Search results: 3156
The course will introduce basic and fundamental programming constructs and techniques through using the C++ programming language in order to generate algorithmic solutions to problems. Upon completion of the course, students will learn an introduction to algorithms, solving problems by flowcharts and pseudo codes, header files, data types, arithmetic & logic operators, control statements (if, if/else, switch-case) and use them as inner statements, loop statements (while, do/while, for), functions, standard functions of programming language, random number generation and their area of use, user-defined functions, global and local variables, recursion, arrays, searching algorithms on arrays, sorting algorithms on arrays, pointers, pointer operators, using pointers with arrays and functions. In the laboratory hours, students are writing full programs or modifying existing programs for other solutions.
- Teacher: Olanrewaju Adekoya
- Teacher: Jana Alhajj
- Teacher: Gad Bambembe
- Teacher: Tolgay Karanfiller
- Teacher: Masoud Moradi
- Teacher: Muesser Nat
- Teacher: Andre Sena
This course gives an overview of Information Technology and introduces student to the basic computing terminologies such as the four basic component of the computer systems . Topics such as basic computer hardware, software, storage, networking, and security will be covered. Students will also have a hand-on learning on the use of word processor, spreadsheet, presentation and access database. At the end of the course, student will be familiar with the basic computer terminologies and they will have the basic knowledge of the components of the computer systems. Students will also be able to use the word processor, presentation and spreadsheet programs.
- Teacher: Mary Agoyi
- Teacher: Oluwajana Dokun
This course is designed to provide students with a thorough understanding of Python, a leading programming language in the tech industry. The course aims to equip students with advanced programming skills through a structured yet flexible curriculum. Students will cover core topics including python for data analysis, AI, scripting, automation, software development while engaging in hands-on projects that simulate real-world applications. The course emphasizes critical thinking, problem-solving, and coding best practices. As students progress, they will develop the ability to write efficient and effective Python code. By completion of the course, students will have gained practical experience and confidence in their programming abilities, preparing them for advanced studies or professional opportunities in the industry. Completion of the course requires a final project, which students will present in a comprehensive oral presentation and submit as a formal report.
- Teacher: Mary Agoyi
- Teacher: Abdillahi Sheikmusa
The objective of this course is to provide the basics of data structures and data organization. The course will introduce C/C++ and algorithms for the implementation of data structures which are stack, queue, linked list, tree. Also, the applications of data structures covering stack applications which are paranthesis checker, infix to postfix and prefix conversions, recursion, dynamic stack and queue, tree traversals. Linked lists with their types and implementations are also studied in details. Theoretical aspects of most widely used data structures will be covered during the lectures. Programming assignments and labworks cover the C/C++ implementations of applications of data structures that are discussed in the lectures.
- Teacher: Gad Bambembe
- Teacher: Tarek Ghamrawi
- Teacher: Labaran Isiaku
- Teacher: Abdillahi Sheikmusa
- Teacher: Umut ZekI
Data mining has emerged as one of the most exciting fields
in Computer Science because of the growth of computerized data collections,
which become more and more available in our modern digitalized world. Data
mining have roots in the fields of artificial intelligence, machine learning (including
classification, prediction, and clustering), statistical data analysis, data
visualization and information retrieval. By completion of this course, students
learn about different data mining methods such as classification, rule-based
learning, decision trees and association rules. Students also learn about data
selection and cleaning, machine learning techniques to “learn” about the “hidden”
patterns in data, and the reporting and visualization of the resulting
knowledge.
The course covers basic concepts of cyber security theory and techniques for optimizing security on computers and networks. Students are taught on how to assess the current security landscape, the nature of the threat, the general status of common vulnerabilities, the likely consequences of security failures and the set of information security metrics that can be applied to prevent and mitigate the cyber security issues. At the completion of this course student will be able to Identify potential threats to computer and networks, describe basic incident response techniques and identifies several techniques that provides basic protection to computer and networks
- Teacher: Labaran Isiaku
- Teacher: Ozhan OzyOnUm
This course aims to help students describe the basic network concepts such as port, protocol, OSI model, etc., the cybercriminal's intrusion strategies, and what kind of countermeasures can be taken to maintain the system security—also, response plans and processes against a security breach, ethical behaviors in the digital environment, and the risk assessment to be able to identify the assets that need to be protected the most.
- Teacher: Labaran Isiaku
In this course, students perform a penetration test on a server by utilizing the tools in Kali Linux. Other vulnerability scanner programs (Nessus and OpenVas) are installed on Kali Linux to execute an automatic vulnerability assessment. Students gain access to the server and steal the passwords by exploiting the discovered vulnerabilities. Then, they try to crack the passwords. The test is conducted based on ethical hacking methodologies to have a systematic lane in order to bring better results. Legal and ethical standards respected throughout the practicals. Based on the results, counter measurements are generated and supported against the vulnerabilities. Finally, all the findings are explained and illustrated in an official report.
- Teacher: Mustafa Cagatayli
This course covers both the fundamentals and advanced topics in operating system (OS) security. Access control mechanisms (e.g., SACL/DACL), memory protections, and interprocess communications mechanisms will be studied. Students will learn the current state-of-the-art OS-level mechanisms and policies designed to help protect systems against sophisticated attacks. In addition, advanced persistent threats, including rootkits and malware, as well as various protection mechanisms designed to thwart these types of malicious activities, will be studied. Advanced kernel debugging techniques will be applied to understand the underlying protection mechanisms and analyze the malicious software. Students will learn both hardware and software mechanisms designed to protect the OS (e.g., NX/ASLR/SMEP/SMAP).
- Teacher: Mary Agoyi