SFE - Software Engineering Course Descriptions
Introduction to the methods and tools for software development. Topics include the personal software process, requirements engineering, software design, testing methods, project management, and other management techniques.
This course covers the Linux operating system, the BASH command line, and its related applications. The goal of this course is to build familiarity with the Linux command line environment, Linux system administration, and scripting proficiency. Students will get hands-on technical experience with installing, configuring, and administering Linux systems and well as building scripts to automate tasks.
Design process notations, methods, paradigms, and tools. System architecture tradeoff analysis; component and subcomponent specification. Generic (domain) design; architectural styles, frameworks, and patterns. Test and integration plan documents. Architecture standards; design tools.
Elicitation, analysis, specification, validation, and management of user requirements; conflict resolution; process, notations, methods and tools, requirements standards, operational concepts documents (OCD) and system requirements specifications (SRS).
This course will focus on the skills needed to manage the infrastructure found in an enterprise IT environment. Topics will include network architecture, service design and monitoring, data center operations, and the corresponding best-practices to apply when building and maintaining these systems. Students will be given the opportunity to apply the concepts covered in lecture with hands-on labs designed to provide practical experience with tools available to manage IT infrastructure.
Introduces students to the fundamentals of network and data communication technologies. Course topics include telecommunication media and equipment; data transmission and protocols; corporate, local, and wide area networks; intranets and internets; and network software and management. An introduction to electromagnetic concepts and principles is included to provide a technical foundation for these concepts (Cross listed with CSC 256).
CSC 141 or CSC 144
Examines the four fundamental types of data organization (sequential, direct, indexed sequential, and database management systems) and the corresponding programming and design techniques. Security, privacy, data integrity, and future trends are discussed (Cross listed with CSC 261).
CSC 141 or 144
Ethics in Cyberspace is a course that cultivates virtuous leadership in the digital sea. This course investigates the growing need for an ethical sophistication of the technological world. We will specifically examine the ethical use of hardware, software and Internet systems, the ethical use of private information, big data acquisition, data analytics and the evils of the dark web. As these dangerous arenas grow, it is vital to equip the rising generation with the knowledge and tools to defend Christian values in cyberspace.
PHL 212 Foundations of Ethics
Covers the fundamental algorithms used in both private key and public key cryptography. Algorithms covered will include DES, AES, Diffie-Hellman, and RSA. Traditional encryption methods such as Vigenere ciphers and their cryptanalysis will be briefly described. The number theory needed to understand primality testing and RSA encryption will be developed in detail. Several programming projects aimed at implementing some of the material will be given throughout the semester (Cross listed with CSC 330 and MTH 330).
CSC 141, 144, 171, or 280; and MTH 220
This course focuses on the mathematical foundations found at the heart of computer-based machine learning and artificial intelligence techniques. Topics include linear regression, network connectivity and neural networks, input methods including edge detection and filters, genetic algorithms, and Bayesian networks.
Students will learn the fundamental methodology for how to analyze and secure information systems. This course will cover the basic concepts in computer security including operating system and application vulnerability analysis and defense. Students will gain experience securing enterprise systems in both Windows and Linux environments.
SFE 240 Applied Network and Infrastructure Management
Students will learn the fundamental methodology for how to analyze and secure enterprise networks. This course will cover the basic concepts in both wireless and wired network security including network security controls, protocol analysis, and applied cryptography. Students will conduct network vulnerability analysis and defense. This course builds upon topics covered in the Advanced Network Management course.
SFE 240 and SFE 330
This course exposes students to the challenges of insecure and vulnerable software. Students will be exposed to basic programming constructs as well as the specific principles of object-oriented programming languages. The course also surveys the types of threats and vulnerabilities inherent in software. An overview of secure coding concepts and techniques will be provided to students to provide exposure as to how software can be made more secure and resilient through the application of proper software engineering practices. This course builds upon topics covered in the Software Engineering course.
SFE 240 Applied Network and Infrastructure Management
Covers inspections of requirements, design and code, as well as testing, the handling of change requests, software evolution, code comprehension, and change management.
This class gives the student a fundamental background in computer architecture and operating systems. Through this course a student will learn how to use this information to develop more secure and efficient programs (Cross listed with CSC 401).
MTH 220 and (CSC 145 or 171)
Provides the student with the opportunity to pursue a research project. Students will conduct research in consultation with Software Engineering faculty. The project and the amount of credit must be approved by the faculty member.
Capstone project or internship in software engineering.
Culmination of the capstone project or internship in software engineering.
Students will study the various aspects related to software processes. It will examine the definitions and models of the software process with a focus on process assessment and improvement.
This course aims to familiarize students with the forensic acquisition and analysis processes and to apply forensic principles with many tools of the trade. Upon completion of the course, a student should feel confident in participating in a digital forensic investigation and be able to turn digital artifacts into admissible evidence. This course focuses on the forensic process (planning, acquisition, analysis, reporting) as it relates to computer system and networks. Class periods will consist of lecture and exercises.
This course provides a systematic introduction to the field of digital forensics. The course aims to familiarize students with the forensic process and to apply forensic principles with many tools of the trade. Upon completion of the course, a student should feel confident in participating in a digital forensic investigation. This course focuses on the forensic process (planning, acquisition, analysis, reporting) as it relates to host system and network forensics. Class periods will consist of lecture and exercises.
SFE 471 Digital Forensics in Practice