Department Course
Mobile Commerce (ECBP614)
This course provides a coverage of mobile commerce (m-commerce) including frameworks, applications, requirements, location-based services, group-oriented services, transaction management, content and pricing, business model and emerging m-commerce services. The proposed course brings together challenges and solutions in mobile commerce including multi-layer frameworks, current and emerging mobile commerce services such as mobile financial services and mobile entertainment services. Management of mobile commerce services, business models and revenue management are also included. As m-commerce is going through many advances, many near and long-term issues such as the role of emerging wireless LANs and 3G/4G wireless networks, personalized content management, implementation challenges in m-commerce and futuristic m-commerce services will also be discussed.
Credit Hours : 3
Fourth Industrial Revolution (GEIT112)
With the rapid technological development and transformation, the world now is amidst the Fourth Industrial Revolution. This revolution is very much driven by intelligence in powering decision-making and processes. This course is designed to offer students an introduction to Fourth Industrial Revolution and provides a coverage of key Fourth Industrial Revolution technologies and trends; the changes it will generate and the benefits of its application; the different provided opportunities and posed challenges; and how organizations can reap Fourth Industrial Revolution benefits.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Explain Fourth Industrial Revolution concepts, components, opportunities, drivers and challenges.
- Compare different technologies involved in Fourth Industrial Revolution.
- Discuss individuals and societal Fourth Industrial Revolution impacts.
- Develop lifelong Fourth Industrial Revolution skills.
Information Systems Management (ISBP631)
IT is broadly encompassing the information that business creates and uses, as well as a wide spectrum of increasingly convergent and interlinked technologies that process information. Topics include: Information Systems in organizations; organizing data and information; enterprises and their organization; overview of Electronic Commerce; transaction processing and Enterprise-Wide Systems; information and Decision Support Systems; systems analysis, design, implementation and maintenance; Database Management Systems, Current trends in the development of information systems, and Creating and sustaining competitive advantage with IT.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze Current Trends In The Development Of Information Systems.
- Analyze How It Usage By An Organization Creates And Sustains A Competitive Advantage.
- Assess Information Sharing Across Business Departments For Efficient Operations.
- Evaluate It Strategies In An Organization.
- Synthesize Information And Technologies Used By Businesses Processes.
Applied Data Mining (ISBP632)
Due to advances in IT, the amount of modern data comprises huge files of diverse types, resulting in data rich but information poor organizations. To facilitate discovery of information patterns and trends, new approaches are required. Data mining techniques can help companies discover information and acquire business intelligence from these massive datasets. This course covers data mining for business intelligence. Data mining refers to extracting or “mining” knowledge from large amounts of data and consists of techniques that aim at discovering patterns that can bring value or “business intelligence” to organizations, for example consumer behavior. The course covers salient data mining techniques including classification, clustering, association rule mining, visualization and prediction.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Perform data pre-processing and exploration.
- Apply data mining techniques to extract knowledge from different genres of data.
- Develop data mining models for decision making.
- Evaluate the performance of different data mining techniques.
- Demonstrate teamwork skills.
Managing the IT Venture (ISBP633)
Digital firms are distinguished from traditional firms because of their near total reliance on a set of information technologies to organize and manage their operations. This course focuses on starting-up a such a new Information Technology (IT) venture; Identifying IT venture opportunities; Drafting an agenda for a successful IT venture; Risks and returns management; Business planning; Operational planning; Organizational development and management; Financing entrepreneurial ventures.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Investigate the role and skills of an entrepreneur.
- Analyze the entrepreneurial process in IT related business.
- Evaluate the principles and success factors of IT venture planning.
- Assess the viability of functional planning in IT ventures considering key legal and intellectual property issues.
- Create a business plan (including financial plan) for an IT venture.
Enterprise Computing (ISBP634)
Enterprise computing involves the use of computers in networks, such as LANs and WANs, or a series of interconnected networks that encompass a variety of different operating systems, protocols, network architectures, and enterprise applications. This course introduces the concept of enterprise computing and covers various enterprise technologies including architectural frameworks (.Net, CORBA, EJB), business process modeling tools, integration frameworks (EAI, SOA and web services), and applications such as ERP and CRM. In this course, students carry out a research project on future directions and challenges of enterprise applications and technologies.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Apply Architectural Frameworks (Corba, .Net, Ejb) For Enterprise Computing Applications
- Conduct Research On Enterprise Computing Topics.
- Construct Enterprise Applications Using Service Oriented Architecture (Soa).
- Develop Business Process Models
- Investigate The Evolution Of Enterprise Computing, Its Underlying Distributed Platforms And Architectures, And Typical Enterprise Applications.
Knowledge Management (ISBP635)
Knowledge Management (KM) is a discipline that promotes an integrated approach to identifying, capturing, sharing and evaluating an enterprise's information and knowledge assets. This course reviews and discusses existing technologies in KM and new, emerging KM technologies and practices. The course evaluates the computer representation, access, and utilization of knowledge versus information within a human context. It provides an essential preparation for managerial roles in today's modern knowledge-based economy.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze Different Approaches To Knowledge Management In Organizational Contexts.
- Analyze Knowledge Management Technologies And Practices.
- Create A Plan To Leverage Opportunities, Capture, Represent And Share Knowledge Within An Organization.
- Demonstrate The Ability To Work In A Team And Communicate Effectively.
- Evaluate Current Trends In Knowledge Management And Their Manifestation In Business.
IT Legislation (ISBP636)
This course provides a broad spectrum and analysis of the legal issues confronted in today’s information technology (IT). It describes the foundation of intellectual property concepts upon which IT activities and transactions are based. The course also explains the licensing issues of software or information resources, the outsourcing or hosting of services or information, the allocation of software or websites development rights. It also addresses existing legislations and regulations impacting the use of IT systems in the UAE, including electronic privacy and security, and commercial laws related to IT
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Assess The Foundation Of Intellectual Property Concepts.
- Discuss The Vital Components And Key Practical Applications Of An Information Security Policy.
- Evaluate The Principles And Philosophies Which Underlie Successful Information Security Governance.
- Evaluate The Value And Necessity Of Information Security Policies In The Globalizing Business World.
- Investigate The Major Social, Legal, And Ethical Issues Present In The Realm Of Computing.
