Course Description

This course is designed to provide fundamental concepts and detailed technical treatment of key issues of Data and Computer Communication, and to relate them to the present-day advances so that students will be able to get the big picture of state-of-the-art networking and communications with its different pieces and their interaction.

Course Description

This course aims to support students in developing their research project and to assist them in defining their mode of enquiry. Students are introduced to a range of research tools and are equipped to plan and organize their research, as well as to communicate their findings in a scientific manner.

Course Description

This course introduces the fundamental concepts of the information technology audit and control function. The main focus of this course is on understanding information controls, the types of controls and their impact on the organization, and how to manage and audit them. The concepts and techniques used in information technology audits will be presented. Students will learn the process of creating a control structure with goals and objectives, audit an information technology infrastructure against it, and establish a systematic remediation procedure for any inadequacies. The challenge of dealing with best practices, standards, and regulatory requirements governing information and controls is addressed.

Course Description

This course aims to provide basic understanding on up to date technologies as well as social and ethical behavior of information technology related industries. Additionally, students will arrange for selecting different technical areas according to their preference and core competencies.

Course Description

This course provides an introduction to the fundamental principles and topics of Information Technology Security and Risk Management at the organizational level. Students will learn critical security principles that enable them to plan, develop, and perform security tasks. The course will address hardware, software, processes, communications, applications, and policies and procedures with respect to organizational IT Security and Risk Management.