{"id":27949,"date":"2025-02-15T12:01:26","date_gmt":"2025-02-15T08:01:26","guid":{"rendered":"https:\/\/buc.edu.om\/?page_id=27949"},"modified":"2025-09-10T18:07:40","modified_gmt":"2025-09-10T14:07:40","slug":"bachelor-cyber-security-pos","status":"publish","type":"page","link":"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/software-engineering-program\/bachelor-cyber-security-pos\/","title":{"rendered":"\u0627\u0644\u062e\u0637\u0629 \u0627\u0644\u062f\u0631\u0627\u0633\u064a\u0629 \u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u0628\u0643\u0627\u0644\u0648\u0631\u064a\u0648\u0633 \u0641\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a"},"content":{"rendered":"<section class=\"l-section wpb_row us_custom_c45606ef height_small\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_6df4bc3a has_text_color\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: center;\">\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a<\/h3>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_2f58e7cb has_text_color\"><div class=\"wpb_wrapper\"><h4 style=\"text-align: center;\">B.Sc.Bachelor Cyber Security Plan of Study<\/h4>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_baaa7a21 height_huge width_custom\" style=\"--site-content-width:1280px;\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1-2 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container type_sticky\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_980bc58e has_text_color\"><div class=\"wpb_wrapper\"><h4 style=\"text-align: center;\">\u0646\u0638\u0631\u0647 \u0639\u0627\u0645\u0647<\/h4>\n<\/div><\/div><div class=\"wpb_wmca_accordion_wrapper wpb_wmca_accordion_wrapper_22151 wpb_wmca_accordion_wrapper_theme_dark wpb_wmca_accordion_indicator_position_right wpb_wmca_depth_spacing_no wpb_wmca_keyboard_accessibility_no wpb_wmca_control_max_height_no wpb_wmca_accordion_has_click_effect\" ><div class=\"wpb_wmca_accordion_inner\"><div class=\"wpb_wmca_accordion_shortcode_22151 wpb_wmca_fire_accordion wpb_the_menu_accordion wpb_wmca_menu_107 wpb_category_n_menu_accordion wpb_wmca_theme_dark wpb_wcma_manu_parent_open_off wpb_wcma_all_level_manu_open_off wpb_wmca_current_menu_open_on wpb_wmca_jc_submenu_no\" data-accordion=\"true\" data-save=\"true\" data-close_on_esc=\"false\" data-duration=\"400\" data-trigger=\"click\" data-indicator_icon=\"fas fa-plus\">\n\t<ul id=\"menu-it-menu\" class=\"wpb_category_n_menu_accordion_list\"><li id='menu-item-22138'  class=\"menu-item menu-item-type-post_type menu-item-object-page wpb-wmca-menu-item-has-children\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/\">\u0642\u0633\u0645 \u062a\u0642\u0646\u064a\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a<\/a> \n<ul class=\"sub-menu\">\n<li id='menu-item-22139'  class=\"menu-item menu-item-type-post_type menu-item-object-page wpb-wmca-menu-item-has-children\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/information-system-program\/\">\u0628\u0631\u0646\u0627\u0645\u062c \u0646\u0638\u0645 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a<\/a> \n\t<ul class=\"sub-menu\">\n<li id='menu-item-22140'  class=\"menu-item menu-item-type-post_type menu-item-object-page\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/information-system-program\/is-aims-learning-outcomes\/\">\u0623\u0647\u062f\u0627\u0641 \u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0648\u0645\u062e\u0631\u062c\u0627\u062a \u0627\u0644\u062a\u0639\u0644\u0645<\/a> <\/li>\n<li id='menu-item-22131'  class=\"menu-item menu-item-type-post_type menu-item-object-page\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/information-system-program\/bachelor-information-system-pos\/\">\u0627\u0644\u062e\u0637\u0629 \u0627\u0644\u062f\u0631\u0627\u0633\u064a\u0629 \u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u0628\u0643\u0627\u0644\u0648\u0631\u064a\u0648\u0633 \u0641\u064a \u0623\u0646\u0638\u0645\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a<\/a> <\/li>\n<li id='menu-item-22130'  class=\"menu-item menu-item-type-post_type menu-item-object-page\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/information-system-program\/adv-diploma-information-system-pos\/\">\u0627\u0644\u062e\u0637\u0629 \u0627\u0644\u062f\u0631\u0627\u0633\u064a\u0629 \u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u062f\u0628\u0644\u0648\u0645 \u0627\u0644\u0645\u062a\u0642\u062f\u0645 \u0641\u064a \u0623\u0646\u0638\u0645\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a<\/a> <\/li>\n<li id='menu-item-22132'  class=\"menu-item menu-item-type-post_type menu-item-object-page\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/information-system-program\/diploma-information-system-pos\/\">\u0627\u0644\u062e\u0637\u0629 \u0627\u0644\u062f\u0631\u0627\u0633\u064a\u0629 \u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u062f\u0628\u0644\u0648\u0645 \u0641\u064a \u0623\u0646\u0638\u0645\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a<\/a> <\/li>\n\t<\/ul>\n<\/li>\n<li id='menu-item-22137'  class=\"menu-item menu-item-type-post_type menu-item-object-page wpb-wmca-menu-item-has-children\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/computer-science-program\/\">\u0628\u0631\u0646\u0627\u0645\u062c \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0628<\/a> \n\t<ul class=\"sub-menu\">\n<li id='menu-item-22238'  class=\"menu-item menu-item-type-post_type menu-item-object-page\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/computer-science-program\/cs-aims-learning-outcomes\/\">\u0623\u0647\u062f\u0627\u0641 \u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0648\u0645\u062e\u0631\u062c\u0627\u062a \u0627\u0644\u062a\u0639\u0644\u0645<\/a> <\/li>\n<li id='menu-item-22134'  class=\"menu-item menu-item-type-post_type menu-item-object-page\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/computer-science-program\/bachelor-computer-science-pos\/\">\u0627\u0644\u062e\u0637\u0629 \u0627\u0644\u062f\u0631\u0627\u0633\u064a\u0629 \u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u0628\u0643\u0627\u0644\u0648\u0631\u064a\u0648\u0633 \u0641\u064a \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0628<\/a> <\/li>\n<li id='menu-item-22133'  class=\"menu-item menu-item-type-post_type menu-item-object-page\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/computer-science-program\/adv-diploma-computer-science-pos\/\">\u0627\u0644\u062e\u0637\u0629 \u0627\u0644\u062f\u0631\u0627\u0633\u064a\u0629 \u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u062f\u0628\u0644\u0648\u0645 \u0627\u0644\u0645\u062a\u0642\u062f\u0645 \u0641\u064a \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0628<\/a> <\/li>\n<li id='menu-item-22135'  class=\"menu-item menu-item-type-post_type menu-item-object-page\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/computer-science-program\/diploma-computer-science-pos\/\">\u0627\u0644\u062e\u0637\u0629 \u0627\u0644\u062f\u0631\u0627\u0633\u064a\u0629 \u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u062f\u0628\u0644\u0648\u0645 \u0641\u064a \u0639\u0644\u0648\u0645 \u0627\u0644\u062d\u0627\u0633\u0628<\/a> <\/li>\n\t<\/ul>\n<\/li>\n<li id='menu-item-22143'  class=\"menu-item menu-item-type-post_type menu-item-object-page wpb-wmca-menu-item-has-children\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/software-engineering-program\/\">\u0628\u0631\u0646\u0627\u0645\u062c \u0647\u0646\u062f\u0633\u0629 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a<\/a> \n\t<ul class=\"sub-menu\">\n<li id='menu-item-22144'  class=\"menu-item menu-item-type-post_type menu-item-object-page\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/software-engineering-program\/se-programm-aims-learning-outcomes\/\">\u0623\u0647\u062f\u0627\u0641 \u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0648\u0645\u062e\u0631\u062c\u0627\u062a \u0627\u0644\u062a\u0639\u0644\u0645<\/a> <\/li>\n<li id='menu-item-22136'  class=\"menu-item menu-item-type-post_type menu-item-object-page\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/software-engineering-program\/bachelor-software-engineering-pos\/\">\u0627\u0644\u062e\u0637\u0629 \u0627\u0644\u062f\u0631\u0627\u0633\u064a\u0629 \u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u0628\u0643\u0627\u0644\u0648\u0631\u064a\u0648\u0633 \u0641\u064a \u0647\u0646\u062f\u0633\u0629 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a<\/a> <\/li>\n\t<\/ul>\n<\/li>\n<li id='menu-item-27943'  class=\"menu-item menu-item-type-post_type menu-item-object-page wpb-wmca-menu-item-has-children\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/artificial-intelligence-program\/\">\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u0630\u0643\u0627\u0621 \u0627\u0644\u0627\u0635\u0637\u0646\u0627\u0639\u064a (AI)<\/a> \n\t<ul class=\"sub-menu\">\n<li id='menu-item-27932'  class=\"menu-item menu-item-type-post_type menu-item-object-page\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/software-engineering-program\/bachelor-artificial-intelligence-pos\/\">\u0627\u0644\u062e\u0637\u0629 \u0627\u0644\u062f\u0631\u0627\u0633\u064a\u0629 \u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u0628\u0643\u0627\u0644\u0648\u0631\u064a\u0648\u0633 \u0641\u064a \u0627\u0644\u0630\u0643\u0627\u0621 \u0627\u0644\u0627\u0635\u0637\u0646\u0627\u0639\u064a<\/a> <\/li>\n\t<\/ul>\n<\/li>\n<li id='menu-item-27947'  class=\"menu-item menu-item-type-post_type menu-item-object-page wpb-wmca-menu-item-has-children\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/cyber-security-program\/\">\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a<\/a> \n\t<ul class=\"sub-menu\">\n<li id='menu-item-27954'  class=\"menu-item menu-item-type-post_type menu-item-object-page\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/software-engineering-program\/bachelor-cyber-security-pos\/\">\u0627\u0644\u062e\u0637\u0629 \u0627\u0644\u062f\u0631\u0627\u0633\u064a\u0629 \u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u0628\u0643\u0627\u0644\u0648\u0631\u064a\u0648\u0633 \u0641\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a<\/a> <\/li>\n\t<\/ul>\n<\/li>\n<li id='menu-item-22142'  class=\"menu-item menu-item-type-post_type menu-item-object-page\"><a  href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/information-technology-faculty-members\/\">\u0627\u0639\u0636\u0627\u0621 \u0627\u0644\u0647\u064a\u0626\u0629 \u0627\u0644\u0623\u0643\u0627\u062f\u064a\u0645\u064a\u0629<\/a> <\/li>\n<\/ul>\n<\/li>\n<\/ul><\/div>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p><strong><a href=\"#cgrc\">I. \u0645\u062a\u0637\u0644\u0628\u0627\u062a \u0627\u0644\u0643\u0644\u064a\u0629 \u0627\u0644\u0639\u0627\u0645\u0629 (21 \u0633\u0627\u0639\u0629 \u0645\u0639\u062a\u0645\u062f\u0629) \u0625\u062c\u0628\u0627\u0631\u064a\u0629.<\/a><\/strong><\/p>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p><strong><a href=\"#cgrc\">II. \u0645\u062a\u0637\u0644\u0628\u0627\u062a \u0627\u0644\u0642\u0633\u0645 (63 \u0633\u0627\u0639\u0629 \u0645\u0639\u062a\u0645\u062f\u0629) \u0625\u062c\u0628\u0627\u0631\u064a\u0629<\/a><\/strong><\/p>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p><strong><a href=\"#cgrc\">III. \u0645\u062a\u0637\u0644\u0628\u0627\u062a \u0627\u0644\u0642\u0633\u0645 (12 \u0633\u0627\u0639\u0629 \u0645\u0639\u062a\u0645\u062f\u0629) \u0627\u062e\u062a\u064a\u0627\u0631\u064a\u0629<\/a><\/strong><\/p>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p><strong><a href=\"#mrc\">III. Major Requirements (30 Credits Hours) Compulsory :<\/a><\/strong><\/p>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h4>B.Sc Cyber Security Plan of Study<\/h4>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column\" id=\"cgrc\"><div class=\"wpb_wrapper\"><h4>I. \u0645\u062a\u0637\u0644\u0628\u0627\u062a \u0627\u0644\u0643\u0644\u064a\u0629 \u0627\u0644\u0639\u0627\u0645\u0629 (21 \u0633\u0627\u0639\u0629 \u0645\u0639\u062a\u0645\u062f\u0629) \u0625\u062c\u0628\u0627\u0631\u064a\u0629<\/h4>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"w-html\"><html>\n<head>\n<style>\ntable {\n  border-collapse: collapse;\n  width: 100%;\n}\n\nth, td {\n  padding: 8px;\n  text-align: left;\n  border-bottom: 1px solid #ddd;\n}\n\ntr:hover {background-color: #b6b6b4;}\n<\/style>\n<\/head>\n<body>\n\n<table>\n  <tr style=\"margin:0;padding:0;background-color:#4682b4; color:#fafafa\">\n    <th>\u0627\u0644\u062a\u0633\u0644\u0633\u0644<\/th>\n    <th>\u0631\u0645\u0632 \u0627\u0644\u0645\u0633\u0627\u0642<\/th>\n    <th>\u0639\u0646\u0648\u0627\u0646 \u0627\u0644\u062f\u0648\u0631\u0629<\/th>\n    <th style=\"text-align: center;\">\u0627\u0644\u0633\u0627\u0639\u0627\u062a \u0627\u0644\u0645\u0639\u062a\u0645\u062f\u0629<\/th>\n    <th style=\"text-align: center;\">\u0627\u0644\u0645\u062a\u0637\u0644\u0628 \u0627\u0644\u0633\u0627\u0628\u0642<\/th>\n  <\/tr>\n  <tr>\n    <td>1.<\/td>\n    <td>BCGE001<\/td>\n    <td style=\"text-align: left;\">\u0627\u0644\u0644\u063a\u0629 \u0627\u0644\u0639\u0631\u0628\u064a\u0629<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\"><\/td>\n  <\/tr>\n  <tr>\n    <td>2.