Computer Science (COS)
Introductory survey of the concepts and terminology of computer hardware and software integrated with significant computer laboratory experience. Includes hardware organization, operating systems, and skill development projects in commonly used Productivity Software.
An introduction to structured programming using Visual BASIC as a programming language. Focus on problem/solving techniques using basic file handling routines, mathematical computation, string handling, decision and repetition structures.
A language-independent introduction to program development using various problem-solving techniques. Emphasis is placed on problem analysis, algorithm and pseudocode development, a well as various data and control structures.
An introduction to the foundations of Computer Science that incorporates the study of computer architecture, data representation, organization and storage, algorithm development and structured programming using C++ as a design tool.
A continuation of COS 108 with an extensive study of the manipulation of arrays, strings, record structure and files. A brief introduction to Object Oriented Programming is provided.
Introductory coverage of the Microsoft Office Publisher. Learn how to create a publication from scratch or use one of the hundreds of business and personal designs available in Publisher.
This computer literacy course introduces computer terminology about computer hardware, software and various areas related to computers such as Email, Internet, World Wide Web, networking, input, output and storage devices
Introducing Windows, the operating system and commands. Learning customizing the user inferface, adding and deleting hardware, installing software, managing folders, files and disks, shortcuts, properties, and using Control Panel.
Creating simple documents with editing commands, and preparing professional documents, reports, flyers, and posters. Learning to manage tables, indexes, cross references, newspaper columns, merge mail, label/envelop printing, macros, and more.
Creating simple spreadsheets and applying math, statistical, financial, and database functions with various built-in commands. Learning to draw and interpret pie, line, bar, and stacked graph charts. Learning how to make macros.
Learning to use a database management system (DBMS) for creating, reading, updating and deleting data. Experiencing formatting, sorting, finding records using search tools, generating reports, securing data, along with other database application features
Creating on-screen presentations. Learning how to produce informative, attractive, effective presentations using features of this software application.
Learning about various HTML tags and their use for creating simple, attractive web pages. The pages can contain animation, graphics, audio/video, and script programs.
Create applets using JavaScript and design professional looking web pages with executing code embedded.
This laboratory course will have changing topics form computer science to provide knowledge ini new area of this fast changing field. May be repeated for credit 3 times with different topics.
This courses deals with principles and practices in networking. It will involve an overview of networking and computer components employed in transmission of data in local and wide area networks. The basics of networking media, devices, protocols, layered communications models and network addressing are some of the topics to be covered.
A continuation of COS 101. The course includes topics such as table handling, advanced string manipulation, file processing, sorting, and search routines in Visual BASIC.
Overview of computer/based information systems, major models, applications and functions from a component perspective. Learn to describe physical and logical aspects of systems. Learn to present related material with intermediate HTML.
Required for Business and Security options. This course is a study of COBOL syntax, constructs, and its applications in business programming. Topics include structured program design, control break processing, table usage, sorting, merging, report writing, and maintenance of sequential, indexed and relative files.
This course focuses on the growing threats to wireless devices, networks and services delivered over the mobile infrastructure. This course provides an exploration into the unique challenges facing mobile security while comparing and contrasting it with what has been learned from computer and network security. This course provides a conceptual overview of the security principles incorporated in the design of generations of mobile networks, and platform models of the mobile devices.
This course introduces students to the rigorous field of interactive simulation and gaming. Students learn about the major components of modern simulations and games from both a design perspective and a technical perspective. Topics covered include: fundamentals of simulation/gaming, user interface design, human computer interaction, input/output paradigms, and an overview of simulation/game design process. Lab activities are designed to foster critical thinking and problem solving skills through the development of an understanding of the development process as well as interactive programming techniques through the creation of working interactive programs in a high level programming language. Credit: 4 semester hours.
This course provides the foundation for understanding the key issues associated with protecting information asset, determining the levels of protection and response to security incidents, designing a consistent, reasonable information security system with appropriate intrusion detection and reporting features, and learning the principles of trusted computing bases (TCB). CREDIT: 3 SEMESTER HOURS.
This course provides a comprehensive foundation in the principles and practices of cryptography. This course covers the essential concepts, techniques, and applications of cryptographic methods to secure information in the digital age.
A study of computer systems design and development techniques. Includes the systems development cycle, requirements determination and analysis, specification development , Object-oriented (OOD) methods, system validation and verification, quality assurance and implementation.
A detailed study of the organization and structuring of a computer system. Topics include logical basis of computer structure, machine language, number systems, the mechanics of data transfer and control, and recent advances in computer organization.
An overview of the concepts and theories that underlie operating systems including: process and memory management strategies, file systems and protection, scheduling algorithms, multi/programming, distributed systems, and virtual memory.
This course focuses on the study of computing’s interaction with human culture.
Introduces mathematical topics needed in the study of Computer Science including logic, set theory, matrices, induction and recursion, discrete probability, relations, Graphs, Trees, etc..
This course introduces students to network protocols, in particular the OSI and TCP/IP suite of network communication protocols. Topics include fundamentals of networks, data transmission, network architecture, protocols and others.
This course provides a bottom up approach to the concepts of cloud landscape, architectural principles, techniques, design configurations and real-world best practices related to Cloud: service providers, consumers, and services. The course will define and delineate Cloud security architecture and explore the guiding security design principles, design patterns, industry standards, applied technologies and addressing regulatory compliance requirements critical to design, implement, deliver and manage secure cloud based services.
Introduction to robotics including the design, building, and programming simple robots. Included will be the basic science, engineering, and mathematics needed to design and build a simple robot. Students will also be introduced to the topic of project management. The course is a combination lecture/laboratory course that will meet five hours per week for three credit hours.
