Course Description

Elements of security management, Enterprise security architecture, Information systems security planning, Business Continuity, Disaster Recovery process, Computer operations security, Physical security and Biometrics, and Ethical and Legal issues in Information security. The purpose of this course is to introduce fundamental concepts of information systems security. It provides the students an understanding of the importance of information security and several techniques of planning and exploiting information systems security methods

Course Learning Outcomes

On successful completion of this module, the student will be able to :

  • Describe the conceptual design of the network security infrastructure, related security mechanisms, and related security policies and procedures
  • Explain the concepts of physical security and biometrics.
  • Develop and implement security procedures, standards, and policies and ensure compliance with ethics, laws, and regulations.
  • Establish disaster recovery strategies.
  • Recovering data after a security breach.

Course Content

  • Elements of security management
  •  Integrity, Confidentiality, and Availability.
  •  Enterprise Security Architecture
  •  Information systems security planning
  • Organization size, Type of organization and Top level management.
  • Business Continuity
  • Types of disasters and information systems security threats, Control measures, Strategies and Importance of disaster recovery process.
  • Physical Security and Biometrics
  • Ethical and Legal issues in Information Security
  • Ethical issues, Privacy, Legal Issues

Course reading materials

  • Information Security Management Handbook, Fifth Edition by Harold Tiptop, Micki Krause, Publisher: Auerbach Publications; 5th edition (2004), ISBN: 0849319978.
  • Security in Computing, Charles P. Pfleeger, Shari Lawrence Pfleeger, Publisher: Prentice Hall, Hardcover, 3rd edition, Published 2002, ISBN 0130355488
  • Managing Information Security Risks: The OCTAVE (SM) Approach, by Christopher Alberts, Audrey Dorofee, Publisher: Addison-Wesley, Published 2002,  ISBN 0321118863
  • Computer Security: Art and Science, by Matt Bishop, Publisher: Addison-Wesley, Hardcover, Published 2002, ISBN 0201440997

Course Description                                                                            

Database Concepts and Design: Database System Application, Purpose of Database System, Data Models, DBMS, View of data, Database languages, Database Design, DDL, DML, SQL, Relational Database, Data Storage, Querying, Application Design and development, Server, Server Side Scripting languages, Client Side Scripting Languages, Database Architecture, Database Users, Database administrator. Data Mining, Information Retrieve.

Course Learning Outcomes

On successful completion of this module, the student will be able to:

  •  Demonstrate an understanding of the differences between file base system and DBMS
  • Demonstrate  purpose of Database System

·         Demonstrate an understanding of the importance of Database Management System;

  • Demonstrate an understanding of the data view;
  • Demonstrate an understanding the query languages;
  • Demonstrate and understand the SQL command;
  • Demonstrate and understand Data model techniques

Course Materials

  • Overview of database systems
  • Database System Application
  • Structure of Relational Databases,
  •  Fundamental Relation Algebra Operations
  • Database Design and Entity Relational Model
  • SQL
  • Basic Structure of SQL Queries
  • Application Design and Development
  •  Data Analysis and Mining
  • Data Storage and Querying

Course reading materials

  • Database System Concepts by Abraham Silberschatz, Henry F, F.Korth, S. Sudarshan Publisher: McGraw-Hill, Hardcover, 5th edition, Published 2005, ISBN 0072958863
  • Database Management Systems, 3rd Edition, by Raghu Ramakrishnan, Johannes Gehrke, Publisher:  McGraw-Hill, Hardcover, 3rd edition, Published 2002, ISBN 0072465638


Course description

To provide the broad overview of the basic concepts of the computer graphics. Three-dimensional concepts are focused in the beginning of the course, followed by OpenGL programming and then interactive graphics. This will provide students with skills in graphics layout/design fundamentals, as well as digital design software skills and other computer graphics use.

Course Learning Outcomes

  •  On successful completion of this module, the student will be able to :
  • Ability to design and produce different images using OpenGL  programming
  • Ability to model and transform an image using different geometric transformations and display the resulting image at the screen.
  • Ability to develop program which generates images of different colors using C programming language

Course Content

  •  Hardware and software principles of interactive raster graphics
  • Two- and three-dimensional transformations and clipping,

  •  Windowing techniques,
  •  Three-dimensional viewing and perspective,
  • Illumination and color models,
  • Open GL, and 3-D modeling tools. Emphasis is on the development of practical skills in using graphics libraries and tools,
  •  Programming using C and OpenGL

Course reading materials

  • Interactive Computer Graphics: A Top-Down Approach with OpenGL, by Edward Angel, Publisher: Addison-Wesley, 3rd edition, Published 2002, ISBN 0201773430
  • Computer Graphics with OpenGL, Donald Hearn, M. Pauline Baker, Publisher: Prentice Hall, 3rd edition, Published 2003, ISBN 0130153907

Course Description

In this course, students will learn the fundamentals of computer security, including; principles of computer security, introduction to threats, vulnerabilities, and controls, basic cryptography, security in programs, including applications, operating systems, database management systems and networks.

