Course Structure Overview of input/output hardware. Elements of graphics software. Fundamental algorithms.
Two-dimensional viewing and transformation. Design for interaction. Introduction to threedimensional concepts. Digital photography. Video editing. Survey of applications. Virtual
environments technology. requirements and applications. Presence. Displays. Programming
virtual environments. Devices. An overview of computer graphics for visualization. Scientific
visualization techniques. Introduction to computer animation
Course Structure The Semantic Web Activity of W3C. Overview of techniques and standards of W3C. Introduction
to Ontologies. Ontology languages for semantic web.XML with Document Type Definitions and
Schemas, Resource Description Framework (RDF). The Basis of the Semantic Web. Metadata
with RDF (Resource Description Framework). Metadata taxonomies with RDF Schema.
Transformation/Inference rules in XSLT. RuleML and RIF. The W3C ontology language OWL.
Integrating these techniques for ontology/rule-based multi-agent systems. Semantic Modeling.
Semantic Web Applications. Logic for the Semantic Web. Semantic Web Vision. Ontology Design
and Management using the Protege editor. Ontology Reasoning with Pellet. Ontology Querying
with SPARQL. Ontology Engineering. Ontology Programming with the Jena API. Current
Applications of the Semantic Web. Semantic web and Web 2.0. Semantic web and Web 3.0
Course Structure Course Contents
System vulnerabilities. Applied cryptography. Host-based and network-based security. Privacy.
Anonymity. Usability. Security economics. Risks and vulnerabilities. Policy formation. Controls
and protection methods. Law and privacy issues. Threat models and attacks. Techniques for
achieving security. Operating systems security. Capabilities. Information flow control. Language
security. Network protocols. Hardware security. Security in web applications.
Lab Work: Students will design, implement and compromise a secure web server and web
application in a group project. Hands-on experiences on some basic attacks using isolated VMs
and simulated hardware.
Course Structure Overview of main trends in the management of digitization in an organization. Fundamentals of
Governance principles (strategy development, establishment and monitoring system for
management and policy). Organizational context. Staffing roles and skills (SFIA, e_CF).
Organization digital transformation and disruption. Change management. Service and product
management. Managing the operation of ICT using Information Technology Infrastructure Library
(ITIL). Control objectives for Information related technology. Discussion of information and
communication technologies importance in contemporary organizations. Logic underpinning
information systems management and the importance of strategic planning when ICT deployment
in organization is concerned, discussion on the most common technological solutions used by
organizations to support managerial different managerial and business activities. Project
management and its use to develop and implement information systems. ICT governance and
outsourcing. Project planning. Project control and homogeneous deployment in enterprise.
Information systems and benefit management (E-Business, Big data analytics, Knowledge
management
Course Structure Introduction to computer network. Network components. Multi-layer network model. OSI model.
Data link layer. Link types: point-to-point, multi-access. Ethernet and PPPprotocols, Internet
Protocol (IP). IP addressing. Introduction to routing. ICMP control protocol. Transport layer. TCP
and UDP protocols. Static routing, and dynamic routing. Network key performance indicators
(KPI). Bandwidth, latency. jitter, convergence time. KPI measurement. Optimization of network
bandwidth. Load sharing and load balancing. Routing protocol tweaking. Forwarding detection
(BFD). Optimization of network latency. Packet queuing, packet scheduling. Quality-of-service
(QoS) features. KPI measurement automation. Optimization of computer networks using IP SLA
feature.
Course Structure Database basics and SQL. The role of databases in information systems. Introduction to database
security and auditing. Security architecture fundamentals. Operating systems security
fundamentals. Administration of users' profiles. Password policies, privileges, and roles. Database
application security models. Multilevel secure relational model. poly instantiation. Access control
models: MAC, DAC, RBAC. Stored procedures and functions: PL/SQL I. PL/SQL II. Virtual
private databases. SQL Injection. Database vault. Auditing database activities. XML Access
Control. Watermarking in relational database. Regulations. compliance and privacy protection.
Database as a service: challenges in outsourced database, Merke hash tree, data confidentiality:
relational encryption. NoSQL.
Lab Work: Database installation and basics, implementation of discretionary access control,
implementation of mandatory access control using Oracle label security, implementation of virtual
private databases and SQL Injection