This course focuses on the managerial aspects of information security and assurances. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security are included to reinforce key concepts. The course includes up-to-date information on changes in the field, such as national and international laws and international standards like the ISO 27000 series. Credit: 3 semester hours.
This course will deal with an exciting area of computer forensics, crimes, law and investigations. Date are collected from cell phones, mobile devices documents, e-mail, etc., and evidence is collected by using various forensics tools. The pretrial and courtroom experiences of a computer forensics investigator will also be discussed. CREDIT: 4 SEMESTER HOURS.
A more advanced study of the complex discrete data structures explored in COS 310. Algorithms manipulating these structures are implemented in C++; using Object Oriented Programming techniques.
A comparative analysis of programming language constructs used in major programming languages. Students study the historical development of programming languages, BNF context/free grammars, language evaluation criteria, and the implementation of data types, control structures, and operators.
This course is an introduction to data warehouse design,modeling and data mining. It provides students with an understanding of the industry standard data mining methodologies, and with the ability of solving problems with it. CREDIT: 3 SEMESTER HOURS.
This course is a continuation of the Gaming I and students will learn to build on their previous knowledge. They will learn the advanced level material in such as Graphics, Sound and Animations. They will build professional looking user interfaces and will use GUI for interactive simulation and gaming. CREDIT: 3 SEMESTER HOURS.
Topics in two and three-dimensional graphics, along with a modern 3D graphics API. Introduction to the foundations of three-dimensional display: projections, geometric transformations, scan conversion, clipping, lighting, shading, and texturing. CREDIT: 4 SEMESTER HOURS.
Students earn course credit for undergraduate teaching experience including but not limited to (1) assisting students during laboratory sessions, (2) helping to set up laboratories or lecture/lab quizzes, or (3) conducting PLTL-Excel type workshops for students. Course may be repeated for credit.
Detailed study of major database concepts and dominant models. Focus on hierarchical, relational, and object—relational systems as they are implemented in current DBMS. Student teams design and build a DBMS.
Techniques of analyzing, developing, and implementing algorithms are presented. Examples of algorithms from sorting, set manipulation, and graphs; computational complexity and np/completeness are implemented in appropriate programming languages.
This course will focus on issues related to the design, testing, review and implementation of secure applications. Emphasis will be placed on writing software programs that make it difficult for intruders to exploit security holes.
An in- depth study of advanced topics in information security. Topics will vary according to current trends and research directions in the field. Some possible topics include: information security, managements, risk assessment, network security, and cyber- forensics.This course will provide most advanced knowledge in cyber security in line with some homeland security strategically research themes and current hard problems in INFOSEC. Research and knowledge, these include current hard problems in INFOSEC research. Credit: 3 semester hours.
Introduces various topics related to the field of Artificial Intelligence including but not limited to logic, knowledge representation, expert systems, natural language processing, AI related problems, and AI languages.
This course provides a capstone course for students to integrate course experiences. Students will manage real Information System projects for businesses/organizations located in the community. Credit: 4 semester hours.
Issues relating to network analysis and management are explored.
This course involves the study of the technology, science and storytelling involved in the creation of computer games. It will emphasize hands-on development of games. Relevant software technologies including programming languages, and simulation engines will be discussed. We assume significant programming experience and knowledge of programming language concepts. We also assume student can learn new programming concepts and systems on their own (direct,OpenGL). CREDIT: 3 SEMESTER HOURS
This course introduces different concepts of Information Security. It provides a broad overview of the threats to the security of information systems, the responsibilities and basic tools for information security, and the levels of training and expertise needed in organizations to reach and maintain a sate of acceptable security.
This course focus is on in-depth methodologies, techniques, and tools used to identify vulnerabilities, exploit, and assess security risk to networks, operating systems, and applications. This course will allow the student to ethically think and work like a successful ethical penetration tester.
This course will focus on the design principles of trusted computing bases (TCB). Issues regarding authentication; access control and authorization; discretionary and mandatory security policies; secure kernel design; secure operating systems; and secure databases.
This course provides the basics of cryptography and how it is used for Information Security.
This course will focus on issues related to the design and implementation of secure data stores. Emphasis will be placed on multilevel security in database systems; covert channels; and security measures for relational and object-oriented database systems.
This course introduces students to the fundamental techniques used in implementing secure network communication and gives them an understanding of common threats and attacks, as well as some practical experience in attacking and defending networked systems.
Prerequisites or corequisites: three courses from COS 481-484. This project course integrates all of the knowledge accumulated in the previous security courses and will serve as a capstone course for the specialization in Information Security
Important and timely problems in Computer Science are reviewed to reinforce and integrate ideas presented over the curriculum. Advanced topics will be introduced.
Prequisite: COS/DGE 475. Interctive gaming puts into practice all of the information and knowledge gained in the previous colurses. In this sequence the students first identify, then build, the necessary coomponets for a full working 3D simulation/game engine. We assume significant progamming experience and knowledge of programming language concepts. We also assume studen can learn new programming concepts and systems on their own (direct, OpenGL).
The Capstone Project provides an opportunity for students close to graduating to participate at a high-level of inquiry-based and practice-centered learning focusing on their area of specialization. These projects aim to bridge theory and practice and are aimed to have an impact on the professional life of students after graduation.
Research and in-depth study of a particular computer science topic or problem under the supervision of a Computer Science faculty member.
This course can be taken for on- or off-campus employment related to the computer science discipline. The student must demonstrate that the experience gained on the job is at least equivalent to the material learned in a typical class. May be repeated once.
This course may have a different topic relevant to the computer science field each time it is offered. The purpose of the course is to gain knowledge in current areas of this ever-changing field. The course may be repeated four times for credit.