0637\u0644\u0627\u0628 \u0625\u0643\u0645\u0627\u0644 120 \u0633\u0627\u0639\u0629 \u0645\u0639\u062a\u0645\u062f\u0629 \u0628\u0634\u0643\u0644 \u0645\u064f\u0631\u0636\u064d \u0645\u0646 \u0627\u0644\u062f\u0648\u0631\u0627\u062a \u0627\u0644\u062a\u062f\u0631\u064a\u0628\u064a\u0629 \u0627\u0644\u0645\u0648\u0636\u062d\u0629 \u0641\u064a \u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u062f\u0631\u0627\u0633\u0629 \u0628\u0645\u062a\u0648\u0633\u0637 \u0625\u062c\u0645\u0627\u0644\u064a \u0644\u0627 \u064a\u0642\u0644 \u0639\u0646 65 \u0628\u0627\u0644\u0645\u0627\u0626\u0629\u060c \u0648\u0645\u062a\u0648\u0633\u0637 \u062a\u0631\u0627\u0643\u0645\u064a 70 \u0628\u0627\u0644\u0645\u0627\u0626\u0629 \u0641\u064a \u0627\u0644\u0645\u0642\u0631\u0631\u0627\u062a \u0627\u0644\u0631\u0626\u064a\u0633\u064a\u0629.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>\u0645\u062a\u0637\u0644\u0628\u0627\u062a \u0627\u0644\u062c\u0627\u0645\u0639\u0629<\/strong><\/span><br \/>\n\u062a\u0634\u0645\u0644 \u0645\u062a\u0637\u0644\u0628\u0627\u062a \u0627\u0644\u062a\u0639\u0644\u064a\u0645 \u0627\u0644\u0639\u0627\u0645 \u0644\u0644\u0628\u0643\u0627\u0644\u0648\u0631\u064a\u0648\u0633 \u0627\u0644\u0645\u0642\u0631\u0631\u0627\u062a \u0627\u0644\u0639\u0634\u0631 \u0627\u0644\u0622\u062a\u064a\u0629 \u0627\u0644\u062a\u064a \u062a\u062a\u0643\u0648\u0646 \u0645\u0646 30 \u0633\u0627\u0639\u0629 \u0645\u0639\u062a\u0645\u062f\u0629: (\u0639\u0631\u0636 POS \u0644\u0645\u0632\u064a\u062f \u0645\u0646 \u0627\u0644\u062a\u0641\u0627\u0635\u064a\u0644).<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>\u0645\u062a\u0637\u0644\u0628\u0627\u062a \u0627\u0644\u0643\u0644\u064a\u0629<\/strong><\/span><br \/>\n\u062a\u062a\u0643\u0648\u0646 \u0647\u0630\u0647 \u0627\u0644\u0645\u062c\u0645\u0648\u0639\u0629 \u0645\u0646 \u0623\u0631\u0628\u0639\u0629 \u0645\u0642\u0631\u0631\u0627\u062a \u062a\u062a\u0643\u0648\u0646 \u0645\u0646 12 \u0633\u0627\u0639\u0629 \u0645\u0639\u062a\u0645\u062f\u0629 \u0643\u062d\u062f \u0623\u062f\u0646\u0649 \u0645\u0648\u0632\u0639\u0629 \u0639\u0644\u0649 \u0627\u0644\u0646\u062d\u0648 \u0627\u0644\u0622\u062a\u064a:<\/p>\n<ul>\n<li>\u0645\u0642\u0631\u0631 \u0641\u064a \u0627\u0644\u0639\u0644\u0648\u0645 \u0627\u0644\u0641\u064a\u0632\u064a\u0627\u0626\u064a\u0629 \/ \u0627\u0644\u0637\u0628\u064a\u0639\u064a\u0629 \u0627\u0644\u0627\u062e\u062a\u064a\u0627\u0631\u064a\u0629<\/li>\n<li>\u0645\u0642\u0631\u0631 \u0641\u064a \u0627\u0644\u0645\u0648\u0627\u062f \u0627\u0644\u0627\u062e\u062a\u064a\u0627\u0631\u064a\u0629 \u0627\u0644\u0627\u062c\u062a\u0645\u0627\u0639\u064a\u0629 \/ \u0627\u0644\u0625\u0646\u0633\u0627\u0646\u064a\u0629<\/li>\n<li>\u0645\u0642\u0631\u0631\u0627\u0646  \u0641\u064a \u0623\u064a \u062a\u062e\u0635\u0635\u0627\u062a \u0623\u062e\u0631\u0649.<\/li>\n<\/ul>\n<p><span style=\"text-decoration: underline;\"><strong>\u0627\u0644\u0645\u0642\u0631\u0631\u0627\u062a \u0627\u0644\u062f\u0631\u0627\u0633\u064a\u0629 \u0627\u0644\u0645\u0637\u0644\u0648\u0628\u0629<\/strong><\/span><br \/>\n\u062a\u062a\u0643\u0648\u0646 \u0647\u0630\u0647 \u0627\u0644\u0645\u062c\u0645\u0648\u0639\u0629 \u0645\u0646 25 \u0645\u0642\u0631\u0631 \u0639\u0628\u0627\u0631\u0629 \u0639\u0646 78 \u0633\u0627\u0639\u0629 \u0645\u0639\u062a\u0645\u062f\u0629<\/p>\n<hr \/>\n<h4 style=\"text-align: center;\">For Master of Science in Cybersecurity<\/h4>\n<p>There are