Computer Science and Information Technology
Technology is vital in driving innovation, economic development, and organizational transformation in today’s rapidly evolving digital landscape. The Department of Computer Science and Information Technology (CSIT) at the American University of Kurdistan is committed to equipping students with the technical expertise and problem-solving skills needed to meet the demands of both the public and private sectors.
The Department offers a Bachelor of Science in Computer Software and Security, a distinctive program designed to provide students with a strong foundation in software development and cybersecurity. Through theoretical knowledge and practical experience, students learn to analyze, design, develop, and test complex software systems that address real-world challenges. The curriculum emphasizes modern tools and technologies for building secure, high-performance web and mobile applications.
In addition to software engineering, the program integrates essential computer security concepts, preparing students to safeguard data, networks, and digital infrastructure. Graduates will be able to develop secure systems, identify potential vulnerabilities, and implement effective security strategies. We are also proud to announce the launch of our Master of Science in Artificial Intelligence, a forward-looking graduate program to prepare the next generation of AI professionals. This program empowers students to explore cutting-edge techniques in machine learning, data science, and intelligent systems, driving innovation across various industries.
At a Glance:
Degree | Bachelor of Science (B.Sc.) |
---|---|
Total Credits | 121- 122 credit hours |
Total Courses | 37 courses |
Duration of Study | 4 Years (depending on the student’s pace) |
Start Date | August or January |
Costs | Click Here |
Chair of Department | Dr. Shamal Taha
|
- Apply critical thinking to analyze, design, and implement effective computing solutions that address real-world challenges across diverse domains.
- Drive digital transformation by contributing to the modernization and digitization of governmental, non-governmental, and private organizations.
- Design and implement secure systems, demonstrating the ability to identify vulnerabilities, protect digital assets, and apply cybersecurity principles in developing reliable software solutions.
- Pursue lifelong learning, stay current with computing advancements, and actively promote digital literacy and computing knowledge within the broader community.
- Demonstrate ethical awareness, recognizing and responding to computing and information technologies’ legal, social, and professional responsibilities.
- Analyze complex computing problems and apply principles of computing and other relevant disciplines to identify effective solutions.
- Design, implement, and evaluate computing-based solutions that meet specified requirements within the context of the program’s discipline.
- Communicate effectively in a variety of professional contexts.
- Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
- Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
- Apply computer science theory and software development fundamentals to produce computing-based solutions.
- Apply security principles and practices to maintain operations in the presence of risks and threats.
Requirements | Number of Courses | Credit Hours |
---|---|---|
General Education | 13 | 40-41 |
Program Courses | 22 | 75 |
Elective | 2 | 6 |
Total | 37 | 121-122 |
subjects should be studied.
- Software Developer: Analyze, design, develop, and test robust software solutions, including eCommerce platforms, enterprise systems, and mobile applications.
- Network Administrator: Design, configure, and maintain secure and efficient computer networks, ensuring reliable connectivity and protection against cyber threats.
- Cyber Security Analyst: Assess the security of digital systems by identifying vulnerabilities, conducting penetration testing, and applying up-to-date cybersecurity tools and methodologies.
- Database Administrator: Design, manage, and secure organizational databases, ensuring data integrity, availability, and performance while protecting sensitive information from unauthorized access.
- Minimum 3 years, upon the successful completion of 12 courses per year.
- Standard 4 years, upon the successful completion of 10 courses per year.
- Maximum 5 years, upon the successful completion of 8 courses per year.
* This study duration does not include English language courses.
Academic Year Breakdown:
Semester | Start Date | End Date | Duration | Type |
---|---|---|---|---|
Fall | August | December | 14 weeks | Mandatory |
Spring | January | April | 14 weeks | Mandatory |
Summer | June | August | 8 weeks | Optional |
* The start and end dates are subject to changes.
Semester:
Instructional period of 14 weeks plus a final examination period offered twice a year
(referred to as Fall and Spring semester). Additional instructional periods include intersessions and Summer
sessions.
- Students must be high school or Institute graduates.
- Proof of English Proficiency. Learn more about our English language requirements and exemptions.
and/or call us on 07517414102/07517414103 (Viber/WhatsApp), during
working hours from Sunday to Thursday, 9:00 am – 2:00pm