Cybersecurity Essentials: Protecting Digital Assets

Micro Credentials
Standalone Micro-Credential

A structured pathway in Cybersecurity, Network Security, and Information Security, delivered through credit-bearing courses and awarded as an independent credential.

Credential Offeror
College of Engineering, Abu Dhabi University
Embedded Courses
CSE210 · CSC305 · ITE408
Minimum Achievement
B+ (85%) in each course

At a Glance

Competency-based recognition aligned to defined learning outcomes.

  • Cybersecurity foundations: threats, vulnerabilities, and risk assessment
  • Network security context: communication protocols and network protection mechanisms
  • Information security implementation: cryptography, access control, and system protection
  • Evidence: assessed coursework and applied cybersecurity practice

Explore the course sequence

Digital credentials are issued via Certifier.io with a verification page accessible through the credential link.

Sample Credentials

Example of the digital micro-credential as issued to learners.

What you'll see

  • Credential title and issuing unit
  • Recipient name and issuance date
  • Verification link / QR

The actual credential is issued digitally via Certifier.io.

Cybersecurity Essentials

CSE210 — Introduction to Cybersecurity Engineering

Foundations of cybersecurity including the motivation for security, the value of personal and organizational data, threat actors, vulnerabilities, malware, and the real-world consequences of security breaches. The course introduces risk assessment, security management, and security control planning, together with cryptographic concepts such as hashing and public- and private-key encryption. Hands-on laboratory activities expose learners to intrusion detection, malware protection tools, database security (e.g., SQL injection), operating system hardening, and physical infrastructure security, while addressing legal and ethical considerations in cybersecurity.

Topics covered

  • Threat actors and vulnerabilities
  • Risk assessment and security controls
  • Cryptography fundamentals
  • Intrusion detection and system hardening

Prerequisite: ECT200 (Introduction to Computing)

CSC305 — Data Communication and Networks

Fundamental principles of data communication and networking required to understand how cyber threats propagate across networked systems. The course covers communication architectures, protocols, transmission techniques, multiplexing, switching, error detection and correction, and data link control. Laboratory activities explore wired and wireless networks, routing mechanisms, transport protocols, and logical addressing, while connecting network operation concepts with cybersecurity protection requirements.

Topics covered

  • OSI and TCP/IP models
  • Network protocols and routing
  • Wireless communication technologies
  • Network security and cryptography basics

Prerequisite: Junior Level

ITE408 — Information Security

Advanced application of information security mechanisms for protecting computing systems and digital assets. The course examines attack surfaces, security strategies, governance processes, security policies, and auditing practices. Learners implement cryptographic mechanisms including symmetric and asymmetric encryption, key exchange, authentication, and digital signatures. Laboratory activities address access control models, firewall configuration, intrusion prevention systems, malicious software analysis, and secure software development practices including protection against common vulnerabilities such as cross-site scripting.

Topics covered

  • Cryptographic systems and key management
  • Access control and authentication mechanisms
  • Firewall configuration and intrusion prevention
  • Secure software development and vulnerability protection

Prerequisite: CSC305 (Data Communication and Networks)

Pilot implementation:

During the pilot offering, learners who achieved a grade of B+ (85%) or higher in each of the three embedded courses were considered to have satisfied the academic requirements for the micro-credential. This pilot phase was used to validate the credential structure, confirm alignment with the defined learner outcomes, and gather performance and feedback data to support continuous improvement.

Learning Outcomes

Upon completion, learners demonstrate the following outcomes.

LO-1: Explain how cybersecurity principles and protection mechanisms are used to analyze security risks, safeguard digital assets across various application domains.

LO-2: Apply appropriate analytical and technical reasoning to develop and assess cybersecurity solutions, considering technical requirements, system vulnerabilities, threat landscapes, and contextual constraints.

LO-3: Evaluate the effectiveness, strengths, and limitations of cybersecurity controls and protection mechanisms, using evidence-based judgment to interpret results and inform improvement decisions.

LO-4: Integrate ethical and professional considerations into the design and implementation of cybersecurity solutions, recognizing their broader societal, economic, and legal implications.

LO-5: Communicate and collaborate effectively when addressing cybersecurity challenges, demonstrating responsibility, adaptability, and awareness of multidisciplinary perspectives.

Credential Educational Goals

CEG-1 — Professional Application

Enable learners to apply cybersecurity principles, methods, and tools to protect digital assets, secure networked and information systems, and mitigate cybersecurity risks in engineering, computing, and information technology contexts. 

CEG-2 — Career and Workforce Relevance

Support learner readiness for current and emerging roles that require competence in cybersecurity engineering, network security, and information security, thereby enhancing employability, career progression, and effective participation in professional and organizational environments. 

CEG-3 — Lifelong Learning and Adaptability

Prepare learners to engage in continuous professional development and to adapt to evolving cybersecurity threats, technologies, standards, regulations, and ethical considerations in rapidly changing digital and organizational contexts. 

Credential Completion Conditions

Requirements to be awarded the micro-credential.

Primary Completion Requirements

All learners must satisfy both conditions.

Academic achievement: B+ (85%) or above in each of the three embedded courses.

Applied evidence: At least one of the following: technical/applied paper, substantial project or report, faculty reference letter, or verified experience letter aligned to the credential domain.

Alternative Completion Pathway (Equivalency)

For alumni or external learners not completing the embedded courses through standard enrollment, verified equivalent evidence may be considered through formal academic evaluation by qualified faculty designated by the College of Engineering.

Any equivalency determination is documented to ensure consistency and continued alignment with the credential’s learning outcomes and standards.

Content creation and delivery are conducted by qualified faculty within the College of Engineering.

dradelProf. Adel Khelifi, Ph.D.
Chair of the Computer Science and Information Technology Department; Professor of Computer Science

Expert in software engineering and information technology with extensive academic and professional experience across academia and international organizations. Senior IEEE member, ABET Program Evaluator, and contributor to open-source software initiatives in the region.

Prof. Shehzad Ashraf Chaudhry, Ph.D
Professor of Cybersecurity Engineering

Specializes in cybersecurity and cryptographic systems with research contributions in secure communication and authentication technologies. Recognized for academic excellence and extensive international teaching experience.

Dr. Mohamed Elhadad, Ph.D.
Assistant Professor of Cybersecurity Engineering

Researcher in cybersecurity and network security with experience in intelligent transportation systems and secure communication infrastructures. His work spans wireless networks, cryptography, and secure system design.

Dr. Moatsum Alawida, Ph.D.
Assistant Professor of Cybersecurity

Researcher in cryptography and cybersecurity with publications in leading international journals. His work focuses on multimedia security, blockchain technologies, chaotic systems, and advanced cryptographic methods.

Dr. Abid Mehmood, Ph.D.
Assistant Professor of Computer Science

Research interests include information security and privacy, data mining, machine learning, and cloud computing with applications in secure and intelligent data systems.

Dr. Modafar Ati, Ph.D.
Associate Professor of Computer Science and Information Technology

Experienced academic and program developer with expertise in computing systems, networking, and ICT program design. Contributed to the development of internationally accredited computing programs and curricula.

Dr. Deepa Shankar, Ph.D.
Assistant Professor of Cybersecurity

Researcher in cybersecurity with specialization in steganalysis and cyber biosecurity. Her work focuses on information hiding techniques, statistical analysis methods, and secure data systems.

About the Micro-credential
Back to top