Undergraduate Degree Programme Handbook 2018/2019 - page 87

45
Synopsis of Course Content
This course contains the introduction towards
Internet and its evolution in introducing new
technologies such as Internet of Everything, Cloud
Computing and Software Defined Network. It
explained the concept and steps of implementation
of the technology discussed and how to implement
it. It also discussed the strength and weaknesses of
each Internet technology and the security issues
related.
Assessment Methods
Continuous Assessment: 50%
Final Examination: 50%
WIC3001
MATHEMATICS IN NETWORKING
Credit:
3
Course Pre-requisite(s):
None
Medium of Instruction:
English
Learning Outcomes
1. Explain mathematics theorems related to
networking
2. Solve networking problems with mathematics
3. Solve problems related to network performance
with mathematics
Synopsis of Course Content
This course covers probability theory, stochastic
processes, queuing theory, graph theory and their
applications to networking. Topics include random
vairables, conditional probability, discrete and
continuous distribution, Little’s theorem, Markov
processes, Markov chains, birth-death processes,
M/M/1 queue, multiserver queue, graph theory etc.
Assessment Methods
Continuous Assessment: 50%
Final Examination: 50%
WIC3002
CRYPTOGRAPHY
Credit:
3
Course Pre-requisite(s):
None
Medium of Instruction:
English
Learning Outcomes
1. Explain the concept of cryptography and
technique used clearly.
2. Analyze the technique used in an algorithm for
the strength and weaknesses.
3. Determine which technique or algorithm to be
used and implemented in a system accordingly.
4. Discuss the implementation of cryptographic
technique in any internet security protocols and
user authentication mechanisms.
5. Apply the current cryptographic and security
technology.
Synopsis of Course Content
This course consists of the introduction of
cryptography, cryptographic techniques, computer-
based Symmetric Key Cryptographic Algorithms,
computer-based Asymmetric Key Cryptographic
Algorithms, Public Key Infrastructure (PKI), Internet
Security
Protocols
(Implementation
of
Cryptography), user authentication mechanisms,
practical implementations of cryptography and case
studies.
Assessment Methods
Continuous Assessment: 50%
Final Examination: 50%
WIC3003
EMBEDDED SYSTEM PROGRAMING
Credit:
3
Course Pre-requisite(s):
None
Medium of Instruction:
English
Learning Outcomes
1. Identify the concept and architecture of an
embedded system.
2. Apply an embedded system application.
3. Use interfacing technique between embedded
system applications.
Synopsis of Course Contents
This course covers the embedded system overview,
special variable processor design, embedded
system memory, embedded system interfaces and
embedded system controller.
Assessment Methods
Continuous Assesssment: 50%
Final Examination: 50%
WIC3004
COMPUTER PENETRATION
Credit:
3
Course Pre-requisite(s):
None
Medium of Instruction:
English
Learning Outcomes
1. Identify the suitable principles and techniques
in computer penetration.
2. Apply the computer penetration techniques
based upon the suitable selection process.
3. Solve security problems on appliances by using
the computer penetration process.
Synopsis of Course Content
This course introduces the concepts and techniques
used in computer penetration which mainly
focussing on ethical hacking. Topic includes Ethical
Hacking, Footprinting, Scanning Networks, System
Hacking, Malware, Hacking Webservers, Hacking
Wireless and Penetration Testing.
1...,77,78,79,80,81,82,83,84,85,86 88,89,90,91,92,93,94,95,96,97,...272
Powered by FlippingBook