E-Governance (ISBP637)
This course introduces Internet technologies that are affecting people’s interactions with government. The course shows the means by which governments use and manage these technologies to provide better information and services to the public. The course content is divided into three categories: Overview and assessment of development techniques, key policy issues relevant to e-government implementation programs and the broader use of information technology in modern societies. Case studies, which explore the skills and concepts needed to manage e-government projects and programs effectively, are also discussed in this course.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze Key Issues Impacting E-Governance Adoption And Implementation.
- Assess Key E-Governance Components, And Models In Enterprises.
- Develop Strategic E-Governance Project Plan For An Enterprise.
- Investigate The Different Types Of Interactions In E-Governance.
Computation and Data Science (ISBP669)
This course will introduce the students to the main concepts and tools of computation for data science. There are two main components to this course, namely, conceptual component and practical component. The conceptual part will start with an overview of data, information, and computational techniques that data analysts and data scientists work with. It will follow a description of different types of data analytics, including data extraction, cleaning, statistical inference from data, regression models, and an overview of machine learning. The second part will be a hands on experience with the state-of-the art computational tools for data science, including R, python and java based libraries and tools. This part will also include real case studies. The course will be concluded with relevant contemporary challenges and research problems related to data science.
Credit Hours : 3
Prerequisites
- PHYS105 with a minimum grade D
- PHYS110 with a minimum grade D
- MATH105 with a minimum grade D
- MATH110 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Describe the conceptual fundamentals of data science
- Compare various approaches for data analytics
- Design a data analytics solution for a real world problem
- Evaluate effectiveness of different data analytics tools on addressing a given problem
Network Security I (ISEC311)
This course provides the basic fundamental theoretical concepts of network traffic and services filtering. In addition, this course provides concepts of stateless and stateful firewalls. Topics include: TCP/IP protocols, network packet filtering, common Internet services (HTTP, FTP, SMTP, POP3, DNS, etc.) filtering, stateless and stateful firewalls, firewall filtering rules consistency and efficiency verification, VPNs, secure network architectures, network attacks on firewalls.
Credit Hours : 3
Prerequisites
- ITBP301 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Assess Firewall Filtering Rules Consistency And Efficiency.
- Compare Stateless And Stateful Firewalls.
- Demonstrate Teamwork Skills.
- Describe Tcp/Ip Protocols And Common Network Services.
- Discuss Vpn And Secure Network Architectures.
- Explain Network Traffic And Service Filtering Concepts.
Cryptography (ISEC312)
The students in this course will be introduced to various encryption techniques and their applications. The main encryption techniques the students will learn and apply in this course are Symmetric encryption, Public-key encryption, and hash functions. These techniques will be used for digital signatures, certificate generation and verification. The performance of the various encryption techniques used will be analyzed based on certain criteria and design needs.
Credit Hours : 3
Prerequisites
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze Security Threats Associated With Cryptographic Algorithms.
- Apply Hash Function Algorithms
- Discuss Contemporary Cryptography And Its Application.
- Evaluate Various Cryptographic Techniques.
- Investigate The Mathematical Concepts Required For Cryptographic Algorithms
Network Security II (ISEC321)
This course covers basic fundamental theoretical concepts, mechanisms and techniques for network intrusion detection and prevention both in wired and wireless networks. In addition, the course provides students with hands-on skills on configuring intrusion prevention systems (IPS) as well as on generating common network attacks. Topics covered include: overview on network attack types, attack signatures generation, denial of services (DoS) attacks, distributed DoS attacks, buffer overflow attack, Man-in-the-Middle attacks, ARP cache poisoning attacks, common mobile and wireless network attacks, IP spoofing based attacks, sniffing attacks, covert channels, steganography, operating systems fingerprinting, system and network vulnerability assessment.
Credit Hours : 3
Prerequisites
- ISEC311 with a minimum grade D
Corequisites
- ISEC414 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Demonstrate teamwork skills.
- Discuss system security auditing and vulnerability assessment.
- Evaluate IPS attack signature rules.
- Analyze common security threats and network attacks.
- Compare appropriate countermeasures for common network attacks.
Design and Analysis of Security Protocols (ISEC322)
This course provides the students with the necessary knowledge in the design, analysis, and evaluation of various security protocols and mechanisms, including but not limited to: basic symmetric and asymmetric cryptography protocols, SSL/TLS, WEP/WPA, IPSec, S/MIME, PGP, SSH, X.509 and Kerberos. A security protocol may fail in three ways: the protocol design may be flawed, the cryptography may be inadequate, or the implementation may be buggy. This course focuses on discussing the pros and cons of various security trade-offs involved in the design of internet protocols, identifies and describes vulnerabilities associated with such protocols, and describes the mitigations for these vulnerabilities.
Credit Hours : 3
Prerequisites
- ISEC312 with a minimum grade D
Corequisites
- ISEC324 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze vulnerabilities associated with the insecure internet and E-Commerce Protocols.
- Communicate issues relevant to Public-Key Infrastructure (PKI).
- Demonstrate how security protocols are used to achieve internet and E-Commerce security.
- Describe the internet and E-Commerce Security Protocols.
- Explain the concept of trust (and trust models) on the internet using secure internet protocols.
Secure Software Design and Engineering (ISEC323)
This course takes a close look at software as a mechanism for attack, as a tool for protecting resources, and as a resource to be defended. The course covers how poor software design and engineering can be the root causes of most security vulnerabilities in deployed systems, web technologies and digital rights management. Topics covered include: secure software design and development process, common software and web vulnerabilities such as buffer overflows and cross site scripting, program and code auditing and analysis using static, dynamic, and hybrid analysis, software watermarking and code obfuscation, and software testing for vulnerability.
Credit Hours : 3
Prerequisites
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze software vulnerabilities.
- Analyze web application security threats and countermeasures.
- Compare various software security testing tools and techniques
- Discuss common security issues in software.
- Explain secure software design & development techniques
Cryptography Lab (ISEC324)
This laboratory course provides hands-on experience that covers the concepts of symmetric and asymmetric cryptographic algorithms, hash functions, and its real-world security applications. Main topics include: classical cryptography, encryption algorithms including DES, RC4, AES and RSA, Diffie-Hellman key exchange, hash functions, cryptographic-based security protocols including SSL, SSH, PGP, and IPSec.
