Course image CIS4261: Computer Forensics
Semester II

Summary of the module:

Computer Forensics is an emerging field owing to the rise in cyber felonies nowadays. It’s very important for students to be familiar with computer forensic issues and be able to gather evidence against malicious intruders and identify them. Computer forensic experts help secure sensitive information in enterprise networks.  This course is designed to provide a solid foundation in the theory and practice of essential computer forensic techniques, this introductory course in computer forensics focuses on preparing students to respond to many types of crisis situations by providing the skills needed to respond to an investigation. Focus is placed on the role of computer forensics and the methods used in the investigation of computer crimes.

Learning outcomes of the module:

A Knowledge and Understanding

A1. Mathematics and sciences relevant to computer engineering and information security

A2. The fundamental concepts, principles and theories of computing.

A3. The principles of design and development including an awareness of standards of practice.

A4. Information systems threats, vulnerabilities, risks and controls

A5. Computer security implementation technologies

B Cognitive/Intellectual skills/Application of Knowledge

B1. Select and apply appropriate mathematical methods for modelling and analysing computer engineering and information security problems.

B2. Apply technical knowledge to produce a technical risk assessment.

B3. Apply professional knowledge to produce a commercial risk assessment

C Communication/ICT/Numeracy/Analytic Techniques/Practical Skills

C1. Use competently and safely standard electrical/electronic/computer laboratory instrumentation.

C2. Detection of network security attacks and configuration of protective mechanisms e.g. firewalls

C3. Have practical experience of operation and application of an encryption technology eg. PGP

C4. Analyse, evaluate and interpret data and apply them to the solution of computer engineering and information security problems.

D General transferable   skills

D1. Have the capacity for self-learning in familiar and unfamiliar situations.

D2. Carry out independently a sustained investigation.

D3. Demonstrate general numerical skills and problem solving skills.

D4. Use competently information technology (ICT).

Course image CSC4265: Research Project II
Semester II

SUMMARY OF THE MODULE

This module is aimed at summarizing the skills attained as a result of taking the applied computer science modules whereby the students are expected to develop systems (hardware or software) that are applicable to the market. Such systems need to contribute to gaps in the market and should mainly target areas that need solutions in the unique African region. The solutions should mainly have customized solutions to the region.

OBJECTIVES OF THE MODULE

-Identifying the research problem

-Performing a literature review & writing a theoretical/conceptual framework

-Researching the design or approach to the problem

-Collecting and analyzing the data and/or designing and validating the design

-Drawing conclusions and giving recommendations

LEARNING OUTCOMES OF THE MODULE

A. Knowledge & Understanding           :

Having successfully completed the module, students should be able to demonstrate knowledge and understanding of:

A.1. Project methodology

A.2. Risk management and social aspects of project work

B. Cognitive/ Intellectual Skills/ Application of Knowledge :

Having successfully completed the module, students should be able to:

B.1. Apply mathematical and engineering knowledge to a technical investigation.

B.2. Analyse published technical work through literature reviews.

B.3. Produce a risk assessment for the proposed project.

B.4. Consider health, safety and environmental aspects of a technical project.

C. Communication/ ICT/ Numeracy/ Analytic Techniques/ Practical Skills:

Having successfully completed the module, students should be able to:

C.1. Specify, plan and initiate implementation of a technical project.

C.2. Prepare a technical report and give a technical presentation.

C.3. Carry out initial data acquisition and analysis for the project.

C.4. Carry out practical and computational work as required.

D. General Transferable Skills          :

Having successfully completed the module, students should be able to:

D.1. Acquire new knowledge and information independently.

D.2. Plan and start implementing a year long project.

D.3. Define and manage the resources required for the investigation.

D.4. Solve problems of implementation and analysis.

D.5. Communicate effectively both in written and verbal ways.

D.6. Use ICT in information gathering, analysis and presentation

Course image CSC4264: Ubiquitous and Pervasive Computing
Semester II

Meaning:

Present, appearing, or found everywhere, omnipresent: being present everywhere at once
Ubiquitous computing: is provided by a continuous networked infrastructure of accessible devices
U. Computing environment including sensors, cameras and integrated active elements that cooperate to help user.
 
Course image CSC4263: Parallel and Distributed Systems
Semester II

Course Aims

A distributed system is a computer system consisting of several independent computers, connected by a network, that can work together to perform a task or provide a service. Typical examples include: the World Wide Web, networked file systems, DNS, and massive multiprocessor supercomputers.