<\/td>\n    <td>BCGE002<\/td>\n    <td style=\"text-align: left;\">\u0627\u0644\u062b\u0642\u0627\u0641\u0629 \u0627\u0644\u0623\u0633\u0644\u0627\u0645\u064a\u0629<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\"><\/td>\n  <\/tr>\n  <tr>\n    <td>3.<\/td>\n    <td>BCGE003<\/td>\n    <td style=\"text-align: left;\">Oman the State and Human<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\"><\/td>\n  <\/tr>\n  <tr>\n    <td>4.<\/td>\n    <td>COMP100<\/td>\n    <td style=\"text-align: left;\">Computers: Their Impact  and use<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\"><\/td>\n  <\/tr>\n  <tr>\n    <td>5.<\/td>\n    <td>ENGL002<\/td>\n    <td style=\"text-align: left;\">General English<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\"><\/td>\n  <\/tr>\n  <tr>\n    <td>6.<\/td>\n    <td>BCGE004<\/td>\n    <td style=\"text-align: left;\">Study Skills<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\"><\/td>\n  <\/tr>\n  <tr>\n    <td>7.<\/td>\n    <td>BCGE009<\/td>\n    <td style=\"text-align: left;\">\u0631\u064a\u0627\u062f\u0629 \u0627\u0644\u0623\u0639\u0645\u0627\u0644 <\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\"><\/td>\n  <\/tr>\n<\/table>\n\n<\/body>\n<\/html><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column\" id=\"drc\"><div class=\"wpb_wrapper\"><h4>II. \u0645\u062a\u0637\u0644\u0628\u0627\u062a \u0627\u0644\u0642\u0633\u0645 (63 \u0633\u0627\u0639\u0629 \u0645\u0639\u062a\u0645\u062f\u0629) \u0625\u062c\u0628\u0627\u0631\u064a\u0629<\/h4>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"w-html\"><html>\n<head>\n<style>\ntable {\n  border-collapse: collapse;\n  width: 100%;\n}\n\nth, td {\n  padding: 8px;\n  text-align: center;\n  border-bottom: 1px solid #ddd;\n}\n\ntr:hover {background-color: #b6b6b4;}\n<\/style>\n<\/head>\n<body>\n\n<table>\n  <tr style=\"margin:0;padding:0;background-color:#4682b4; color:#fafafa\">\n    <th>\u0627\u0644\u062a\u0633\u0644\u0633\u0644<\/th>\n    <th>\u0631\u0645\u0632 \u0627\u0644\u0645\u0633\u0627\u0642<\/th>\n    <th>\u0639\u0646\u0648\u0627\u0646 \u0627\u0644\u062f\u0648\u0631\u0629<\/th>\n    <th style=\"text-align: center;\">\u0627\u0644\u0633\u0627\u0639\u0627\u062a \u0627\u0644\u0645\u0639\u062a\u0645\u062f\u0629<\/th>\n    <th style=\"text-align: center;\">\u0627\u0644\u0645\u062a\u0637\u0644\u0628 \u0627\u0644\u0633\u0627\u0628\u0642<\/th>\n  <\/tr>\n  <tr>\n    <td>1.<\/td>\n    <td>BCGE006<\/td>\n    <td style=\"text-align: left;\">Research Methodology<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\"><\/td>\n  <\/tr>\n  <tr>\n    <td>2.<\/td>\n    <td>COMP112<\/td>\n    <td style=\"text-align: left;\">Advanced Machine Learning<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\"><\/td>\n  <\/tr>\n  <tr>\n    <td>3.<\/td>\n    <td>COMP113<\/td>\n    <td style=\"text-align: left;\">Intelligance in Data Mining<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP112<\/td>\n  <\/tr>\n  <tr>\n    <td>4.<\/td>\n    <td>COMP123<\/td>\n    <td style=\"text-align: left;\">Advanced Human-AI Interaction<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP112<\/td>\n  <\/tr>\n  <tr>\n    <td>5.<\/td>\n    <td>COMP182<\/td>\n    <td style=\"text-align: left;\">Introduction to Operating Systems and Systems Architecture<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP113<\/td>\n  <\/tr>\n  <tr>\n    <td>6.<\/td>\n    <td>COMP241<\/td>\n    <td style=\"text-align: left;\">Programming with Java<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">IS431<\/td>\n  <\/tr>\n  <tr>\n    <td>7.<\/td>\n    <td>COMP242<\/td>\n    <td style=\"text-align: left;\"> Introduction to Web Development<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP113<\/td>\n  <\/tr>\n  <tr>\n    <td>8.<\/td>\n    <td>COMP322<\/td>\n    <td style=\"text-align: left;\">Introduction to Operating Systems and Systems Architecture<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP123<\/td>\n  <\/tr>\n  <tr>\n    <td>9.<\/td>\n    <td>COMP377<\/td>\n    <td style=\"text-align: left;\">Programming with Python<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP113<\/td>\n  <\/tr>\n  <tr>\n    <td>10.<\/td>\n    <td>COMP380<\/td>\n    <td style=\"text-align: left;\">Introduction To Software Engineering<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">-<\/td>\n  <\/tr>\n  <tr>\n    <td>11.