Credit Hours : 1
Corequisites
- ISEC322 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze classic cryptographic algorithms.
- Compare security properties of well-known cryptographic protocols
- Implement an IPSEC VPN solution for a small network.
- Implement public-key cryptosystems techniques
- Implement symmetric cryptography techniques
Privacy and Anonymity (ISEC411)
This course prepares students to recognize, analyze, and manage privacy challenges. Students learn concepts and methods for creating technologies and related policies with provable guarantees of privacy protection. Students will draw on work from data mining, information retrieval, web technology, computer security, cryptography, relational databases, statistics and political philosophy. Students are not expected to have these backgrounds; relevant material is introduced as needed. Main topics include: Privacy concepts and challenges, policies, and regulations; identity, anonymity and confidentiality; private data analysis and database sanitization; privacy-preserving data mining techniques including k-anonymity and secure function evaluation, and finally, some case studies from different domains are presented.
Credit Hours : 3
Prerequisites
Course Learning Outcomes
At the end of the course, students will be able to :- Use tools to detect when data is mined/shared with false beliefs about privacy and data protection.
- Investigate privacy protection technologies that provide formal computational guarantees of privacy.
- Discuss challenges to privacy protection.
- Analyze privacy legislation, policies, and best practices.
Digital Forensics (ISEC412)
This course is designed to equip students with the skills needed to safely locate and secure computer evidence at the search site as well as to conduct subsequent off-site analysis. The course aims to equip future Forensics Investigators and Lawful Enforcement Offices with sufficient knowledge on conducting investigation on Internet based or Cyber based crime. It provides knowledge on implementing the right solution for collecting, analyzing, correlating the Internet data and report them as valid and legal evidence in the court. Topics include evidence handling and disk imaging (restore evidence drive, system backup imaging), DOS/Windows forensics utilities (DOS analysis tools, Access Data’s forensics tool kit, Xway’s WinHex Disk Editor), hidden data and encryption, steganography, covert channel, erased file recovery, Internet investigations, Hacker profile analysis, and Email header analysis.
Credit Hours : 3
Prerequisites
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze concepts of computer digital forensics.
- Assess digital forensics on mobile devices and applications.
- Conduct software and hardware based digital forensic analysis.
- Discuss laws affecting digital forensics.
- Evaluate current computer digital forensics tools.
- Evaluate web and cloud based digital forensic tools.
Security Architecture and Mechanisms (ISEC413)
This course is intended to provide students with an understanding of the OM-AM framework, security architectures and mechanisms, system security infrastructures, access control multilevel security models, and biometric authentication and authorization architecture models. Also, the course provides analysis and evaluation of the security related functions of various systems including: monitoring systems, telecommunication systems, smart grid systems, and physical tamper resistant and proof systems.
Credit Hours : 3
Prerequisites
- ISEC322 with a minimum grade D
Corequisites
- ISEC423 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze security threats associated with information systems and their infrastructures
- Apply security access control models
- Design a secure information system using the OM-AM framework
- Discuss system security architectures concepts and their attributes
- Evaluate biometric solutions and authentication protocols
- Select security countermeasures solutions
Network Security Lab (ISEC414)
This laboratory course provides hands-on experience that covers a broad spectrum of state-of-the-art network security practical solutions, their implementation details, verification steps, and testing procedures. Main topics include: security features of network devices such as routers and switches; authentication, authorization, and auditing models; best practices of access control security policies; stateful and application firewalls; intrusion detection, prevention, and response systems; network threats and attacks.
Credit Hours : 1
Corequisites
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze common network threats and attack vectors.
- Analyze security incidents using intrusion detection and prevention systems.
- Apply Attack Mitigation Techniques.
- Configure security features of network devices.
- Implement packet filters, stateful firewalls, and application layer firewalls.
Information Security Management (ISEC416)
This course will cover a variety of topics to develop students’ skills in information security management. The course examines the fundamental principles of computer security management as applied to information technology. Course topics include: Security Management Practices: Business Continuity Planning (BCP), Disaster Recovery Planning (DRP), Law, Investigations, and Ethics. Business Needs: Commercial and legal implications. Introduction to ISMS standards: History, development, current situation. Certification: process and maintenance. Accreditation: Current developments, options, designing and implementing a management system. Policy and risk assessment: Statement of applicability, risk management, critical success factors, auditing.
Credit Hours : 3
Prerequisites
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze And Implement Business Continuity Planning (Bcp) And Disaster Recovery Planning (Drp)
- Analyze Risk Management And Auditing Techniques
- Apply Isms Standards.
- Apply Risk Evaluation And Mitigation Strategies
- Criticize Legal And Ethical Implications On Security Management
- Discuss Security Management Policies And Best Practices
Database Security (ISEC417)
This course is concerned with the study of principles and practices of implementing computer database security. The course discusses the following security features of the database: database security principles, database auditing, security implementation and database reliability, database enumeration (authenticated and unauthenticated), identifying database vulnerabilities, exploiting flaws to gain control, developing an assessment methodology, database assessment flag challenge, and virtual private database. The course provides also suggested architectures for common security problems. Students will learn how to secure their database and how to use the database features that enhance security. The student will be provided with the tools, techniques and industry accepted methodologies so that upon completion of the course the student will be able to describe key concepts of database security and how to apply those concepts to securing database management systems within their organizations.
Credit Hours : 3
Prerequisites
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze security vulnerabilities in databases.
- Apply database security models and policies on modern databases.
- Compare various database security and defense mechanisms.
- Describe database security models and architectures.
- Discuss data and applications auditing procedures for database security.
