The importance and need for development in information technology and communication ICT skills have been recognized as one of the key priorities to support the economic progression for Palestine. Previous studies show that the ICT sector mainly depends on human resources and it needs to continuously grow in products and services provided to businesses government and households. This growth is essential to both countries%27 local economies; ICT alone contributes to the GDP with an estimated 8% while employing 3% of the total workforce.
However one of the vital lacking issues is that most current ICT programs are not compatible with the market needs; hence available ICT programs should be upgraded to meet international trends.
One of the most lacking domains that require particular multidisciplinary skills is Forensic Computing and Digital Criminology domain. Consequently this has significantly impacted the security of the information systems and their infrastructure which face the risk of cybercrimes punishable by the laws.
We believe that introducing a Master of Science in Cybercrimes and Digital Evidences Analysis program is essential to overcome this wide gap of lack of expertise and critical to improving both law and ICT sectors%27 quality at personal and governmental levels eventually improving economic as well as Digital Criminology legislations.
Information systems continue to be a critical part of organizations%27 products services operations and management.
Indeed information systems can be so critical as to disrupt classic business models threatening traditional revenue streams and even driving industry sectors to extinction. The practical and efficient use of ICT is an essential element in maintaining or achieving competitive advantage for business organizations and excellence in service for government and non-profit organizations.
The new infrastructure on which the Information systems are developed is based on the internet cloud and the internet. This infrastructure has many advantages such as extensibility; on the other hand it is subject to various information security risks and cybercrime.
The program is designed for law enforcement. The program vision is to provide high-quality education in cyber-crimes and digital forensics using both theory and techniques to improve the quality of both law and ICT sectors at personal and governmental levels.
The program is designed to deliver up-to-date, cutting-edge cybercrime investigation techniques and strategies to allow students to understand and tackle emerging trends in cybercrimes and digital forensics. The program structure encourages and fosters close liaison between students. Therefore, graduates will have the required skills regarding cybercrimes and digital forensics and an excellent international network of contacts for the future.
The program is designed to improve the level of competencies and skills of students in Digital Forensics, including both domains of Law and technology, by providing a specialized course on emerging areas of Cyber-crimes and Digital Forensics that address: Digital Investigation, Issues in Criminal Justice, Digital Forensics, Ethical Hacking, and Digital Evidence.
The objectives of the program include the following:
• To provide graduates with the essential knowledge and skills they need to participate as influential team members or team leaders in digital evidence investigations
• To build the capacity of graduates for professional future careers in digital forensics examination forensic tool development tool verification and validation security and forensics administration.
• To give graduates the knowledge and skills to pursue advanced studies and research in computing or computer crime-related disciplines
• To equip graduates with the communication skills both oral and written to become an effective problem solver as well as an effective communicator as an expert forensic examiner and expert witness
• Cloud Security Expert.
• Consulting in Cyber Security Technology.
• Contract Cloud Engineers.
• Cyber Resilience Managing Consultant.
• Cyber Security Director/Lead/Manager.
• Cyber Security Analyst.
• Cyber Security Engineer.
• Cyber Security Risk Management Consultant.
• Cyber Security Specialist.
• Cyber Security Technical Consultant.
• Cyber Security Trainer.
• Data Privacy & Protection Assistant Manager.
• Identity & Access Management.
• Industrial Control Systems ICS Cyber Security Operation Engineer.
• Information Security Architect.
• Information Security Professional.
• Instructor – Computer Engineering Cyber Security.
• L3 Analyst/Cyber Security Team Lead.
• Managed Security Service Provider MSSP Operations Manager.
• Network and Security Engineer.
• Risk Assessments Information Security/Cyber Security.
• Security and Controls Specialist.
• Security Operations Center Analyst.
• Security Operations Center Manager.
• Security Operations Center Principal Architect.
• Security Technical Operation Manager.