<\/td>\n    <td>COMP424<\/td>\n    <td style=\"text-align: left;\">Computer System Security<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">IS435<\/td>\n  <\/tr>\n  <tr>\n    <td>12.<\/td>\n    <td>COMP490<\/td>\n    <td style=\"text-align: left;\"> Senior Project<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">-<\/td>\n  <\/tr>  \n  <tr>\n    <td>13.<\/td>\n    <td>ENGL030<\/td>\n    <td style=\"text-align: left;\">Technical Writing 2 (for IT)<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">-<\/td>\n  <\/tr>  \n  <tr>\n    <td>14.<\/td>\n    <td>ENGL004<\/td>\n    <td style=\"text-align: left;\">Technical Writing 1 (for IT)<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">ENGL002<\/td>\n  <\/tr>\n  <tr>\n    <td>15.<\/td>\n    <td>ENGL030<\/td>\n    <td style=\"text-align: left;\">Technical Writing 2 (for IT)<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">ENGL004<\/td>\n  <\/tr>\n  <tr>\n    <td>16.<\/td>\n    <td>IS431<\/td>\n    <td style=\"text-align: left;\">Systems Analysis and Design<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP113<\/td>\n  <\/tr>\n  <tr>\n    <td>17.<\/td>\n    <td>IS435<\/td>\n    <td style=\"text-align: left;\">Communication and Networking<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP123<\/td>\n  <\/tr>\n  <tr>\n    <td>18.<\/td>\n    <td>MATH152<\/td>\n    <td style=\"text-align: left;\">Discrete Mathematics<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">MATH153<\/td>\n  <\/tr>\n  <tr>\n    <td>19.<\/td>\n    <td>MATH326<\/td>\n    <td style=\"text-align: left;\">Basic Business Statistics<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">MATH153<\/td>\n  <\/tr>\n<\/table>\n\n<\/body>\n<\/html><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column\" id=\"drc\"><div class=\"wpb_wrapper\"><h4>Department Requirements (Elective) Select 12 Cr (CybS Electives)<\/h4>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"w-html\"><html>\n<head>\n<style>\ntable {\n  border-collapse: collapse;\n  width: 100%;\n}\n\nth, td {\n  padding: 8px;\n  text-align: center;\n  border-bottom: 1px solid #ddd;\n}\n\ntr:hover {background-color: #b6b6b4;}\n<\/style>\n<\/head>\n<body>\n\n<table>\n  <tr style=\"margin:0;padding:0;background-color:#4682b4; color:#fafafa\">\n    <th>\u0627\u0644\u062a\u0633\u0644\u0633\u0644<\/th>\n    <th>\u0631\u0645\u0632 \u0627\u0644\u0645\u0633\u0627\u0642<\/th>\n    <th>\u0639\u0646\u0648\u0627\u0646 \u0627\u0644\u062f\u0648\u0631\u0629<\/th>\n    <th style=\"text-align: center;\">\u0627\u0644\u0633\u0627\u0639\u0627\u062a \u0627\u0644\u0645\u0639\u062a\u0645\u062f\u0629<\/th>\n    <th style=\"text-align: center;\">\u0627\u0644\u0645\u062a\u0637\u0644\u0628 \u0627\u0644\u0633\u0627\u0628\u0642<\/th>\n  <\/tr>\n  <tr>\n    <td>1.<\/td>\n    <td>COMP106<\/td>\n    <td style=\"text-align: left;\">Visual Programming<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP112<\/td>\n  <\/tr>\n  <tr>\n    <td>2.<\/td>\n    <td>COMP381<\/td>\n    <td style=\"text-align: left;\">Open Source Software Engineering<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">IS441<\/td>\n  <\/tr>\n  <tr>\n    <td>3.<\/td>\n    <td>COMP410<\/td>\n    <td style=\"text-align: left;\">Data Mining<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\"is441><\/td>\n  <\/tr>\n  <tr>\n    <td>4.<\/td>\n    <td>COMP412<\/td>\n    <td style=\"text-align: left;\">Machine Learning<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">SOM120<\/td>\n  <\/tr>\n  <tr>\n    <td>5.<\/td>\n    <td>COMP478<\/td>\n    <td style=\"text-align: left;\">Advanced Software Engineering<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP387<\/td>\n  <\/tr>\n  <tr>\n    <td>6.<\/td>\n    <td>COMP485<\/td>\n    <td style=\"text-align: left;\">Human-Computer Interaction<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP380<\/td>\n  <\/tr>\n  <tr>\n    <td>7.<\/td>\n    <td>CS317<\/td>\n    <td style=\"text-align: left;\">Operating System Administration<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP322<\/td>\n  <\/tr>\n  <tr>\n    <td>8.<\/td>\n    <td>CS413<\/td>\n    <td style=\"text-align: left;\"> Network Infrastructure<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">IS435<\/td>\n  <\/tr>\n  <tr>\n    <td>9.<\/td>\n    <td>CS456<\/td>\n    <td style=\"text-align: left;\">Cloud Computing Security<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP242<\/td>\n  <\/tr>\n  <tr>\n    <td>10.