Risk Analysis and Management (ISEC421)
This course provides students with an introduction to the field of information security risk assessment. Students will learn how to design systems that are secure, how to measure risk, and how to ensure that proper levels of security are maintained for individual technology users, businesses, government, and other organizations. This course will cover different approaches for risk assessment and risk mitigation. Students will learn how to apply NIST standards in conducting risk assessments. The course will incorporate cases in risk analysis derived from actual state and law enforcement agencies or private firms. Students will learn how to use a risk analysis matrix for performing both quantitative and qualitative risk analysis. As a part of the course, students learn the different threats that they need to incorporate in their risk analysis matrices. Course topics include: Threat Vulnerability Analysis (TVA), Risk Management Identification and Assessment, Strategies (Avoidance, Transference, Mitigation, Acceptance), Counter-Measures, Cyber Warfare (Technical and People), Vulnerability Testing and Penetration Testing, Contingency Planning (Business Impact Analysis, Disaster Recover, Business Continuity), SETA: Security, Education, Training and Awareness Initiatives, Cost Benefit Analysis of Info Security investments
Credit Hours : 2
Prerequisites
Course Learning Outcomes
At the end of the course, students will be able to :- Compare risk assessment techniques
- Design an information security risk management program for an organization
- Implement an information security risk management roadmap
- Manage an information security risk assessment consulting contract
Security Policy, Laws, and Governance (ISEC422)
This course provides students with an introduction to information security policies and standards, as per the ISO/IEC 27001-2013 guidelines. In this course, students will be introduced to sociological and legal issues in policy implementation in general (such as Sarbanes Oxley, HIPAA, Gramm, Leach, Bliley Act, etc.) and will be provided with a focused dialogue on information security specific policies. The course also discusses the entire lifecycle of policy creation and enactment and presents students with issues specific policies in different domains of security. The structure of policy is also discussed to assist the students in the design and modification of policies. Moreover, Students will learn how to allocate the appropriate security techniques needed to satisfy a specific security policy. Several examples from different domains are incorporated in the curriculum to assist students to learn in context of real life situations
Credit Hours : 3
Prerequisites
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze Designing Issues Pertaining To Information Security Policies
- Apply Principles And Philosophies Which Underlie Successful Information Security Governance
- Discuss Interactions Between Information Security Concerns And Business Objectives.
- Evaluate Information Security Activities Within The Implementation Of Projects
- Investigate Sociological And Legal Issues In Policy Implementations
Systems Security Lab (ISEC423)
This laboratory course provides practical training and hands-on experience on the basic Computer Systems Security concepts as it pertains to the logical and physical security. It will expose the students to various security principles of trusted computing bases. Main topics include Operating System Security, Access Control Models, Password Cracking, Computer Viruses, Windows Registry Hacks, Computer Viruses, Web Security, Biometrics Solutions, and Digital Forensics.
Credit Hours : 1
Corequisites
- ISEC413 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Configure biometric security systems.
- Design active response security architectures.
- Evaluate operating systems security aspects .
- Implement lattice-based access control model.
- Use digital forensics hardware and software tools
Hardware-Oriented Security and Trust (ISEC424)
This course will investigate recent technology developments for the design and evaluation of secure and trustworthy hardware. It also teaches the concepts of tamper-proof, tamper-resistance, and trusted platform modules. Topics covered mainly include: Smart cards, RFIDs, cryptographic processor and processing overhead analysis, physical and invasive attacks, side-channel attacks, physically unclonable functions, hardware-based true random number generators, watermarking of Intellectual Property (IP) blocks, FPGA security, passive and active metering for prevention of piracy, access control, hardware Trojan detection and isolation
Credit Hours : 3
Prerequisites
- ISEC413 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze Attacks On Hardware Systems
- Apply Detection, Prevention And Isolation Methods Against Hardware Attacks
- Assess Vulnerabilities Of A Hardware Device Or System
- Evaluate Security And Trust Of Hardware Systems
- Integrate Hardware Security Measures As A Design Metric
Special Topics in Information Security (ISEC428)
The course focuses on selected topics pertained to current information security solutions and methodologies. The course represents an in-depth approach to specific areas in information security which are of interest to undergraduate students in the program. It covers topics in computer, network, and systems security and privacy which are not covered as part of required courses. Students will learn to apply existing security techniques and methodologies to emerging systems and networks, derive and enumerate best practices for the selected topics and evaluate chosen security schemes.
Credit Hours : 3
Prerequisites
Course Learning Outcomes
At the end of the course, students will be able to :- Evaluate options for a needed security solution.
- Compare various security mechanisms.
- Apply current security solutions to address certain requirements.
- Analyze the performance of applied security solutions.
Advanced Systems and Data Security. (ISEC755)
The goal of this course is to introduce students to the computational technologies for ensuring systems and data security. The main topics include security architecture, operating systems security, security issues in database systems, privacy preserving data mining, secure computations on distributed data, and secure data outsourcing. The foundations are drawn from a number of sub-disciplines of Computer Science including: database systems, data mining, algorithms, cryptography, and computer security.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Discuss policies and best practices in the context of system and data security.
- Evaluate system security vulnerabilities and data protection techniques.
- Develop secure computing solutions.
- Create scientific reports.
Information Technology Project Management Exhibition (ITBP280)
This course provides concepts, tools and models built along the IT project management life cycle. It covers detailed topics of IT project management, including project planning, project governance, project procurement management, project time management, project cost management, project risk management, project quality management, leadership and ethics, project closure and evaluation. Application of IT project management skills for an IT project is an important part of this course.
Credit Hours : 3
Prerequisites
- CSBP219 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Apply IT project techniques and tools to manage an IT project.
- Apply project lifecycle processes to an IT project.
- Demonstrate verbal, and written communication skills as part of a team.
- Identify internal and external constraints of a given IT project.
- Produce documents typically used in the development of an IT Project.
Security Principles & Practice (ITBP301)
This course provides an overview of information security. It is designed to help students understand this important priority in society today. The content of the course gives a broad overview of essential concepts and methods for providing and evaluating security in information processing systems (e.g. operating systems and applications, networks, protocols). The course will be organized around a few themes: foundations (security mindset, essential concepts: e.g. policy, CIA), authentication and access control, software security (e.g. vulnerabilities and protections, malware, program analysis), practical cryptography (e.g. encryption, authentication, hashing, symmetric and asymmetric crypto), networks (e.g. wired and wireless networks, protocols, attacks and countermeasures).
Credit Hours : 3
Prerequisites
- CENG210 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze security threats and vulnerabilities in computer systems.
- Define solutions to defend against viruses and other malicious programs.
- Describe cryptographic techniques and their applications.
- Discuss operating system security models and mechanisms.
- Explain security policies, models, and mechanisms.
