Course Code |
Course Name |
Credit Hours |
Prerequests |
10032100
|
Remedial English
|
0 |
|
This is a three-hour non-credited English course offered to students who score poorly (i.e. below 50%) on the placement test. Since the major concern of this course is to improve the students’ proficiency before starting their ordinary university English basic courses and major courses taught in English, special emphasis has been placed on enhancing the students’ ability to effectively acquire the four language skills: reading, writing, listening, and speaking. Specifically, the course attempts to ensure an academically acceptable performance on the part of the students at the level of the English basic courses. Moreover, the course aims at expanding students’ vocabulary needed for various tasks. |
11000101
|
Islamic Culture
|
3 |
|
This course aims to establish the concept of Islamic culture and its position among the other international cultures, its position in the Muslim life, its sources, its bases and its characteristics. It also aims to introduce the Islamic culture in faith, worship, relations, morals, and knowledge, to discuss the clash between cultures in addition to Globalization, Human Rights, Woman Rights, Democracy and other contemporary issues. |
11000102
|
Arabic Language
|
3 |
|
This course aims to improve the level of students in language skills and various literary, read and absorb and express written, and oral and tasted literary, through texts flags authors and poets in different eras, lessons in grammar and spelling, and brief definition months dictionaries and Arab old ones the modern and how to use them. This course aims to implement the Arabic language in the areas of reading and expression of both types oral and written communication. |
11000103
|
English Language I
|
3 |
|
This is a three credit-hour university-required English language course designed for students who need to work on the four skills of the language: reading, writing, listening, and speaking. The development of vocabulary and skills of comprehension are integral parts of the course. In addition, various reading strategies (making predictions, identifying main ideas, reading for details, relating information in the text to life experience) are introduced and developed through a wide range of topics for reading and writing. The course encourages a more analytical and independent approach to study and helps prepare the students for any subsequent exam preparation. |
11000105
|
Palestinian Studies
|
3 |
|
The course is mandatory for university students from various disciplines, so it does provide students with knowledge and `information about the Palestinian reality and in particular the political developments of the Palestinian cause since its inception until the present day in line social and economic developments and political which constitute the main pillars for the study of the Palestinian political reality. This course aims to study Palestinian issue from its begging until present day in social, economic and political issue. |
11000108
|
Community Service
|
1 |
|
11000117
|
Leadership and Communication Skills
|
1 |
|
11000126
|
Introduction to Computer Science and Skills
|
2 |
|
11000322
|
English Language -II
|
3 |
|
This is a three-credit hour university-required English language course which is offered to students majoring in Sciences, Engineering, Agriculture, Veterinary, and Information Technology ... etc. Students in this course will be exposed to a range of science-based writings in English that supply students with samples of the kind of academic English they are likely to encounter in their textbooks. Exercises on grammar, vocabulary and textual organization are geared towards developing students’ observational and analytical skills that aid comprehension. The course uses an integrated approach which allows for communicative interaction in the class to actively test and broaden the listening and speaking abilities of the students. Furthermore, the acquisition of vocabulary items will be reinforced through their use in written sentences. Additional training in writing will be given through questions and answers, summaries of principal ideas in a reading passage and the preparation of reports. |
Course Code |
Course Name |
Credit Hours |
Prerequests |
10221111
|
General Physics for Information Technology Students
|
3 |
|
This course is given to non-physics students, it includes the following topics: - Classical mechanics: Motion and Newton's Laws, Circular motion and applications, Energy transfer, and Linear and angular momentum. - Fluid mechanics, vibrations and wave motion - Thermodynamics - Electricity and magnetism: Gauss law, electric circuits, and Sources of magnetic fields. - Light and lasers. - Microscopes. |
10671201
|
Technical Report Writing
|
3 |
|
This Course focuses on Report-Writing Skills. It is designed to equip students with the principles of Scientific and Business Writing. By the end of the Course, students are expected to have mastered the process of Professional Report-Writing. |
10671231
|
Discrete Mathematics
|
3 |
|
Topics covered are set theory, statements, mathematical induction, propositional and predicate logic, Boolean algebra, relations, functions, counting methods, graph theory, recurrence relations and examples applicable to computer science. |
