COMP 7360 Enterprise Networking and Cloud Computing
To give students an in-depth knowledge of enterprise networking and cloud computing; to
learn the techniques of Ethernet LANs, wireless LANs, MANs, and WANs for enterprise networking; to learn TCP/IP internetworking principles; to learn network security and network management; and to learn the architecture and services of cloud computing. No. Course Intended Learning Outcomes (CILOs) Knowledge 1 Describe Ethernet LANs, wireless LANs, MANs, WANs, and TCP/IP internetworking 2 Identify common network security issues and the corresponding countermeasures 3 Describe the architecture and services of cloud computing Professional Skill 4 Design Ethernet LANs and wireless LANs for enterprises 5 Manage enterprise networks 6 Design and implement cloud computing for enterprises x Topic I. Ethernet Local Area Networks A. LAN topologies and transmission media B. Ethernet protocol architecture C. Switched Ethernet D. Spanning tree protocol E. Virtual LANs
II. Wireless Local Area Networks A. Properties of wireless networks B. IEEE 802.11 WLAN
III. Metropolitan Area Networks and Wide Area Networks A. SONET/SDH B. Metro Ethernet C. Leased line networks D. Frame relay and ATM
IV. TCP/IP Internetworking A. Internet protocol: IPv4 and IPv6 B. Routing protocols C. Transport protocols D. Quality of service
V. Network Security and Management A. Network security B. Virtual private networks C. Network management
VI. Cloud Computing Architecture A. Overview of cloud computing B. Private, public, and hybrid clouds
VII. Cloud Computing Services A. Infrastructure as a service B. Software as a service C. Platform as a service D. Case studies: enterprise applications
VIII. Cloud Design and Implementation A. Cloud design B. Cloud implementation C. Cloud management D. Case studies COMP 7350 Enterprise Information Systems Development To cover practical development methodologies for Enterprise Information Systems (EISs), such as prototyping, extreme programming, agile methods and rapid application development (RAD) and to extend the students experience on system development life cycle. Development related topics such as software deployment, configurations and maintenance will be covered. Functionalities of enterprise information systems offer to business strategies are also covered. Learning outcome No. Course Intended Learning Outcomes (CILOs) Knowledge 1 Explain major components in architectures of EISs 2 Analyze alternative development strategies Professional Skill 3 Acquire agile software development skills 4 Execute software maintenance strategies 5 Implement some components of EIS Attitude 6 Work as a team in project development Topics I. Developing an EIS Architecture A. Implementation strategies B. Architecture components and artifacts C. Development of architecture views
II. Agile Development A. Extreme programming and pair programming B. Rapid development strategies C. UML and design patterns D. Other development methodologies and tools (e.g. CASE)
III. Maintenance Management A. Software deployment and configuration management B. Software maintenance C. Software reuse D. Key Process Areas
IV. Functionalities of Enterprise Information Systems
V. Performance Evaluation of Enterprise Information Systems
Business Intelligence Specialists; Database Administrators; Business Systems Analysts/Developers
COMP 7340 Enterprise Application Architecture and Integration This course aims to cover key concepts and design principles related to enterprise application architecture and enterprise application integration. It first provides students a business strategic perspective on adopting enterprise architecture, and then includes topics like layering structure, business logic organization, patterns for object/relational access layers, model-view-control patterns for Web, message-based enterprise application integration, and recent advances in enterprise application architecture. After the completion of this course, the students should be able to explain the principles behind different enterprise patterns and apply them for enterprise application development. Learning outcome No. Course Intended Learning Outcomes (CILOs) Knowledge 1 Describe the basics of enterprise architecture and explain the strategical perspectives behind 2 Describe the key design related issues and principles in enterprise application architecture 3 Explain how different design patterns for enterprise application architecture work 4 Explain how the message-based integration pattern can be applied to enterprise application integration Professional Skill 5 Use different design patterns for enterprise applications development Attitude 6 Recognize the importance of architectural design in enterprise application development Topics I. An Overview on Application Architecture
II. IT Alignment and Enterprise Architecture as Strategy
