Page 491 - Undergraduate Catalog 2024-25
P. 491
491
integrity, and authenticity of the about the security of mobile services, firewalls, secure coding practices,
information in this digital age. such as VoIP, text messaging, WAP cryptographic protocols, privacy and
and mobile HTML. Students will anonymity, and mobile code. Case
CSE 400 - Network Security and become familiar with various tools studies from real-world systems will
Forensics that are used to recover cell phone also be analyzed.
Credit Hours: 3 data, and the type of extractions,
Prerequisite: CSC 305 and will be able to analyze the
results by diving deep within the file Major Electives
This course provides the students systems of mobile devices. Students
the opportunity to examine will engage in forensic acquisition
network-based attacks and whether and analysis of mobile computing
originating from outside the devices, specifically iOS, Android, and SWE 401 - Software Engineering
enterprise (Internet) or from the local Windows Phone devices. Credit Hours: 3
LAN. In addition, this course provides Prerequisite: CSC 202
an introduction to the methodology CSE 420 - Ethical Hacking
and procedures associated with Credit Hours: 3 This course covers the principles of
digital forensic analysis in a network Prerequisite: CSC 305 software engineering and object-
environment. The course will provide oriented analysis and design. Topics
the students with the methods This course introduces the include software development as an
and ways to protect, detect, and fundamental concepts of ethical engineering discipline, modeling with
defend the enterprise network hacking methodology, practical UML, requirements elicitation, object-
from such attacks. Students will techniques and ethics. The main oriented analysis, architecture design,
also learn about the importance of focus of the course is to introduce object design, implementation and
network forensic principles, legal students to the methodology and testing.
considerations, digital evidence tools necessary in order to assess CSE 490 - Selected Topics in
controls, and documentation of the security posture of the system
forensic procedures. The practical under study. The course utilizes Kali- Cybersecurity
component of this course will Linux and many other software tools Credit Hours: 3
provide the students with the skills that are usually used by a malicious Prerequisite: Determined based on
to install, troubleshoot and monitor hacker to study the weaknesses and topics
network devices to maintain integrity, vulnerabilities of a target systems.
confidentiality and availability of data In this course the students study Cybersecurity Engineering curriculum
and. The course concludes upon the main phases of ethical hacking, covers fundamental principles in
the topic of legal and ethical aspects the phases include reconnaissance, different area such as database
of computer security including gaining access, enumeration, security, network security, Secure
cybercrime, intellectual property, maintaining access, and covering the Programming, Operating systems
privacy and ethical issues. tracks. security, and many other areas.
The main purpose of this course
CSE 410 - Mobile Device Security ITE 408 - Information Security is to study Cybersecurity related
Credit Hours: 3 Credit Hours: 3 topic that are not included in the
Prerequisite: CSC 305 Prerequisite: CSC 305 current Cybersecurity Engineering
curriculum. The content of the course
This course focuses on how to secure This course builds on understanding and the subjects vary depending
mobile devices, i.e., any device that of Data Communications and on the instructor background and
cannot be not classified as a desktop Networks and introduces students to students’ interest in the subject.
or a server, and the significant threats information and computer security. ITE 422 - System and Network
affecting the services delivered over It will cover theory and practice for
the mobile infrastructure. The main the design of secure systems. It will Administration
security principles incorporated in also emphasize on each of these Credit Hours: 3
the design of several generations techniques. An important component Prerequisite: CSC 305
of mobile networks is overviewed. of the course will be a survey of
Various security models will be modern topics in computer security, This course is designed to provide
explored including the main popular including protection, access control, students with the knowledge
mobile device platforms such as: applied cryptography, Message required to administer and
iOS, Android and Windows Phone. In Authentications, DoS, IDS and IPS, suggest alternative strategies for
addition, the course teaches students Hash Functions, network security, the configuration, operation and
Abu Dhabi University | Undergraduate Catalog 2024 - 2025