0% found this document useful (0 votes)
115 views28 pages

RISE: Advancing InfoSec & Data Science

Riphah Institute of Systems Engineering (RISE) provides education, training, and consulting in information security. It aims to create excellence in information security and data sciences. RISE offers academic programs, research initiatives, and professional training in areas like secure software engineering, information security management, network security, offensive security, and health data analytics. The research groups work on topics such as wireless security, social engineering, malware analysis, and intrusion detection. RISE aims to develop talent and solutions in information security and data sciences to benefit both private and public sectors.

Uploaded by

Nafae Mirza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views28 pages

RISE: Advancing InfoSec & Data Science

Riphah Institute of Systems Engineering (RISE) provides education, training, and consulting in information security. It aims to create excellence in information security and data sciences. RISE offers academic programs, research initiatives, and professional training in areas like secure software engineering, information security management, network security, offensive security, and health data analytics. The research groups work on topics such as wireless security, social engineering, malware analysis, and intrusion detection. RISE aims to develop talent and solutions in information security and data sciences to benefit both private and public sectors.

Uploaded by

Nafae Mirza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

RIPHAH INSTITUTE OF

Prospectus SYSTEMS ENGINEERING


3
Riphah Institute of Systems Engineering
Our Mission
“To create a center of excellence for Information
Security and Data Sciences. Facilitate the market
with the best talent in information security,
Data Sciences and positively contribute to the
academic, public and private sectors. Ingrain
the spirit of national competitiveness and be a
catalyst for change in the field of Information
Securityand Data Sciences”

Riphah Institute of
Systems Engineering (RISE)
RISE is a special initiative by Riphah
International University to impart quality
in education, professional trainings &
consultancy in the field of Information
Security. With a unique construct this
institute out shines all the other educational
institutes as it is the first institute that has
academia, R&D, training & consulting
specializing in information security
technology solutions and dedicated to
providing information security professionals
& delivering cost affective services that
span Information Security Management,
Data Sciences for all industries.

4
Dr. Saad Naeem Zafar
(CISA, CISM, CRISC, CGEIT)
Professor, Riphah Institute of Systems Engineering
Dr. Saad Zafar is currently working as Research Professor, Riphah Institute of Systems
Engineering, at Riphah International University (RIU), Islamabad, Pakistan. He has been
affiliated with the field of Information Technology for more than twenty years. His area
of specialization is Information Security.
At Riphah, he is leading a Secure and Dependable Systems research group. He has
been teaching Information Security Management, Security Engineering and Application
Security, both at the undergraduate and postgraduate level. He has been Director of
Information Technology at Riphah International University and has provided Information
Technology consultancy to a number of organizations. Dr. Zafar started his career
working as a Software Engineer at Phoenix Technologies and Polysar Incorporated in the
USA. Since then he has been involved in many projects related to software acquisition,
development and implementation as software engineer, project manager and chief
information officer.
He has received his PhD from Griffith University, Australia. His research is in the area of
Information Security. He was affiliated with the Dependable Complex Computer-based
System (DCCS) research group which was funded by the Australian Research Council. He
was also associated with the Software Quality Institute and the Institute of Integrated
and Intelligent Systems at Griffith University. He has received Masters in Software
Engineering from Griffith University, Australia. He was awarded Academic Excellence
Award for his educational performance at the Griffith University.

Khurram Javed
(CEI, CEH, ECSA, CHFI, LPT, CCAI)
Assistant Director, Riphah Institute of Systems Engineering
Cyber Security Consultant/Penetration Tester
Master Trainer, Cyber Security Training

Khurram Javed is currently serving as Assistant Director, RISE. He is a renowned Cyber


Security professional leading the strategic development, planning, analysis and execution
of diversified projects for clientele varying from defence, strategic, financial, multi-national
and telecommunication/internet security related organizations across the globe. Khurram
is also an acclaimed academician and has been attached with academia for over a decade
and has served as permanent faculty in many prestigious universities in Pakistan. His areas
of specialization are Social Engineering, Wireless and Offensive Security.
In addition to managerial responsibilities, he has been delivering as Cyber Security
Consultant/Penetration Tester & Master Trainer, under the Professional Development Center
at RISE. He is a prolific cyber security mentor and has trained over 1000 professionals from
leading companies through numerous security training sessions conducted across Pakistan.
He is a Certified EC-Council Instructor (CEI), Certified Ethical Hacker (CEH), Computer
Hacking Forensics Investigator (CHFI), EC-Council Certified Security Analyst (ECSA) and
a Licensed Penetration Tester (LPT) from EC-Council Academy, Kuala Lumpur, Malaysia
and is enlisted amongst their Roll of Honor. His competence as a Security Analyst is well
acknowledged by the industry through deliverance in training and consultancy projects.
He leads the Penetration Testing and Digital Forensics teams at RISE. His other trainings
include Cyber Security Assesment of Industrial control systems,International Innovative
ICT Management in Artifical Intelligence & Big Data (Mayor’s Scholarship, Government of
China),Block Chain Technologies Cisco Certified Academy Instructor (CCAI), Virtualization
Security, Network Analysis & Forensics, Panda Gate Defender Integra-Performa, VoIP
design, installation & configuration, CCNA Discovery, FTTH technology and creating an
effective CSOC.
Khurram is also an active researcher focusing in the areas of Wireless Security, Social
Engineering, Malware Development & Analysis, BOTNETs, Offensive Security and Digital
Forensics. He has also contributed towards architecting multiple flavors of Cyber Security
Awareness training programs. Khurram is an enthusiastic speaker at Cyber Security
conferences, symposiums and seminars and has professional memberships with EC-
Council, IEEE, Cisco Network Academy, ISOC, CSTA-ACM and PISA.
5
Creating Knowledge Beyond Chronology
RISE Research
The objective of research initiatives is to educate future leaders
which will enable them to unveil knowledge and generate
fresh ideas. Our research groups work in liaison with varied
international research consortiums. The key areas of research are:

Secure and Dependable Systems Research


Group
This research group is led by Dr. Saad Naeem Zafar. Active
research areas of this group are: Secure Software Engineering,
Information Security Management, Information Security Policies,
IT Governance.