Web Application Development Lab (ITBP321)
The objective of this lab is to provide a hands-on approach to the creation of a Web based application while ensuring the participants are involved in the different stages of a software project lifecycle. The lab formally introduces the fundamentals of using SQL to create a database back-end and tie it to a Web front-end using HTML, JSP and Servlets. The lab also includes a project where students use the acquired Web development knowledge to design and implement a functional Web application. Students work in teams to collaborate in developing the assigned software project
Credit Hours : 1
Prerequisites
- Pre/Co CSBP340 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Apply emerging technologies to build web-based applications.
- Create database using MYSQL and write SQL quires to add, display, or delete data from database.
- Develop internet-based applications using client-side and server-side programming.
- Use HTML, servlet and JSP to connect and query databases.
Web and Mobile Systems (ITBP322)
This course introduces the concepts, practices, and technologies to design, develop, and manage web and mobile applications. It covers different technologies related to the Web such as HTML5, Cascade Style Sheets (CSS), and Java Script Pages (JSP). The course establishes mobile development foundation, which includes mobile layouts, handlers, and views. It also covers Mobile Development and relevant Internet development approaches and architectures such as Model-View-Controller (MVC), relational databases and restful services. Students develop web/mobile-enabled databases in project-based assignments
Credit Hours : 3
Prerequisites
- CSBP219 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Design a web site for mobile application (E-learning, E-health, E-Business…) using specific technologies
- Design mobile application (M-learning, M-health, M-Business, U-learning.. (U ubiquitous))
- Explain the layers based approach to design web and mobile (E, M and U) system.
Systems Integration and Administration (ITBP323)
This course will provide students with the knowledge and tools needed to plan, manage and administer network systems hardware and software resources of an enterprise. Topics include, approaches to system integration, performance monitoring and backup strategy, active directories, control users’ access and privileges, troubleshooting for errors and misuse, network services and management, server management, Virtual Machines, user/client administration and services, heterogeneous operating system environment (Linux, Windows ...ect.).
Credit Hours : 3
Prerequisites
- CSBP315 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Discuss systems integration approaches.
- Discuss Virtual Machines in the context of different operating systems.
- Configure users, group accounts, and access policies.
- Manage servers, files and system resources.
- Apply remote access methodologies to manage network devices, servers, and client computers.
- Apply troubleshooting of both systems and networks for error, performance and connectivity.
Cloud Computing Fundamentals (ITBP324)
This course introduces the concepts, practices and technologies to develop, deploy and manage Cloud computing applications, allows the students to learn and practice the web as the portal to Cloud, including a detailed overview of Web protocols, to learn and practice virtualization and its use and benefits for cloud computing, scheduling of cloud computing loads where issues related to execution time versus bandwidth and load balancing will be examined, distributed data center file systems and technologies, as well as security and privacy issues.
Credit Hours : 3
Prerequisites
- CSBP219 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Develop cloud computing application;
- Define cloud service in different area ( X as a service);
- Design mobile application as a service using cloud computing technology (M-learning, M-health, M-Business, U-learning.. (U ubiquitous));
- Specification of cloud computing application using cloudsim.
Professional Responsibility in Information Technology (ITBP370)
A coverage of ethical issues and solutions in IT; code of ethics; ethical decision making; computer crimes and security; freedom of expression; electronic privacy protection; intellectual property protection; computing in the workplace and its implications on workers and organizations; online communities, the digital divide, and their social and economic implications; professional communication and team work; examples of laws and regulations; case studies.
Credit Hours : 3
Prerequisites
- ESPU1081 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze issues and case studies using ethical decision making based on a code of ethics and formal methods
- Discuss intellectual property and software development issues.
- Discuss the implications of computing in the workplace on workers and employers.
- Discuss the Socio-Economic implications of online communities and the digital divide.
- Function in groups to assess current ethical issues and communicate the results in oral and written form
- Identify privacy, freedom of speech and crime issues in cyberspace.
The Internet of Things (ITBP410)
The course covers the significance of Internet of Things (IoT) in society, the common components IoT devices and the future trends. Design considerations for IoT devices and systems and the constraints are also discussed. The interfacing among the IoT devices and the physical world are covered. The course also covers operating systems for IoT. Additionally, the course goes over the major components of networking from the IoT perspective, i.e., Internet-connectivity, mobile adhoc networks, etc. Other topics as they related to IoT are: big data and analytics, edge and cloud computing, and security and privacy. Practical implementation of core IoT concepts is included in the course.
Credit Hours : 3
Prerequisites
- CENG530 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Explain IoT, its impact on society and the related technology trends.
- Evaluate the components of an IoT embedded system.
- Evaluate the interactions of an IoT device with the physical world.
- Build an IoT system.
- Explain mobile adhoc networks and their relation to IoT devices.
Entrepreneurship in Information Technology (ITBP418)
This course discusses starting-up a new Information Technology (IT) venture; Identifying IT venture opportunities; Drafting an agenda for a successful IT venture; Risks and returns management; Business planning; Operational planning; Organizational development and management; Financing entrepreneurial ventures.
Credit Hours : 3
Prerequisites
Course Learning Outcomes
At the end of the course, students will be able to :- Apply The Process Followed By An Entrepreneur In Selecting A Valuable Opportunity For An It Related Business
- Create A Business Model And Financial Plan For An It Venture
- Describe The Role And Skills Of An Entrepreneur And Cultivate An Entrepreneurial Mindset.
- Evaluate The Viability Of Functional Planning In It Ventures, Considering Key Legal And Intellectual Property Issues.
- Explain The Principles And Success Factors Of It Venture Planning
Data Analytics (ITBP420)
This course will introduce the students to the main tools and ideas of data analytics. The course will give an overview of the data, questions, and tools that data analysts and data scientists work with. There are two components to this course. The first is a conceptual introduction to the ideas behind turning data into actionable knowledge, which includes exploratory data analysis, statistical inference, regression models, and overview of machine learning. The second is a practical introduction to the tools that will be used in the program like R, and RStudio
Credit Hours : 3
Prerequisites
- CSBP320 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Describe different mechanisms of data science
- Compare different approaches for data analytics
- Design a data analytics solution for a real world problem
- Apply different data analytics tools
Big Data Analytics (ITBP421)
This course will enrich knowledge of data science by understanding the challenges of Big Data in Analytics. It will introduce the core concepts behind big data problems, applications, and systems. It will provide an introduction to one of the most common frameworks, Hadoop. This course will give an overview architectural components and programming models used for scalable big data analysis. It will also introduce concepts of big data management systems and machine learning with big data.