two exit routes:<\/p>\n<ol>\n<li><strong>M.Sc in Cybersecurity (Industrial project)<\/strong><\/li>\n<\/ol>\n<p>8 core course (3 credits each) + 2 Major Electives (3 credit each) + Industrial Project (3 credits) = Total 33 credits<\/p>\n<ol start=\"2\">\n<li><strong>M.Sc in Cybersecurity (Comprehensive exam)<\/strong><\/li>\n<\/ol>\n<p>9 core course (3 credits each) + 2 Major Electives (3 credit each) + Comprehensive Exam (0 credit) = Total 33 credits<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><div class=\"vc_tta-panel\" id=\"1460617312479-5d947108-03a0\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1460617312479-5d947108-03a0\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">Diploma Plan's of Study (POS)<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><h4 style=\"text-align: left;font-family:Arimo;font-weight:400;font-style:normal\" class=\"vc_custom_heading\" >\u062f\u0628\u0644\u0648\u0645 \u0641\u064a \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0648\u0628<\/h4><div class=\"vc_btn3-container vc_btn3-left\" ><a class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-icon-left vc_btn3-color-green\" href=\"https:\/\/caas.du.edu.om\/wp-content\/uploads\/2020\/11\/CS-Diploma-POS.pdf\" title=\"CS POS\" target=\"_blank\" rel=\"nofollow\"><i class=\"vc_btn3-icon fa fa-download\"><\/i> Click here to download Plan of Study<\/a><\/div><h4 style=\"text-align: left;font-family:Arimo;font-weight:400;font-style:normal\" class=\"vc_custom_heading\" >Diploma Program in Computer Science for Students with Hearing Impairment<\/h4><div class=\"vc_btn3-container vc_btn3-left\" ><a class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-icon-left vc_btn3-color-green\" href=\"https:\/\/caas.du.edu.om\/wp-content\/uploads\/2023\/05\/Plan-of-Study-of-Diploma-CS-with-HI.pdf\" title=\"CS POS\" target=\"_blank\" rel=\"nofollow\"><i class=\"vc_btn3-icon\"><\/i> Click here to download Plan of Study<\/a><\/div><\/div><\/div><div class=\"vc_tta-panel\" id=\"1461572386443-ef04848e-54b9\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1461572386443-ef04848e-54b9\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">Bachelor Plan's of Study (POS)<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><h2 style=\"text-align: left;font-family:Arimo;font-weight:400;font-style:normal\" class=\"vc_custom_heading\" >For Bachelor in Computer Science<\/h2><div class=\"vc_btn3-container vc_btn3-left\" ><a class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-icon-left vc_btn3-color-green\" href=\"https:\/\/caas.du.edu.om\/wp-content\/uploads\/2020\/11\/CS-Bachelor-POS.pdf\" title=\"Bachelor POS\" target=\"_blank\" rel=\"nofollow\"><i class=\"vc_btn3-icon fa fa-download\"><\/i> Click here to download Plan of Study<\/a><\/div><div class=\"vc_btn3-container vc_btn3-left\" ><a class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-icon-left vc_btn3-color-green\" href=\"https:\/\/caas.du.edu.om\/wp-content\/uploads\/2024\/11\/POS-CS-Cybersecurity.pdf\" title=\"Bachelor in Cybersecurity POS\" target=\"_blank\" rel=\"nofollow\"><i class=\"vc_btn3-icon fas fa-download\"><\/i> For Bachelor in Cybersecurity<\/a><\/div><div class=\"vc_btn3-container vc_btn3-left\" ><a class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-icon-left vc_btn3-color-green\" href=\"https:\/\/caas.du.edu.om\/wp-content\/uploads\/2024\/11\/POS-CS-Data-Science.pdf\" title=\"For Bachelor in Data Science and