Search results: 1822
This course gives an overview of Information Technology and introduces student to the basic computing terminologies such as the four basic component of the computer systems . Topics such as basic computer hardware, software, storage, networking, and security will be covered. Students will also have a hand-on learning on the use of word processor, spreadsheet, presentation and access database. At the end of the course, student will be familiar with the basic computer terminologies and they will have the basic knowledge of the components of the computer systems. Students will also be able to use the word processor, presentation and spreadsheet programs.
- Teacher: Mary Agoyi
- Teacher: Oluwajana Dokun
- Teacher: Abdillahi Sheikmusa
This course gives an overview of Information Technology and introduces student to the basic computing terminologies such as the four basic component of the computer systems . Topics such as basic computer hardware, software, storage, networking, and security will be covered. Students will also have a hand-on learning on the use of word processor, spreadsheet, presentation and access database. At the end of the course, student will be familiar with the basic computer terminologies and they will have the basic knowledge of the components of the computer systems. Students will also be able to use the word processor, presentation and spreadsheet programs.
- Teacher: Mary Agoyi
The objective of this course is to provide the basics of data structures and data organization. The course will introduce C/C++ and algorithms for the implementation of data structures which are stack, queue, linked list, tree. Also, the applications of data structures covering stack applications which are paranthesis checker, infix to postfix and prefix conversions, recursion, dynamic stack and queue, tree traversals. Linked lists with their types and implementations are also studied in details. Theoretical aspects of most widely used data structures will be covered during the lectures. Programming assignments and labworks cover the C/C++ implementations of applications of data structures that are discussed in the lectures.
- Teacher: Gad Bambembe
- Teacher: Tarek Ghamrawi
- Teacher: Labaran Isiaku
- Teacher: Umut ZekI
Data mining has emerged as one of the most exciting fields
in Computer Science because of the growth of computerized data collections,
which become more and more available in our modern digitalized world. Data
mining have roots in the fields of artificial intelligence, machine learning (including
classification, prediction, and clustering), statistical data analysis, data
visualization and information retrieval. By completion of this course, students
learn about different data mining methods such as classification, rule-based
learning, decision trees and association rules. Students also learn about data
selection and cleaning, machine learning techniques to “learn” about the “hidden”
patterns in data, and the reporting and visualization of the resulting
knowledge.
The course covers basic concepts of cyber security theory and techniques for optimizing security on computers and networks. Students are taught on how to assess the current security landscape, the nature of the threat, the general status of common vulnerabilities, the likely consequences of security failures and the set of information security metrics that can be applied to prevent and mitigate the cyber security issues. At the completion of this course student will be able to Identify potential threats to computer and networks, describe basic incident response techniques and identifies several techniques that provides basic protection to computer and networks
- Teacher: Labaran Isiaku
- Teacher: Ozhan OzyOnUm
This course aims to help students describe the basic network concepts such as port, protocol, OSI model, etc., the cybercriminal's intrusion strategies, and what kind of countermeasures can be taken to maintain the system security—also, response plans and processes against a security breach, ethical behaviors in the digital environment, and the risk assessment to be able to identify the assets that need to be protected the most.
- Teacher: Labaran Isiaku
- Teacher: Adacha Kwala
In this course, students perform a penetration test on a server by utilizing the tools in Kali Linux. Other vulnerability scanner programs (Nessus and OpenVas) are installed on Kali Linux to execute an automatic vulnerability assessment. Students gain access to the server and steal the passwords by exploiting the discovered vulnerabilities. Then, they try to crack the passwords. The test is conducted based on ethical hacking methodologies to have a systematic lane in order to bring better results. Legal and ethical standards respected throughout the practicals. Based on the results, counter measurements are generated and supported against the vulnerabilities. Finally, all the findings are explained and illustrated in an official report.
This course covers both the fundamentals and advanced topics in operating system (OS) security. Access control mechanisms (e.g., SACL/DACL), memory protections, and interprocess communications mechanisms will be studied. Students will learn the current state-of-the-art OS-level mechanisms and policies designed to help protect systems against sophisticated attacks. In addition, advanced persistent threats, including rootkits and malware, as well as various protection mechanisms designed to thwart these types of malicious activities, will be studied. Advanced kernel debugging techniques will be applied to understand the underlying protection mechanisms and analyze the malicious software. Students will learn both hardware and software mechanisms designed to protect the OS (e.g., NX/ASLR/SMEP/SMAP).
- Teacher: Mary Agoyi
This course discusses different types of malicious attacks and various methods of mitigating to them. Students learn how to protect computer networks by using security codes. Topics covered includes foundations of network security, IP packet structure and analysis control, routing and access control lists, attack techniques, network defense fundamentals, sign-on solutions and file encryption solutions. At the end, the course students will be able to understand the security problems introduced by the combination of the Internet with Intranets, mobile devices, and sensors networks. Students will also be able to develop a basic understanding of the theoretical and conceptual aspects that are needed to build secure systems.
- Teacher: Mustafa Cagatayli
Üniversitenin kalite çalışmaları kapsamında kullanılacak olan dokümanları ve bilgilendirmeleri içerir.