Page 518 - Undergraduate Catalog 2023-24
P. 518

518                                                                                                  519


        of Data Communications and    SWE 471 - Software Design and   ITE 421 - Native Mobile                 logic devices and systems and   proofs based on clearly stated   a significant part of the revenue
        Networks and introduces students to   Architecture          Application Development                   introduces students to a systematic   hardness assumptions. Therefore,   stream for companies. This subject
        information and computer security.                                                                    design methodology.           to learn cryptography, it is essential   will develop an appreciation for all
        It will cover theory and practice for   Credit Hours: 3      Credit Hours: 3                                                        to understand its mathematical   the issues involved in developing
        the design of secure systems.  It will   Prerequisite: CSC 401  Prerequisite: CSC 202                 CSE 300 - Introduction to Digital   underpinning. In this class, we will see   an ecommerce site, ranging from
        also emphasize on each of these   This course presents concepts and   This course provides basic      Forensics                     the inner-working of cryptography   the business case to the technology
        techniques. An important component   methods for the design of software   knowledge and understanding of   Credit Hours: 3          for several core cryptographic   involved.
        of the course will be a survey of   systems. Fundamental design   mobile applications design and      Prerequisite: SWE 201 or CSC 201  tools, from encryption, to message
        modern topics in computer security,   concepts using notation of Unified   implementation. The course also                          authentication codes, to hash   This subject will cover a range of
        including protection, access control,   Modeling Language (UML). Designing   examines the tools by which mobile   Digital Forensics Investigations   functions, to digital signatures, etc.  business and technical concepts,
        applied cryptography, Message   for qualities such as performance,   applications are built in different   introduces the newest technologies                     which are required to understand
        Authentications, DoS, IDS and IPS,   security, reusability, reliability.   mobile device environments. The aim   along with detailed information on   The course provides an intermediate   e-commerce and e-business
        Hash Functions, network security,   Metrics and measurement.  Survey of   of this subject is to enable students   how the evidence contained on these   level of cryptography methods used   applications. These include supply
        firewalls, secure coding practices,   software design methods; Object-  to understand the basic principles   devices should be analyzed. Packed   in modern systems.  This course   chain management, systems analysis
        cryptographic protocols, privacy and   oriented analysis and modeling;   and architectures of native mobile   with practical, hands-on activities,   will highlight the important of such   and development, ecommerce
        anonymity, and mobile code.  Case   Software architecture design.  application development. The course   students will learn unique subjects   methods on the confidentiality,   models, website analysis, legal
        studies from real-world systems will                        focuses on mobile application             from chapters including handling   integrity, and authenticity of the   and ethical issues, and building
        also be analyzed.             SWE 472 - Software Testing and   development using Android. In          computer hardware, capturing   information in this digital age.  ecommerce web site.
                                      Quality Assurance             addition, the course introduces cloud-    online communications, network,   ITE 410 - Web Programming  ITE 442 - Data Science and Big
        SWE 370 - Object Oriented                                                                             mobile, and MAC forensics, as well
        Design Patterns               Credit Hours: 3               based servers and cloud functions         as photograph forensics. This course   Credit Hours: 3      Data Analytics
                                      Prerequisite: SWE 471         using firebase.                           will prepare students for the rapidly-  Prerequisite: CSC 307  Credit Hours: 3
        Credit Hours: 3
        Prerequisite: CSC 202         Concepts and techniques for                                             growing field of computer forensics   This course is designed to provide   Prerequisite: (SWE 201 or CSC 20) +
                                      testing software. Topics include                                        for a career with law enforcement,   students with the knowledge required   STT 201
        Software can be built utilizing proven   software testing at the unit, module,                        accounting firms, banks and credit   to design, implement, and maintain
        solutions to common problems, called   subsystem, and system levels;   Major Electives                card companies, private investigation   web-based applications. It introduces   This course provides practical
                                                                                                                                                                          foundation level training that enable
        design patterns. Reapplying design   developer testing; automatic and                                 companies, or government agencies.   the tools, protocols and languages   immediate and effective participation
        pattern solutions to new applications   manual techniques for generating                                                            used in the development of these
        reduces the development cost and   test data; testing concurrent and   CEN 325 - Internet of Things:   CSE 310 - Introduction to    applications. This course gives an   in big data and other analytics
                                                                                                                                                                          projects. It includes an introduction
        lends itself to extensibility. This course   distributed software; designing and   Foundation and Design  Cryptography              understanding of web middleware