Artificial Intelligence  POS\" target=\"_blank\" rel=\"nofollow\"><i class=\"vc_btn3-icon fas fa-download\"><\/i> For Bachelor in Data Science and Artificial Intelligence<\/a><\/div><\/div><\/div><div class=\"vc_tta-panel\" id=\"1606714152779-6a6797a5-eb06\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1606714152779-6a6797a5-eb06\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">Master Plan's of Study (POS)<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><h4 style=\"text-align: left;font-family:Arimo;font-weight:700;font-style:normal\" class=\"vc_custom_heading\" >For Master of Science Cybersecurity<\/h4><div class=\"vc_btn3-container vc_btn3-left\" ><a class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-icon-left vc_btn3-color-green\" href=\"https:\/\/caas.du.edu.om\/wp-content\/uploads\/2024\/03\/POS-Cybersecurity.pdf\" title=\"Master POS\" target=\"_blank\" rel=\"nofollow\"><i class=\"vc_btn3-icon\"><\/i> Click here to download Plan of Study<\/a><\/div><\/div><\/div><div class=\"vc_tta-panel\" id=\"1460625247344-fbc153b3-eba7\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1460625247344-fbc153b3-eba7\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">\u0623\u0639\u0636\u0627\u0621 \u0627\u0644\u0647\u064a\u0626\u0629<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Click on the following link to view faculty &amp; staff of Department of Computer Science.<\/strong><\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/apex.oracle.com\/pls\/apex\/r\/du\/dhofar-university-staff\/college-of-arts-and-applied-sciences\" target=\"_blank\" rel=\"noopener noreferrer\">Faculty &amp; Staff of Department of Computer Science<\/a><\/strong><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><div class=\"vc_tta-panel\" id=\"1460617311407-10d6bd6c-e158\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1460617311407-10d6bd6c-e158\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">Facilities &amp; Resources<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4><strong>\u0627\u0644\u0645\u0643\u0627\u062a\u0628<\/strong><\/h4>\n<p style=\"text-align: justify;\">After the successful completion of the new building which offered much more space, the department increased in size and acquired more teaching and learning resources. The new building increased the Computer Science department\u2019s space to about three times. All the faculty members are provided with their own office rooms which are well equipped with all the modern facilities. The Department secretary is also provided with an office to increase productivity.<\/p>\n<h4><strong>\u0627\u0644\u0642\u0627\u0639\u0627\u062a \u0648\u0627\u0644\u0645\u062e\u062a\u0628\u0631\u0627\u062a<\/strong><\/h4>\n<p><strong>Classrooms: Common classroom building<\/strong><\/p>\n<p>The common classroom building contains numerous classrooms equipped with overhead projectors and a personal computer to serve the education needs of the DU community. The College of Arts and Applied Sciences and specifically the Department of Computer Science may use this facility as and when feasible.<\/p>\n<p>These seven computer labs are specifically designated for the use of the Department of Computer Science in the College of Arts and Applied Sciences building. A dedicated room for students with disabilities has also been established in September 2021.<\/p>\n<p><strong>Computer Labs<\/strong><\/p>\n<p>Computer labs are equipped with 130 computers.