Page 209 - Postgraduate Catalog 2024-25
P. 209

209


        including reconnaissance, scanning,   initiative and independent thinking;   maintain integrity, confidentiality,
        enumeration, gaining access,   (b) involve both knowledge gained   and availability of data. The course
        maintaining access, and covering the   through coursework and skills   concludes upon the topic of legal and
        tracks. The course covers other topics   acquired during the conduct of the   ethical aspects of computer security
        related to hacking such as: malware,   M.Sc. thesis research; (c) demonstrate   including cybercrime, intellectual
        sniffers, and social engineering. In   the ability to carry out a major piece   property, privacy, and ethical issues.
        addition, the course introduces the   of work according to sound scientific
        students to various types of security   and engineering principles; (d)   CSE 502 - Security Risk
        attacks such as: denial of service,   organize work in a comprehensive   Assessment and Auditing
        session hijacking, SQL injection,   and well-structured report, and (e)   Credit hours: 3
        and attacks on Web servers and   demonstrate the ability to defend   Prerequisite: Graduate status
        applications.                 assumptions, methodology, and
                                      significance and impact of work. The   The aim of this course is to provide
        ITE 515 - Artificial Intelligence  thesis consists of two successive   students with an overview about
        Credit hours: 3               courses A and B. In the first part   security risk management, functions,
        Prerequisite: Graduate status  (ITE591A) the students are expected   mechanisms, and auditing. The
                                      to select and advisor, write a   course will expose students to the
        This course provides a        proposal and defend their proposal   latest and recent techniques for
        comprehensive introduction to   successfully. While in the second part   securing information and its systems,
        artificial intelligence. It is intended to   (ITE591B) students are expected to   through understanding the best
        equip the students with theoretical   complete their thesis work including   practices of management policies,
        and hands-on practical knowledge   defending it successfully and writing   procedures, methods and how to
        necessary to analyze and understand   at least one original conference/  apply the best auditing practices
        different aspects related to modern   journal paper for publication.  using variety of auditing tools and
        AI systems. Topics covered include                           related technologies. Moreover, the
        intelligent agents’ design, search and                       course will help students to apply
        optimization algorithms, machine   Elective Courses          audit tools, and audit procedures
        learning (ML), deep learning (DL),                           to help in detection and prevention
        natural language processing                                  of security breaches and frauds.
        (NLP), and recommender systems   CSE 501 - Cryptography and   Students will be able to apply full
        (RecSys). The course utilizes variety   Network Security     risk management activities for
        of learning and assessment tools   Credit hours: 3           information and systems under risk.
        including practical labs, case-study   Prerequisite: Graduate status
        analysis, and research paper writing.                        Students will have in depth view of
        By completing this course, the   This course provides a clear and   physical and infrastructure security
        students will be able to analyze the   practical approach of both the   through identifying, prevention, and
        requirements for real-life AI systems,   principles and practice of crypto-  mitigating such threats. Tools such as
        design them using the Rational   protocols and network security. The   IDS, IPS, firewalls, ACLs and different
        Agent Design Framework, implement   emphasis is on applications that   network types of protections,
        them by applying advanced learning,   are widely used on the Internet for   including remote and wireless
        search, or optimization algorithms,   corporate networks. Topics covered in   communications. Human resources
        and evaluate them using different   this course include network security   security is also introduced in this
        evaluation tools and techniques   concepts such as data integrity,   course to show the different policies
        presented in the course.      confidentiality, and availability. The   that need to be implemented. In this
                                                                     course, students should become
        ITE 591 - Master’s Thesis in    course will also cover other important   familiar with all legal and ethical
                                      topics related to network security,
        Information Technology        such as encryption (symmetric and   aspects that help them to conduct
        Credit hours: 9               asymmetric), cryptographic hash   proper risk assessments and security
        Prerequisite: 15 credits      functions, message authentication,   auditing and to understand that the
                                                                     strongly bonded these elements for
                                      digital signatures, key management
        Thesis is a comprehensive integrated   and distribution, firewalls, IP security,   successfully carrying out security risk
        project that brings together   email security and cloud security.   assessments in this digital age.
        knowledge, skills, and competencies   The practical component of this
        developed during the program.    course will provide the students
        Thesis requirements: (a) the thesis   with the skills to install, troubleshoot
        should exhibit elements of creativity,   and monitor network devices to


        Abu Dhabi University | Postgraduate Catalog 2024 - 2025
   204   205   206   207   208   209   210   211   212   213   214