Offensive Security Research Group:


This research group is led by Mr. Khurram Javed. Active Research
areas of the group are: Wireless Security, Ethical Hacking, Social
Engineering, Penetration Testing, Offensive Security, Digital
Forensics, Malware Research, BOTNETS & Android exploitation
framework.

Network Security Research Group:


The members of the Network Security Research Group (NSRG)
are committed to design, analyze and implement the security
services and mechanisms in order to achieve the following
two primary objectives: i) to contribute towards enhancing the
security of network infrastructure, security protocols, and network
applications, ii) to contribute towards discouraging cyber-attacks
through network forensics readiness and sophisticated attack
detection schemes. Dr. Muhammad Yousaf leads the NSRG
group. Following are the active research projects currently going
on in the NSRG group: Network Traffic Analysis, Next Generation
Firewalls, Intrusion Detection and Prevention Systems, Public Key
Infrastructure based Smart Card Authentication Systems, Secure
VoIP Infrastructures, Secure IoT Infrastructures, Secure Group
Communication Systems, User Profiling Techniques, Privacy
Preserving Techniques. [Link]/groups/nsrgp

Health Data Analytics Research Group

The health data analytics research group at Riphah Institute of Systems Engineering (RISE) is actively engaged in
cutting-edge research in the field of healthcare and data science. The recent explosion in health data coupled with
the advances in the field of artificial intelligence has created tremendous opportunities for healthcare improvement.
The group aims to provide a platform for collaborative multidisciplinary research in healthcare by providing support
through expertise in large-scale data science techniques to researchers in the medical field. The group has a keen
interest to address the global health challenges in the local context of Pakistan, as the healthcare indicators in the
country are one of the lowest in the region. To this end, as one of the key initiatives, the research center is in the
process of establishing a permanent source of data through our collaborative partners to collect, store and process
health data to support research in the areas of: (i) diagnostics—data mining and analysis to identify causes of
illness; (ii) prevent medicine – predictive analytics and data analysis of genetic, lifestyle, and social circumstances to
prevent disease; (iii) precision medicine – leveraging aggregate data to drive hyper-personalized care; (iv) medical
research – data-driven medical and pharmacological research to cure disease and discover new treatments and
medicines; (v) reduction of adverse medication events – harnessing of big data to spot medication errors and flag
potential adverse reactions (vi) cost reduction – identification of value that drives better patient outcomes for long-
term savings; (vii) population health – monitor big data to identify disease trends and health strategies based on
demographics, geography, and socio-economics.

6
International Research Grants
Strategic Support for Accreditation of Programs and Internationalization at South Asian
Higher Education Institutes (HEIs)
Start: 15-01-2021 - End: 14-01-2024
Project Reference: 619438-EPP-1-2020-1-PK-EPPKA2-CBHE-JP
EU Grant: 876206 EUR
Programme: Erasmus+
Key Action: Cooperation for innovation and the exchange of good practices
Action Type: Capacity Building in higher education

Because of globalization, standardization leading to accreditation of academic programs has become an


increasingly dominant theme in higher education. In order to achieve it, there are various challenges faced
by Asian partner country Higher Education Institutions, which resulted in creating the motivation towards
undertaking this project. The partner countries face the challenge of strong competition with international
institutions because of the easy and wide access to higher education abroad. The institutions cannot delay
any further to address it, otherwise they risk the severe issues of comparability of quality of education locally
and abroad, and other issues relating to recognition of qualification. Moreover, the increased proportion
of students entering university-level education has increased the complexity of higher education systems
across the entire partner countries, thereby also giving rise to the need of standardization and accreditation.
In spite of huge student population in Asia, unfortunately very few universities from Asia are seen in good
positions in global world ranking of universities.

Map of project partner countries

7
Network Security Training and Workshops unable to go to big cities to get themselves trained
across Selected Women Universities in Pakistan on network and cybersecurity. There is a dire need
The employees and students in women’s to conduct hands-on training and workshops at
universities across Pakistan are girls. As Pakistan’s their doorsteps and campuses.
government is planning to have more women RISE Secured a Grant amount of 76650/- Euros
universities in the country, there is a need to from European Commission through TEIN*CC via
trained women to serve in newly established 4th Call of its Asi@connect programs. It consists
universities to ensure the security of networks of seven “five days hands-on network security
of those universities. Moreover, there isn’t any training and workshops” for Pakistani women
cybersecurity or network security program or network engineers at their doorstep and place.
department in women’s universities in Pakistan. Dr Syed Muhammad Sajjad was the Principal
Moreover, Women in Pakistan face isolation, and Investigator of the Project.
due to cultural and religious implications, they are

Deployment of Collaborative Modern region to form a regional collaborative honeynet


HoneyNet to improve Regional Cyber security network, and promoted R&D activities to secure
Landscape (CMoHN) network infrastructure through publications and
Landscape (CMoHN)The project deployed and conducting community awareness seminars. Grant
established the core skills required to manage amount for this research project is AUD 30,000. Dr.
and integrate different honeynets and designed Muhammad Yousaf was the principal investigator
new honeypots for countering cyber-attacks. The of the project.
project connected with other honeynets in the

10 INITIATIVES SELECTED
Australia, India, Myanmar, New Zealand, Pakistan,
Philippines, Singapore, Thailand and Tonga

CATEGORIES
• APNIC Internet Operations Research Grants
• Internet Society Cybersecurity Grant
• Community Impact Grants
• Technical Innovation Grants
300+
APPLICATIONS REVIEWED