        is about object-oriented design   implementing software to increase                                   Credit Hours: 3               and the programming technologies to   to big data and the Data Analytics
                                                                                                                                                                          Lifecycle to address business
        patterns. How design patterns solve   maintainability and reuse.  Credit Hours: 3                     Prerequisite: STT 201 + MTT 202  build modern web applications using   challenges that leverage big data. The
        design problems? How to select a                            Prerequisite: CSC 201, CSC 303                                          proper Application programming
        design pattern? How to use a design   SWE 473 - Software Maintenance                                  The main objective of this course is   interfaces and environments.  course provides grounding in basic
                                                                                                                                                                          and advanced analytic methods and
        pattern? Detailed study of creational   and Evolution       This course will introduce                unveiling some of the fascinating
        patterns, structural patterns, and                          microcontrollers and how they are         magic of cryptography, and to provide   This course aims at the study   an introduction to big data analytics
                                                                                                                                                                          technology and tools, including
        behavioral patterns in included.  Credit Hours: 3           used to build Internet of Things          students with understanding to the   of Internet Protocols and utility
                                      Prerequisite: SWE 401         applications. During this course,         tools of cryptography.  Students will   programs used in popular   MapReduce and Hadoop. Labs
        SWE 371 - Software                                          students will develop a basic             discover how cryptography ensures   Internetapplications. It describes   offer opportunities for students to
        Requirements and Specification   The main objective of the course is   understanding of embedded and   privacy, authenticity, and integrity   the features of HTTP protocol and   understand how these methods and
                                      to cover the principles of software
        Credit Hours: 3               maintenance and evolution. Software   networked systems and how to      to both data and systems in this   its interaction features. It also   tools may be applied to real-world
                                                                                                                                                                          business challenges as a practicing
                                                                    program them using assembly and
                                                                                                              modern digital age. Cryptography
        Prerequisite: CSC 202         maintenance and evolution comes   embedded C. They also learn how                                     presents specific elements of Java   data scientist. The course takes
                                      with many issues and challenges.                                        tools, includes both symmetric and   used in web programming. Popular
        The course describes the      Without proper maintenance and   simple I/O devices are controlled      asymmetric encryptions, practical   server-side web application scripting   an “Open”, or technology-neutral
        requirements development including   evolution strategy, the software will   by these microcontrollers and how   usage of these tools including digital   and programming languages are   approach, and includes a final lab in
        the business requirements, functional   eventually become costly, difficult to   to connect them to the cloud using   signature, message authentication,   described (e.g. Java script and   which students address a big data
        and non-functional requirements,   maintain, evolve and comprehend.   Wi-Fi. Lectures and labs will be used   digital envelops, message   NodeJs). Database oriented web   analytics challenge by applying the
        and data requirements. The course   This course introduces different   to ensure that the concepts of IoT are   authentications hash functions more.    applications are also introduced.  concepts taught in the course in
        also covers the study of methods,   techniques, strategies and concepts   understood.                 Modern Cryptography uses                                    the context of the Data Analytics
        tools, notations, verification, and   to help software engineers design a   CSC 303 - Digital Logic Design                          ITE 414 - Introduction to     Lifecycle. The course prepares the
        validation to techniques for the   usable and maintainable software.                                  mathematical language to precisely   E-commerce             student for the Proven™ Professional
                                                                                                              pin down elusive security goals,
        analysis and specification of software   Course topics include software   Credit Hours: 3             design primitives and protocols to   Credit Hours: 3        Data Scientist Associate (EMCDSA)
        requirements.                 quality, software refactoring, software   Prerequisite: ECS 200         achieve these goals, and validate   Prerequisite: Junior Level  certification exam.
                                      change management, regression   This course discusses the theory,       the security of designed primitives
                                      testing, software re-engineering and   operation, and applications of digital   and protocols using mathematical   With the rapid growth of the Internet,
                                      software ruse.                                                                                        commerce on the web has been
        Abu Dhabi University | Undergraduate Catalog 2023 - 2024                                              Abu Dhabi University | Undergraduate Catalog 2023 - 2024
   513   514   515   516   517   518   519   520   521   522   523