You are on page 1of 7

COMP 7360 Enterprise Networking and Cloud Computing

To give students an in-depth knowledge of enterprise networking and cloud computing; to


learn the techniques of Ethernet LANs, wireless LANs, MANs, and WANs for enterprise
networking; to learn TCP/IP internetworking principles; to learn network security and
network management; and to learn the architecture and services of cloud computing.
No. Course Intended Learning Outcomes (CILOs)
Knowledge
1 Describe Ethernet LANs, wireless LANs, MANs, WANs, and TCP/IP internetworking
2 Identify common network security issues and the corresponding countermeasures
3 Describe the architecture and services of cloud computing
Professional Skill
4 Design Ethernet LANs and wireless LANs for enterprises
5 Manage enterprise networks
6 Design and implement cloud computing for enterprises
x Topic
I. Ethernet Local Area Networks
A. LAN topologies and transmission media
B. Ethernet protocol architecture
C. Switched Ethernet
D. Spanning tree protocol
E. Virtual LANs

II. Wireless Local Area Networks
A. Properties of wireless networks
B. IEEE 802.11 WLAN

III. Metropolitan Area Networks and Wide Area Networks
A. SONET/SDH
B. Metro Ethernet
C. Leased line networks
D. Frame relay and ATM

IV. TCP/IP Internetworking
A. Internet protocol: IPv4 and IPv6
B. Routing protocols
C. Transport protocols
D. Quality of service

V. Network Security and Management
A. Network security
B. Virtual private networks
C. Network management

VI. Cloud Computing Architecture A. Overview of cloud computing
B. Private, public, and hybrid clouds

VII. Cloud Computing Services
A. Infrastructure as a service
B. Software as a service
C. Platform as a service
D. Case studies: enterprise applications

VIII. Cloud Design and Implementation
A. Cloud design
B. Cloud implementation
C. Cloud management
D. Case studies
COMP 7350 Enterprise Information Systems Development
To cover practical development methodologies for Enterprise Information Systems (EISs),
such as prototyping, extreme programming, agile methods and rapid application
development (RAD) and to extend the students experience on system development life
cycle. Development related topics such as software deployment, configurations and
maintenance will be covered. Functionalities of enterprise information systems offer to
business strategies are also covered.
Learning
outcome
No. Course Intended Learning Outcomes (CILOs)
Knowledge
1 Explain major components in architectures of EISs
2 Analyze alternative development strategies
Professional Skill
3 Acquire agile software development skills
4 Execute software maintenance strategies
5 Implement some components of EIS
Attitude
6 Work as a team in project development
Topics
I. Developing an EIS Architecture
A. Implementation strategies
B. Architecture components and artifacts
C. Development of architecture views

II. Agile Development
A. Extreme programming and pair programming
B. Rapid development strategies
C. UML and design patterns
D. Other development methodologies and tools (e.g. CASE)

III. Maintenance Management
A. Software deployment and configuration management
B. Software maintenance
C. Software reuse
D. Key Process Areas

IV. Functionalities of Enterprise Information Systems

V. Performance Evaluation of Enterprise Information Systems




Business Intelligence Specialists; Database Administrators; Business Systems Analysts/Developers






COMP 7340 Enterprise Application Architecture and Integration
This course aims to cover key concepts and design principles related to enterprise
application architecture and enterprise application integration. It first provides students a
business strategic perspective on adopting enterprise architecture, and then includes topics
like layering structure, business logic organization, patterns for object/relational access
layers, model-view-control patterns for Web, message-based enterprise application
integration, and recent advances in enterprise application architecture. After the completion
of this course, the students should be able to explain the principles behind different
enterprise patterns and apply them for enterprise application development.
Learning
outcome
No. Course Intended Learning Outcomes (CILOs)
Knowledge
1 Describe the basics of enterprise architecture and explain the strategical perspectives behind
2 Describe the key design related issues and principles in enterprise application architecture
3 Explain how different design patterns for enterprise application architecture work
4 Explain how the message-based integration pattern can be applied to enterprise application
integration
Professional Skill
5 Use different design patterns for enterprise applications development
Attitude
6 Recognize the importance of architectural design in enterprise application development
Topics I. An Overview on Application Architecture