8
National Research Grants
• Development of interactive online “cyber- of Research and Academic Coordination (RAC).
security and privacy awareness training Awarded to Principal Investigator Dr. Muhammad
program for students” Yousaf, Riphah Institute of Systems Engineering,
“The proposed project helps to curtail the threats/ Riphah International University Islamabad. 2017
vulnerabilities associated with cyberspace - 2019.
by developing and evaluating cyber-security • Secure Sandbox Orchestration
awareness course for vulnerable segments of
society (School and College/ University going Project funded by National Engineering and
Students)”. Grant amount for this research Scientific Commission (NESCOM), Directorate
project is PKR 4.6 M. Dr. Saad Naeem Zafar is the of Research and Academic Coordination (RAC).
principal investigator of the project. Awarded to Principal Investigator Dr. Muhammad
Yousaf, Riphah Institute of Systems Engineering,
• Establishment of Cyber Range using Open Riphah International University Islamabad. 2019
Source Technologies to 2020 – Continue.
Project funded by National Engineering and
Scientific Commission (NESCOM), Directorate

Industrial Projects
Ministry of Information Technology (IT) & Pakistan • Microsoft Azure
Software Export Board (PSEB) Government of • AWS Solutions Architect-Associate (SAA)
Pakistan has granted a project titled “Free IT Training
• AWS Solutions Architect-Professional (SAP)
and Certification” to a joint venture of MetaPi Private
limited and Riphah Institute of Systems Engineering • Cisco Certified Network Associate (CCNA)
(RISE) worth PKR. 270 Million for providing trainings • Certified Associate in Python Programming
and certifications to 1700 students, professionals, Certification (PCAP)
and government employees across all over Pakistan The project will be executed in two phases. In
(2022) for the following professional certifications. the first phase, 800 professionals are targeted to
• Certified Ethical Hacking (CEH) be trained. So for, team RISE has trained 700+
professionals in the following cities of Pakistan.
• Computer Hacking Forensics Investigation Islamabad, Lahore, Peshawar, Quetta, and Karachi.
(CHFI)

9
10
Programs Offered
MS Information Security (MSIS)
The program aims to develop core competencies in University Mandatory Courses
various areas of information security like information
Code Course Name Cr. Hrs
security management, application security, computer
networks security, and digital forensics. Students will CM-5011 Ethics in Practice-2 2
have the opportunity of learning the technical aspects
of information security by understanding current Some Elective Courses
threats and vulnerabilities and examining ways of Cr.
developing effective countermeasures. In order to Code Course Name
Hrs
cater for wide range of professional and academic IS-6013 Information Systems Auditing 3
interests, students have the option of selecting
IS-6023 Risk Management 3
their course work according to their specific needs.
IS-6033 Information Security Management 3
Currently, RISE is offering three degree programs that
are: i) MS (Information Security), ii) MS (Data Science), IS-6043 IT Governance 3
and iii) Ph.D. Computing with area of specialization IS-6063 Strategic Management, Leadership & 3
as Information Security and Data Science. Governance
IS-5023 Network Security 3
Duration 4 Semesters (2 Years) IS-6233 Wireless Networks Security 3
IS-6203 Ethical Hacking 3
Eligibility
IS-6213 Penetration Testing 3
• 16-years of education in science/engineering
IS-6253 Distributed and Cloud Computing 3
discipline preferably with 4 years degree
program of BS (SE/CS/IT/EE) or equivalent from IS-6283 Security of Internet of Things 3
HEC recognized university or degree awarding IS-5053 Application Security 3
institute with at least 60% marks or CGPA of at IS-6403 Secure Software Development 3
least 2.0 (on a scale of 4.0). (NOTE: candidates IS-6433 Malware Analysis 3
may have to complete the deficiency coursework
IS-6443 Programming for Security Professionals 3
as determined by the admissions committee).
IS-6453 Machine Learning for Security Applications 3
• Two years of relevant work experience is IS-6463 Database Security 3
recommended.
IS-6473 Security Testing 3
Admission Criteria IS-6483 Trusted Computing 3

• Qualify GRE General type admission test IS-6633 Applied Cryptography 3


conducted by the university or a valid NTS GRE IS-6663 Digital Forensics 3
General test IS-6703 Data Analysis and Quantitative Techniques 3
• Qualify the admission interview. IS-6723 Ethics in Information Security 3

• Admission will depend to the candidate’s overall IS-6803 Advanced Topics in Applied Cryptography 3
score in previous academic degree, admission IS-6813 Quantum Computing & Information 3
Security
test and performance in the interview.
IS-6823 Quantum Cryptography 3
Intake: Spring (January) & Fall (July) IS-5433 Research Methods 3

Class Timings: Degree Completion


05:30 pm – 08:30 pm (Monday – Friday) For award of MS degree, a student must have:
a. Passed courses totaling at least 32 credit hours,
Scholarships: Talent & need based scholarship
including two core courses.
(upto 100% on tution fee)
b. Obtained a CGPA of 2.5 or more.
List of Core Courses
Code Course Name Cr. Hrs
IS-5063 Cryptography 3
IS-5073 Information Privacy and Security 3