III. Enterprise Architecture Design Considerations and Related Design Patterns A. Dividing an enterprise application in layers B. Approaches for business logic organization C. Mapping between objects and relational databases D. Model-View-Controller and Web presentation E. Designing distributed object interfaces F. Examples of Design Patterns for Enterprise Applications
IV. Enterprise System Integration Via Messaging
V. Advanced Topics (e.g. SOA Design patterns)
COMP 7330 Information Systems Security & Auditing To introduce the fundamental concepts and techniques in computer and network security, giving students an overview of information security and auditing, and to expose students to the latest trend of computer attack and defense. Other advanced topics on information security such as mobile computing security, security and privacy of cloud computing, as well as secure information system development will also be discussed. Learning outcome No. Course Intended Learning Outcomes (CILOs) Knowledge 1 Describe fundamental concepts of information security 2 Describe the fundamental concepts of information systems auditing 3 Describe the latest trend of computer security threats and defense Professional Skill 4 Identify security weaknesses in information systems, and rectify them with appropriate security mechanisms 5 Explain the security controls in the aspects of physical, logical and operational security control Attitude 6 Develop a critical mind for evaluating and auditing the security of information systems Topics Topic I. Introduction to Information Security and IS Auditing A. Objectives of IS audit and control B. The structure of an IS audit and audit reports C. IS auditing standards D. Computer assisted audit tools
II. Organization Security and Controls A. Physical security controls contingency plan, disaster recovery and reconstruction B. Logical security controls operating system security and access control C. Operating controls segregation of duties, monitoring and logging controls D. Personnel security and management practices user training and incident reporting third-party access and outsourcing E. Application software control software development control input, processing and output control
III. Basics of Information Security
IV. Basics of Cryptographic Technologies A. Symmetric encryption B. Asymmetric encryption C. Basics of message authentication and cryptographic hash functions D. Digital signatures and digital certificates E. Public-key Infrastructure & Web of Trust
V. User Authentication, Access Control and Identity Management
VI. Host Security Attack & Defense A. Virus B. Worm C. Trojan Horse D. Rootkit & Stealth E. Stack-based Buffer Overflow
VII. Network Security Attack & Defense A. Network Attacks Host based attacks Network attacks Web based attacks B. Network Defense Intrusion detection systems & firewall IPSec and DNSSec IPv6 Cloud computing
VIII. Information System Security Auditing and Computer Forensic A. Security auditing and security standards B. Incident handling and computer forensic
COMP 7810 Business Intelligence (3,2,1) To cover practical development methodologies for Enterprise Information Systems (EISs), such as prototyping, extreme programming, agile methods and rapid application development (RAD) and to extend the students experience on system development life cycle. Development related topics such as software deployment, configurations and maintenance will be covered. Functionalities of enterprise information systems offer to business strategies are also covered. Learning outcome No. Course Intended Learning Outcomes (CILOs) Knowledge 1 Describe business intelligence methodologies and concepts 2 Explain the characteristics, architectures, and development of data warehouses, data marts, and decision support systems 3 Distinguish between Online Analytic Processing and Online Transaction Processing (OLTP), and I dentify the different types of OLAP Professional Skill 4 Perform data warehouse and data mart design 5 Formulate analysis database queries in SQL for analyzing business data 6 Apply appropriate business intelligence techniques to extract significant business patterns and solve business problems Topics Topic I. The Business Intelligence Perspective A. Drivers of business intelligence B. Process of intelligence creation and use C. Major characteristics of business intelligence D. Competitive intelligence and advantage E. Structure and components of business intelligence
II. The Data Warehouse A. Characteristics of a data warehouse B. Data warehouse architectures C. Data integration and the extraction, transformation, and load (ETL) process D. Data warehouse development E. Data warehouse administration and security issues
III. Online Analytic Processing (OLAP) and Business Analytics A. OLAP (Online Analytic Processing) vs OLTP (Online Transaction Processing) B. Star and snowflake schemas C. SQL and Software Tools for Analyses D. Data, text and Web mining
IV Case Studies and Applications, which may include one or more of the following: A. Customer relationship management (CRM) B. Supply chain management (SCM) C. Business Performance Management (BPM) D. Health Informatics