| | This course aims to improve students’ ability in developing web applications using Client-Side programming including XHTML, Cascading Style Sheet and JavaScript. Students will have strong knowledge about the methods and tools used in developing web applications. Students will know how the World Wide Web works to be able to design, implement and configure its services and applications effectively. | | | | This course uses PHP and MySQL to provide students with a programming background by using applied skills in order to build professional-quality, database- driven Web sites. By integrating PHP and MySQL with the XHTML and CSS frameworks, the student will develop the skills to build interactive Web sites with authentication and security. Throughout the course, the student will be able to apply new concepts in both guided and free- form activities. The student will be able to expand the functionality of a comprehensive Web site project that then can be directly translated or easily modified into a real- world Web application. Tomcat, XAMPP, or WampServer development platform environment could be used to create the PHP web applications. | | | | 1- Understand information security concepts and terminologies.
2- Understand the nature of e-Business security.
3- Understand the role of security services in the field of e-Business.
4- Understand enterprise security architecture and design.
5- Be able to assess risk and model threats in e-Business organization.
6- Be able to utilize various web security tools and techniques.
7- Discuss various web security protocols.
8- Discuss various security issues related to online payment systems and protocols.
9- Be able to utilize secure programming techniques.
| | | | This course covers the security and safety analysis in software design and development. It defines and identifies vulnerability detection and avoidance. Topics include threat modeling, defensive programming, web security and the interaction between security and usability, authentication, principle of least privilege, buffer overflows, race conditions, time-of-check vs. time-of-use, trust management, access control, and other security relevant issues. | | | | This course focuses on the fundamentals of information security. Students will learn the principles of information security, security architectures and models, and aspects and methods of information security such as physical security control, operations security, access control, hacks/attacks/defense, systems and programs security, cryptography, network and web security, worms and viruses, and other Internet secure applications. The course covers the following topics: system security issues, authentication systems, IP security, web security, access control, firewalls, data integrity through encryption, virtual private networks, SSL, SSH, and IPSec | | | |
The overall aim of this course firstly, is to build the core knowledge for the main concepts, technologies and tools related to e-Business, then to use this knowledge and apply it directly to make entrepreneurial e-business plan along with an e-Commerce websites that represents alive demonstration of that business model.
| | | | Fundamental concepts of programming using C++; Basic structures of
programming tools: variable names; Data types; Control structures; Arrays;
Functions; Pointers; Introduction to classes and objects; Inheritance;
Applications using C++. Weekly practice in the lab. | | | |
This course provides the student with a complete learning lectures focusing on the most important, essential, and current concepts of information technology. Students are given a streamlined, concise, relevant approach to the fundamental issues surrounding the world of computing through a balance between theory and applied learning of these important topics. | | | | Web applications security, as branch of secure software design, focuses on how to design and develop dependable and trustworthy web applications. Having completed this course the student will be able to participate in, and cooperate with, web application development teams with a goal to achieving appropriate levels of security for web products. It introduces students to Saltzer and Schroeder security design principles and how security can be integrated with the web application development lifecycle. The course covers common web vulnerabilities such as Cross-Site Scripting, Cross-site Request Forgery, SQL injection and more. Topics such as threat modeling, abuse cases and secure programming will be discussed as well. | |
|