11
MS Data Science (MSDS)
Data science is an interdisciplinary field of scientific program is expected to not only complement
methods, processes and systems for understanding the existing program but also it will open new
the modern-age data sources, modelling the data opportunities for coping with the challenges of the
behavior, extracting the business insight from that near future.
data, predicting the future behavior and delivering
the useful data-driven business applications. Duration: 4 Semesters (2 Years)
In 2013, IBM estimated that two and a half million Eligibility
terabytes of data are created every day. Some of
the sources, generating the data are: • 16-years of education in computing/science/
engineering discipline preferably with 4 years
a) Individuals (through social networks and degree program of BS (Computer Science,
smartphones for the reflection of society) Software Engineering, Information Technology,
b) Machines (through real-time, network Applied Mathematics, Mathematics, Statistics,
connected sensors – “the internet of things”) Computer Engineering, and Electrical
c) Business and commerce (e.g. transaction Engineering) or equivalent from HEC recognized
records and financial data) university or degree awarding institute.
d) Education (e.g. academics, literature, research) • At least CGPA of 2.0 on the scale of 4.0 or 60%
e) Medical / Healthcare (personal health records, marks in the previous degree.
health insurance) • Two years of relevant work experience is
f) Justice (crime statistics for a city for the sake of recommended.
efficient resource deployment)
g) Transportation (Vehicle, pedestrians, trains, • Candidates may have to complete the
airlines, movement data) deficiency coursework as determined by the
admissions committee. List of deficiency
The challenge is to make sense of this ever- courses is:
increasing source of data for the use and benefit of 1. Programming Fundamentals
society. A lot many companies and higher education
2. Data Structures and Algorithms / Design
institutions are already planning and implementing
and Analysis of Algorithms
for this data tsunami. Data science has emerged
as an interdisciplinary paradigm that draws upon 3. Database Systems
the traditionally distinct areas of computer science,
applied mathematics and statistics, applications Admission Criteria
from natural and social science, engineering, and • Qualify GRE General type admission test
business for developing solutions for gathering, conducted by the university or a valid NTS GRE
cleaning, archiving, analyzing and visualizing data General test.
for the purposes of making informed decisions.
The Master of Science in Data Science (MS-DS) • Qualify the admission interview.
program aims to develop core competencies in • Admission will depend on the candidate’s
various areas of data science like understanding overall score in previous academic degree,
data products, data extraction, data cleaning, data admission test and performance in the
modeling, classification, clustering, predictions, etc. interview.
Students will have the opportunity of learning the
technical aspects of data science by understanding Intake: Spring (January) & Fall (July)
the trends in the current data products and
preparing for the required data analysis skillset for Class Timings
the upcoming information processing systems. To 05:30pm – 08:30pm (Monday – Friday)
cater for wide range of professional and academic
interests, students have the option of selecting Scholarships
their course work according to their specific needs. Talent & need based scholarship (upto 100% on
Riphah Institute of Systems Engineering (RISE) tution fee)
is currently offering MS (Information Security)
program and the proposed MS (Data Science)

12
List of Core Courses
Code Course Name Cr. Hrs Code Course Name Cr. Hrs
DS-5013 Statistical and Mathematical Methods 3 DS-6223 Cloud Computing 3
for Data Science
DS-6233 Datacenter Design 3
DS-5023 Tools and Techniques in Data Science 3
DS-6313 Data Mining 3
DS-5033 Machine Learning 3
DS-6323 Distributed Machine Learning 3
University Mandatory Courses DS-6333 Time Series Analysis and Prediction 3
DS-6343 Social Network Analysis 3
Code Course Name Cr. Hrs
DS-6353 Applied Text Analysis 3
CM-5011 Ethics in Practice-2 2
Modelling and Reasoning in Bayesian
DS-6363
Networks 3
List of Specialization Courses
IS-5043 Information Systems Security 3
Choose any two from the following specialization
IS-6013 Information Systems Auditing 3
courses of data science.
Data Analytics for Security
DS-6433
Applications 3
Code Course Name Cr. Hrs
DS-6513 Health Data Analytics 3
DS-5513 Big Data Analytics 3
DS-6613 Data Privacy Laws and Regulations 3
DS-5523 Deep Learning 3
DS-6623 Ethics for Data Scientists 3
DS-5533 Natural Language Processing 3
DS-6633 Optimization Methods in Data 3
DS-5543 Distributed Data Processing 3 Science
IS-5433 Research Methods 3
Some Elective Courses
Degree Completion
Code Course Name Cr. Hrs
For award of MS degree, a student must have:
DS-6113 Data Classification 3
a. Passed courses totaling at least 32 credit
DS-6123 Data Clustering 3
hours, including three core courses and two
DS-6133 Predictive Analytics 3 specialization courses.
DS-6143 Data Visualization 3 b. Obtained a CGPA of 2.5 or more.
DS-6153 Advanced Database Systems 3
DS-6163 Advanced Data Structures 3
DS-6173 High Performance Computing 3
DS-6213 Data ware Housing 3

13
Graduate Diploma
The Graduate Diploma program has been designed counted towards relevant MS program under
to offer a higher degree of flexibility, especially for the rules, outlined by university.
the professionals, in order to meet their targeted
2. A student who enrolled in MS program
learning requirements in constrained time limits.
and partially completed the coursework
Additionally, the students successfully completing
the Graduate Diploma will have the opportunity to requirements and is not willing to continue, will
upgrade their earned diploma into MS program. have option to get certificate(s) or graduate
The knowledge areas include Information Security, diploma depending upon the successfully
Data Science, Software Engineering, and Computer completed credit hours. One successfully
Science. completed course will equate one graduate
certificate while five successfully completed
Eligibility Criteria courses will be equivalent to graduate diploma.
16-years of education in Computer Science or 3. A student who enrolled in graduate diploma
Software Engineering or any other 16-years and is not willing to continue, will have the
degree in computing discipline preferably with 4 right to get graduate certificates equal to the
years degree program of BS (Computer Science successfully completed courses.
or Software Engineering) or equivalent from HEC
recognized university or degree awarding institute. Intake and Class Timings
1. At least CGPA of 2.0 on the scale of 4.0 or 60 % It will be one semester long i.e. Spring (February-
marks in the previous degree. June) or Fall (August - January) Evening Classes,
2. An industrial experience of two years is Monday to Friday, 05:30 PM to 08:30 PM.
recommended.
Titles to Offer
Requirements for the Award of Graduate Broadly, any candidate who fulfils the admission
Diploma criteria can enroll for graduate diploma and can
After successful completion of 5 courses each of 3 study any course, offered at the graduate level in the
credit hours, the student can claim his/her diploma. department of software engineering & computer
Duration of diploma is 1 year or maximum 2 years. science or the department of cyber security and
data science. Specifically, the department(s) can
Conversion Options offer specialized graduate certificate(s) / graduate
The students completing the graduate certificate diploma(s) according to the requirements of a
and graduate diploma will have the following group of professionals. For more information about
conversion options. the specific titles to be offered please refer to list of
courses provided in MS programs.
1. A student who enrolled and successfully
completed graduate diploma will have the
right to enroll in the MS program later on such
that the earned credit hours in diploma will be

