Week |
Subject |
Related Preparation |
1) |
Program definition, Programming languages and Developing and executing a program in Java language |
Curzon, Paul, and Peter W. McOwan. The power of computational thinking: Games, magic and puzzles to help you become a computational thinker. World Scientific Publishing Company, 2017. |
2) |
Java Programming language General features, Java program menus, shortcuts |
NoneCurzon, Paul, and Peter W. McOwan. The power of computational thinking: Games, magic and puzzles to help you become a computational thinker. World Scientific Publishing Company, 2017. |
3) |
General structure of Java language, syntax rules, variable definition, assignment operations, operators, data types |
Curzon, Paul, and Peter W. McOwan. The power of computational thinking: Games, magic and puzzles to help you become a computational thinker. World Scientific Publishing Company, 2017. |
4) |
Input-Output commands used in Java programming language, Basic screen commands, Sample Applications |
Curzon, Paul, and Peter W. McOwan. The power of computational thinking: Games, magic and puzzles to help you become a computational thinker. World Scientific Publishing Company, 2017. |
5) |
Decision (if and if else) commands used in Java programming language, Sample Applications |
Curzon, Paul, and Peter W. McOwan. The power of computational thinking: Games, magic and puzzles to help you become a computational thinker. World Scientific Publishing Company, 2017. |
6) |
Counter loop instruction used in Java programming language, Sample Applications |
Curzon, Paul, and Peter W. McOwan. The power of computational thinking: Games, magic and puzzles to help you become a computational thinker. World Scientific Publishing Company, 2017. |
7) |
Conditional loop commands and loop exit commands, Sample Applications |
Curzon, Paul, and Peter W. McOwan. The power of computational thinking: Games, magic and puzzles to help you become a computational thinker. World Scientific Publishing Company, 2017. |
8) |
Midterm |
Curzon, Paul, and Peter W. McOwan. The power of computational thinking: Games, magic and puzzles to help you become a computational thinker. World Scientific Publishing Company, 2017. |
9) |
Basic library functions used in Java programming language, Sample Applications |
Curzon, Paul, and Peter W. McOwan. The power of computational thinking: Games, magic and puzzles to help you become a computational thinker. World Scientific Publishing Company, 2017. |
10) |
Array structure in programming languages, One-dimensional arrays, Example Applications |
Curzon, Paul, and Peter W. McOwan. The power of computational thinking: Games, magic and puzzles to help you become a computational thinker. World Scientific Publishing Company, 2017. |
11) |
Subprogram structure in programming languages, Functions (Defining Functions, declarations) Sample Applications |
Curzon, Paul, and Peter W. McOwan. The power of computational thinking: Games, magic and puzzles to help you become a computational thinker. World Scientific Publishing Company, 2017. |
12) |
File concept in programming languages, Use of Text Files, Sample Applications |
Curzon, Paul, and Peter W. McOwan. The power of computational thinking: Games, magic and puzzles to help you become a computational thinker. World Scientific Publishing Company, 2017. |
13) |
Structure and Union , Sample Applications |
Curzon, Paul, and Peter W. McOwan. The power of computational thinking: Games, magic and puzzles to help you become a computational thinker. World Scientific Publishing Company, 2017. |
14) |
Function calling techniques, Example Applications |
Curzon, Paul, and Peter W. McOwan. The power of computational thinking: Games, magic and puzzles to help you become a computational thinker. World Scientific Publishing Company, 2017. |
|
Program Outcomes |
Level of Contribution |
1) |
Having knowledge and skills in security algorithms for programming |
4 |
1) |
Possesses in-depth theoretical knowledge in information security, cybersecurity, network security, and data protection. |
3 |
2) |
Understands information security management systems, national and international security standards, ethical considerations, and legal regulations. |
|
2) |
Ability to install and manage software required for end user security |
5 |
3) |
Has analytical thinking skills in classifying cyber threats, attack vectors, and defense mechanisms. |
|
3) |
Having the ability to install and manage computer networks and use the network operating system |
4 |
4) |
Theoretically comprehends security technologies such as cryptography, digital signatures, authentication, and access control mechanisms. |
|
5) |
Can establish network security policies and effectively manage security tools such as firewalls and intrusion detection/prevention systems. |
|
6) |
Has expertise in applying cryptographic algorithms, using data encryption techniques, and analyzing cybersecurity intelligence. |
|
7) |
Can conduct penetration tests and security assessments to identify system vulnerabilities and develop preventive measures. |
|