Page 491 - Undergraduate Catalog 2024-25
P. 491

491


        integrity, and authenticity of the   about the security of mobile services,   firewalls, secure coding practices,
        information in this digital age.  such as VoIP, text messaging, WAP   cryptographic protocols, privacy and
                                      and mobile HTML. Students will   anonymity, and mobile code.  Case
        CSE 400 - Network Security and   become familiar with various tools   studies from real-world systems will
        Forensics                     that are used to recover cell phone   also be analyzed.
        Credit Hours: 3               data, and the type of extractions,
        Prerequisite: CSC 305         and will be able to analyze the
                                      results by diving deep within the file     Major Electives
        This course provides the students   systems of mobile devices. Students
        the opportunity to examine    will engage in forensic acquisition
        network-based attacks and whether   and analysis of mobile computing
        originating from outside the   devices, specifically iOS, Android, and   SWE 401 - Software Engineering
        enterprise (Internet) or from the local   Windows Phone devices.  Credit Hours: 3
        LAN.  In addition, this course provides                      Prerequisite: CSC 202
        an introduction to the methodology   CSE 420 - Ethical Hacking
        and procedures associated with   Credit Hours: 3             This course covers the principles of
        digital forensic analysis in a network   Prerequisite: CSC 305  software engineering and object-
        environment. The course will provide                         oriented analysis and design. Topics
        the students with the methods   This course introduces the   include software development as an
        and ways to protect, detect, and   fundamental concepts of ethical   engineering discipline, modeling with
        defend the enterprise network   hacking methodology, practical   UML, requirements elicitation, object-
        from such attacks. Students will   techniques and ethics. The main   oriented analysis, architecture design,
        also learn about the importance of   focus of the course is to introduce   object design, implementation and
        network forensic principles, legal   students to the methodology and   testing.
        considerations, digital evidence   tools necessary in order to assess   CSE 490 - Selected Topics in
        controls, and documentation of   the security posture of the system
        forensic procedures. The practical   under study. The course utilizes Kali-  Cybersecurity
        component of this course will   Linux and many other software tools    Credit Hours: 3
        provide the students with the skills   that are usually used by a malicious   Prerequisite: Determined based on
        to install, troubleshoot and monitor   hacker to study the weaknesses and   topics
        network devices to maintain integrity,   vulnerabilities of a target systems.
        confidentiality and availability of data   In this course the  students study    Cybersecurity Engineering curriculum
        and. The course concludes upon   the main phases of ethical hacking,   covers fundamental principles in
        the topic of legal and ethical aspects   the phases include reconnaissance,   different area such as database
        of computer security including   gaining access, enumeration,   security, network security, Secure
        cybercrime, intellectual property,   maintaining access, and covering the    Programming, Operating systems
        privacy and ethical issues.   tracks.                        security, and many other areas.
                                                                     The main purpose of this course
        CSE 410 - Mobile Device Security  ITE 408 -  Information Security  is to study Cybersecurity related
        Credit Hours: 3               Credit Hours: 3                topic that are not included in the
        Prerequisite: CSC 305         Prerequisite: CSC 305          current Cybersecurity Engineering
                                                                     curriculum. The content of the course
        This course focuses on how to secure   This course builds on understanding   and the subjects vary depending
        mobile devices, i.e., any device that   of Data Communications and   on the instructor background and
        cannot be not classified as a desktop   Networks and introduces students to   students’ interest in the subject.
        or a server, and the significant threats   information and computer security.    ITE 422 - System and Network
        affecting the services delivered over   It will cover theory and practice for
        the mobile infrastructure. The main   the design of secure systems.  It will   Administration
        security principles incorporated in   also emphasize on each of these   Credit Hours: 3
        the design of several generations   techniques. An important component   Prerequisite: CSC 305
        of mobile networks is overviewed.   of the course will be a survey of
        Various security models will be   modern topics in computer security,   This course is designed to provide
        explored including the main popular   including protection, access control,   students with the knowledge
        mobile device platforms such as:   applied cryptography, Message   required to administer and
        iOS, Android and Windows Phone. In   Authentications, DoS, IDS and IPS,   suggest alternative strategies for
        addition, the course teaches students   Hash Functions, network security,   the configuration, operation and


        Abu Dhabi University | Undergraduate Catalog 2024 - 2025
   486   487   488   489   490   491   492   493   494   495   496