14
Graduate Certificate
The Graduate Certificate program has been the right to enroll in diploma and in the MS
designed to offer a higher degree of flexibility, program later on such that the earned credit
especially for the professionals, in order to meet hours in certificate will be counted towards
their targeted learning requirements in constrained relevant diploma/MS program under the rules,
time limits. Additionally, the students successfully outlined by university.
completing the Graduate Certificate will have the
opportunity to upgrade their earned certificate 2. A student who enrolled in MS program
into diploma and MS program. The knowledge and partially completed the coursework
areas include Information Security, Data Science, requirements and is not willing to continue, will
Software Engineering, and Computer Science. have option to get certificate(s) or graduate
diploma depending upon the successfully
Eligibility Criteria completed credit hours. One successfully
completed course will equate one graduate
16-years of education in Computer Science or certificate while five successfully completed
Software Engineering or any other 16-years courses will be equivalent to graduate diploma.
degree in computing discipline preferably with 4
years degree program of BS (Computer Science 3. A student who enrolled in graduate diploma
or Software Engineering) or equivalent from and is not willing to continue, will have the
HEC recognized university or degree awarding right to get graduate certificates equal to the
successfully completed courses.
institute.
Intake and Class Timing
1. At least CGPA of 2.0 on the scale of 4.0 or 60 %
marks in the previous degree. It will be one semester long i.e. Spring (February-
2. An industrial experience of two years is June) or Fall (August - January) Evening Classes,
recommended. Monday to Friday, 05:30 PM to 08:30 PM.

Requirements for the Award of Certificate Titles to Offer


After successful completion of 3 credit hours Broadly, any candidate who fulfils the admission
course work the student can claim his/her criteria can enroll for graduate certificate and can
certificate. Duration of certificate is 18 weeks. study any course, offered at the graduate level in the
department of software engineering & computer
Conversion Options science or the department of cyber security and
data science. Specifically, the department(s) can
The students completing the graduate certificate
offer specialized graduate certificate(s) / graduate
and graduate diploma will have the following
diploma(s) according to the requirements of a
conversion options.
group of professionals. For more information about
the specific titles to be offered please refer to list of
1. A student who enrolled and successfully
courses provided in MS programs.
completed graduate certificate will have

15
PhD Computing
Students enrolled in the PhD Computing program • CGPA of 3.0/4.0 or above in MS/MPhill degree.
are required to complete minimum 48 credit hours • Two years of relevant work experience is
of course/research work. Students are required recommended.
to take minimum 18 credit hours (typically 6
courses) as part of their course work. Objective
Admission Criteria:
of these 6 courses is to cover the breadth as well
• A valid GAT (Subject) type score of minimum
as depth of the knowledge of their interest area.
70% is required
At the completion of these 6 courses, students
are expected to cover the issues, best practices, • Interview
standards, research gaps and challenges of their
interest area. On the completion of the course work, Intake: Spring & Fall (Twice a year)
students are required to pass the comprehensive /
Timings: Evening Classes
doctoral qualifying exam as well.
Duration: 3 to 8 years
Furthermore, students are required to take minimum
of 30 credit hours as part of their research work. Active Research Areas:
During this phase, students initially are required • Cyber Security Management
to defend their PhD synopsis / proposal defense. • Malware Analysis
Students are required to publish their research • Security Assesment
work in ISI indexed impact factor journals. Minimum • Digital Forensics
of 1 ISI indexed impact factor journal paper and • Network Security
2 conference papers in high quality international • Machine Learning
research conferences are required as part of the • Natural Language Processing
PhD degree program. However, this number can • Data Governance
be increased by the concerned research supervisor.
Later on, student is required to defend his/her PhD
pre-final defense. Student’s research thesis is also Program Compliance and Accreditation
evaluated by 2 foreign experts from technologically PhD program is structured to meet the requirements
developed countries. Finally, student is required to of Higher Education Commission (HEC), Pakistan.
defend his/her PhD final public defense. The programs are offered by Riphah International
University, which is a Federally Chartered University
Generally, students complete their PhD degree based in Islamabad, Pakistan. Programs are
requirements in 4 years. However, in some rare approved by the relevant university authorities.
cases this duration can last up to maximum 8 years.
Students failing to complete their PhD degree Courses Details Cr. Hrs
requirements in 8 years will be disqualified.
University Mandatory Course (Ehtics in Practice II) 02
Eligibility Criteria Elective Courses 18
• 18 years of education in science / engineering Research Credit Hours 30
discipline preferably with MS/MPhil (IS/SE/ Total Ph.D Credit Hours 50
CS/IT/EE) or equivalent from HEC recognized
university or degree awarding institute.
(NOTE: candidates may have to complete the
deficiency coursework as determined by the
admissions committee.)

16
Trainings
RISE provides following world recognised certifications and trainings

Certified Ethical Hacker

CEH provides a comprehensive ethical hacking and network This course is designed to prepare the participants for the CISA
security hands-on training program to meet the standards of examination. It covers the unique aspects of managing an audit
highly skilled security professionals. Hundreds of SMEs and and the knowledge necessary to complete the task. The course
authors have contributed towards the content presented in the focuses on the design and implementation of general computer
CEH courseware. Our researchers have invested thousands of control, application level control auditing as well as introducing
man hours researching the latest trends and uncovering the the risk based management approach. While disseminating
covert techniques used by the underground community. information about Information Systems auditing standards, this
course enables the trainee to perform Information System audits.