10671241
|
Digital Logic Design
|
3 |
|
In this Course, students are introduced to: Boolean Algebra, the minimization of Boolean functions using Karnaugh Map and Quine-Mc-Cluskey methods, the design of Combinatorial Circuits, the design of Complex Digital Circuits, Sequential Circuits, State Assignment and Minimization, the design of a simple computer incorporating general registers, common addressing modes and conditional instructions. |
10681101
|
Principles of Programming & Problem Solving
|
3 |
|
10681102
|
Fundamentals of Object Oriented Programming
|
3 |
|
10681204
|
Web Programming I
|
3 |
|
The course includes methods for creating dynamic websites, and covers programming techniques for different websites, as well as the MySQL information storage and retrieval language. |
10681205
|
Computer Architecture
|
3 |
|
Introduction to computer organization. Computer instruction set. Machine language. Data processing. Arithmetic unit: Carry look-ahead adders, Subtractors, and shifters. Logic unit. Combinational and sequential multipliers and dividers. Floating-point number representation and arithmetic. |
10681210
|
Data Structure
|
3 |
|
10681220
|
Database Design & Programming
|
3 |
|
10681245
|
Web Programming II
|
3 |
|
10681255
|
Database Administrations
|
3 |
|
The aim of this course is to teach the students the principles of the administration phase for the DBMS. Topics include physical database design and tuning, applying different security features, transaction management, concurrency control, and backup crash recovery. |
10681307
|
Software Engineering
|
3 |
|
10681345
|
Computer Networks
|
3 |
|
10681371
|
Operating Systems
|
3 |
|
10681480
|
Distributed Systems
|
3 |
|
This presents an introduction to Distributed systems, the Internet as a case study, introduction to parallel processing, multithreading, parallel processing interfaces and applications. |
10686111
|
Calculus for Information Technology
|
3 |
|
This course gives an introduction to calculus. Topics include a review of algebra and functions, mathematical modeling with elementary functions, rates of change, inverse functions, logarithms and exponential functions, the derivative, differential equations, and Euler's method, review of trigonometry, modeling with trigonometric functions, geometric sums and series, and the Fundamental Theorem of Calculus |
10686213
|
Probability & Queuing Theory
|
3 |
|
Probability principles and sets theory, random variables, operations on random variables, various distribution functions, introduction to random processes, weak stationary, correlation functions, linear processing, and estimation, Poisson processes and Markov chains, queuing analysis |
10686221
|
Network Transmission Technology
|
3 |
|
This course will familiarize students with the analog and digital transmission, modulation and demodulation, transmission media, data encoding, synchronous and asynchronous transmission, digital carriers, error control, multiplexing, circuit and packet switching, open system standards |
10686235
|
Information Security and Ethics
|
3 |
|
Covers the concepts of information assurance, explicit and implicit policy design, use of basic computer security mechanisms, authentication, access control, policy types. Topics include: Design and use of basic network security mechanisms, asset identification and valuation, determining threats to assets and their vulnerabilities, prioritizing and selecting countermeasures, implementing and deploying countermeasures, and continuing maintenance and assessment of security mechanisms. In addition it covers cyber ethical standards for information system users and administrators, and their role as a driver in developing information system security policies. |
10686325
|
Routers and Switches
|
3 |
|
This course introduces the student to practical networking experiences within a laboratory environment. Students will study router and switch basics, configure routers, investigate routing protocols, configure switches, develop access lists, and troubleshoot routing technologies |
10686326
|
Routers and Switches Lab.
|
1 |
|
This course introduces the student to practical networking experiences within a laboratory environment. Students will study router and switch basics, configure routers, investigate routing protocols, configure switches, develop access lists, and troubleshoot routing technologies |
10686331
|
Cryptography and Network Security
|
3 |
|
Introduction to the principles of number theory and the practice of network security and cryptographic algorithms. Topics include: Divisibility and the Greatest Common Divisor, Euclidean Algorithm, modular arithmetic and discrete logarithm, Primes, primality testing, Chinese Remainder Theorem, cipher) Conventional or symmetric encryption (DES, IDEA, Blowfish, Twofish, Rijndael) and public key or asymmetric encryption (RSA, Diffie-Hellman), key management and exchange, hash functions (MD5, SHA-1, RIPEMD-160, HMAC), digital signatures, certificates and authentication protocols (X.509, DSS, Kerberos), electronic mail security (PGP, S/MIME), web security and protocols for secure electronic commerce (IPSec, SSL, TLS, SET). |
10686332
|
Network Security Lab.
