Faculty of Information Technology

More ...

About Faculty of Information Technology

Faculty of Information Technology

The Faculty of Information Technology is one of the most recent faculties at the University of Tripoli, as it was established in pursuant to the former General People's Committee for Higher Education Decision No. 535 of 2007 regarding the creation of Information Technology Faculties in the main universities in Libya.


Upon its establishment, the Faculty consisted of three departments: Computer Networks Department, Computer Science Department and Software Engineering Department. It now includes five departments: Mobile Computing Department, Computer Network Department, Internet Technologies Department, Information Systems Department and Software Engineering Department.


The Faculty’s study system follows the open semester system by two (Fall and Spring) terms per year. The Faculty began to actually accept students and teach with the beginning of the Fall semester 2008. It grants a specialized (university) degree in information technology in any of the aforementioned disciplines. Obtaining the degree requires the successful completion of at least 135 credit hours. Arabic is the language of study in the college, and English may be also used alongside it. It takes eight semesters to graduate from the Faculty if Information Technology.


The Faculty aspires to open postgraduate programs in the departments of computer networks and software engineering in the near future.

Facts about Faculty of Information Technology

We are proud of what we offer to the world and the community




Academic Staff





Faculty of Information Technology News

2021-05-04 349 0
More News




بكالوريوس في تقنية المعلومات
Major هندسة البرمجيات





Who works at the Faculty of Information Technology

Faculty of Information Technology has more than 34 academic staff members

staff photo

Mr. Ahmed Ali Sadegh Elhoni


Some of publications in Faculty of Information Technology

أهم التحديات والصعوبات لتطويرحكومة إلكترونية مكتملة الؤظائف

تشيرتقارير بعض الخبراء الى ان التعامل مع مبادرات الحكومة اإللكترونية على إنها فوضوية و ال يمكن السيطرة عليها، على موخرا على المستويات المختلفة للحكومات والمؤسسات األكاديمية والمؤتمرات الدوليةى حول الرغم من المبادرات العديدة الحكومة اإللكترونية. تطرح انظمة الحكومة اإللكترونية عددا من التحديات لفرق الدعم اإلداري المشرفة على هده االنظمة، لمساعدة هذه الفرق تصف الورقة المراحل المختلفة لعملية تطوير الحكومة اإللكترونية وتقترح نموذج "مراحل النمو" لتحقبق حكومة اإللكترونية مكتملة الوظائف. مواقع حكومية مختلفة، وبعض مبادرات الحكومات اإللكترونية ذات الصلة تساعد في تفسير هذا النمودج . هذه المراحل تطهرالتحول المتعدد داخل الهيكلية الحكومية ووظائفها، في ذات الوقت الذي يتم فيه التحول إلى الحكومة اإللكترونية من خالل كل مرحلة كما توضح التحديات التكنولوجية والتنظيمية لكل مرحلة
عبدالمنعم عمر احمد الاسود(1-2020)
Publisher's website

Vulnerabilities of Biometric Authentication “Threats and Countermeasures”

Biometric systems have a powerful potential to provide security for a variety of applications, systems are nowadays being introduced in many applications and have already been deployed to protect personal computers, Banking machines, credit cards, electronic transactions, airports, high security institutions like nuclear facilities, Military Bases and other applications like borders control, access control, sensitive data protection and on-line tracking systems. While biometrics may improve security in different environments and serve many purposes, biometric systems, like any other security system, have vulnerabilities and are susceptible to threats. they are susceptible to external vulnerabilities of biometric systems so that their weaknesses can be found and useful countermeasures against foreseeable attacks can be developed The increasingly high profile use of biometrics for security purposes has provoked new interest in researching and exploring methods of attacking biometric systems.
Abdulmonam Omar Ahmed Alaswad, Ahlal H. Montaser, Fawzia Elhashmi Mohamad(0-2014)
Publisher's website

An Extensive Study on Online and Mobile Ad Fraud

The advertising ecosystem faces major threats from ad fraud caused by artificial display requests or clicks, created by malicious codes, bot-nets, and click-firms. Currently, there is a multibillion-dollar online advertisement market which generates the primary revenue for some of the internet's most successful websites. Unfortunately, the complexities of the advertisement ecosystem attract a considerable amount of cybercrime activity, which profits at the expense of advertisers. Web ad fraud has been extensively studied whereas fraud in mobile ads has received very little attention. Most of these studies have been carried out to identify fraudulent online and mobile ads clicks. However, the identification of individual fraudulent displays in mobile ads has yet to be explored. Additionally, other fraudulent activity aspects such as hacking ad-campaign accounts have rarely been addressed. The purpose of this study is to provide a comprehensive review of state-of-the-art ad fraud in web content as well as mobile apps. In this context, we will introduce a deeper understanding of vulnerabilities of online/mobile advertising ecosystems, the ad fraud’s well-known attacks, their effective detection methods and prevention mechanisms. arabic 8 English 40
Hala Shaari, Nuredin Ahmed(12-2020)
Publisher's website