CISSP
Hacking Forensic The Certified Information Systems Security Professional (CISSP)
Computer
INVE STIGATOR is the most globally recognized certification in the information
Computer forensics include the application of computer security market. CISSP validates an information security
investigation and analysis techniques in the interests of professional’s deep technical and managerial knowledge and
determining potential legal [Link] enables trainees experience to effectively design, engineer, and manage the overall
to acquire necessary hands-on experience on various forensic security posture of an organization.
investigation techniques and standard forensic tools necessary to The broad spectrum of topics included in the CISSP Common Body
successfully carry out a computer forensic investigation leading of Knowledge (CBK®) ensure its relevance across all disciplines
to prosecution of perpetrators. in the field of information security. Successful candidates are
competent in the following eight domains:
• Security and Risk Management
• Asset Security
• Security Architecture and Engineering
EC-Council Certified Security Analyst • Communication and Network Security
• Identity and Access Management (IAM)
Computer forensics include the application of computer • Security Assessment and Testing
investigation and analysis techniques in the interests of
determining potential legal evidence. CHFI enables trainees • Security Operations
to acquire necessary hands-on experience on various forensic • Software Development Security
investigation techniques and standard forensic tools necessary to
successfully carry out a computer forensic investigation leading
to prosecution of perpetrators.
PCAP
This intermediate Certified Associate in Python Programming
training prepares learners to take the PCAP exam, which is the
one exam required to earn the PCAP certification.
Python is one of the simplest, most accessible programming
languages around today, and it’s hard to imagine a developer
who won’t benefit from knowing it. Python always seems to show
CISMs understand the business. Its assists to know how to up everywhere.
manage and adapt technology to the enterprise and industry.
The uniquely management - focused CISM certification promotes Developers who work with data scientists and researchers rely
international security practices and recognizes the individual on the hundreds of scientific libraries to extend Python for their
who manages designs, and oversees and assesses an enterprise’s work. Developers working with tech startups love Python’s ease
Information Security. of use and scalability -- perfect for building simple solutions that
you know can explode when the company does.

AZURE
Designing and Implementing a Data Science Solution on Azure
offers a set of related services to address the day-to-day workflow
of a data scientist. This skill teaches how these Azure services
work together to enable various parts of this workflow. This path
is designed to address the Microsoft DP-100 certification exam.
After completing this course, students will be able to understand
and build AI solutions on Azure, learn about various Azure
Machine Learning services usage & integration, and understand
the profound impacts Machine Learning is making in smart
business decisions.

17
TEAM MEMBERS
Names Designation

Dr. Muhammad Yousaf


PhD Computer Engineering (CASE)
MS Computer Engineering (CASE)
CISSP Member (ISC)2, Director RISE
Founding Member ISOC Islamabad Chapter
Leader: Network Security Research Group (NSRG)
[Link]@[Link]

Dr. Muhammad Zubair


Ph.D. Electrical Engineering (IIUI),
Dean Faculty of Computing
MS Information Technology (Hamdard University)
[Link]@[Link]

Dr. Saad Naeem Zafar


Ph.D – Software Engineering (Australia),
MS – Software Engineering (Australia), Research Professor
CISA, CISM, CRISC, Member IEEE, ISACA
[Link]@[Link]

Dr. Naveed Ikram


PhD - Computer Science (University of Salford, UK)
Professor,
[Link] - Computer Science (University of Salford, UK)
Associate Dean, Graduate Program
Chartered IT Professional, Senior Member ACM, Member IEEE, AIS, CSP
Leader: Empirical Software Engineering Research Group
[Link]@[Link]

Dr. Musharif Ahmed


Assistant Professor
Ph.D. - Computing (Riphah International University)
HoD, Software Engineering &
MS - Systems and Software Engineering (MAJU),
Computer Science
[Link]@[Link]

Dr. Adeel Zafar


Ph.D. - Computing Science (NU-Fast, Islamabad) Assistant Professor
MS - Computing Science (NU-Fast, Islamabad) In-Charge DS Program
BS - Software Engineering (Riphah International University)

Dr. Syed Muhammad Sajjad


PhD Computing (Riphah International University)
MS Electrical Engineering (Networks Engineering) Assistant Professor
BSc Electrical Engineering (Electronics) (FUUAST, Islamabad)
[Link]@[Link]

Mr. Khurram Javed


PhD Scholar - Wireless Security (UTM, Malaysia)
MS - Computer Networks (IIUI, Islamabad)
Assistant Director RISE
Certified EC-Council Instructor (CEI), Certified Ethical Hacker (CEH)
Assistant Professor,
Certified Hacking Forensics Investigator (CHFI)
Head Commercialization & Trainings
EC-Council Certified Security Analyst (ECSA)
Cyber Security Consultant/ Analyst,
Licensed Penetration Tester (LPT),
Master Trainer Cyber Security
Virtualization Security Network Analysis & Forensics, CCAI & CCNA 4.0 discovery
Leader: Offensive Security Research Group
[Link]@[Link]

Mr. Obaid ur Rehman


Certified Ethical Hacker (CEH)
Trained for: ISMS 27001 Lead Auditor
Computer Hacking Forensic Investigator (CHFI)
CSOC - SIEM Installation, Configuration and Administration Manager Security & Compliance
CCNA, VMWare 3.5 ESX, ITIL v3 Foundation
PANDA Gate Defender Performa V3.02 & Panda Security for Business
PANDA Gate Defender Integration
[Link]@[Link]

Ms. Komal Batool


PhD Computing (Riphah International University) (In Progress),
MS-Information Security (Military College of Signal, (NUST)
18 CHFI (Certified Hacker Forensic Investigator),
Senior Lecturer
CASE (Certified Application Security Engineer)
[Link]@[Link]
Names Designation

