Page 506 - Undergraduate Catalog 2024-25
P. 506
506
underpinning. In this class, we will see an ecommerce site, ranging from CSE 400 - Network Security and
the inner-working of cryptography the business case to the technology Forensics
for several core cryptographic involved.
tools, from encryption, to message Credit Hours: 3
authentication codes, to hash This subject will cover a range of Prerequisite: CSC 305
functions, to digital signatures, etc. business and technical concepts,
which are required to understand This course provides the students
The course provides an intermediate e-commerce and e-business the opportunity to examine
level of cryptography methods used applications. These include supply network-based attacks and whether
in modern systems. This course chain management, systems analysis originating from outside the
will highlight the important of such and development, ecommerce enterprise (Internet) or from the local
methods on the confidentiality, models, website analysis, legal LAN. In addition, this course provides
integrity, and authenticity of the and ethical issues, and building an introduction to the methodology
information in this digital age. ecommerce web site. and procedures associated with
digital forensic analysis in a network
ITE 410 - Web Programming ITE 442 - Data Science and Big environment. The course will provide
Data Analytics the students with the methods
Credit Hours: 3 and ways to protect, detect, and
Prerequisite: CSC 307 Credit Hours: 3 defend the enterprise network
Prerequisite: (SWE 201 or CSC 20) +
This course is designed to provide STT 201 from such attacks. Students will
students with the knowledge required also learn about the importance of
to design, implement, and maintain This course provides practical network forensic principles, legal
web-based applications. It introduces foundation level training that enable considerations, digital evidence
the tools, protocols and languages immediate and effective participation controls, and documentation of
used in the development of these in big data and other analytics forensic procedures. The practical
applications. This course gives an projects. It includes an introduction component of this course will
understanding of web middleware to big data and the Data Analytics provide the students with the skills
and the programming technologies to Lifecycle to address business to install, troubleshoot and monitor
build modern web applications using challenges that leverage big data. The network devices to maintain integrity,
proper Application programming course provides grounding in basic confidentiality and availability of data
interfaces and environments. and advanced analytic methods and and. The course concludes upon
an introduction to big data analytics the topic of legal and ethical aspects
This course aims at the study technology and tools, including of computer security including
of Internet Protocols and utility MapReduce and Hadoop. Labs cybercrime, intellectual property,
programs used in popular offer opportunities for students to privacy and ethical issues.
Internetapplications. It describes understand how these methods and
the features of HTTP protocol and tools may be applied to real-world CSE 410 - Mobile Device Security
its interaction features. It also business challenges as a practicing
presents specific elements of Java data scientist. The course takes Credit Hours: 3
Prerequisite: CSC 305
used in web programming. Popular an “Open”, or technology-neutral
server-side web application scripting approach, and includes a final lab in This course focuses on how to secure
and programming languages are which students address a big data mobile devices, i.e., any device that
described (e.g. Java script and analytics challenge by applying the cannot be not classified as a desktop
NodeJs). Database oriented web concepts taught in the course in or a server, and the significant threats
applications are also introduced. affecting the services delivered over
the context of the Data Analytics
ITE 414 - Introduction to Lifecycle. The course prepares the the mobile infrastructure. The main
security principles incorporated in
E-commerce student for the Proven™ Professional
Data Scientist Associate (EMCDSA) the design of several generations
Credit Hours: 3 certification exam. of mobile networks is overviewed.
Prerequisite: Junior Level Various security models will be
explored including the main popular
With the rapid growth of the Internet, mobile device platforms such as:
commerce on the web has been iOS, Android and Windows Phone. In
a significant part of the revenue addition, the course teaches students
stream for companies. This subject about the security of mobile services,
will develop an appreciation for all such as VoIP, text messaging, WAP
the issues involved in developing and mobile HTML. Students will
Abu Dhabi University | Undergraduate Catalog 2024 - 2025