Search results: 1919
This course is designed to provide students with a thorough understanding of Python, a leading programming language in the tech industry. The course aims to equip students with advanced programming skills through a structured yet flexible curriculum. Students will cover core topics including python for data analysis, AI, scripting, automation, software development while engaging in hands-on projects that simulate real-world applications. The course emphasizes critical thinking, problem-solving, and coding best practices. As students progress, they will develop the ability to write efficient and effective Python code. By completion of the course, students will have gained practical experience and confidence in their programming abilities, preparing them for advanced studies or professional opportunities in the industry. Completion of the course requires a final project, which students will present in a comprehensive oral presentation and submit as a formal report.
- Teacher: Mary Agoyi
The objective of this course is to provide the basics of data structures and data organization. The course will introduce C/C++ and algorithms for the implementation of data structures which are stack, queue, linked list, tree. Also, the applications of data structures covering stack applications which are paranthesis checker, infix to postfix and prefix conversions, recursion, dynamic stack and queue, tree traversals. Linked lists with their types and implementations are also studied in details. Theoretical aspects of most widely used data structures will be covered during the lectures. Programming assignments and labworks cover the C/C++ implementations of applications of data structures that are discussed in the lectures.
- Teacher: Gad Bambembe
- Teacher: Tarek Ghamrawi
- Teacher: Labaran Isiaku
- Teacher: Elnaz Mohebbi
- Teacher: Umut ZekI
Data mining has emerged as one of the most exciting fields
in Computer Science because of the growth of computerized data collections,
which become more and more available in our modern digitalized world. Data
mining have roots in the fields of artificial intelligence, machine learning (including
classification, prediction, and clustering), statistical data analysis, data
visualization and information retrieval. By completion of this course, students
learn about different data mining methods such as classification, rule-based
learning, decision trees and association rules. Students also learn about data
selection and cleaning, machine learning techniques to “learn” about the “hidden”
patterns in data, and the reporting and visualization of the resulting
knowledge.
The course covers basic concepts of cyber security theory and techniques for optimizing security on computers and networks. Students are taught on how to assess the current security landscape, the nature of the threat, the general status of common vulnerabilities, the likely consequences of security failures and the set of information security metrics that can be applied to prevent and mitigate the cyber security issues. At the completion of this course student will be able to Identify potential threats to computer and networks, describe basic incident response techniques and identifies several techniques that provides basic protection to computer and networks
- Teacher: Labaran Isiaku
- Teacher: Ozhan OzyOnUm
This course aims to help students describe the basic network concepts such as port, protocol, OSI model, etc., the cybercriminal's intrusion strategies, and what kind of countermeasures can be taken to maintain the system security—also, response plans and processes against a security breach, ethical behaviors in the digital environment, and the risk assessment to be able to identify the assets that need to be protected the most.
In this course, students perform a penetration test on a server by utilizing the tools in Kali Linux. Other vulnerability scanner programs (Nessus and OpenVas) are installed on Kali Linux to execute an automatic vulnerability assessment. Students gain access to the server and steal the passwords by exploiting the discovered vulnerabilities. Then, they try to crack the passwords. The test is conducted based on ethical hacking methodologies to have a systematic lane in order to bring better results. Legal and ethical standards respected throughout the practicals. Based on the results, counter measurements are generated and supported against the vulnerabilities. Finally, all the findings are explained and illustrated in an official report.
- Teacher: Mustafa Cagatayli
This course covers both the fundamentals and advanced topics in operating system (OS) security. Access control mechanisms (e.g., SACL/DACL), memory protections, and interprocess communications mechanisms will be studied. Students will learn the current state-of-the-art OS-level mechanisms and policies designed to help protect systems against sophisticated attacks. In addition, advanced persistent threats, including rootkits and malware, as well as various protection mechanisms designed to thwart these types of malicious activities, will be studied. Advanced kernel debugging techniques will be applied to understand the underlying protection mechanisms and analyze the malicious software. Students will learn both hardware and software mechanisms designed to protect the OS (e.g., NX/ASLR/SMEP/SMAP).
This course discusses different types of malicious attacks and various methods of mitigating to them. Students learn how to protect computer networks by using security codes. Topics covered includes foundations of network security, IP packet structure and analysis control, routing and access control lists, attack techniques, network defense fundamentals, sign-on solutions and file encryption solutions. At the end, the course students will be able to understand the security problems introduced by the combination of the Internet with Intranets, mobile devices, and sensors networks. Students will also be able to develop a basic understanding of the theoretical and conceptual aspects that are needed to build secure systems.
- Teacher: Mustafa Cagatayli
Üniversitenin kalite çalışmaları kapsamında kullanılacak olan dokümanları ve bilgilendirmeleri içerir.