SFE - Software Engineering Course Descriptions
Introduction to the methods and tools for software development. Topics include the personal software process, requirements engineering, software design, testing methods, project management, and other management techniques.
This course covers the Linux operating system, the BASH command line, and its related applications. The goal of this course is to build familiarity with the Linux command line environment, Linux system administration, and scripting proficiency. Students will get hands-on technical experience with installing, configuring, and administering Linux systems and well as building scripts to automate tasks.
Provide an understanding of fundamental software architecture concepts, standards, drivers, styles, and design specification tenets including design patterns. Develop an understanding of UML method notations and tools to document architectures, and use of tradeoff methodologies (e.g., QAW, ATAM) to evaluate an architecture. Present tenets of technical and ethical debt. Throughout the course students will implement a core set of software design patterns using language of choice.
Elicitation, analysis, specification, validation, and management of user requirements; conflict resolution; process, notations, methods and tools, requirements standards, operational concepts documents (OCD) and system requirements specifications (SRS).
This course will focus on both the technologies and practices of cybersecurity on the Internet networking environment, and key cybersecurity methods and practices for securing complex computing and networking systems. Included in the course are: how networks are designed and constructed, security practices given internet exposed systems, software, and networks, cloud technologies, root cause analysis methods, and simple cybersecurity attacks and defenses. This course has lab and classroom components that introduces students to key technologies for the upper level cybersecurity and software engineering coursework.
Introduces students to the fundamentals of network and data communication technologies. Course topics include telecommunication media and equipment; data transmission and protocols; corporate, local, and wide area networks; intranets and internets; and network software and management. An introduction to electromagnetic concepts and principles is included to provide a technical foundation for these concepts (Cross listed with CSC 256).
CSC 141 or CSC 144
Studies the design and the implementation querying of a database. The focus is on the development of effective SQL queries and the use of relational databases. Other database types and technologies will be discussed.
Ethics in Cyberspace is a course that cultivates virtuous leadership in the digital sea. This course investigates the growing need for an ethical sophistication of the technological world. We will specifically examine the ethical use of hardware, software and Internet systems, the ethical use of private information, big data acquisition, data analytics and the evils of the dark web. As these dangerous arenas grow, it is vital to equip the rising generation with the knowledge and tools to defend Christian values in cyberspace.
PHL 212 Foundations of Ethics
Covers the fundamental algorithms used in both private key and public key cryptography. Algorithms covered will include DES, AES, Diffie-Hellman, and RSA. Traditional encryption methods such as Vigenere ciphers and their cryptanalysis will be briefly described. The number theory needed to understand primality testing and RSA encryption will be developed in detail. Several programming projects aimed at implementing some of the material will be given throughout the semester (Cross listed with CSC 330 and MTH 330).
CSC 141, 144, 171, or 280; and MTH 220
This course focuses on the mathematical foundations found at the heart of computer-based machine learning and artificial intelligence techniques. Topics include linear regression, network connectivity and neural networks, input methods including edge detection and filters, genetic algorithms, and Bayesian networks.
Students will learn the fundamental methodology for how to analyze and secure information systems. This course will cover the basic concepts in computer security including operating system and application vulnerability analysis and defense. Students will gain experience securing enterprise systems in both Windows and Linux environments.
SFE 240 Applied Network and Infrastructure Management
Students will learn the fundamental methodology for how to analyze and secure enterprise networks. This course will cover the basic concepts in both wireless and wired network security including network security controls, protocol analysis, and applied cryptography. Students will conduct network vulnerability analysis and defense. This course builds upon topics covered in the Advanced Network Management course.
SFE 240 and SFE 330
This course exposes students to the challenges of insecure and vulnerable software. Students will be exposed to basic programming constructs as well as the specific principles of object-oriented programming languages. The course also surveys the types of threats and vulnerabilities inherent in software. An overview of secure coding concepts and techniques will be provided to students to provide exposure as to how software can be made more secure and resilient through the application of proper software engineering practices. This course builds upon topics covered in the Software Engineering course.
SFE 240 Applied Network and Infrastructure Management
Covers inspections of requirements, design and code, as well as testing, the handling of change requests, software evolution, code comprehension, and change management.
This class gives the student a fundamental background in computer architecture and operating systems. Through this course a student will learn how to use this information to develop more secure and efficient programs (Cross listed with CSC 401).
MTH 220 and (CSC 145 or 171)
This course focuses on the software development principles that emphasize collaboration, communication, and automation among all stakeholders, including IT operations, testers, developers, customers, and security personnel at the inception of a project. Materials leverage reference architectures and use cases for architectural design principles on continuous integration (CI), continuous delivery/deployment (CD), and continuous authorization (CA) tools and practices, including technical laboratory exercises and practical scenarios. Includes introduction to DevOps and DevSecOps.
Provides the student with the opportunity to pursue a research project. Students will conduct research in consultation with Software Engineering faculty. The project and the amount of credit must be approved by the faculty member.
Initiation of capstone project in software engineering. Students will work on a team project to develop a secure, effective, and efficient capability of value to a customer through the application of software engineering theory, processes, tools, technologies and methodologies. Students are expected to pursue their project in a way that shows proficiency in the software engineering tools, processes and techniques, and demonstrate ethical professional conduct.
Notes
SFE 204, SFE 224, and SFE 384 can be taken either as corequisites or prerequisites.
Culmination of capstone project in software engineering. Students will work on a team project to develop a secure, effective, and efficient capability of value to a customer through the application of software engineering theory, processes, tools, technologies and methodologies. The students are expected to complete their project in a way that shows proficiency in the software engineering processes and techniques, and demonstrate ethical professional conduct.
Students will study the various aspects related to software processes. It will examine the definitions and models of the software process with a focus on process assessment and improvement.
This course aims to familiarize students with the forensic acquisition and analysis processes and to apply forensic principles with many tools of the trade. Upon completion of the course, a student should feel confident in participating in a digital forensic investigation and be able to turn digital artifacts into admissible evidence. This course focuses on the forensic process (planning, acquisition, analysis, reporting) as it relates to computer system and networks. Class periods will consist of lecture and exercises.
This course provides a systematic introduction to the field of digital forensics. The course aims to familiarize students with the forensic process and to apply forensic principles with many tools of the trade. Upon completion of the course, a student should feel confident in participating in a digital forensic investigation. This course focuses on the forensic process (planning, acquisition, analysis, reporting) as it relates to host system and network forensics. Class periods will consist of lecture and exercises.
SFE 471 Digital Forensics in Practice