Mr. Mirza Muhammad Touseef


PhD Computing (In Progress)(Riphah International University)
Senior Lecturer
MS – Software Engineering (Riphah International University)
[Link]@[Link]
Mr. Obaid Ullah
MS - Information Security (Riphah International University)
BS - Computer Science (Sarhad University, Peshawar)
CHFI (Computer Hacking Forensics Investigator) Trainer
CEH (Certified Ethical Hacker) Trainer Research Associate
CSFPC (Cyber Security Foundation Professional Certificate)
ISO/IEC 27001 Information Security Associate, CNSS Certified Network Security
Specialist, CISCO Cisco Certified Network Associate
[Link]@[Link]
Shehab Abdo Ali
MS - Information Security (Riphah International University)
BS - Computer Science Hons. (Preston University)
CEI - (Certified Ec-Council Instractor)
CHFI - (Computer Hacking Forensics Investigator) Teaching Fellow
CEH - (Certified Ethical Hacker) Master, Practical
CSFPC - (Cyber Security Foundation Professional Certificate)
ICSI - Certified network security specilist
[Link]@[Link]
Mr. Arslan Ali Khan
MS - Information Security (Riphah International University)
BS - Telecom Engineering (National University of Computer & Teaching Fellow
Emerging Sciences)
[Link]@[Link]
Ms. Kinza Naseer
MS – Software Engineering (Riphah International University) Teaching Fellow
[Link]@[Link]
Ms. Afia Ishaq
MS – Data Sciences (Riphah International University) (In Progress)
Teaching Fellow
BS – Software Engineering (Riphah International University)
[Link]@[Link]
Mr. Furqan Amjad
MS – Data Sciences (Riphah International University)
BS - Electronics and Electrical Systems (Power) University of Lahore
Data Visualization with Python, IBM, Data Analysis with Python, IBM Teaching Fellow
Pytohon 101 for Data Science, IBM,
Data Science & Matchine Learning, DICE Analytics
[Link]@[Link]
Mr. Irfan Ahmad
MBA - Finance (International Islamic University, Islamabad) Program Coordinator
[Link]@[Link]
Mr. Aslam Malik
[Link] (Allama Iqbal Open University, Islamabad) Assistant Program Coordinator
[Link]@[Link]
Mr. Ahsan Ilyas
MBA - HRM (Arid Agriculture University, Rawalpindi (PMP) Assistant Manager Administration
[Link]@[Link]
Mr. Nadeem Ahmed
MBA, Hamdard University, Islamabad
Finance Officer
[Link]@[Link]

19
Corporate Training Sessions

20
21
Testimonials
I and my colleagues participated in the training excellent, discussions were often open and based
of CEHv8 and we found Mr. Khurram Javed as on knowledge sharing. I hope provided material/
instructor of CEHv8 is not only instructor but source information (dumps etc) will help us to get
true mentor for security professional. Moreover, certified. From improvement perspective, if facilities
he turned computer scientist into cyber security provided at training campus are taken care, it will
professional. RISE as institute provide us state of further facilitate participants to focus on learning.
the art resources for CEHv8 training. I recommend Muhammad Qaiser Iqbal (Ufone).
computer & IT professionals to attend CEHv8 at
RISE and see yourself a new world of wonder. The CEH training by Khurram was one of the
M. Shakil (NESCOM). best training I have received in my life. These 5
days contained a wealth of knowledge related to
In modern era of information, its security at all the technical hacking, offensive and of course, defensive
levels individual, organizational, national; now it reason. The training not only broadened my vision
has become a very need of the time. Training was on digital security but also opened horizon of
up to the mark and RISE really is contributing at all various land of security measures that should have
the mentioned levels to induce security expertise to been undertaken by me, but were ignored due to
coup with up-coming threats. lack of knowledge.
M. Sohail Iqbal (NESCOM). It is usually said that ‘ignorance of bless’ but not in
this case. Khurram Javed for alleviating our sense
Training comprises of many good workshops, of security and opening our eyes to the dark that
topics, labs, tutorials and all above conducted by security instant until you is not connected to the
very learned Mr. Khurram Javed. Instructor is a very internet.
professional and instrumental in his field and tried
his level best to impart training to the participant. His Mustafa Shiraz Ahmed (SBP).
support Mr. Ahmed is also well trained, experienced
and having required knowledge to conduct such This was an excellent experience for me. The training
trainings and maintain lab environment. has been provided by skilled trainer i.e. Mr. Khurram
Javed. He shared his professional experiences &
Muzammel Hussain (Pak Navy). provided a real time insight into practical scenarios.

The CEH training helped me boost my confidence I absolutely enjoyed all parts of training setup
towards my aim of CEH Exam. The trainer was including the meals & interaction with other
very proficient and kept a healthy environment. participants. I hope to apply all the knowledge
CEH training gave a set of direction towards exam gained & improve my skills on top of the kick start
preparation and moreover provided a clearer range and platform that this training has provided.
and concepts, roadmap, and strategy to the skills
at hand. I will definitely recommend this to my colleagues.
Noushin Ahson (Systems Ltd). Thank you Mr. Khurram, Mr. Ahmad & Riphah for
this wonderful experience.
Mr. Khurram teaching skills is excellent. I have Waqas Arshed (Systems Ltd).
been through many trainings but the friendly way
with practical and live examples he trained us it’s The training was very good. It does not only
fabulous. I am very happy to being a student of him. improved my knowledge but also enhanced
The course material is really good and the moreover my vision by looking at things form different
the way he delivers it made us to take interest. In perspective. The lab content was excellent and
last I wish him best of luck to Mr. Khurram Javed and tools and material which was provided are also
RIPHAH International University. sufficient for self-training and exam preparation.
Sohaib Naqi (Kaspersky). The training arrangement, including equipment
and environment were excellent as well. Khurram
The training met our expectations, especially in is very knowledgeable and have complete grip and
form of course contents, material provided and command over the topic. Ahmed was very helpful
most important trainer knowledge and the way of and humble and was always there to help us.
knowledge sharing. Labs and related material was Syed Jaffer Zaidi.
22
Clientele
Our clientele is from different sectors of Pakistan including Defense, government, telecom, banks and IT
industry. Almost 26 % of participation is from the defense sector. Higher level defense and governmental
officials have participated in our training programs.

