Course CSC 310 | Algorithms & Complexity Analysis | 300 Level | 2nd Semester
Course Structure Basic algorithmic analysis: Asymptotic analysis of Upper and average complexity bounds: standard Complexity Classes Time and space trade-offs in algorithms analysis recursive algorithms. Algorithmic Strategies: Fundamental computing algorithms: Numerical algorithms. sequential and binary search algorithms; sorting algorithms, Binary Search tress, Hash tables., graphs & its representation.
Course CSC 321 | Systems Analysis & Design | 300 Level | 1st Semester
Course Structure System Concept: System Development Life Cycle Analysis: Fact gathering Techniques, data flow diagrams, Process description data modelling. System Design: Structure Charts, form designs, security, automated Tools for design.
Course CSC301 | Computer Organisation & Architecture | 300 Level | 1st Semester
Course Structure
Course CYB 301 | Software Defined Networks | 300 Level | 1st Semester
Course Structure History, motivation and concept of SDN, SDN Architecture, SDN Application, Controller, Datapath, Control to Data-Plane Interface (CDPI), SDN Northbound Interfaces (NBI), Deployment Models, Application areas of SDN, Security Using SDN Paradigm.
Course CYB 303 | Cryptographic Techniques | 300 Level | 1st Semester
Course Structure Explores symmetric and asymmetric cryptography, key management. and encryption algorithms Such as DES, AES, RSA, and PGP. Discusses PKI, SSL, and VPN including how to use protocols, hashing, digital signatures, and certificates and certificate authorities. Covers policies, procedures and methods for the proper use of cryptography in secure systems.
Course Structure Introduction to biometrics, brief introduction of digital image processing and MatLab in biometric image/signal processing; Introduction to Biometric Algorithms and Systems with emphasis on any two of the following: face, fingerprint. iris, speech & speaker. Multimodal biometrics, privacy issues and other aspects of biometrics, applications of biometrics & future trends. The course also addresses such challenging issues as security strength, recognition rates and privacy, as well as alternatives of passwords and smart cards.
Course CYB 307 | Information Security Engineering | 300 Level | 1st Semester
Course Structure System and management View of information security, Requirements for information security, Systems-design process and life-cycle security management of information systems. Basic policies on information security and methodologies. Information-security risk management, security policies, security in the systems-engineering process. Laws related to information security and management of operational systems.
Course CYB 309 | Systems Security | 300 Level | 1st Semester
Course Structure Security Principles, Account Security, File System Security, Assessing Risk, Risk Analysis, and Encryption. The student's basic network and operating system skills will be expanded to include planning. implementation, and auditing of a system's security package. Secure design and secure coding principles, practices, and methods including least privilege, threat modelling, and static analysis. Covers common vulnerabilities such as buffer overruns, integer overflows, injection attacks, cross-site scripting, and weak error handling.
Course CYB 311 | Introduction to Research Methodology | 300 Level | 1st Semester
Course Structure Foundations of research, researching and choosing a topic, treatment of selected topics from various areas of computing with an emphasis on appropriate research methods, finding a supervisor, writing a research proposal, narrowing the scope of the project, planning, researching, use of encyclopaedias, research guides, handbook etc., academic databases for computing discipline; use of tools/techniques for research: reference management software, software for detection of plagiarism, writing and submitting the project report/dissertation. Practical skills are acquired in technical writing, critical reading, and the presentation of technical literature.
Course CYB 399 | Industrial Training | 300 Level | 1st Semester
Course Structure Students are attached to private and public organisations for a period of six months with a view to making them acquire practical experience and to the extent possible, develop skills in all areas of computing. Students are supervised during the training period and shall be expected to keep records designed for the purpose of monitoring their performance. They are also expected to submit a report on the experience gained and defend their reports in a seminar.