Course Learning Outcomes

On successful completion of this module, the student will be able to:

  • Demonstrate an understanding of the potential threats and security issues in computer systems.
  • Understanding of various technical aspects of software security, database security, and network security;
  • Apply several encryption algorithms
  • Carry out simple ICT security projects

Course content

  • Principles of computer security
  •  Introduction to threats
  • Vulnerabilities, and controls
  • Basic cryptography
  • Security in programs, including applications
  • Operating systems
  • Database management systems and networks.

Course Reading Materials

  • Charles P. Pfleeger and Shari Lawrence Pfleeger Security in Computing Prentice Hall, Hardcover, 3rd edition, Published 2002,  ISBN 0130355488
  • William Stallings Cryptography and Network Security Prentice Hall, Hardcover, 3rd edition, Published 2002,  ISBN 01309142

Course description

The course aimed at providing a hands-on programming experience and to equip students with concepts and skills to develop a database-backed, dynamic and feature-rich Web site. The course covers the use of programming language with PHP and the concepts of a database with MySQL. Students will learn the techniques of gathering data from users through Web forms, storing data in a database on the server, retrieving data from database, formatting and displaying the data on the browser. Solutions for practical online services such as session management and user authentication are also discussed.

 

Course learning Outcome

On successful completion of this module, the student will be able to :

  • Understand database application,
  • Develop database-backed dynamic Web site,
  • Demonstrate JavaScript programming skills for designing dynamic pages,
  •  Develop server-side scripts using PHP,
  •  Install and configure a web server on Windows platforms,
  • Manage user’s privileges and roles for databases.
  •  Understand the difference between client and server-side processing.
  •  Understand fundamental concepts and principles of web programming and relational database systems.
  • Select appropriate techniques to solve a given interaction problem in data-driven web applications.
  • Analyse and evaluate the extent to which a data-driven web application meets the criteria defined for its current use and future development.
  • Ability to design a website and publish it on a hosted server;
  • Ability to develop websites using web content management system
  •  Ability to use start-of-the-art web development techniques
  • Ability to Specify, design, construct and test data-driven web applications.
  • Ability to select and employ suitable techniques and tools for the design, creation, and documentation of web authoring systems with database components, with particular emphasis on understanding the whole process involved in the effective development of data, has driven web applications.
  • Work effectively as part of a team in the planning, development, testing and debugging of a web application.

 

Course content

  • Introduction
  • Server side web authoring
  • General Syntactic Characteristics, Primitives, Operations and Expressions
  • Control Statements Strings, and Advanced Data and Arrays
  • Functions & Pattern Matching
  • Handling Forms (CGI), submit button, transfer of data, return of results
  •  CGI scripting using languages similar to Perl, PHP, and ASP.
  • Executing CGI scripts from stand-alone and networked clients,
    1. Files
    2. PHP
  • The PHP Scripting Language;

Manipulation in PHP; Introduction to Object-Oriented Programming with PHP ;

  • Validation with PHP and JavaScript;
  •  Sessions; Authentication and Security;
  •  Errors, Debugging, and Deployment;
  •  Reporting. 
  •  Relational Databases and Structured Query Language (SQL)
  •  Relational database concepts
  •    Design web database
  •  Structure query language (SQL) Mysql
  •   Architectures for Database Access
  •   Database Integration with Web Application
  •  Web Programming Project                                         
  • Use web programming knowledge to design websites (Practical assignment I and II)

 

Course reading Materials

Compulsory Reading Materials

  •  Web Database Applications with PHP and MySQL, 2nd Edition, by Hugh E. Williams, David Lane, Publisher: O'Reilly & Associates, 2nd edition, Published (2004), ISBN 0596005431
  •  PHP and MySQL Web Development 3rd Edition, by Luke Welling, Laura Thomson, Publisher: Sams, Paperback, 3rd Bk&CD edition, Published September 2004, ISBN 0672326728
  •    HTML for the World Wide Web with XHTML and CSS: Visual QuickStart Guide, by Elizabeth Castro, Publisher: Peachpit Press, 5th edition, Published 2002, ISBN 0321130073

Optional reading materials

  •   JavaFX: Developing Rich Internet Applications by  Jim Clarke  Jim Connors, Eric J. Bruno Publisher:  Publication Date: June 11, 2009, ISBN: 013701287X
  •  Ajax, Rich Internet Applications and Web Development for Programmers by P Deitel, H Deitel; ISBN: 0131587382
  •  Mobile Web Development: Building mobile websites, SMS and MMS messaging, mobile payments, and automated voice call systems with XHTML MP, WCSS, and mobile AJAX; by Nirav Mehta; Publisher: Packt; Publishing (February 6, 2008); ISBN-10: 1847193439