<\/p>\n<p>The College of Arts and Applied Science (CAAS) has initiated a renovation process of computer labs by upgrading the memory and replacing the existing hard disks with SSD which shall significantly enhance their performance. Furthermore, CAAS has ordered 16 new iMac computers for the immersive technology lab.<\/p>\n<p><strong>Computer Labs: CAAS 101C, CAAS 102C, CAAS 103C, CAAS 104C, CAAS 105C and 108C<\/strong><\/p>\n<p>These six computer labs are specifically designated for the use of the Department of Computer Science in the College of Arts and Applied Sciences building. A dedicated room for students with disabilities has also been established in September 2021.<\/p>\n<p><strong>Specialized computer labs: CAAS 107C, CAAS 131C, CAAS 106C<\/strong><\/p>\n<p>Three specialized computer labs are provided to cover the needs of Dhofar University students, staff as well as the local community to conduct the necessary training and extracurricular activities and avail of state-of-the-art hardware and software resources. These labs are:<\/p>\n<ul>\n<li>Networks and Cybersecurity Lab<\/li>\n<li>Immersive Technology Lab<\/li>\n<li>Robotics Lab<\/li>\n<\/ul>\n<p><strong>Software(s): Computer labs<\/strong><\/p>\n<p>Win7 professional operating system, office 2007\/2010. The college has started upgrading the operating system as well as the software packages to Windows 10.<\/p>\n<p>Others:<\/p>\n<ul>\n<li>Java JDK and NetBeans<\/li>\n<li>Visual Studio C ++<\/li>\n<li>MySQL<\/li>\n<li>\u0623\u0648\u0628\u0648\u0646\u062a\u0648 \u0644\u064a\u0646\u0643\u0633<\/li>\n<li>Microsoft Visual FoxPro<\/li>\n<li>\u0645\u0627\u064a\u0643\u0631\u0648\u0633\u0648\u0641\u062a \u0641\u064a\u062c\u0648\u0627\u0644 \u0628\u064a\u0633\u0643<\/li>\n<li>\u0644\u0627\u0632\u0627\u0631\u0648\u0633 (\u0641\u0631\u064a \u0628\u0627\u0633\u0643\u0627\u0644)<\/li>\n<li>\u0628\u0631\u0646\u0627\u0645\u062c Adobe Dreamweaver<\/li>\n<li>Adobe Flash Professional<\/li>\n<li>\u0645\u0627\u064a\u0643\u0631\u0648\u0633\u0648\u0641\u062a \u0623\u0648\u0641\u064a\u0633<\/li>\n<li>Xampp<\/li>\n<\/ul>\n<p><strong>Hardware(s): Computer labs<\/strong><\/p>\n<p>Intel Core i5 CPU with 3.3GHZ, 4GB RAM, 500GB\/1TB HD, and DVD\/R<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><div class=\"vc_tta-panel\" id=\"1460618263889-9ce15277-563a\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1460618263889-9ce15277-563a\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">\u0627\u0644\u0641\u0631\u0635 \u0627\u0644\u0648\u0638\u064a\u0641\u064a\u0629 \u0644\u0644\u062e\u0631\u064a\u062c\u064a\u0646<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Graduates of the Computer Science program will have many career choices spanning a wide range of fields. Most notable are: computing and communication industries, investment banks and financial institutions, global defense and aerospace, management and computing consultancies, research laboratories, media industries, data science, artificial intelligence (AI), and cybersecurity sectors. Graduates will have employment opportunities in almost any enterprise as system analysts and designers, trainers, instructors, system engineers, programmers, database developers and managers, network managers, and computer science consultants. The continuing expansion of the use of computers in commercial and financial operations means employment opportunities in diverse industries.