26%

Banks (15%) Government (18%) IT Industry (20%) Telecom (12%)


Other (9%) Defence (26%)

MOD
GHQ
Defence ISI
Military Intelligence
PAF
State Bank of Pakistan SPD-GHQ
Meezan Bank PAEC
Bank Al Islami Banks Pakistan Navy
MCB
National Bank of Pakistan
UBL
Samba Bank
Tameer Bank NADRA
Islamabad Police
Government HEC
PSO
SNGPL

NTC
WARID
Telenor Telecom
Wateen
Wi-Tribe

LUMS
University of Dammam
Universities MCS (NUST)
Agha Khan University
FAST NU
ABM Group
MT Soft
Horizon Technology
Strategic Security
Rewterz

23
So far we have trained numerous personnel form different sectors like Defence, IT Companies, Banking,
Education, Energy Sector etc.

Ministry of Defense GHQ (Armed Forces) Inter Services Intelligence Military Intelligence SPD-GHQ

Air Weapon Complex NDC/NESCOM Pakistan Air Force MCS-NUST State Bank of Pakistan

Pakistan Atomic Energy


NADRA Commission National Telecom Kaspersky Lab (U.A.E) Ufone Telecom

Ernst and Young Meezan Bank PARCO Bank Al-Islami Islamabad Police

Warid Telecom Telenor Telecom Wateen Muslim Commercial Bank Higher Education Commission

University of Dammam
NIFT PERN Suparco LUMS (Saudi Arabia)

Wi-Tribe CcureIT [Link] KPMG (U.K) GulfCap Investment (U.A.E)

Systems Limited Pakistan Navy Nakheel (U.A.E) Pakistan State Oil National Bank of Pakistan

24
United Bank Limited Samba Bank Tameer Bank Agha Khan University SNGPL

Central Depository NRTC Rewterz CMA CGM Systems (U.A.E) NLC


Company of Pakistan

NCCPL National Foods Limited Horizon Technologies TRG FAST-NU

Toyota-Indus Motors Strategic Security FireEye NetSoft I2c inc

Junaid Jamshed ABM Group Tullo Axvoice Bata

PNEC Muller and Phipps Aptech Dawn Media Group Dubai Immigration

CASE Kualitatem Coeus Infini Logic Deltasoft

Fariya Network GIZ International GulfCap Investments ISRA University IP 360

Infogistic Institute of Chartered Institute of Space Risk Associated LMKR


Accountants of Pakistan and Technology

25
Pacific Delta Shipping NIB Bank Sui Northern Gas Pipelines Limited SNGPL Sonari Bank Sita Aero

Nest Bridge Siemens Server4sale Lucky Cement Tanchulas

CUST voizar NCCPL PTCL KFUEIT

A.F. Ferguson & Co BTMU Agar International Fatima Group Air-University


(Pvt.) Limited

Haniya Technologies Askari Bank FFC SELA-PASS CTD

26
ISLAMABAD / RAWALPINDI
Al-Mizan Campus: I-14 Campus: G-7 Campus:
Al-Mizan IIMCT Complex, Sector I-14, Haji Camp, Islamabad. RIU, 7th Avenue, G-7/4, Islamabad.
274-Peshawar Road, Rawalpindi. Phone: +92 (51) 844 6000-7 Phone: +92 (51) 289 1835-8
UAN: +92 (51) 111-510-510 UAN: +92 (51) -111-747-424 Fax: +92 (51) 289 0690
Phone: +92 (51) 512 5162-7

Gulberg Green Campus: ETB Campus: Westridge Campus:


Plot No PB-02 Gulberg Expressway, Suite No 7,Ground Floor, Evacuee Potohar Plaza, main Peshawar Road,
Gulberg Green (IBECHS), Islamabad Trust Complex, Agha Khan Road, Rawalpindi.
Phone: +92 (51) 5912890-5 Sector F-5/1, Islamabad. Phone:+92 (51) 5166 813-4, 5166 917-8
Phone: +92 (51) 843 8370-7

IIMCT Pakistan Railway Hospital: Riphah International Hospital: Islamic International Dental Hospital:
Westridge, Rawalpindi. Main Expressway opposite DHA II, IIDH, 7th Avenue, G-7/4, Islamabad.
Phone: +92 (51) 425 9795-8 Sihala, Islamabad. Phone: +92 (51) 289 1835-8
Fax: +92 (51) 425 9793 Phone: +92 (51) 448 6064 Fax: +92 (51) 289 0690

MaxHealth Hospital:
2-K Markaz Road, G-8 Markaz,
Islamabad
Phone: +92 (51) 8094760-65

LAHORE

Raiwind Campus: Quaid-e-Azam Campus Gulberg Campus:


Raiwind Road Campus, 28-M, Qauid-e-Azam, Industrial 26-M, Gulberg - III,
13-Km, Raiwind Road, Lahore. Estate, Kot Lakhpat, Lahore. Ferozepur Road, Lahore
Phone: +92 (42) 111- 747-424 UAN: +92 (42) -111-747-424 UAN: +92 (42) -111-747-424

FAISALABAD MALAKAND
Faisalabad Campus: Malakand Campus:
Satiana Road, Adjacent Fish Farm, Chakdara Road, Malakand.
Faisalabad. Phone: 0314-3019495
Phone: +92 (41) 8777- 210 & 310

Find us on facebook

RIPHAH
FM102.2

[Link]

You might also like