|
1 |
|
This course provides in-depth laboratory exercises using commercial-off-the-shelf (COTS) technology. Topics include: eavesdropping, implementing the attacks against ARP, IP, ICMP, TCP, and UDP protocols, exploiting DNS vulnerabilities to launch Pharming attacks, exploiting cross-site scripting vulnerabilities and buffer overflow, implementing a simplified version of IPSec protocol. In addition students will configure network servers, routers, hubs, firewalls and intrusion detection devices to discover the effect each device can have on overall system security. |
10686334
|
Wireless Systems and Security
|
3 |
|
Principles of wireless communications and how they differ from wired communications. Fundamental concepts including transmission and mitigation techniques (e.g., modulation and coding, propagation, interference, and antennas) for wireless systems, multiplexing techniques, wireless system architectures, mobility management, security, protocols, and location technology. Systems include cellular phone networks (e.g., cdma2000, UMTS), wireless local area networks (e.g., IEEE 802.11g), personal area networks (e.g., Bluetooth), fixed-point broadband wireless (e.g., WiMAX) and satellite systems. |
10686335
|
Security Policies and procedures
|
3 |
|
This course covers how to identify emerging security risks and implement highly secure networks to support organizational goals. Discussion of methodologies for identifying, quantifying, mitigating and controlling risks. Students implement a comprehensive IT risk management plans (RMP) that identify alternate sites for processing mission-critical applications, and techniques to recover infrastructure, systems, networks, data and user access. The course also discusses related topics such as: disaster recovery, handling information security; protection of property, personnel and facilities; protection of sensitive and classified information, privacy issues, and criminal terrorist and hostile activities. |
10686341
|
Network Administration
|
3 |
|
This course will cover the fundamentals of current WINDOWS/UNIX server systems and network administration. Topics to be covered include: domain administration; file system management; networked printers; user management; and workstation configuration. |
10686342
|
Network Administration Lab.
|
1 |
|
This is a course where you actively learn by doing. provide the student with skills necessary to manage a WINDOWS/UNIX -based server in a large and complex networking environment |
10686370
|
Internship
|
3 |
|
10686427
|
Network Design and Simulation
|
3 |
|
Data network design issues and applications, point-to-point network design, multipoint network design, data collection and verification, protocol selection, performance considerations and RFP development. Network design tools such as ITGURU and OPNET are used for network design and simulation. Use of simulation results to design a private line or packet switched based data communications network. |
10686428
|
Network Design and Simulation Lab.
|
1 |
|
This lab will cover performance analysis for communications networks. It is used to model networks, their control algorithms and workload. Then simulates the operation of the network and provides measures of network performance. Network Design and Simulation Lab add a practical flavor to the course and enable students to observe the operation of an Internet comprising dissimilar networks and protocols. |
10686471
|
Graduation Project
|
3 |
|
10686487
|
Ethical Hacking
|
3 |
|
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. |
Course Code |
Course Name |
Credit Hours |
Prerequests |
10686381
|
Network Programming
|
3 |
|
Introduction to Network Programming, Transport Layer Protocols, TCP, UDP, and SCTP, Client-Server Model, TCP Sockets, UDP Sockets, SCTP Sockets, I/O Multiplexing, DNS and Address Conversion, Threads Programming, RPC, Raw Sockets and Datalink Access. One or more of the following Internet Application Protocols and Case Studies: TELNET, HTTP, Authd, SMTP, POP, IMAP, FTP, and Web Programming (CGI, Servlets, and XML). |
10686382
|
Voice over IP Engineering
|
3 |
|
Voice over IP (VoIP) engineering and design. Topics include call and session protocols such as SIP, H.323, IAX and MGCP; VAD and PLC; common practical issues such as call redirection; codec integration and quality of service measurements. |
10686383
|
Optical Network
|
3 |
|
Optical fiber and transmission technologies. First generation optical networks (SONET). Optical access networks, broadcast and select networks. IP over optical networks, MPLS, and GMPLS. The light-path concept. Wavelength division multiplexing (WDM) technology. Wavelength routing networks, related protocols and architectures. Routing and Wavelength Assignment (RWA). Optical Time Domain Multiplexing (TDM) Networks. |
10686384
|
High Speed Network
|
3 |
|
This course covers the current state-of-the-art in emerging high-speed network architectures, protocols and control algorithms. Topics include: basic architecture of packet networks and their network elements (switches, routers, bridges), and the protocols used to enable transmission of packets through the network. Network protocols: Ethernet, Internet, token rings, FDDI, Circuit-switched networks, ATM networks, switching, scheduling, naming, and addressing, routing, error control, flow control, traffic collection, modeling, and characterization, traffic management, connection admission control algorithms, and congestion control algorithms. |
