| | Introduction to AI and application; Exhaustive Search methods; Heuristic search Methods; First Order Logic for knowledge representation; Programming in PROLOG; Production rule systems; Principles of expert systems; Expert systems Programming in PROLOG; Knowledge Acquisition. Weekly practice in the lab. | 3rd year |
| | Data Base (DB) Environment; DBMS architecture; Data modeling: Conceptual model, Entity relationship model (ERM), Extended ERM, Object Modeling Technique (OMT); Relational DBs; Data Base design; Data Base language: Structured Query Language (SQL); Views; Data Dictionary; Normalization process: 1NF, 2NF, 3NF; DB Integrity; DB Security; Modern DBMSs: Object-Oriented DBMSs; Physical Data Base design; Centralized and distributed Database systems; Case study. Weekly practice in the lab. | 3rd year |
| | Distributed Database (DB) environment; Distributed Database (DDB) processing: Homogeneous distributed Database (DB) systems, heterogeneous distributed systems; Distributed (DB) design: Fragmentation, allocation, replication; Distributed query processing; Concurrency control: Serializability, locking-based algorithms, time stamp-based algorithms, optimistic algorithms, deadlock management; Reliability and recovery; Distributed data servers; Distributed parallel data servers; Integrity and Security issues in distributed systems; Applications. Weekly practice in the lab. | 4th year |
| | Technical definition, development documentation, system definition and specification –proposals, program reports, feasibility reports, instructions and manuals, project reports, research reports, resumes and interviews, team meeting reports, presentation and briefings, abstracts and summaries . Weekly practice in the lab. | 2nd year |
| | An operating system manages all peripheral devices, network interfaces, other program resources and users of such. In short, an OS is a complex program system. The study of operating systems has gained importance with the advancements made in computer organization and programming systems. This course is devoted to a structured survey of OS concepts and practices. Similarly, certain prominent OS will as well be introduced. Special emphasis will be assigned to Unix/Linux. | 3rd year |
| | A theoretical treatment of what can be computed and how fast it can be done. Applications to compilers, string searching, and control circuit design will be discussed. The hierarchy of finite state machines, pushdown machines, context free grammars and Turing machines will be analyzed, along with their variations. The notions of decidability, complexity theory and a complete discussion of NP-Complete problems round out the course. | 3rd year |
| | Introduction to Visual Basic and Visual Studio environment: Controls, components, wizard; Language constructs and structures: Variables, assignment, arithmetic, selection, repetition, arrays, functions; Advanced controls: Frames, Labels, Boxes and others; Strings: Operations and formatting. Graphics: Coordinate systems and drawing methods | 4th year |
| | The curriculum will focus on introducing students to the four occupational cluster areas of IT that reflect the skills required in many occupations today. | 3rd year |
| | Solving Problems using the computer: Variables, Algorithms and its representation, Data: types and definitions. Advanced applications using software packages such as: MS Word: templates, comparing documents, master, Table of contents, Index, inserting, mailing merge, macros, MS Excel: Charts, Functions, sorting and filtering, Solver, Macros, MS Access: Tables, relations, forms, queries, reports, import and export files and data, macros; introduction to the Web applications. Small Projects and applications. Weekly practice in the lab. | 2nd year |
| | Introduction to AI and applications; exhaustive search methods; heuristic search methods; First order logic for knowledge representation; other knowledge representation schemes such as semantic networks, frames; production rule systems; principles of expert systems; Knowledge acquisition, planning and scheduling,, nonmonotonic logic, event calculus, multi-agent systems, Case-based reasoning and model-based reasoning | Graduate |
| | Overview of Systems analysis & design methodology. Approaches (tools and techniques) used by today’s IS developers to gather requirements, design and model, and then construct and implement successful system solutions. Application of Object-Oriented (OO) tools and the Unified Modeling Language (UML). Description of objects, diagrams for functional (use case), structural & dynamic models, hierarchies, dependencies, message flows, state transition, and user interfaces. | Graduate |
| | | Graduate |
| | | Graduate |
| | | Graduate |
| | | 2nd Year |
| | | 3rd Year |
| | | 2nd Year |
| | | 2nd Year |
| | | 1st |
| | | 1st |
| | | 2nd Year |
| | | 2nd Year |
| | | 2nd Year |
| | | 1st |
| | | Graduate |
| | | Graduate |
| | | Graduate - Master |
| | | Graduate - Ph.D. |
| | | Graduate - Master |
| | Fundamental concepts in the design and implementation of computer communication networks and their protocols. This course provides students with hands on experience in most state of the art networking tools, technologies, standards and protocols. This includes layered network architectures, applications, transport, congestion, routing, data link protocols, local area networks. An emphasis will be placed on the protocols used in the Internet. | 2nd Year |
| | This course addresses how to manage complex high speed computer networks running a high-volume mix of data, voice, and video protocols. This course prepares the graduating stduents to assume positions of network administrators in medium to large organizations. We study performance-tuning options and monitoring techniques. The course covers both large local-area networks and Internet service-provider networks. Special focus will be on network management applications with focus on performance optimization, fault management, and security management.
