Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering …
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Confidentiality, Integrity, Availability" (Week One) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering …
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Encryption and Hashing" (Week Four) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering …
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Hackers" (Week Three) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering …
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Vulnerabilities and Exploits" (Week Two) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
Lecture #1 for the course: CIS 4400: Data Warehousing for Analytics - …
Lecture #1 for the course: CIS 4400: Data Warehousing for Analytics - "Overview" delivered at Baruch College in Spring 2020 by Royce Kok and B. Madhusudan as part of the NYC Tech-in-Residence Corps program.
This document is a topical outline of the CIS 440 UNIX Course. …
This document is a topical outline of the CIS 440 UNIX Course. This course is mostly based on lab assignments that are performed by students using their home computers (desktops or laptops). The home computers are configured as virtual machines by installing the Oracle Virtual Box Version 6.12 The Ubuntu Desktop Operating System (version 20.04) is then installed on these virtual machines, which are then used to run the course labs. The first Unit of the syllabus covers the virtual machine configuration for the lab environment and subsequent Units are a topical outline of the course. The detailed content is on a companion Blackboard website.
Introduction to the use of the computer in the home and office. …
Introduction to the use of the computer in the home and office. Computer literacy. Word processing, database systems, and spreadsheets. Examination and evaluation of computer peripherals and software for personal computers.
Stacks and their implementations. Prefix, postfix, and infix notation. Queues and linked …
Stacks and their implementations. Prefix, postfix, and infix notation. Queues and linked lists and their implementations. Binary and general trees and their implementations and traversals. Sorting and searching techniques. Graph algorithms.
Overview of full-stack implementation of large scale web applications. Team-based software development …
Overview of full-stack implementation of large scale web applications. Team-based software development methodologies, tools and practice. Introduction to modern HTML, CSS. Separation of structure, style and behavior. JavaScript, dynamic types, functional programming, prototypal classes, and closures. HTTP client-server communication, synchronous and asynchronous communication. Java Server Pages, simple database creation, programmatic queries and updates.
Primary objective of this course is to provide the student with the experience of working in a fast-track development environment that requires a shifting balance between collaboration and autonomy. The student will be exposed to a wide range of software tooling across multiple eras of computing history. The student should plan for a considerable amount of focused attention outside of the classroom to complete assignments. Online resources will be provided for all lecture topics. You will get more out of the course if you have experience with some larger development projects, for example, through internships, or open-source contributions.
Tied to "Tools and Techniques in Software Engineering" textbooks at the URL: https://opened.cuny.edu/courses/tools-and-techniques-in-software-engineering
A collection of handbooks to various topics related to CISC 3140 Design …
A collection of handbooks to various topics related to CISC 3140 Design and Implementation of Software Applications II, at Brooklyn College and beyond.
Use with CISC 3140 Design and Implementation of Software Applications II at URL https://opened.cuny.edu/courses/cisc-3140-design-and-implementation-of-software-applications-ii
An introduction to C++ and its roles providing support for object-oriented programming, …
An introduction to C++ and its roles providing support for object-oriented programming, generic programming, procedural programming, and low-level programming. The C++ memory model, and topics in explicit memory management. Storage classes, scope, and compilation stages. The Standard Template Library. Comparison with Java.
Introduction to digital logic. Basic digital circuits. Boolean algebra and combinational logic, …
Introduction to digital logic. Basic digital circuits. Boolean algebra and combinational logic, data representation and transfer, digital arithmetic. Instruction sets. Introduction to assembly languages: ALU and memory reference instructions, flow control. Memory. I/O systems. Performance. After successful completion of this course, students will have a thorough understanding of the structure and behavior of computer systems and the logical and abstract aspects of system implementation as seen by the programmer.
Introduction to digital logic. Basic digital circuits. Boolean algebra and combinational logic, …
Introduction to digital logic. Basic digital circuits. Boolean algebra and combinational logic, data representation and transfer, digital arithmetic. Instruction sets. Introduction to assembly languages ALU and memory reference instructions, flow control, subroutine linkage, arrays and structures. Memory. I/O systems. Performance. Relationship between software and architecture.
Design and implementation of operating systems for large computers. Multiprogramming, multiprocessing, time …
Design and implementation of operating systems for large computers. Multiprogramming, multiprocessing, time sharing. Resource allocation and scheduling. Communications, conversational computing, computer networks. Memory protection, interrupts, segmentation, paging, and virtual memories.
After successful completion of this course, students will have a thorough understanding …
After successful completion of this course, students will have a thorough understanding of the features and functionality of operating systems that enable both end users and trained computer programming professionals to leverage the almost unlimited computing and storage capabilities of modern computers.
Principles and practices of computer and network security. Fundamental concepts and principles …
Principles and practices of computer and network security. Fundamental concepts and principles of computer security, basic cryptography, authentication and access control, Internet vulnerability (malware, DoS attacks, etc), intrusion detection systems, firewalls, software and operating system security, database security, web and wireless security, managerial and ethical issues in computer security. Lab and project activities such as the use of network probing for illustrative and diagnostic purposes; security tool choice, deployment and configuration; secure programming techniques.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.