In this course we aim to provide students with a deeper understanding of distributed systems. In particular we focus on the principles, techniques, and practices relevant to the design and implementation of such systems. The course takes a systems-oriented view of distributed systems, concentrating on infrastructure software and providing hands-on experience implementing distributed systems.

Course objectives:

  • Present the principles underlying the functioning of distributed systems;
  • Create an awareness of the major technical challenges in distributed systems design and implementation;
  • Expose students to modern and classic technology used in distributed systems and their software;
  • Expose students to past and current research issues in the field of distributed systems;
  • Provide experience in the implementation of typical algorithms used in distributed systems.
  • Understanding and operating with distributed systems topics involving concepts, architectures and programming models are the objectives of this course.

 

 

Learning Outcomes

After completing this course you will be able to:

  • Explain what a distributed system is, why you would design a system as a distributed system, and what the desired properties of such systems are;
  • List the principles underlying the functioning of distributed systems, describe the problems and challenges associated with these principles, and evaluate the effectiveness and shortcomings of their solutions;
  • Recognize how the principles are applied in contemporary distributed systems, explain how they affect the software design, and be able to identify features and design decisions that may cause problems;
  • Design a distributed system that fulfills requirements with regards to key distributed systems properties (such as scalability, transparency, etc.), be able to recognize when this is not possible, and explain why;
  • Build distributed system software using basic OS mechanisms as well as higher-level middleware and languages.

Course Prerequisites

Since networks make up a key part of distributed systems, and since many of the key challenges and solutions presented in the course extend those found in operating systems, a solid background in programming, networking and operating systems is essential.

Course image CSC4262: Legal and Ethical Issues in Computing
Semester II
—The main purpose of the module is to expose students to the status of the regulation and developing markets. The module will also examine and evaluate the meaning of ethics, moral ,legal issues and professional conduct including the protection of personal ethical concerns.
—The module focuses on issues that involve computer impact on society and related concerns.
—The basic background to develop their professional role in the workplace, beyond simply performing technical tasks assigned to them.
Course image CIS4263: HACKING AND COUNTERMEASURES
Semester II

Hacking and Counter measures introduces how to scan, test, hack and secure computing systems.

The lab intensive environment gives each student in-depth knowledge and practical experience

with the current essential security systems. Students will begin by understanding how perimeter

defenses work before learning to scan and attack networks.

Course image CIS4264: Telecommunications Systems
Semester II

SUMMARY OF THE MODULE

Welcome to the module of CIS4264: Telecommunications Systems!

Telecommunication can be defined as communication at a distance using electrical signals or
electromagnetic waves. A telecommunications system is a collection of nodes and links to enable
telecommunication. Examples of telecommunications systems are the telephone (fixed & mobile) network, the radio broadcasting system, computer networks and the Internet. This course will cover the mobile communication system, computer network, as well as the internet.

MODULE OBJECTIVES

-Understanding the basic principles of mobile communication systems;

-Understanding brief history of mobile communication and developments towards modern systems;

-Understanding the analysis of mobile communications with the interpretation of the call prints;

-Understanding the basic principles of the modern mobile and wireless communication systems;

-Understanding the operation of mobile communications systems and their generation divisions.

LEARNING OUTCOMES

On successful completion of this course, student should be able to:

-Explain the basic physical and technical settings functioning of mobile communications systems;

-Describe the basic principles of mobile communication system;

-Describe the development and implementation of mobile communication systems;

-Know and understand the engineering principles of wireless transmission, cellular systems and the different cellular/mobile systems;

-Understand the standardisation processes of wireless systems and the different cellular generations and be familiar with the IP issues associated with the development of technologies and standards;

-Compare the different cellular generations and standards in terms of capabilities, technologies (core and wireless access/physical layer), services, cost, complexity and history;

-Make a learned guess at what is 'next step' in cellular systems development on the basis of a thorough understanding of existing systems and of systems under development.

Course image CSC4261: Cryptography and Network Security
Semester II

Welcome to this module of "CRYPTOGRAPHY AND NETWORK SECURITY" which is a module that is taught in year 4, Department of Computer Science, School of Information and Communication Technology. It is a module of 10 credits.

This course provides an essential study of computer security issues and methods in networking systems. Topics to be covered include: Conventional and modern Encryption, Advanced encryption standard, Public Key Encryption and Authentication, Security Practice, System Security.