Page 519 - Undergraduate Catalog 2023-24
P. 519
518 519
of Data Communications and SWE 471 - Software Design and ITE 421 - Native Mobile logic devices and systems and proofs based on clearly stated a significant part of the revenue
Networks and introduces students to Architecture Application Development introduces students to a systematic hardness assumptions. Therefore, stream for companies. This subject
information and computer security. design methodology. to learn cryptography, it is essential will develop an appreciation for all
It will cover theory and practice for Credit Hours: 3 Credit Hours: 3 to understand its mathematical the issues involved in developing
the design of secure systems. It will Prerequisite: CSC 401 Prerequisite: CSC 202 CSE 300 - Introduction to Digital underpinning. In this class, we will see an ecommerce site, ranging from
also emphasize on each of these This course presents concepts and This course provides basic Forensics the inner-working of cryptography the business case to the technology
techniques. An important component methods for the design of software knowledge and understanding of Credit Hours: 3 for several core cryptographic involved.
of the course will be a survey of systems. Fundamental design mobile applications design and Prerequisite: SWE 201 or CSC 201 tools, from encryption, to message
modern topics in computer security, concepts using notation of Unified implementation. The course also authentication codes, to hash This subject will cover a range of
including protection, access control, Modeling Language (UML). Designing examines the tools by which mobile Digital Forensics Investigations functions, to digital signatures, etc. business and technical concepts,
applied cryptography, Message for qualities such as performance, applications are built in different introduces the newest technologies which are required to understand
Authentications, DoS, IDS and IPS, security, reusability, reliability. mobile device environments. The aim along with detailed information on The course provides an intermediate e-commerce and e-business
Hash Functions, network security, Metrics and measurement. Survey of of this subject is to enable students how the evidence contained on these level of cryptography methods used applications. These include supply
firewalls, secure coding practices, software design methods; Object- to understand the basic principles devices should be analyzed. Packed in modern systems. This course chain management, systems analysis
cryptographic protocols, privacy and oriented analysis and modeling; and architectures of native mobile with practical, hands-on activities, will highlight the important of such and development, ecommerce
anonymity, and mobile code. Case Software architecture design. application development. The course students will learn unique subjects methods on the confidentiality, models, website analysis, legal
studies from real-world systems will focuses on mobile application from chapters including handling integrity, and authenticity of the and ethical issues, and building
also be analyzed. SWE 472 - Software Testing and development using Android. In computer hardware, capturing information in this digital age. ecommerce web site.
Quality Assurance addition, the course introduces cloud- online communications, network, ITE 410 - Web Programming ITE 442 - Data Science and Big
SWE 370 - Object Oriented mobile, and MAC forensics, as well
Design Patterns Credit Hours: 3 based servers and cloud functions as photograph forensics. This course Credit Hours: 3 Data Analytics
Prerequisite: SWE 471 using firebase. will prepare students for the rapidly- Prerequisite: CSC 307 Credit Hours: 3
Credit Hours: 3
Prerequisite: CSC 202 Concepts and techniques for growing field of computer forensics This course is designed to provide Prerequisite: (SWE 201 or CSC 20) +
testing software. Topics include for a career with law enforcement, students with the knowledge required STT 201
Software can be built utilizing proven software testing at the unit, module, accounting firms, banks and credit to design, implement, and maintain
solutions to common problems, called subsystem, and system levels; Major Electives card companies, private investigation web-based applications. It introduces This course provides practical
foundation level training that enable
design patterns. Reapplying design developer testing; automatic and companies, or government agencies. the tools, protocols and languages immediate and effective participation
pattern solutions to new applications manual techniques for generating used in the development of these
reduces the development cost and test data; testing concurrent and CEN 325 - Internet of Things: CSE 310 - Introduction to applications. This course gives an in big data and other analytics
projects. It includes an introduction
lends itself to extensibility. This course distributed software; designing and Foundation and Design Cryptography understanding of web middleware
is about object-oriented design implementing software to increase Credit Hours: 3 and the programming technologies to to big data and the Data Analytics
Lifecycle to address business
patterns. How design patterns solve maintainability and reuse. Credit Hours: 3 Prerequisite: STT 201 + MTT 202 build modern web applications using challenges that leverage big data. The
design problems? How to select a Prerequisite: CSC 201, CSC 303 proper Application programming
design pattern? How to use a design SWE 473 - Software Maintenance The main objective of this course is interfaces and environments. course provides grounding in basic
and advanced analytic methods and
pattern? Detailed study of creational and Evolution This course will introduce unveiling some of the fascinating
patterns, structural patterns, and microcontrollers and how they are magic of cryptography, and to provide This course aims at the study an introduction to big data analytics
technology and tools, including
behavioral patterns in included. Credit Hours: 3 used to build Internet of Things students with understanding to the of Internet Protocols and utility
Prerequisite: SWE 401 applications. During this course, tools of cryptography. Students will programs used in popular MapReduce and Hadoop. Labs
SWE 371 - Software students will develop a basic discover how cryptography ensures Internetapplications. It describes offer opportunities for students to
Requirements and Specification The main objective of the course is understanding of embedded and privacy, authenticity, and integrity the features of HTTP protocol and understand how these methods and
to cover the principles of software
Credit Hours: 3 maintenance and evolution. Software networked systems and how to to both data and systems in this its interaction features. It also tools may be applied to real-world
business challenges as a practicing
program them using assembly and
modern digital age. Cryptography
Prerequisite: CSC 202 maintenance and evolution comes embedded C. They also learn how presents specific elements of Java data scientist. The course takes
with many issues and challenges. tools, includes both symmetric and used in web programming. Popular
The course describes the Without proper maintenance and simple I/O devices are controlled asymmetric encryptions, practical server-side web application scripting an “Open”, or technology-neutral
requirements development including evolution strategy, the software will by these microcontrollers and how usage of these tools including digital and programming languages are approach, and includes a final lab in
the business requirements, functional eventually become costly, difficult to to connect them to the cloud using signature, message authentication, described (e.g. Java script and which students address a big data
and non-functional requirements, maintain, evolve and comprehend. Wi-Fi. Lectures and labs will be used digital envelops, message NodeJs). Database oriented web analytics challenge by applying the
and data requirements. The course This course introduces different to ensure that the concepts of IoT are authentications hash functions more. applications are also introduced. concepts taught in the course in
also covers the study of methods, techniques, strategies and concepts understood. Modern Cryptography uses the context of the Data Analytics
tools, notations, verification, and to help software engineers design a CSC 303 - Digital Logic Design ITE 414 - Introduction to Lifecycle. The course prepares the
validation to techniques for the usable and maintainable software. mathematical language to precisely E-commerce student for the Proven™ Professional
pin down elusive security goals,
analysis and specification of software Course topics include software Credit Hours: 3 design primitives and protocols to Credit Hours: 3 Data Scientist Associate (EMCDSA)
requirements. quality, software refactoring, software Prerequisite: ECS 200 achieve these goals, and validate Prerequisite: Junior Level certification exam.
change management, regression This course discusses the theory, the security of designed primitives
testing, software re-engineering and operation, and applications of digital and protocols using mathematical With the rapid growth of the Internet,
software ruse. commerce on the web has been
Abu Dhabi University | Undergraduate Catalog 2023 - 2024 Abu Dhabi University | Undergraduate Catalog 2023 - 2024