Advanced Web Programming

 This course gives students the opportunity to enhance and enrich their skills in web programming. Students will  learn to develop web applications that use three-tier architecture, session management, object-oriented techniques, and advance database interactions. Concepts such as advanced CSS concepts, XHTML, JavaScript, PHP, Jquery, SQL, rich interactive web environments, authentication, and security will also be explored.

Software Requirements Specification

 In the course students learn the full cycle of collecting, prioritizing, balancing and agreeing on IT product/service requirements, they learn the software specification document and UML models. At the course our students work the following tools:  Technical Requirements Matrix, Software Requirements Specification, MoSCoW Priority Matrix, UML Models for Use Cases, States Diagrams,  and Sequence diagrams. At the course a student can consequently develop his/her own package of software requirements.

 Information Systems Audit 

 This course examines the use of various standards, guidelines, laws and methods, which are used in information systems audits. The discussion serves both to set the governance framework, the information systems audit works within and the choices for specific courses of action to meet the requirements of the audit.


Securing an E-Commerce Infrastructure

Securing the e-commerce infrastructure, taking into account data architecture and management and advanced network protocols. In the e-commerce environment, both information security needs of organizations and privacy needs of customers and clients are examined. In addition, the OWASP top 10 is discussed to educate the students about the consequences of the most common and most important web application security weaknesses.


Digital Forensics

 In-depth coverage of live incident response and file system forensic analysis. The course will include the use of various tools and techniques used to extract information from digital media, with a focus on information that is difficult to find using normal methods. These tools and techniques will be supplemented with theoretical discussion, both of the structure of the media itself and of the nature and limitations of digital evidence. The course will cover the most commonly used operating systems and file systems.


 Disaster Recovery and Planning

An in-depth coverage of disaster recovery planning including, techniques to prevent, detect, and recover from loss of information availability. Students are instructed in ways to formulate a disaster and recovery plan, and test and implement the plan in a simulated lab environment.

Close Menu
fr_CAFrench en_USEnglish