<\/p>\n<p><strong>Emerging Fields:<\/strong><\/p>\n<p><strong>Data Science:<\/strong><\/p>\n<ul>\n<li>Data Analysts, Data Engineers, and Data Scientists<\/li>\n<li>Business Intelligence Analysts<\/li>\n<li>Machine Learning Engineers working on predictive analytics<\/li>\n<li>Big Data Specialists managing large-scale data infrastructures (e.g., Hadoop, Spark)<\/li>\n<li>Data Visualization Experts who turn complex data into actionable insights<\/li>\n<\/ul>\n<p><strong>Artificial Intelligence (AI):<\/strong><\/p>\n<ul>\n<li>AI Engineers developing intelligent systems for automation and decision-making<\/li>\n<li>Natural Language Processing (NLP) Specialists working with chatbots, virtual assistants, and language models<\/li>\n<li>Computer Vision Engineers focusing on image recognition, facial recognition, and AR\/VR applications<\/li>\n<li>Robotics Engineers designing AI-powered robots and autonomous systems<\/li>\n<li>AI Ethics Consultants focusing on responsible and fair AI development<\/li>\n<\/ul>\n<p><strong>Cybersecurity:<\/strong><\/p>\n<ul>\n<li>Security Analysts monitoring and detecting cyber threats<\/li>\n<li>Ethical Hackers (Penetration Testers) identifying system vulnerabilities<\/li>\n<li>Cybersecurity Architects designing secure networks and infrastructures<\/li>\n<li>Information Security Officers (CISO) managing enterprise security strategies<\/li>\n<li>Incident Response Specialists leading investigations and recovery from cyberattacks<\/li>\n<li>Threat Intelligence Analysts tracking emerging security threats<\/li>\n<\/ul>\n<p>Graduates can also explore innovative fields such as the gaming industry, virtual reality, multimedia applications, computer animations, internet support and development, as well as many other related industries. With the rise of AI-driven solutions and cybersecurity challenges, computer science professionals are at the forefront of shaping future technologies and ensuring digital safety across sectors.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>    \t\t\t<\/div><!--\/u_row-->","protected":false},"excerpt":{"rendered":"Department of Computer Science (CS) Degrees OfferedDiploma in Computer ScienceDiploma in Computer Science for Students with Hearing ImpairmentsBachelor in Computer ScienceMaster of Computer Science in CybersecurityDepartment ResearchRequirementsDiploma Plan's of Study (POS)Bachelor Plan's of Study (POS)Master Plan's of Study (POS)Faculty &amp; StaffFacilities &amp; ResourcesCareer OpportunitiesDegrees Offered Degrees Offered The department offers the following Diploma, Bachelor, and [...]","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2790","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/caas.du.edu.om\/ar\/wp-json\/wp\/v2\/pages\/2790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/caas.du.edu.om\/ar\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/caas.du.edu.om\/ar\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/caas.du.edu.om\/ar\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/caas.du.edu.om\/ar\/wp-json\/wp\/v2\/comments?post=2790"}],"version-history":[{"count":75,"href":"https:\/\/caas.du.edu.om\/ar\/wp-json\/wp\/v2\/pages\/2790\/revisions"}],"predecessor-version":[{"id":5862,"href":"https:\/\/caas.du.edu.om\/ar\/wp-json\/wp\/v2\/pages\/2790\/revisions\/5862"}],"wp:attachment":[{"href":"https:\/\/caas.du.edu.om\/ar\/wp-json\/wp\/v2\/media?parent=2790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}