Course Criteria

Add courses to your favorites to save, share, and find your best transfer school.
  • 3.00 Credits

    Thiscourse covers various topics relevant to clustering including the following: interconnection networks, protocols, high performance I/O, load balancing, availability, programming models and environments, parallel algorithms, and applications. The course is lab intensive and includes the implementation of parallel algorithms on a parallel cluster.
  • 3.00 Credits

    This course covers a broad range of advanced operating systems concepts including protection, security, memory management, kernels, file systems, synchronization, naming, networks, and distributed systems as well as recent trends in operating systems design. Specific aspects of operating systems which support distributed computing will be emphasized.
  • 3.00 Credits

    The theory of finite state machines and regular expressions are applied to the design of switching circuits, components of compilers such as lexical analysis, pattern-matching, text-editors, unifications as needed in Prolog or for automated deduction, and almost any program which processes under commands. Undecidable problems and intractable problems are explored.
  • 3.00 Credits

    The course surveys the principles of programming language design and the issues related to their implementation. Topics will include a comparison of the major programming paradigms: imperative, functional, logic, and object-oriented. Also covered are data types, methods of specifying the semantics of language constructs, and concurrency.
  • 3.00 Credits

    A survey of the principles and practices related to computer security. The course concentrates on the problems of security associated with computer systems and emphasizes the application of cryptography to address those problems.
  • 3.00 Credits

    An introduction to data communications and computer networking. Topics include LAN topologies, transmission media, error detection, packet switching networks, internetworking of heterogeneous network technologies, Internet protocol suites (with emphasis on TCP/IP), the client/server paradigm, the BSD Socket interface, network security, and network applications.
  • 3.00 Credits

    Managing projects within an organizational context, including the processes related to initiating, planning, executing, controlling, reporting, and closing a project form the major portion of this course. Project integration, scope, time, cost, quality control, risk management, and managing the changes in organization resulting from introducing or revising information systems are also included. Cross-listed with PMGT 650.
  • 3.00 Credits

    This course explores agile-related practices, methodologies, and applications in development and operational project environments. Learning experiences and team projects focus on developing the knowledge, skills, abilities and attitudes considered essential in effectively managing teams in adaptive project environments. Topics of study include the development of an agile mindset, theoretical and practical applications of agile practices, the transition and integration of these practices with other project management methodologies, along with the stages of the agile development cycle. Students will apply tools and techniques in a learning environment that approximates adaptive project environments. In addition, case studies will include applicable individual and organizational experiences with implementing agile methodologies. Cross-listed with PMGT 663.
  • 3.00 Credits

    Topics include algorithms for query processing and optimization, physical database design, transaction processing, concurrency control, database backup and recovery techniques, distributed databases, multidimensional data, and recursive query processing, as an example, Datalog. Other topics may include multimedia databases, object and object relational databases, data warehousing, and data mining
  • 3.00 Credits

    This course will cover the techniques used to secure cybersystems. Topics covered will include security policies, computer security management and risk assessment, secured network protocols, software security issues, ethical and legal aspects of cybersecurity, and disaster recovery. Special emphasis will be given to designing, deploying, and managing complete secured cybersystems.
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
(Type the name of a College, University, Exam, or Corporation)
(For example: Accounting, Psychology)
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
(For example: Introduction To Accounting)
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
of
(For example: Find all institutions within 5 miles of the selected Zip Code)
Privacy Statement   |   Terms of Use   |   Institutional Membership Information   |   About AcademyOne   
Copyright 2006 - 2024 AcademyOne, Inc.