10686385
|
Multimedia Networking
|
3 |
|
This introductory course in multimedia networking explores the interaction between multimedia data and the systems that need to support multimedia data such as audio and video. Topics include: compression technologies, multimedia formats such as JPEG and MPEG, multimedia streaming over reservation-based and best-effort networks, multicasting of multimedia data, and systems support for multimedia computing. |
10686481
|
Advanced Internetwork Routing and Switching
|
3 |
|
This course extends routing and switching knowledge with specific attention given to emerging trends. This course focuses on the concepts of traffic shaping, advanced exterior gateway routing protocols, label switching technologies, and quality of service. The necessary perspectives of integration of these topics into enterprise networks are addresses in both lecture and laboratory. |
10686482
|
Advanced Wireless Networking and Security
|
3 |
|
Provides advanced coverage of wireless networks and the special security problems they pose. Topics include measures taken to secure wireless personal area networks (PANs), wireless LANs, cellular wireless networks, and ad-hoc wireless networks. Threats, vulnerabilities and countermeasures specific to each type of network will be enumerated and studied in detail. Coverage includes the use of cryptography and cryptographic primitives in secure protocols, wireless device security, and security policy management. The treatment of ad-hoc wireless network security will cover secure routing protocols and intrusion detection systems. |
10686483
|
Web Services Security
|
3 |
|
Address requisites, mechanisms, techniques, issues and security standards for web services security. Service Oriented Architecture concepts, Service Oriented Architecture technological foundations and related standards (SOAP and WSDL), Web Service security standardization framework , Transport layer security and related standards, Message-level security and reliability, and related standards, Application-level security, access control models, and related standards, Security policies and standards, Security for Business Processes, Identity Management and related standards, Security and privacy issue in Healthcare |
10686484
|
Advanced Topics in Distributed Systems
|
3 |
|
Discusses advanced topics in Client/Server systems, Distributed Systems, and Network Computing. The focus is on examining strategies and algorithms to achieve design goals such as performance, reliability, scalability, consistency, and security in a distributed system. Topics include: Parallel Processing and Scheduling; Performance Modeling; Concurrency Control, Recovery in multi-user and distributed data servers; Security and Fault Tolerance; Embedded and Real Time distributed systems; Multimedia Storage and Transmission |
10686485
|
Application Development for Mobile Devices
|
3 |
|
Focus on information system applications that run on top of wireless infrastructure such as multimedia messaging, mobile inventory control, location aware services including wireless technologies (GSM, CDMA2000, UMTS, 802.11, Bluetooth), mobile information systems and applications (M-Business, location-based services, wireless CRN), wireless information system challenges and architectures (security, reliability, mobility, power conservation, gateways, proxies), mobile application protocols (SMS, EMS, MMS, WAP), thin and thick client mobile application development (WML, VXML, Java, J2ME, J2EE, .NETCF, C#), and business case studies of mobile applications. |
10686486
|
Network Intrusion Detection
|
3 |
|
The need for intrusion detection systems (IDS) is described. Several basic IDS design approaches and implementation methods are presented. Basic attack methods employed by network attackers and the resulting signatures are explained. The business case for justifying the acquisition of IDS is explored. |
10686488
|
Special Topics in Networking and Security
|
3 |
|
Department Approval. Selected the current state-of-the-art topics in network and security. |
10686489
|
Network Management
|
3 |
|
Appreciate the need f or interoperable network management, understand general concepts and architecture behind standards based network management, understand concepts and terminology associated with SNMP and TMN, appreciate network management as a typical distributed application, get a feeling of current trends in network management technologies, understand advanced Information processing techniques such as distributed object technologies, software agents and internet, technologies used f or network management |
10686491
|
Protocol Design and Validation
|
3 |
|
This course is an introduction to the formal design, specifications, and validation of communication protocols. Topics include: structured protocol design, protocol models, protocol validation, and protocol correctness requirements. Protocol modeling techniques such as FSM models and Petri net models are considered. Protocol verification techniques: Communicating FSM, reachability analysis, verification using checking, protocol design validation. A known verification modeling language such as PROMELA is considered. Specification and Description Language (SDL) may be considered |
10686492
|
Network Firewalls
|
3 |
|
Teaches the student the basic design of firewalls and provides actual hands-on experience with a popular enterprise firewall. The need for firewalls is also covered. |
11011222
|
Entrepreneurship and Innovation
|
3 |
|