Credit Hours : 3
Prerequisites
- ITBP420 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Describe the theory, concepts and challenges in Big Data Analytics.
- Analyze different Cloud Computing Techniques for Big Data.
- Design efficient and scalable applications for Big Data Analytics.
- Compare different Techniques on a given Big Data Analytics problem.
- Assess challenges and opportunities of Big Data Analytics for various applications.
Mobile Computing (ITBP430)
Mobile computing devices have become omnipresent in our daily activities. This course will introduce students to mobile computing and mobile application development. Mobile computing will be discussed from three perspectives: mobile technology, application development, and user interaction. The course will first overview various mobile computing applications, technologies and wireless communication. Next, students will be introduced to and use mobile application frameworks and development environments. User interface and user experience will be discussed and application development guidelines from various vendors will be discussed and analyzed. Students will be expected to learn at least one mobile application development framework and use it to implement their assignments and course project.
Credit Hours : 3
Prerequisites
- ITBP322 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Explain mobile computing concepts and principles.
- Design a simple mobile application for hand held devices.
- Compare current mobile platforms and their architectures.
- Develop applications on a mobile computing system to interact with servers and database systems.
Senior Graduation Project I (ITBP480)
Supervised students in small groups undertake full end-to-end development of a substantial project plan, taking it from initial concept through the final delivery. Topics range from applied IT development to assignment on applied research. Students are expected to: complete literature survey; develop a project plan; analyze requirements and acquire the necessary material and steps for their intended project.
Credit Hours : 3
Prerequisites
- STAT210 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze project requirements
- Communicate effectively both orally and in writing
- Create an effective project plan
- Function effectively, professionally and ethically on teams
- Integrate IT technologies/principles into the project design
- Undertake a survey of related work and evaluate the project objectives against the findings
Senior Graduation Project II (ITBP481)
Students work in teams under the supervision of a faculty member on the implementation, testing and analysis of the results of a project based on the design and schedule completed by the same group of students during the ITBP 480 course
Credit Hours : 3
Prerequisites
- ITBP480 with a minimum grade D
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze obtained results and make recommendations
- Apply enabling technologies/principles to implement the project
- Communicate effectively both orally and in writing
- Function effectively, professionally and ethically on teams
- Recognize the need for continuing professional development
Internship (ITBP495)
Students are required to spend one full semester as interns in an approved internship program. The internship provides students with practical experience, which allows them to integrate theory with “real world” situations. During the internship students work under the supervision of a qualified professional in industry or government fulfill various assignments to acquire first-hand knowledge of a working environment. In addition to this professional supervision, each student is assigned an academic advisor to ensure that an appropriate level of support from and contact with the university is given to the student during the training period. Students are required to write a final formal report, that documents and details the technical aspects of the work undertaken during their internship, and give a final presentation at the end of the internship period.
Credit Hours : 12
Course Learning Outcomes
At the end of the course, students will be able to :- Apply IT knowledge in the workplace
- Communicate effectively and technically orally and in writing
- Function effectively, professionally and ethically on teams
- Identify the structure and operations of the workplace
- Recognize the employee rights and responsibilities
- Recognize the need for continuing professional development
Current Emerging Trends in Information Technology (ITCO601)
The course enables future IT leaders and researchers to look ahead on both existing and emerging technologies and consider how these could be applied within their enterprise environments. Topics include: Cloud computing, Big data analytics, Mobility to increase the pace of information absorption and decision making, Social networking, Green computing, Internet of Things, Smart cities, Privacy, Security and ICT Ethics.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze Opportunities And Challenges In Applying Emerging Information Technologies.
- Develop A Project Or A Survey Paper On Emerging Information Technologies.
- Evaluate The Advantages Of Emerging Information Technologies.
- Investigate Various Emerging Information Technologies.
Management and Leadership in Information Technology (ITCO602)
This course provides students with essential strategic skills and knowledge required to lead the assessment and management of Information Technology (IT) projects in organizations. Topics include: strategic IT integration, organizational and managerial issues that impact IT projects, the business case and feasibility studies, project planning and control and risk assessment, leadership and management practices and change management.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Develop Information Systems Strategic Architecture And Infrastructure In Organizations
- Function Effectively Within Teams To Address Key Strategic Information Systems Project
- Analyze The Business Case For Strategic Information Systems Highlighting The Different Impacting Factors And Key Project Management Issues.
- Assessing The Readiness And Competency Of Organizations And Their Management For Managing And Implementing Strategic Information Systems Projects.
- Develop Information Systems Strategic Architecture And Infrastructure In Organizations
- Function Effectively Within Teams To Address A Strategic Information Systems Project
System Analysis, Modeling & Design (ITCO603)
This course provides students with in-depth knowledge of object oriented systems analysis and design procedures. The course covers system development life cycle models, with emphasis on Risk Management methodologies. Emphasis is on the specification of system’s logical and physical analysis and design from a management perspective. Software project management techniques are introduced. The course also addresses team organization and communication.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Apply Systems Analysis And Object Oriented Design Principles To Develop Software Systems.
- Apply Systems Analysis And Design Principles.
- Develop Project Plans
- Evaluate Various Systems Design And Development Methodologies.
- Implement Project Following System Design Processes.
Research Methods in Information Technology (ITPG602)
Techniques and conventions in research methods, evaluation approaches, Ethics, and presentation of results, how to choose a research topic, how to write a thesis proposal or a research proposal, common research methods in IT, research outcomes presentation, research evaluation, research papers review.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Identify An Appropriate Research Area In It And Apply Related Methodologies
- Produce Well Developed Research Proposal, And Research Paper
- Use The Resources Needed To Guide The Research Process
- Apply The Various Tasks Required To Carry Out The Research
- Apply Various Tasks Required To Carry Out Research
- Develop Research Proposals, And Research Papers
- Investigate Research Areas And Methodologies In It.
- Use Scholarly Resources To Conduct Research
Practicum Project (ITPG690)
This course gives students the opportunity to develop in-depth competency in one or more advanced IT disciplines as well as soft skills that are needed in major IT projects. Students are expected to undertake a structured problem identification and formulation, devise solutions, generate and analyze results, and effectively communicate their results.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Develop knowledge of IT project requirements, design, and implementation
- Apply technologies associated with end product.
