This course is fundamental course in the program of information technology provides a comprehensive introduction to research methodologies in the field. It covers a range of quantitative and qualitative methods of data collection and data analysis, and introduces students to the fundamental concepts, tools and methodologies to challenges them of carrying out scientific researches. It aims to familiarize students with scientific concepts to study, diagnose and analyze the scientific problems. They learn about the cyclical nature of applied research in accordance with the scientific method steps to set up or writing scientific research or reports. Students are encouraged to investigate research papers in in different areas. Hence, the students demonstrate, summarize and present techniques such as thoroughly surveying literature, critical discussion and analysis of scientific articles. This course provides students with consolidated background and necessary skills to carry out their research phase.
Advanced Computer Networks
P.
T.
L.
C.H.
3
3
This course designed to introduce advanced topics in computer networks. Algorithms and protocols at the application, transport, network and medium access layers as well as experimentation, simulation and modeling techniques will be cover. Students will have chance to study the state-of-art research in Computer Networks by exploring emerging research challenges in the field of information and content centric networks. Course projects are required and involve programming and working with simulation tools.
Information Technology Management
P.
T.
L.
C.H.
3
3
This is an intermediate course in Information Technology Management. The course will start with assessment of the role of IT in organization, its consequences on organization and its business management systems and functional business systems. It will continue with discussion about related technologies such as Information Systems, IT Architecture, Data Governance, Cloud Computing, Collaborative Technology, and the Internet of Things. The course will then examine strategic and recommending technology as well as operational issues of IT management. Real-world case examples illustrating best practices of what works, and failures to highlight what does not work, and why, will provide a balance of theory and practice.
Selected Topics in Data Science
P.
T.
L.
C.H.
3
3
This course introduces selected topics in one of the most important field in data science area. It introduces the different topics, concepts and theory of Natural Language Processing (NLP; a.k.a. computational linguistics) and its practical tasks. NLP is devoted to creating computer systems which understand and produce human languages. Traditional NLP tasks include part-of-speech tagging, parsing, information extraction, machine translation, text categorization, question-answering and conversation agents. Recent NLP applications include sentiment analysis, opinion mining, chatbots and voice-assisted digital personal assistants. The primary focus of this course is on the concepts, topics and algorithms/techniques of NLP. The theoretical side is complemented by case studies, practical implementations/programming and projects. Different topics to be covered including language models, sentiment analysis, parsing, information extraction and neural language models. To achieve the course, different teaching strategies will be applied such as lectures, case studies, problem solving and self-learning. Good programming, knowledge of data structures, algorithms, probability and linear algebra are the requisites of this course.
Advanced Information Security and Privacy
P.
T.
L.
C.H.
3
3
This course aims to provide a important issues of information security and privacy theories, tools, techniques and their application in a real problems. This course cover an overview of properties, vulnerabilities, threats and attacks of information security, control tools and techniques, system security development and its lifecycle, operating system security, network security, privacy, cyber security concepts, security management. It also focuses on how to apply and implement control tools and techniques in practice to build, manage and defense an information system.
IT Enterprise Architecture
P.
T.
L.
C.H.
3
3
The course explains what Enterprise Architecture (EA) is and how to create and maintain effective business models that enhance business strategic goals and decision-making processes from the perspectives of ICT enabled business processes. The course explains how to integrate the Service Oriented architecture (SOA) with business process logics. It introduces some of the well-known EA frameworks and the ties between enterprise architecture and ICT infrastructure through some practical case studies that explain how to build and maintain business architecture within an organization.
Advanced IT project management
P.
T.
L.
C.H.
3
3
In the rapid growth of information technology, the ability to deliver an IT project on time and on budget depends on professionally executing project management skills. This course mainly designed to prepare IT projects managers with the necessary project management skills. This course covers the basic concepts related to IT project management through project phases and the project life cycle, project management, process groups, scope, time, cost, quality, communications, risk, and procurement involved in the management of IT projects.
Digital Forensics
P.
T.
L.
C.H.
3
3
This course is to introduce the principles and practices of digital investigation, emphasize the fundamentals and importance of digital forensics. Topics of study include an overview of different techniques and procedures that perform a digital investigation. This course focuses mainly on the analysis of physical storage media and volume analysis. It covers the major phases of digital investigation such as preservation, analysis and acquisition of artifacts that reside in hard disks and random access memory. This course will provide theoretical and practical knowledge, as well as current research on Digital Forensics.
Selected topics in cybersecurity
P.
T.
L.
C.H.
3
3
Cybersecurity is one of the most rapidly growing field. In fact, most of the current systems are distributed systems which are highly potential for any cybersecurity attack. The aim of this course is to provide students with some of the main topics related to cybersecurity. These topics including introduction, law and regulation, human factors, privacy and online rights, malware and attack technologies, distributed systems security, web and mobile security, network security, hardware security, and cyber-physical systems security.
Cloud Computing Security
P.
T.
L.
C.H.
3
3
This course provides the ground-up coverage on the concepts of cloud architecture, techniques, and real-world best practices applied to Cloud service providers and consumers and delivering secure Cloud-based services. It describes Cloud security architecture and explores the guiding security design principles and applied technologies to deliver and manage secure cloud-based services. The course explores the secure cloud architectural aspects with regards to identifying and mitigating risks, protection and isolation of physical & logical infrastructures including compute, network and storage, data protection, identity management & access control, monitoring and auditing processes and meeting compliance with industry and regulatory mandates.
Advanced Database Systems
P.
T.
L.
C.H.
3
3
This is a graduate-level course on the internals of database management systems and advanced data models and technologies. The course starts by introducing the main DBMS components such as physical database storage techniques, advanced indexing techniques, query processing and optimization…etc. Moreover, an advanced data models, such as Key-Value Databases, Document Databases, Column-Family Stores, and Graph Databases are investigated. The course concludes by introducing emerging database technologies such as Big data and block chain databases.
Selected Topics in Information Technology
P.
T.
L.
C.H.
3
3
This course is very special course of selected topics in the field of computer science. It covers many modern topics that are currently highlighted as hot research trends. There is a flexibility to change some topics according to change of research trend.