Page 519 - Undergraduate Catalog 2023-24
P. 519

518    519


 of Data Communications and   SWE 471 - Software Design and   ITE 421 - Native Mobile   logic devices and systems and   proofs based on clearly stated   a significant part of the revenue
 Networks and introduces students to   Architecture  Application Development  introduces students to a systematic   hardness assumptions. Therefore,   stream for companies. This subject
 information and computer security.    design methodology.  to learn cryptography, it is essential   will develop an appreciation for all
 It will cover theory and practice for   Credit Hours: 3      Credit Hours: 3      to understand its mathematical   the issues involved in developing
 the design of secure systems.  It will   Prerequisite: CSC 401  Prerequisite: CSC 202  CSE 300 - Introduction to Digital   underpinning. In this class, we will see   an ecommerce site, ranging from
 also emphasize on each of these   This course presents concepts and   This course provides basic   Forensics  the inner-working of cryptography   the business case to the technology
 techniques. An important component   methods for the design of software   knowledge and understanding of   Credit Hours: 3      for several core cryptographic   involved.
 of the course will be a survey of   systems. Fundamental design   mobile applications design and   Prerequisite: SWE 201 or CSC 201  tools, from encryption, to message
 modern topics in computer security,   concepts using notation of Unified   implementation. The course also   authentication codes, to hash   This subject will cover a range of
 including protection, access control,   Modeling Language (UML). Designing   examines the tools by which mobile   Digital Forensics Investigations   functions, to digital signatures, etc.  business and technical concepts,
 applied cryptography, Message   for qualities such as performance,   applications are built in different   introduces the newest technologies   which are required to understand
 Authentications, DoS, IDS and IPS,   security, reusability, reliability.   mobile device environments. The aim   along with detailed information on   The course provides an intermediate   e-commerce and e-business
 Hash Functions, network security,   Metrics and measurement.  Survey of   of this subject is to enable students   how the evidence contained on these   level of cryptography methods used   applications. These include supply
 firewalls, secure coding practices,   software design methods; Object-  to understand the basic principles   devices should be analyzed. Packed   in modern systems.  This course   chain management, systems analysis
 cryptographic protocols, privacy and   oriented analysis and modeling;   and architectures of native mobile   with practical, hands-on activities,   will highlight the important of such   and development, ecommerce
 anonymity, and mobile code.  Case   Software architecture design.  application development. The course   students will learn unique subjects   methods on the confidentiality,   models, website analysis, legal
 studies from real-world systems will   focuses on mobile application   from chapters including handling   integrity, and authenticity of the   and ethical issues, and building
 also be analyzed.  SWE 472 - Software Testing and   development using Android. In   computer hardware, capturing   information in this digital age.  ecommerce web site.
 Quality Assurance  addition, the course introduces cloud-  online communications, network,   ITE 410 - Web Programming  ITE 442 - Data Science and Big
 SWE 370 - Object Oriented   mobile, and MAC forensics, as well
 Design Patterns   Credit Hours: 3      based servers and cloud functions   as photograph forensics. This course   Credit Hours: 3      Data Analytics
 Prerequisite: SWE 471  using firebase.  will prepare students for the rapidly-  Prerequisite: CSC 307  Credit Hours: 3
 Credit Hours: 3
 Prerequisite: CSC 202  Concepts and techniques for   growing field of computer forensics   This course is designed to provide   Prerequisite: (SWE 201 or CSC 20) +
 testing software. Topics include   for a career with law enforcement,   students with the knowledge required   STT 201
 Software can be built utilizing proven   software testing at the unit, module,   accounting firms, banks and credit   to design, implement, and maintain
 solutions to common problems, called   subsystem, and system levels;   Major Electives   card companies, private investigation   web-based applications. It introduces   This course provides practical
                                                                    foundation level training that enable
 design patterns. Reapplying design   developer testing; automatic and   companies, or government agencies.   the tools, protocols and languages   immediate and effective participation
 pattern solutions to new applications   manual techniques for generating   used in the development of these
 reduces the development cost and   test data; testing concurrent and   CEN 325 - Internet of Things:   CSE 310 - Introduction to   applications. This course gives an   in big data and other analytics
                                                                    projects. It includes an introduction