- Apply design methodologies to produce system design documents.
- Demonstrate teamwork and communication skills.
- Create the different phases of an IT project development lifecycle.
Special Topics in Information Technology (ITPG698)
The content of this course is customized on every offering depending on current trends and interests.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Apply Information Technology Concepts And Principles In Various Emerging Areas.
- Criticize Different Enterprise Architectures And Platforms
- Investigate Research Activities In Selected Topics Of Information Technology.
- Apply Information Technology Concepts And Principles In Various Emerging Areas.
- Criticize Different Enterprise Architectures And Platforms
- Evaluate New And Rapidly Evolving Technologies And Their Applications.
- Investigate Research Activities In Selected Topics Of Information Technology.
Research Thesis (ITPG699)
This individual research exploration work allows each student to perform real investigation work in the state-of-the-art in a particular domain. Methodology includes theoretical research methods, theoretical analysis methods, origination of an idea, literature review, experiment design, data collection and analysis, and report writing. The course involves a substantive piece of experimental work conducted by the student under supervision of a faculty member, and presented in the form of a thesis.
Credit Hours : 6
Course Learning Outcomes
At the end of the course, students will be able to :- Identify a suitable research method in the domain of the research proposal.
- Identify research activities to be carried out and develop a research proposal.
- Apply research methodologies and theories to develop the proposed research work.
- Analyze ethical issues pertaining to research and scientific pursuit.
- Create novel research work culminating in a thesis that contributes to the body of knowledge.
Foundations of Computational Science and Informatics (ITPG708)
This course covers advanced topics of computational science and informatics such as modeling processes, system dynamics problems, system dynamics models with interactions, simulation techniques, empirical models, cellular automaton random walk simulations, cellular automaton diffusion simulations, high-performance computing. Students will investigate the foundations of computational science models. They will analyze the effectiveness and impact of these models in different domains. State of the art implementations will be used to assess the quality of these systems. Students are required to collaborate on a team project to develop computational model prototypes.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Assess the state of the art in modelling processes, modelling types, simulation techniques, and high-performance computing models and algorithms.
- Evaluate effectiveness of computational models and simulation techniques.
- Analyze current computational models used in different domains including sciences, arts, and humanities.
- Develop simulation solutions in different domains by applying computational modeling tools and simulation techniques.
- Collaborate on a team project to develop computational modeling prototypes.
Numerical Optimization Methods (ITPG720)
This course intends to provide the students with a thorough understanding of numerical optimization methods. This course will cover topics related to unconstrained and constrained optimization, convex optimization and non-convex optimization. The course will also cover derivative-free optimization algorithms and discrete optimization algorithms. Heuristic strategies for optimization will also be covered. Topics include line-search method, trust-region method, conjugate gradient methods, linear programming, the simplex method, duality, interior point methods, quadratic programming, active set methods, gradient projection methods, non-convex stochastic gradient descent, random stochastic gradient descent, discrete optimization algorithms, global search methods and local search methods for derivative-free optimization.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Formulate an optimization problem for a problem in their fields of research.
- Develop solutions for constrained and non-constrained optimization by applying appropriate algorithms.
- Utilize convex and non-convex optimization methods.
- Apply gradient-free and discrete optimization algorithms.
- Describe the limitations of modern optimization techniques.
Special Topics in Informatics and Computing (ITPG760)
This course covers special topics on various advanced or specialized topics in Informatics and Computing. Its content is customized on every offering depending on current trends and expression of mutual interest by students and faculty
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Apply advanced computing principles in various emerging areas.
- Investigate research activities in selected topics of informatics and computing.
- Evaluate new and rapidly evolving computing technologies and their applications
Comprehensive Exam (ITPG800)
Every PhD student must pass a Comprehensive Examination designed to evaluate the breadth and depth of the student’s knowledge of his or her discipline, as well as the student’s scholarly potential. The comprehensive exam consists of an oral part and will be prepared, administered, and evaluated by an examination committee from the student’s concerned department. Students taking the comprehensive exam must be in good academic standing after completion of the required coursework.
Credit Hours : 0
Course Learning Outcomes
At the end of the course, students will be able to :- Assess the comprehensive knowledge gained in fundamental courses relevant to computing.
- Gain greater knowledge of preparation and presentation of key knowledge in computing.
- Comprehend the questions asked and answer them with confidence.
Research Proposal (ITPG810)
Upon passing the comprehensive examination, a PhD student is required to prepare a concise and complete Research Proposal that clearly defines the research problem and objectives, and outlines the research methodology that the student plans to follow. The proposal’s content and format must follow the PhD Research Proposal Preparation Guidelines issued by the College of Graduate Studies. The proposal should be completed under the direction of the student’s supervisor and must be approved by the Advisory Committee. Research Proposals are examined by a committee composed of the student’s advisor, and two other Internal examiners in the field of the student research.
Credit Hours : 0
Prerequisites
Course Learning Outcomes
At the end of the course, students will be able to :- Write a research proposal.
- Study the existing literature on the research topic.
- Develop the main research questions and hypothesis if any.
- Identify the methodology and theories to conduct the research.
- Propose an outline to carry out the research to its completion.
Dissertation Research (ITPG900)
The dissertation research is intended to assist doctoral students in the preparation of a dissertation and facilitate the transition from course work to dissertation. It has a set of definite milestones that students have to meet as they progress through the dissertation process. These include building the research plan, reviewing the existing literature, developing the proposal component, with particular emphasis on research design and development, and finally conducting substantive piece of experimental work. Student will be working under the supervision of thesis advisors, and committee members, he/she will report all in the form of thesis and defend it through a presentation.
Credit Hours : 30
Course Learning Outcomes
At the end of the course, students will be able to :- Compose a research proposal.
- Identify various research activities required to carry out the research.
- Apply independently research methodologies and theories on proposed research topic.
- Write research reports( conference/journal papers).
- Apply ethically research work that contributes significantly to the body of knowledge.
Dissertation Defense (ITPG910)
Student defends his/her research dissertation in the form of an oral presentation in a public session, followed by a closed session, before a Dissertation Examination Committee, which includes internal and external examiners. The outcome of the overall evaluation of the dissertation is based on two main parts: (1) the Committee’s evaluation of the dissertation document and (2) the Committee’s evaluation of the dissertation defense. The final result shall be one of the following: (1) Approve dissertation as presented, (2) Approved with minor revisions, (3) Re-examine after making major revisions, or (4) Rejection of dissertation and dismissal.