<\/td>\n    <td>CS461<\/td>\n    <td style=\"text-align: left;\"> Advanced Cyber Defense<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">CS372<\/td>\n  <\/tr>\n  <tr>\n    <td>11.<\/td>\n    <td>CS474<\/td>\n    <td style=\"text-align: left;\">Advanced Ethical Hacking<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">CS339<\/td>\n  <\/tr>\n  <tr>\n    <td>12.<\/td>\n    <td>CS482<\/td>\n    <td style=\"text-align: left;\"> Cyber security Policies<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">CS317<\/td>\n  <\/tr>  \n  <tr>\n    <td>13.<\/td>\n    <td>IS441<\/td>\n    <td style=\"text-align: left;\">Database Management Systems<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP241<\/td>\n  <\/tr>  \n  <tr>\n    <td>14.<\/td>\n    <td>IS457<\/td>\n    <td style=\"text-align: left;\">Advanced Telecommunication And Networking<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">IS435<\/td>\n  <\/tr> \n  <tr>\n    <td>15.<\/td>\n    <td>SOM485<\/td>\n    <td style=\"text-align: left;\"> Decision Support System<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP241<\/td>\n  <\/tr>\n<\/table>\n\n<\/body>\n<\/html><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column\" id=\"mrc\"><div class=\"wpb_wrapper\"><h4>III. :Major Requirements (Compulsory) 30 CR:<\/h4>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"w-html\"><html>\n<head>\n<style>\ntable {\n  border-collapse: collapse;\n  width: 100%;\n}\n\nth, td {\n  padding: 8px;\n  text-align: center;\n  border-bottom: 1px solid #ddd;\n}\n\ntr:hover {background-color: #b6b6b4;}\n<\/style>\n<\/head>\n<body>\n\n<table>\n  <tr style=\"margin:0;padding:0;background-color:#4682b4; color:#fafafa\">\n    <th>\u0627\u0644\u062a\u0633\u0644\u0633\u0644<\/th>\n    <th>\u0631\u0645\u0632 \u0627\u0644\u0645\u0633\u0627\u0642<\/th>\n    <th>\u0639\u0646\u0648\u0627\u0646 \u0627\u0644\u062f\u0648\u0631\u0629<\/th>\n    <th style=\"text-align: center;\">\u0627\u0644\u0633\u0627\u0639\u0627\u062a \u0627\u0644\u0645\u0639\u062a\u0645\u062f\u0629<\/th>\n    <th style=\"text-align: center;\">\u0627\u0644\u0645\u062a\u0637\u0644\u0628 \u0627\u0644\u0633\u0627\u0628\u0642<\/th>\n  <\/tr>\n  <tr>\n    <td>1.<\/td>\n    <td>CS300<\/td>\n    <td style=\"text-align: left;\">Intro to Cyber Security<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP123<\/td>\n  <\/tr>\n  <tr>\n    <td>2.<\/td>\n    <td>CS302<\/td>\n    <td style=\"text-align: left;\">Cyber Security Threats and Risk Analysis<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">CS300<\/td>\n  <\/tr>\n  <tr>\n    <td>3.<\/td>\n    <td>CS303<\/td>\n    <td style=\"text-align: left;\">Cyber Security Ethics<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">CS300<\/td>\n  <\/tr>\n  <tr>\n    <td>4.<\/td>\n    <td>CS304<\/td>\n    <td style=\"text-align: left;\">Cryptographic Algorithms and Protocols<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">CS300<\/td>\n  <\/tr>\n  <tr>\n    <td>5.<\/td>\n    <td>CS304<\/td>\n    <td style=\"text-align: left;\">Web Application Security and Testing<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">CS302<\/td>\n  <\/tr>\n  <tr>\n    <td>6.<\/td>\n    <td>CS305<\/td>\n    <td style=\"text-align: left;\">Ethical Hacking<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">CS300-<\/td>\n  <\/tr>\n  <tr>\n    <td>7.<\/td>\n    <td>CS372<\/td>\n    <td style=\"text-align: left;\">Cyber Defense<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">CS317<\/td>\n  <\/tr>\n  <tr>\n    <td>8.<\/td>\n    <td>CS406<\/td>\n    <td style=\"text-align: left;\">Digital Forensics<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">CS372<\/td>\n  <\/tr>\n  <tr>\n    <td>9.<\/td>\n    <td>CS416<\/td>\n    <td style=\"text-align: left;\">Cyber Security Management<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">CS339<\/td>\n  <\/tr>\n  <tr>\n    <td>10.