Search results: 341
This course is designed to provide students with a thorough understanding of Python, a leading programming language in the tech industry. The course aims to equip students with advanced programming skills through a structured yet flexible curriculum. Students will cover core topics including python for data analysis, AI, scripting, automation, software development while engaging in hands-on projects that simulate real-world applications. The course emphasizes critical thinking, problem-solving, and coding best practices. As students progress, they will develop the ability to write efficient and effective Python code. By completion of the course, students will have gained practical experience and confidence in their programming abilities, preparing them for advanced studies or professional opportunities in the industry. Completion of the course requires a final project, which students will present in a comprehensive oral presentation and submit as a formal report.
- Teacher: Mary Agoyi
Data mining has emerged as one of the most exciting fields
in Computer Science because of the growth of computerized data collections,
which become more and more available in our modern digitalized world. Data
mining have roots in the fields of artificial intelligence, machine learning (including
classification, prediction, and clustering), statistical data analysis, data
visualization and information retrieval. By completion of this course, students
learn about different data mining methods such as classification, rule-based
learning, decision trees and association rules. Students also learn about data
selection and cleaning, machine learning techniques to “learn” about the “hidden”
patterns in data, and the reporting and visualization of the resulting
knowledge.
The course covers basic concepts of cyber security theory and techniques for optimizing security on computers and networks. Students are taught on how to assess the current security landscape, the nature of the threat, the general status of common vulnerabilities, the likely consequences of security failures and the set of information security metrics that can be applied to prevent and mitigate the cyber security issues. At the completion of this course student will be able to Identify potential threats to computer and networks, describe basic incident response techniques and identifies several techniques that provides basic protection to computer and networks
- Teacher: Labaran Isiaku
- Teacher: Elnaz Mohebbi
- Teacher: Mustafa OzdeSer
- Teacher: Ozhan OzyOnUm
- Teacher: Mustafa OzdeSer
In this course, students perform a penetration test on a server by utilizing the tools in Kali Linux. Other vulnerability scanner programs (Nessus and OpenVas) are installed on Kali Linux to execute an automatic vulnerability assessment. Students gain access to the server and steal the passwords by exploiting the discovered vulnerabilities. Then, they try to crack the passwords. The test is conducted based on ethical hacking methodologies to have a systematic lane in order to bring better results. Legal and ethical standards respected throughout the practicals. Based on the results, counter measurements are generated and supported against the vulnerabilities. Finally, all the findings are explained and illustrated in an official report.
- Teacher: Mustafa Cagatayli
- Teacher: Olabimpe Badru
- Teacher: Emmanuel Okitor
- Teacher: Zehra Sensoy