|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
(Prerequisites, MA 240, CS 345.) This course will provide a rigorous treatment of database theory and the implementation of database structures. Topics will include: data modeling, relational algebra, relational calculus, dependencies and normalization theory, and external implementations of data structures such as B-Trees and hash tables.
-
3.00 Credits
(Prerequisite, CS 345.) This course covers the phases of software development including formalization of requirements, architectural and detailed design, implementation, testing, and maintenance.
-
3.00 Credits
(Prerequisites, CS 345 and CS 542.) A lecture laboratory course where students will learn the hierarchical structure of computer architecture. A hands on experience will be included.
-
3.00 Credits
(Prerequisite, CS 345.) This course stresses the hierarchical structure of computer architecture. Levels of computer organization include digital logic, microprogramming, machine language, macro language, operating systems. Topics covered are instruction execution, memory, registers, addressing, input/output, control, instruction sets, data flow, control flow, interrupts, and multitasking. Hands on experience will include assembly language programming using macros, linkers, and loaders.
-
3.00 Credits
(Prerequisite, CS 345.) This course is designed to study the principles and problems involved in the development of an operating system of a computer. Overview of the development of operating systems, sequential and concurrent processes, cooperation, communication and mutual exclusion, synchronization constructs: monitors, conditional critical regions, semaphores; deadlocks, resource allocation, scheduling policies, storage management, case study of the operating system of a personal computer.
-
3.00 Credits
(Prerequisite, CS 340.) Organization of a computer system. Internal representation of data. Memory management, input/output and interrupts. Utilizing system software in order to program the system via assembling, linking, and debugging.
-
3.00 Credits
When talking about Network Security, we have to acknowledge that all systems have vulnerable points. This course examines the fundamental and historical perspective of hacking methodology and psyche. The hacking topics are explored in order to examine the current systems associated with these vulnerable points. This course researches and studies the techniques and tools to detect and evaluate these vulnerable points of known exploits in network and operating systems. Types of hackers include those that snoop around networks, vandalize websites or even steal proprietary information by the use of well-known schemes, such as viruses, worms, Trojan horses, denial-of-service attacks and buffer overflows.
-
3.00 Credits
Network Defense and Countermeasures focuses on students¿ understanding of the architecture for network defense. Students will work with layered network defense structures and implement firewalls on various platforms. Students will also gain a working knowledge of Virtual Private Networks and Intrusion Detection Systems, perform packet and signature analysis, identify different methods of risk analysis, and create a security policy.
-
3.00 Credits
This course examines procedures and tools for identifications, preservation, and extraction of electronic evidence, auditing and investigation of network and host system intrusions, analysis and documentation of information gathered, and preparation of expert testimonial evidence.
-
3.00 Credits
This course takes a practical look at using good security practices in software. We take a broad look at the issues of correctly implementing security strategies, including why some strategies fail. Students will apply concepts from software engineering, cryptography, and security theory. Students will study state-of-the-art implementation techniques and learn appropriate conditions under which these techniques apply (or not). Students will implement a non-trivial project that will stress correct secure programming techniques.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2024 AcademyOne, Inc.
|
|
|