This course focuses on the role of Information Technology in solving business problems. It involves interaction of corporates and Information Technology from strategic and planning purview as well as interaction of various functional areas in manufacturing and commercial enterprises. Students will learn how latest developments in IT such as mobile devices, wireless sensor networks, social media, logistic systems, interoperability, collaboration, and Internet apps are helping organizations in their overall decision making and growth.
This course focuses on the fundamental design issues of performance, storage and retrieval considerations in designing a database. Specific topics include distributed databases and its administration. The course also offers an in-depth analysis of the algorithms and machine organizations of database systems.
This course surveys current practices in software development and software design, especially in the area of object-oriented design. The course will examine and contrast current and leading edge methodologies and practices, including agile, extreme programming, test-driven design, patterns, aspect-oriented programming, model-driven architecture, Unified Modeling Language, and integrated development environments.
This course covers MVC architecture, framework of development, elements of software construction using object oriented methodology, component architecture, web based components, web services, application server, web server, media and database integration. This course also covers specific platform development methodologies and approach to develop entire software application. Students also learn to develop multi shore development, integration and deployment of the application.
This course covers Internet and Internet concepts, web services, content management, web servers and web application servers, design methodologies with concentration on object-oriented concepts, server pages and database connectivity. Students will apply MVC architecture on the web development. Students will also familiarize with web analysis tools in the proprietary and open source domains.
This course provides in-depth discussions of the architectures, protocols, and other key issues in the design of the global Internet. Topics include: common Internet applications, layered network architecture, switching techniques, local area networks, routing and multimedia networking.
The course is a comprehensive study of the various networking protocols that the Internet is built upon and how they are implemented in the real world. In particular, the following Internet protocols will be examined in details: IP, ARP, ICMP, TCP, UDP, OSPF, BGP. It also covers various algorithms used by networking equipment including switches and routers. The course will also include hands-on programming projects and paper reading assignments.
This course covers the latest developments in the area of wireless networking, concentrating mainly on mobile ad hoc and sensor networks. Topics include: cellular networks, mobility management, connection admission control algorithms, mobility models, wireless IP networks, ad-hoc routing, sensor networks, quality of service, and wireless security.
This course covers networking services topics such as signalling for setting up networking services, networking architectures for providing Quality of services (QoS) for networking services, signalling protocols for setting up QoS connections in the transport stratum, video-based communications, and capacity planning models for dimensioning services.
This course is an introduction to the security concepts needed for the design, use, and implementation of secure voice and data communications networks, including the Internet. Security subjects addressed include defence models, security policy development, authentication and authorization controls, firewalls, packet filtering, virtual private networks (VPNs), and wireless network security. A specific project on network security in a hypothetical based scenario is assessed by a team of experts who are working in the field.
This course examines the process and procedures for ensuring the security of mobile devices and wireless network. It examines the various types of security threats to a corporate network such as hacking, virus attack, integrity of useful information, eavesdropping, etc. The course provides the means and procedures to design a secure wireless network, to monitor and intercept attacks, prevent active and passive security threats. Upon completion, students will be able to understand the risks and challenges of wireless technologies and potential approaches to mitigating these risks.
This course introduces the concepts and issues related to securing information systems and the development of policies to implement information security controls. The material covered addresses information system security planning, development of security policies and programs, risk assessment, risk management, disaster recovery, business continuity and personnel issues.
This course focuses on how hackers attack computers and networks, and how to protect systems from such attacks. It explores penetration testing, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors, foot printing and social engineering, scanning and enumeration, operating system weaknesses, and the methods used to hack Web servers and wireless networks. Students complete hands-on projects using state-of-the-art hacking tools and techniques.
This course aims to educate students in the design and implementation techniques for assuring security of software applications. The course focuses on web services and the prevention of hacking through vulnerable web applications. Students will learn about security threats, software vulnerabilities and hacker attacks that are commonly implemented against commercial applications, including SQL Injection, Cross-Site Scripting and Denial of Service.
This course discusses objectives, formal models, and mechanisms for access control and security architecture for authorization. In this course, students will learn how to connect business requirements to security performance targets by using a methodical systems-analysis based approach. Topics include systems engineering, architecture layers, security policies, security administration, and return on investment.
This course is designed to discuss the various cryptographic schemes. It covers symmetric-key and public-key encryptions, Classical Encryption Techniques, Hill Cipher, introduction to Number Theory, Modular Arithmetic, Discrete Logarithm DES, RSA Algorithms, Hash Functions, Key Establishment Protocols, authentication and digital signature protocols, secure electronic transactions, error correcting codes.
