Information Technologies Security
Protect digital assets and fight cybercrime. Learn ethical hacking, encryption, network security, and threat analysis. Study cybersecurity frameworks and policies. Train with real-world simulations of cyberattacks and incident response. Use tools like Wireshark, Kali Linux, and Splunk. Gain experience in securing systems, applications, and data. Learn how to conduct vulnerability assessments and penetration testing. Prepare for certifications like CEH or CISSP. Develop critical skills for defending digital infrastructure. Graduate ready to lead in the cybersecurity industry.
Required Documents
Documents Required for Application and Registration:
1- High School Certificate
2- High School Transcript (All Grades)
3- A Copy of the Passport
4- A Personal Photo
5- Valid English Language Certificate (For English Programs / if any)
Accommodation Info
Accommodation Types:
University Halls:
On-campus or nearby
Single rooms with shared facilities (bathrooms, kitchen)
Catered (meals provided) or self-catered
Social activities and support services
Private Halls:
Off-campus, often in purpose-built student accommodation
Similar to university halls, but privately owned and managed
Private Rented Accommodation:
Houses or flats rented from private landlords
Shared or individual rooms
More flexibility but less support