Also, hardware-oriented management protocols such as SNMP, tools for managing software applications, and policy-based routing protocols such as BGP will be covered. Will also cover Advanced IP configuration using iproute2 package, how to tune networks for real-time traffic such as RTP and VOIP, and network-management tools such as OpenNMS and GroundWork.
There will be a programming project involving development of a network-monitoring tool, preferably using Java. | 3rd |
| | Decision support systems are playing key role in today’s organizations in taking effective and useful decisions while insulating organizations from effects of wrong decisions. The course is devoted to introduce decision support systems; show their relationship to other computer-based information systems, demonstrate DSS development approaches, and show students how to utilize DSS capacities to support different types of decisions. The topics covered in the course include but not limited to Introduction to decision support systems; DSS components; Decision making and DSS; DSS software and hardware; developing DSS; DSS models | 4th Year |
| | This course will provide the students with the basics of academic writing and a broad introduction to the methodological foundations and tools to make research. The course covers the basics of academic writing for graduate level students and introduces the language of research, ethical principles and challenges, and the elements of the research process within quantitative, qualitative, and mixed methods approaches. Participants will use theoretical aspects to begin to critically review literature relevant to their field of interests. Students will learn how to identify problems to study, develop hypotheses and research questions, specify independent and dependent variables, check for the validity and reliability of studies and design research projects. They will be exposed to a broad range of designs used in their researches from laboratory and field experiments, surveys, content analysis, focus groups and in-depth interviewing | Graduate - Master |
| | This course teaches the communication skills needed to effectively present IT solutions and make recommendations to directors, C-level executives, and others who may or may not understand technical details. Students learn effective means of communicating technical ideas or thoughts to non-technical audiences for approval, budgets, and types of proposals. | Graduate - Master |
| | This course provides an in-depth look at the challenges organizations face as they operate Students will describe utilization of virtual teams, management strategies, and effective uses of IT for establishing an organization’s worldwide presence | Graduate - Master |
| | | Graduate - Master |
| | This course provides students with insight into the cybersecurity issues surrounding an enterprise. These include securing organizational data, responding to cyber- based security breaches, emerging technologies, and ensuring a secured computing environment for safeguarding company information. The course reviews the network security and cryptographic techniques that are currently being used. The nuances involved in defining cybersecurity strategies and complying with security standards to ensure governance are also discussed. | Graduate - Master |
| | This course includes a focus on external cyber security threats including the Internet, information networks and the World-Wide Web. There will be a detailed view into social media, search engines, and current trends that integrate social media outlets into the enterprise as a means of achieving strategic objectives. This course prepares students to protect web based resources, sites and portals for common threats and vulnerabilities. Risk mitigation and SQL injection prevention techniques will also be discussed. | Graduate - Master |
| | The Cyber Security Defense and Countermeasures course prepares students to defend enterprise networks and protect enterprise data assets from Web-based and internal attacks using techniques such as system hardening, encryption, policy enforcement, and software/hardware intrusion detection systems | Graduate - Master |
| | This course provides students with an overview of cybersecurity which includes a comprehensive view of organizational issues involved with privacy, information security, and cybercrime focused on information networks and systems. | Graduate - Master |
| | The capstone course allows the students to review an organization’s needs and address all the challenges involved with implementing and/or changing information technology focusing on information security in a complex organization. Students will analyze organizational objectives and propose a solution and a full implementation plan. The proposed solution must address strategies for overcoming the challenges of information security related projects such as assessing risks, reduction of funding, and keeping the support of executive management. Students will utilize skills gained throughout the program to demonstrate the ability to design an information security project from conception to post deployment (Prerequisite: Successful completion of all core and specialization coursework). | Graduate - Master |
| | During this course the primary aim of students will be to choose a development project which they will work on during Senior Project 1 and Senior Project 2. To equip them with necessary skills and tools in research and analysis phases of this senior project, in the first four weeks, the students will be taught on how to review literature, conduct research and elicit requirements. These following details outline the desired objectives of tis teaching.
This course will equip undergraduate Information Technologies students with the basic skills to conduct researches in the field of Information Technologies. The course aims to introduce the required techniques for conducting a research, implementing systems, writing technical reports and the skills for presenting the work for audiences. This course will particularly focus on topics, which are related to the field of information technologies. The course will also provide guidance to the students in selecting their projects, understanding the research process as well as the tools needed to support implementing the system and writing its documentation. The course discusses other issues including research methods that are normally used in researches such as experiments, survey, interview and simulations, understanding the importance of literature review, preparing visual presentations and other ethical issues such as plagiarism.
| 4th Year |
| | This a continuation of the graduation project started in IT490. The focus will be in this part on low-level design, implementation, testing and quality assurance as well as management of the project. | 4th Year |