Credit Hours : 0
Information Security Fundamentals (SECB621)
This course covers the main information security concepts. It provides students with an in-depth-knowledge of the main security issues, and solutions, that face IT Systems today. The course will cover topics that include but not limited to: cryptography and cryptographic protocols, public key infrastructure, operating systems security, authentication and access control technologies and models. Network security and internet security protocols, database security, wireless network vulnerabilities and countermeasures, firewalls, VPN, and intrusion detection/prevention systems.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze Authentication And Access Control In Computer Systems And Networks
- Analyze Security Policies, Procedures, Models, And Mechanisms.
- Evaluate Cryptographic Techniques And Applications.
- Evaluate Database Security Issues
- Investigate Operating System Security Models And Mechanisms.
Advanced Network Security (SECB622)
This course provides an understanding of advanced network security theoretical concepts, mechanisms, and solutions with emphasis on wired and wireless network architectures, using firewalls, intrusion prevention systems, virtual private networks (VPN), access control lists and protocols. Topics include also anomalies, analysis of network filtering rules, advanced attack signature generation, common attacks mechanisms, covert channels and steganography concepts, operating system fingerprinting, viruses, and malicious codes
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze Common Security Threats And Network Attacks.
- Build Network Firewall, Vpn, And Ips Based Secure Systems.
- Develop Advanced Firewall-Filtering Rules And Attack Signatures.
- Evaluate Appropriate Security Solutions For Different Types Of Network Architectures
- Investigate System Security Auditing And Vulnerabilities.
Cryptography and Secure Communications (SECB623)
The students in this course will be introduced to various encryption techniques, their applications and weaknesses. The main encryption techniques the students will learn and apply in this course are Symmetric encryption, Public-key encryption, and hash functions. These techniques will be used for digital signatures, certificate generation and verification. In addition, the required mathematical concepts for information security will be discussed. The performance of the various encryption techniques used will be analyzed based on certain criteria and design needs.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze Security Threats Associated With Cryptographic Algorithms.
- Apply Hash Function Algorithms.
- Discuss Contemporary Cryptography, Its Application And Weaknesses.
- Evaluate Various Cryptographic Techniques.
- Investigate The Mathematical Concepts Required For Cryptographic Algorithms.
Software Security (SECB624)
This course provides deep understanding of security vulnerabilities of software, operating systems, and web applications. Common cases of vulnerability exploitations followed by mitigation techniques of these exploitations are discussed. Topics include common security vulnerabilities in software (e.g. buffer overflow, format string bug) and web application (e.g. SQL injection, cross-site scripting), vulnerability databases, malicious code analysis (virus, worm, rootkit), social engineering attacks, and vulnerability detection in software and web applications (security testing, static analysis, penetration testing, web scanner). Additional topics discussed include fundamental security concepts present in operating systems (access control, process, memory), examples of security breach mitigation techniques in operating systems (system log analysis, memory randomization, malicious code monitor).
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze Security Threats And Vulnerabilities In Software.
- Compare Software Security Analysis And Testing Tools And Techniques.
- Demonstrate Secure Software Design And Development Techniques To Mitigate Vulnerabilities.
- Evaluate Operating Systems Based On Security Risks And Defense Mechanisms.
- Investigate Web Application Vulnerabilities And Countermeasures.
Secure Electronic Commerce (SECB626)
This course investigates theoretical security problems related to protocols and applications of the Internet and electronic commerce and provides contemporary solutions to these problems. The focus of this course is on architectures and the implementations of security protocols that are used on the Internet today. Topics include: cryptography techniques; Authentication applications; Public-key Infrastructure and Digital Certificates; Email Security: PGP, S/MIME; Web security: SSL/TLS, SET; IPSec; Digital Cash. The course also includes case studies in application of security technology in electronic commerce.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze Security Protocols Used In The Internet And Electronic Commerce.
- Apply Public-Key Infrastructure (Pki) Tools And Applications.
- Criticize Legal And Ethical Issues Associated With E-Commerce.
- Demonstrate How Security Protocols Are Used To Achieve Internet And E-Commerce Security.
Ethics, Law and Policy in Cyberspace (SECB627)
This course provides students with the information needed for the creation, selection and implementation of cyber security policies, and audit and control functions to ensure compliance and efficacy. In this course, students will be exposed to the national and international policy and legal considerations related to cybersecurity such as privacy, intellectual property, cybercrime., homeland security and cyberwarfare. Broader technology issues such as system evolution standards (ISO & Common Criteria) also are discussed to ensure compliance and to demonstrate the interdisciplinary influences and concerns that must be addressed in developing or implementing effective national cybersecurity laws and policies.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Investigate the major social, legal, and ethical issues present in the realm of computing.
- Analyze the key elements for developing information security policies.
- Apply the principles of a good information security governance.
- Develop security policies, procedures and guideline.
Computer Crimes and Forensics (SECB628)
This course is designed to equip students with the theoretical knowledge and practical skills needed to safely locate and secure computer evidence at the search site as well as to conduct subsequent off-site analysis. The course aims to equip future Forensics Investigators and Lawful Enforcement Officers with sufficient theoretical and practical knowledge on conducting investigation on Internet based or Cyber based crime. It provides knowledge on implementing the right solution for collecting, analyzing, correlating the Internet data and report them as valid and legal evidence in the court. Topics include evidence handling and disk imaging (restore evidence drive, system backup imaging), Windows forensics utilities, Access Data’s forensics tool kit, hidden data and encryption, steganography, covert channel, erased file recovery, Internet investigations, Hacker profile analysis, and Email header analysis.
Credit Hours : 3
Course Learning Outcomes
At the end of the course, students will be able to :- Analyze Concepts Of Computer Digital Forensics.
- Assess Concepts Of Computer Crimes.
- Conduct Software And Hardware Based Digital Forensic Investigations.
- Evaluate Current Computer Digital Forensics Tools.
- Investigate Web And Cloud Based Digital Forensic Tools.
عفوا
لايوجد محتوى عربي لهذه الصفحة
عفوا
يوجد مشكلة في الصفحة التي تحاول الوصول إليها