Page 462 - Undergraduate Catalog 2024-25
P. 462
462
an example of a single-page Web both for the individual managing ITE 414 - Introduction to
application. their own development, and for the E-commerce
team leader managing a larger scale
CIS 404 - Data Warehousing and project. The emphasis will be on Credit Hours: 3
Data Mining getting a quality product produced Prerequisite: Junior Level
Credit Hours: 3 on time and within budget. With the rapid growth of the Internet,
Prerequisite: CSC 302 ITE 409 - Human Computer commerce on the web has been
This course focuses on current Interaction a significant part of the revenue
stream for companies. This subject
advancements in data warehouses Credit Hours: 3 will develop an appreciation for all
and data mining dealing with the Prerequisite: CSC 401 or SWE 401 the issues involved in developing
data preparation, online analytical an ecommerce site, ranging from
processing, and mining useful Effective design of human the business case to the technology
patterns in databases using different computer interfaces is a major involved. This subject will cover a
algorithmic techniques. Machine factor in developing user-friendly range of business and technical
learning, neural networks, clustering software. The course will provide concepts, which are required to
techniques are also introduced and the background theory, practical understand e-commerce and
applied in classification. examples, and models and e-business applications. These
techniques that enable students
CSE 420 - Ethical Hacking to design good interfaces and to include supply chain management,
systems analysis and development,
Credit Hours: 3 evaluate human computer interface ecommerce models, website analysis,
Prerequisite: CSC 305 functionality and usability. The legal and ethical issues, and building
course will examine the practical
This course introduces the and theoretical issues of how people ecommerce web site.
fundamental concepts of ethical interact with computers and methods ITE 402 - Computer Networks
hacking methodology, practical for developing software to improve Design and Implementation
techniques and ethics. The main usability. A principal goal is for
focus of the course is to introduce students to develop an awareness Credit Hours: 3
students to the methodology and and sensitivity for user needs Prerequisite: CSC 305
tools necessary in order to assess and abilities as they interact with This course is designed to provide
the security posture of the system computer software. students with the knowledge
under study. The course utilizes Kali- required to create a logical network
Linux and many other software tools ITE 408 - Information Security design and suggest alternative
that are usually used by a malicious Credit Hours: 3 physical implementations of this
hacker to study the weaknesses and Prerequisite: CSC 305 design. The objective is to learn
vulnerabilities of a target systems. how to design local, campus,
In this course the students study This course builds on understanding metropolitan, or wide area networks
the main phases of ethical hacking, of Data Communications and and the connection to the Internet.
the phases include reconnaissance, Networks and introduces students to Topics covered in this course include:
gaining access, enumeration, information and computer security. Identifying customer’s needs and
maintaining access, and covering the It will cover theory and practice for goals, Logical network design,
tracks. the design of secure systems. It will Addressing and routing architecture,
also emphasize on each of these
ITE 401 - IT Project Management techniques. An important component Network management architecture,
Physical network design, Testing,
Credit Hours: 3 of the course will be a survey of optimizing, and documenting a
Prerequisite: SWE 401 modern topics in computer security, network design.
including protection, access control,
This course deals with project applied cryptography, Message
management concepts and Authentications, DoS, IDS and IPS, ITE 422 - System and Network
applications and stresses the Hash Functions, network security, Administration
importance of utilizing project firewalls, secure coding practices,
management methodologies in cryptographic protocols, privacy and Credit Hours: 3
planning modern information anonymity, and mobile code. Case Prerequisite: CSC 305
systems. The aim is to give students studies from real-world systems will This course is designed to provide
an understanding of how to manage also be analyzed. students with the knowledge
information technology projects required to administer and
Abu Dhabi University | Undergraduate Catalog 2024 - 2025