<\/td>\n    <td>CS428<\/td>\n    <td style=\"text-align: left;\">Mobile and Wireless Security<\/td>\n    <td style=\"text-align: center;\">3<\/td>\n    <td style=\"text-align: center;\">COMP424<\/td>\n  <\/tr>\n<\/table>\n\n<\/body>\n<\/html><\/div><\/div><\/div><\/div><\/div><\/section>","protected":false},"excerpt":{"rendered":"Cyber Security Program B.Sc.Bachelor Cyber Security Plan of Study OVERVIEW Information Technology Department Information System Program Programme Aims &#038; Learning Outcomes Bachelor Information System POS ADV Information System POS Diploma Information System POS Computer Science Program Programme Aims &#038; Learning Outcomes Bachelor Computer Science POS ADV-Diploma Computer Science POS Diploma Computer Science POS Software Engineering...","protected":false},"author":19,"featured_media":0,"parent":19265,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-27949","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Bachelor Cyber Security POS - BUC<\/title>\n<meta name=\"description\" content=\"Bachelor Cyber Security POS BUC -\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/software-engineering-program\/bachelor-cyber-security-pos\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bachelor Cyber Security POS - BUC\" \/>\n<meta property=\"og:description\" content=\"Bachelor Cyber Security POS BUC -\" \/>\n<meta property=\"og:url\" content=\"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/software-engineering-program\/bachelor-cyber-security-pos\/\" \/>\n<meta property=\"og:site_name\" content=\"BUC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=100063702033637\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-10T14:07:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/buc.edu.om\/wp-content\/uploads\/2021\/06\/logo-buc-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"416\" \/>\n\t<meta property=\"og:image:height\" content=\"100\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@bucnewss\" \/>\n<meta name=\"twitter:label1\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u062f\u0642\u064a\u0642\u0629 \u0648\u0627\u062d\u062f\u0629\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/buc.edu.om\/academics\/information-technology\/software-engineering-program\/bachelor-cyber-security-pos\/\",\"url\":\"https:\/\/buc.edu.om\/academics\/information-technology\/software-engineering-program\/bachelor-cyber-security-pos\/\",\"name\":\"Bachelor Cyber Security POS - BUC\",\"isPartOf\":{\"@id\":\"https:\/\/buc.edu.om\/#website\"},\"datePublished\":\"2025-02-15T08:01:26+00:00\",\"dateModified\":\"2025-09-10T14:07:40+00:00\",\"description\":\"Bachelor Cyber Security POS BUC -\",\"breadcrumb\":{\"@id\":\"https:\/\/buc.edu.om\/academics\/information-technology\/software-engineering-program\/bachelor-cyber-security-pos\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/buc.edu.om\/academics\/information-technology\/software-engineering-program\/bachelor-cyber-security-pos\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/buc.edu.om\/academics\/information-technology\/software-engineering-program\/bachelor-cyber-security-pos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/buc.edu.om\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Academics\",\"item\":\"https:\/\/buc.edu.om\/academics\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Technology Department\",\"item\":\"https:\/\/buc.edu.om\/academics\/information-technology\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Software Engineering Program\",\"item\":\"https:\/\/buc.edu.om\/academics\/information-technology\/software-engineering-program\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Bachelor Cyber Security POS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/buc.edu.om\/#website\",\"url\":\"https:\/\/buc.edu.om\/\",\"name\":\"BUC - Al Buraimi University College\",\"description\":\"Al Buraimi University College\",\"publisher\":{\"@id\":\"https:\/\/buc.edu.om\/#organization\"},\"alternateName\":\"buc\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/buc.edu.om\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/buc.edu.om\/#organization\",\"name\":\"Al Buraimi University College\",\"alternateName\":\"Al Buraimi College\",\"url\":\"https:\/\/buc.edu.om\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/buc.edu.om\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/buc.edu.om\/wp-content\/uploads\/2023\/07\/buc_logo.jpg\",\"contentUrl\":\"https:\/\/buc.edu.om\/wp-content\/uploads\/2023\/07\/buc_logo.jpg\",\"width\":512,\"height\":512,\"caption\":\"Al Buraimi University College\"},\"image\":{\"@id\":\"https:\/\/buc.edu.om\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=100063702033637\",\"https:\/\/x.com\/bucnewss\",\"https:\/\/www.instagram.com\/bucnewss\/?hl=en\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bachelor Cyber Security POS - BUC","description":"Bachelor Cyber Security POS BUC -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/software-engineering-program\/bachelor-cyber-security-pos\/","og_locale":"ar_AR","og_type":"article","og_title":"Bachelor Cyber Security POS - BUC","og_description":"Bachelor Cyber Security POS BUC -","og_url":"https:\/\/buc.edu.om\/ar\/academics\/information-technology\/software-engineering-program\/bachelor-cyber-security-pos\/","og_site_name":"BUC","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=100063702033637","article_modified_time":"2025-09-10T14:07:40+00:00","og_image":[{"width":416,"height":100,"url":"https:\/\/buc.edu.om\/wp-content\/uploads\/2021\/06\/logo-buc-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@bucnewss","twitter_misc":{"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"\u062f\u0642\u064a\u0642\u0629 \u0648\u0627\u062d\u062f\u0629"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/buc.edu.om\/academics\/information-technology\/software-engineering-program\/bachelor-cyber-security-pos\/","url":"https:\/\/buc.edu.om\/academics\/information-technology\/software-engineering-program\/bachelor-cyber-security-pos\/","name":"Bachelor Cyber Security POS - BUC","isPartOf":{"@id":"https:\/\/buc.edu.om\/#website"},"datePublished":"2025-02-15T08:01:26+00:00","dateModified":"2025-09-10T14:07:40+00:00","description":"Bachelor Cyber Security POS BUC -","breadcrumb":{"@id":"https:\/\/buc.edu.om\/academics\/information-technology\/software-engineering-program\/bachelor-cyber-security-pos\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/buc.edu.om\/academics\/information-technology\/software-engineering-program\/bachelor-cyber-security-pos\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/buc.edu.om\/academics\/information-technology\/software-engineering-program\/bachelor-cyber-security-pos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/buc.edu.om\/"},{"@type":"ListItem","position":2,"name":"Academics","item":"https:\/\/buc.edu.om\/academics\/"},{"@type":"ListItem","position":3,"name":"Information Technology Department","item":"https:\/\/buc.edu.om\/academics\/information-technology\/"},{"@type":"ListItem","position":4,"name":"Software Engineering Program","item":"https:\/\/buc.edu.om\/academics\/information-technology\/software-engineering-program\/"},{"@type":"ListItem","position":5,"name":"Bachelor Cyber Security POS"}]},{"@type":"WebSite","@id":"https:\/\/buc.edu.om\/#website","url":"https:\/\/buc.edu.om\/","name":"BUC - Al Buraimi University College","description":"\u0643\u0644\u064a\u0629 \u0627\u0644\u0628\u0631\u064a\u0645\u064a \u0627\u0644\u062c\u0627\u0645\u0639\u064a\u0629","publisher":{"@id":"https:\/\/buc.edu.om\/#organization"},"alternateName":"buc","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/buc.edu.om\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/buc.edu.om\/#organization","name":"\u0643\u0644\u064a\u0629 \u0627\u0644\u0628\u0631\u064a\u0645\u064a \u0627\u0644\u062c\u0627\u0645\u0639\u064a\u0629","alternateName":"Al Buraimi College","url":"https:\/\/buc.edu.om\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/buc.edu.om\/#\/schema\/logo\/image\/","url":"https:\/\/buc.edu.om\/wp-content\/uploads\/2023\/07\/buc_logo.jpg","contentUrl":"https:\/\/buc.edu.om\/wp-content\/uploads\/2023\/07\/buc_logo.jpg","width":512,"height":512,"caption":"Al Buraimi University College"},"image":{"@id":"https:\/\/buc.edu.om\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=100063702033637","https:\/\/x.com\/bucnewss","https:\/\/www.instagram.com\/bucnewss\/?hl=en"]}]}},"_links":{"self":[{"href":"https:\/\/buc.edu.om\/ar\/wp-json\/wp\/v2\/pages\/27949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/buc.edu.om\/ar\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/buc.edu.om\/ar\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/buc.edu.om\/ar\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/buc.edu.om\/ar\/wp-json\/wp\/v2\/comments?post=27949"}],"version-history":[{"count":1,"href":"https:\/\/buc.edu.om\/ar\/wp-json\/wp\/v2\/pages\/27949\/revisions"}],"predecessor-version":[{"id":29954,"href":"https:\/\/buc.edu.om\/ar\/wp-json\/wp\/v2\/pages\/27949\/revisions\/29954"}],"up":[{"embeddable":true,"href":"https:\/\/buc.edu.om\/ar\/wp-json\/wp\/v2\/pages\/19265"}],"wp:attachment":[{"href":"https:\/\/buc.edu.om\/ar\/wp-json\/wp\/v2\/media?parent=27949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}