{"id":7416,"date":"2023-02-20T04:03:20","date_gmt":"2023-02-20T04:03:20","guid":{"rendered":"https:\/\/www.shared-plus.com\/dev\/academyj\/?page_id=7416"},"modified":"2023-02-20T04:03:21","modified_gmt":"2023-02-20T04:03:21","slug":"%d8%a8%d8%b1%d9%86%d8%a7%d9%85%d8%ac-%d9%85%d8%a7%d8%ac%d8%b3%d8%aa%d9%8a%d8%b1-%d8%a7%d9%84%d8%b9%d9%84%d9%88%d9%85-%d9%81%d9%8a-%d8%a7%d9%84%d8%af%d9%81%d8%a7%d8%b9-%d8%a7%d9%84%d8%b3%d9%8a%d8%a8","status":"publish","type":"page","link":"https:\/\/jbj.edu.qa\/en\/%d8%a8%d8%b1%d9%86%d8%a7%d9%85%d8%ac-%d9%85%d8%a7%d8%ac%d8%b3%d8%aa%d9%8a%d8%b1-%d8%a7%d9%84%d8%b9%d9%84%d9%88%d9%85-%d9%81%d9%8a-%d8%a7%d9%84%d8%af%d9%81%d8%a7%d8%b9-%d8%a7%d9%84%d8%b3%d9%8a%d8%a8\/","title":{"rendered":"M.Sc. in Cyber Defense"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"7416\" class=\"elementor elementor-7416\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-29bf982 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"29bf982\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6fe21f1\" data-id=\"6fe21f1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aebddeb elementor-widget elementor-widget-heading\" data-id=\"aebddeb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.10.2 - 29-01-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">1.\tEducational Objectives of the program<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-62a516b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"62a516b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-10290ca\" data-id=\"10290ca\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cd7f562 elementor-widget elementor-widget-text-editor\" data-id=\"cd7f562\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.10.2 - 29-01-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:right;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<h4>The Cyber Defense Master\u2019s Program at Joaan bin Jassim Academy for Defense Studies is a postgraduate program specialized in information space security, one of the most important academic fields that arose as a result of technological development. <strong>The educational objectives of the program can be summarized as follows:<\/strong><\/h4>\n<h4>\u2022\tLearning about cybersecurity methods to protect systems, networks, applications, data, and the environment that supports the information security system.<\/h4>\n<h4>\u2022\tUnderstanding the world of hacking through wired and wireless networks, smart mobile applications, methods and methodologies of hackers, encryption methods, and risk management.<\/h4>\n<h4>\u2022\tStudying policies, legal frameworks, and cybersecurity ethics.<\/h4>\n<h4>\u2022\tAddressing the applications, limits and ambition of artificial intelligence in the field of information security as well as intelligence so that the learner can know the nature of these systems as well as the possibilities and limits of their technical, legal and military use.<\/h4>\n<h4>\u2022\tAddressing social and institutional awareness and urging students to think out of the box to promote innovative, non-traditional ways.<\/h4>\n<h4>\u2022\tAssessment and detection of vulnerabilities in information systems and penetration testing in order to enhance the protection of information systems. <\/h4>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3c182ea elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3c182ea\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f206780\" data-id=\"f206780\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4597488 elementor-widget elementor-widget-heading\" data-id=\"4597488\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2.\tEducational outputs of the program<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5fe4499 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5fe4499\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0cf6622\" data-id=\"0cf6622\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3258b2e elementor-widget elementor-widget-text-editor\" data-id=\"3258b2e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h4>After completing the courses and preparing the thesis, the graduate is expected to have experienced in information security with the following qualities: <strong>with the following outputs:<\/strong><\/h4><h4>\u2022\tAn understanding of the theoretical and practical knowledge foundations that affect cyber security.<\/h4><h4>\u2022\tAbility to develop evidence-based recommendations to solve cybersecurity-related problems.<\/h4><h4>\u2022\tAbility to analyze and evaluate best practices in dealing with information security issues.<\/h4><h4>\u2022\tUnderstanding the laws and ethics of cybersecurity.<\/h4><h4>\u2022\tAbility to conduct relevant research and make continuous contributions to knowledge and practice in the field of cybersecurity.<\/h4>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\/*! elementor &#8211; v3.10.2 &#8211; 29-01-2023 *\/ .elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]&gt;a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px} 1. \u0627\u0644\u0623\u0647\u062f\u0627\u0641 \u0627\u0644\u062a\u0639\u0644\u064a\u0645\u064a\u0629 \u0644\u0644\u0628\u0631\u0646\u0627\u0645\u062c: \u0628\u0631\u0646\u0627\u0645\u062c \u0645\u0627\u062c\u0633\u062a\u064a\u0631 \u0627\u0644\u062f\u0641\u0627\u0639 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a [&hellip;]<\/p>","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"categories":[135],"tags":[157],"_links":{"self":[{"href":"https:\/\/jbj.edu.qa\/en\/wp-json\/wp\/v2\/pages\/7416"}],"collection":[{"href":"https:\/\/jbj.edu.qa\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jbj.edu.qa\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jbj.edu.qa\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/jbj.edu.qa\/en\/wp-json\/wp\/v2\/comments?post=7416"}],"version-history":[{"count":21,"href":"https:\/\/jbj.edu.qa\/en\/wp-json\/wp\/v2\/pages\/7416\/revisions"}],"predecessor-version":[{"id":7761,"href":"https:\/\/jbj.edu.qa\/en\/wp-json\/wp\/v2\/pages\/7416\/revisions\/7761"}],"wp:attachment":[{"href":"https:\/\/jbj.edu.qa\/en\/wp-json\/wp\/v2\/media?parent=7416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jbj.edu.qa\/en\/wp-json\/wp\/v2\/categories?post=7416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jbj.edu.qa\/en\/wp-json\/wp\/v2\/tags?post=7416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}