II. IT Alignment and Enterprise Architecture as Strategy

III. Enterprise Architecture Design Considerations and Related Design Patterns
A. Dividing an enterprise application in layers
B. Approaches for business logic organization
C. Mapping between objects and relational databases
D. Model-View-Controller and Web presentation
E. Designing distributed object interfaces
F. Examples of Design Patterns for Enterprise Applications

IV. Enterprise System Integration Via Messaging

V. Advanced Topics (e.g. SOA Design patterns)












COMP 7330 Information Systems Security & Auditing
To introduce the fundamental concepts and techniques in computer and network security,
giving students an overview of information security and auditing, and to expose students to
the latest trend of computer attack and defense. Other advanced topics on information
security such as mobile computing security, security and privacy of cloud computing, as
well as secure information system development will also be discussed.
Learning
outcome
No. Course Intended Learning Outcomes (CILOs)
Knowledge
1 Describe fundamental concepts of information security
2 Describe the fundamental concepts of information systems auditing
3 Describe the latest trend of computer security threats and defense
Professional Skill
4 Identify security weaknesses in information systems, and rectify them with appropriate security
mechanisms
5 Explain the security controls in the aspects of physical, logical and operational security control
Attitude
6 Develop a critical mind for evaluating and auditing the security of information systems
Topics Topic
I. Introduction to Information Security and IS Auditing
A. Objectives of IS audit and control
B. The structure of an IS audit and audit reports
C. IS auditing standards
D. Computer assisted audit tools

II. Organization Security and Controls
A. Physical security controls
contingency plan, disaster recovery and reconstruction
B. Logical security controls
operating system security and access control
C. Operating controls
segregation of duties, monitoring and logging controls
D. Personnel security and management practices
user training and incident reporting
third-party access and outsourcing
E. Application software control
software development control
input, processing and output control

III. Basics of Information Security

IV. Basics of Cryptographic Technologies
A. Symmetric encryption
B. Asymmetric encryption
C. Basics of message authentication and cryptographic hash functions
D. Digital signatures and digital certificates
E. Public-key Infrastructure & Web of Trust

V. User Authentication, Access Control and Identity Management

VI. Host Security Attack & Defense
A. Virus
B. Worm
C. Trojan Horse
D. Rootkit & Stealth
E. Stack-based Buffer Overflow

VII. Network Security Attack & Defense
A. Network Attacks
Host based attacks
Network attacks
Web based attacks
B. Network Defense
Intrusion detection systems & firewall
IPSec and DNSSec
IPv6
Cloud computing

VIII. Information System Security Auditing and Computer Forensic
A. Security auditing and security standards
B. Incident handling and computer forensic























COMP 7810 Business Intelligence (3,2,1)
To cover practical development methodologies for Enterprise Information Systems (EISs),
such as prototyping, extreme programming, agile methods and rapid application
development (RAD) and to extend the students experience on system development life
cycle. Development related topics such as software deployment, configurations and
maintenance will be covered. Functionalities of enterprise information systems offer to
business strategies are also covered.
Learning
outcome
No. Course Intended Learning Outcomes (CILOs)
Knowledge
1 Describe business intelligence methodologies and concepts
2 Explain the characteristics, architectures, and development of data warehouses, data marts, and
decision support systems
3 Distinguish between Online Analytic Processing and Online Transaction Processing (OLTP), and I
dentify the different types of OLAP
Professional Skill
4 Perform data warehouse and data mart design
5 Formulate analysis database queries in SQL for analyzing business data
6 Apply appropriate business intelligence techniques to extract significant business patterns and
solve business problems
Topics Topic
I. The Business Intelligence Perspective
A. Drivers of business intelligence
B. Process of intelligence creation and use
C. Major characteristics of business intelligence
D. Competitive intelligence and advantage
E. Structure and components of business intelligence

II. The Data Warehouse
A. Characteristics of a data warehouse
B. Data warehouse architectures
C. Data integration and the extraction, transformation, and load (ETL) process
D. Data warehouse development
E. Data warehouse administration and security issues

III. Online Analytic Processing (OLAP) and Business Analytics
A. OLAP (Online Analytic Processing) vs OLTP (Online Transaction Processing)
B. Star and snowflake schemas
C. SQL and Software Tools for Analyses
D. Data, text and Web mining

IV Case Studies and Applications, which may include one or more of the following:
A. Customer relationship management (CRM)
B. Supply chain management (SCM)
C. Business Performance Management (BPM)
D. Health Informatics