#### Computer Science Thesis 1

This course is designed to give an introductory knowledge to conduct a systematic investigation of a problem, which focuses on business processes that can be solved using Computing. They will gain overview of research intent and design, methodology and technique, format and presentation, and data management and analysis informed by commonly used statistical methods. The course will develop each student’s ability to use this knowledge to become more effective research and development computing professionals.

#### Machine Learning

#### INTERMEDIATE PROGRAMMING

**This course is a continuation of CCCS 102 - Programming 1. The emphasis is to train students to design, implement, test, and debug programs intended to solve computing problems using fundamental programming constructs.**

#### APPLIED CRYPTOGRAPHY

Applied cryptography is the study of using cryptographic techniques and protocols to secure communication and protect data. In this course, students will learn about the basics of cryptography, including symmetric-key and public-key algorithms, as well as more advanced topics such as cryptographic protocols, key management, and security engineering. The course will also cover the ethical and legal considerations of cryptography, as well as the potential risks and vulnerabilities associated with its use. By the end of the course, students will have the knowledge and skills needed to design and implement secure application systems using cryptographic techniques and protocols.

#### CS 226 - Network Communication 2nd sem SY 2022-2023

This course introduces the underlying concepts behind networking using the Internet and its protocols as examples. The goal of the course are (1) to give an understanding of how networks, especially the Internet, work, (2) to give experience with large scale systems, and (3) to teach network programming. Topics cover the first five chapters of Kurose in detail, down the network stack from the application layer to the data-link layer. Concurrent with the lectures, will be building a functional TCP/IP stack and a small web server that will run on it.

#### INFORMATION MANAGEMENT 1

Information Management 1 is an introduction to the principles and practices of managing information in organizations. The course covers topics such as databases, data modeling, and data management. Students will learn how to design and implement effective information systems to support organizational goals and objectives, as well as how to use data to make informed decisions. Through hands-on Learning Tasks and case studies, students will gain practical skills in using database management systems and data analysis tools like SQL.

#### CSAC 328 - Probability and Statistics in Computer Science 2S2023

This course provides an elementary introduction to probability and statistics with applications. Topics include basic combinatorics, random variables, probability distributions, Bayesian inference, hypothesis testing, confidence intervals, and linear regression as well as illustrative examples and simulation exercises from queuing, reliability, and other CS applications. At the end of the course, students are expected to submit an analysis report illustrating the application of probabilistic and statistical techniques on their chosen computing-related topic of interest.

#### Robotics 2022-2023 2nd Sem

The course is an
introduction to concepts and techniques in Robotics using Arduino Technology. Topics covered include electricity and electronics, analog
and digital signals, basic test instruments, Arduino for robotics, components
assembly, sensors, and programming. Upon course completion, one major learning
output will be developed, a type of robot explorer capable of following given
tracks.

#### NETWORK AND COMMUNICATION

This course introduces the underlying concepts behind networking networking networking using the Internet and its protocols as examples. The goal of the course are (1) to give an understanding of how networks, especially the Internet, work, (2) to give experience with large-scale systems, and (3) to teach network programming.

#### Fundamentals of Programming

The course covers the use of general-purpose programming language to solve problems. The emphasis is to train students to design, implement, test, and debug programs intended to solve computing problems using fundamental programming constructs. During this course, students will be required to design and create a program using the Python programing language following the objectives for their machine project.

#### CS317 :: Automata Theory and Formal Languages

The course introduces some fundamental concepts in automata theory and formal languages including grammar, finite automaton, regular expression, formal language, pushdown automaton, and Turing machine. Not only do they form basic models of computation, they are also the foundation of many branches of computer science, e.g. compilers, software engineering, concurrent systems, etc. The properties of these models will be studied and various rigorous techniques for analyzing and comparing them will be discussed, by using both formalism and examples. The students are expected to submit an analysis report on evaluation of computing theories and their real-life applications to complete the course.

#### Computer Science Thesis 2

A final course that caps three years of study in a form of a research project relatively topics parallel with the Research cum Extension priorities of the department and project agendas indicated in the CMO. This course is the culmination of the accumulated educational experiences and trainings of the students at CCS in a single original research project of their choice, which focuses on the implication of introducing a computing solution to problems on business processes. This project is subject to the approval and supervision of a faculty mentor.

#### CS 3215 - Human Computer Interaction 2S2023

#### MAEC 121 - Ordinary Differential Equations 2S2023

This
course begins with the basic concepts and definitions on mathematical models
and applications of differential equations to real-world problems. The focus is
to teach you how to model the world in terms of differential equations, and how
to solve equations and interpret the solutions in computing. Topic includes First-order
and higher-order differential equations, along with the methods of solutions
and their applications are introduced. Modeling with higher-order, and systems
of linear first-order differential equations are also covered. Numerical
methods are covered throughout the course. At the end, students learn series
solutions of ordinary differential equations and evaluate how it is applied in
real life.

#### BSCS 4C Social Issues & Professional Practice 1

This course provides awareness on the ethical responsibilities of a computing IS Professional. The course covers identifying, understanding and finding resolution to ethical and moral challenges relating to the personal and organization utilization / development of Information Systems. The student are expected to write a case study discussing Moral, Social and Ethical Issues Associated with Internet.

#### BSCS 4A Social Issues & Professional Practice 1

This course provides awareness on the ethical responsibilities of a computing IS Professional. The course covers identifying, understanding and finding resolution to ethical and moral challenges relating to the personal and organization utilization / development of Information Systems. The student are expected to write a case study discussing Moral, Social and Ethical Issues Associated with Internet.

#### Digital Forensics 1

This course is a broad introduction to the field
of Digital Forensics. It covers various fundamental topics necessary for
digital forensics investigation. The course begins with foundations of
electronic evidence including cybercrime laws, the 4th Amendment, compliance
and requirements, collection and handling, analysis, and reporting. The course
also covers fundamentals of file systems with specific details pertaining to
Microsoft FAT file systems. Students will learn two important forensics
techniques–-file recovery and file carving–-among other things. Finally,
forensics artifacts relevant to Windows Systems and Networks are discussed with
relevant lab activities and students are also introduced to Anti-forensics.
Hands-on lab activities familiarize students with several relevant
investigation techniques and the use of open-source forensics tools.