This course is intended to provide a foundation in computer forensics, and provide hands-on practice in applying forensics techniques. This course covers digital forensics, email and image file analysis, investigation methods, problem-solving techniques, forensic analysis tools, method of digital evidence acquisition and control, and preparation for testimony and prosecution.
This course covers fundamentals of enterprise resource planning (ERP) system concepts, and the importance of integrated information systems in an organization. This course covers overview of the SAP ERP system functions: logistics (LO), financial accounting (FI), controlling (CO), and human capital management (HCM). In addition to lecture, students will be guided through several hands-on activities of various business processes in SAP R/3 software product.
This course introduces data-oriented techniques for business intelligence. Topics include Business Intelligence architecture, business analytics, and enterprise reporting. SAP Business Information Warehouse, Business Objects, or similar tools will be used to access and present data, generate reports, and perform analysis.
This course provides a thorough understanding of the role of ABAP programming, SAP’s programming language, in the implementation and use of enterprise systems. Components of the course include complex report development, SAP query, dialog programming, ABAP objects, transaction development, BAPI development, business add-ins (BADIs) and output processing.
This course provides basic understanding of SAP ERP Human Capital Management. It covers HCM structures and business processes, overview of the main functionality of SAP ERP HCM and integration possibilities. The course also explains the integration of Personnel Administration (PA), Personnel Development, Time Management, Authorization, Evaluation and Payroll within SAP HCM/HR.
This course provides students with an in depth review of the concepts, capabilities, and practices of a modern customer relationship management (CRM) system. It also emphasizes identification (targeting), acquisition, retention, and development (expansion) of (profitable) customers, as well as effective and efficient management of customers, using information technology. SAP CRM and SAS BI tools are used.
Project Management introduces project management from the standpoint of a manager who must organize, plan, implement, and control tasks to achieve an organization's schedule, budget, and performance objectives. This course also examines various issues related to the Management of Information Technology project. Therefore, this course includes topics such as strategic planning, organizing the technology resources, means of prioritizing and selecting information technology, personnel management related to projects and their assessment.
This course provides an analysis and evaluation of the theories and practices for managing projects. Students learn the techniques that are commonly used to manage large projects through the Project Management life cycle. Students will analyse and evaluate strategies, tools, software, and management approaches to effectively complete and evaluate projects.
This course provides an analysis of the principles, tools, and techniques for Scheduling and Cost Control to develop effective measures for project management to work. The course will also focus on managing the constraints Project Managers face in any project: limits on time, human resources, materials, budget, and specifications. Students will discover proven ways to work within the identified constraints, without letting predefined limits curtail creativity or innovation.
This course explores the basic principles and practices of risk management, quality maintenance and procurement. The Risk Management module leads students through an organized approach to risk management, starting with planning for risk management, through the identification and quantification of risks, preparation of risk response strategies, and the monitoring and control of risk factors. The Quality Management module introduces students to the functions of quality planning, quality assurance, quality control and quality improvement in projects. Students also learn about the evolution of quality management and the international system of ISO standards.
This course provides an introduction to the primary and secondary sources of information in the Computing literature. Introduction to research: experimental, quasi-experimental, quantitative, and qualitative. Exploration to various research approaches and methods in Information Technology. Discussion about ethical aspects of research designs. Writing thesis reports.
This course is an introduction to Agile methodologies and principles for project management with emphasis on software development. The Agile project management process encourages iterative incremental model of inspection and adaptation, teamwork, accountability, self-organization, best practices that allow for rapid delivery and high quality. Agile methodologies also encompass business approaches that align development with customer needs and company goals. Scrum and Extreme Programming (XP) are 2 different varied methodologies based on Agile Project management principles.
Internship includes positions with participating business, industry, or governmental organizations. Supervised, research-oriented, off-campus, non-group instruction, including field experiences.
The primary goal of this course is to expose students to state-of-the-art research in Information Technology and to get them actively think about various thesis research papers from different researchers, authors and contemporary professors. Students are expected to participate in presentations, seminars and expert panel groups with other students, and professors. There will be also discussions of business ethics and lifelong learning.
This course provides a platform for the student to accomplish a major project that involves and integrates ideas from the previous graduate courses. Projects may take many forms and may include programming efforts, should involve background research and some type of implemented IT solution. Purely research based theses are acceptable as well. The thesis involves and in-depth research on chosen topic, analysis of results and demonstration of the solution.