 lends itself to extensibility. This course   distributed software; designing and   Foundation and Design  Cryptography  understanding of web middleware
 is about object-oriented design   implementing software to increase   Credit Hours: 3      and the programming technologies to   to big data and the Data Analytics
                                                                    Lifecycle to address business
 patterns. How design patterns solve   maintainability and reuse.  Credit Hours: 3      Prerequisite: STT 201 + MTT 202  build modern web applications using   challenges that leverage big data. The
 design problems? How to select a   Prerequisite: CSC 201, CSC 303  proper Application programming
 design pattern? How to use a design   SWE 473 - Software Maintenance   The main objective of this course is   interfaces and environments.  course provides grounding in basic
                                                                    and advanced analytic methods and
 pattern? Detailed study of creational   and Evolution   This course will introduce   unveiling some of the fascinating
 patterns, structural patterns, and   microcontrollers and how they are   magic of cryptography, and to provide   This course aims at the study   an introduction to big data analytics
                                                                    technology and tools, including
 behavioral patterns in included.  Credit Hours: 3      used to build Internet of Things   students with understanding to the   of Internet Protocols and utility
 Prerequisite: SWE 401  applications. During this course,   tools of cryptography.  Students will   programs used in popular   MapReduce and Hadoop. Labs
 SWE 371 - Software   students will develop a basic   discover how cryptography ensures   Internetapplications. It describes   offer opportunities for students to
 Requirements and Specification   The main objective of the course is   understanding of embedded and   privacy, authenticity, and integrity   the features of HTTP protocol and   understand how these methods and
 to cover the principles of software
 Credit Hours: 3      maintenance and evolution. Software   networked systems and how to   to both data and systems in this   its interaction features. It also   tools may be applied to real-world
                                                                    business challenges as a practicing
 program them using assembly and
        modern digital age. Cryptography
 Prerequisite: CSC 202  maintenance and evolution comes   embedded C. They also learn how   presents specific elements of Java   data scientist. The course takes
 with many issues and challenges.   tools, includes both symmetric and   used in web programming. Popular
 The course describes the   Without proper maintenance and   simple I/O devices are controlled   asymmetric encryptions, practical   server-side web application scripting   an “Open”, or technology-neutral
 requirements development including   evolution strategy, the software will   by these microcontrollers and how   usage of these tools including digital   and programming languages are   approach, and includes a final lab in
 the business requirements, functional   eventually become costly, difficult to   to connect them to the cloud using   signature, message authentication,   described (e.g. Java script and   which students address a big data
 and non-functional requirements,   maintain, evolve and comprehend.   Wi-Fi. Lectures and labs will be used   digital envelops, message   NodeJs). Database oriented web   analytics challenge by applying the
 and data requirements. The course   This course introduces different   to ensure that the concepts of IoT are   authentications hash functions more.    applications are also introduced.  concepts taught in the course in
 also covers the study of methods,   techniques, strategies and concepts   understood.   Modern Cryptography uses   the context of the Data Analytics
 tools, notations, verification, and   to help software engineers design a   CSC 303 - Digital Logic Design  ITE 414 - Introduction to   Lifecycle. The course prepares the
 validation to techniques for the   usable and maintainable software.   mathematical language to precisely   E-commerce  student for the Proven™ Professional
        pin down elusive security goals,
 analysis and specification of software   Course topics include software   Credit Hours: 3      design primitives and protocols to   Credit Hours: 3       Data Scientist Associate (EMCDSA)
 requirements.  quality, software refactoring, software   Prerequisite: ECS 200  achieve these goals, and validate   Prerequisite: Junior Level  certification exam.
 change management, regression   This course discusses the theory,   the security of designed primitives
 testing, software re-engineering and   operation, and applications of digital   and protocols using mathematical   With the rapid growth of the Internet,
 software ruse.                       commerce on the web has been
 Abu Dhabi University | Undergraduate Catalog 2023 - 2024  Abu Dhabi University | Undergraduate Catalog 2023 - 2024
   514   515   516   517   518   519   520   521   522   523   524