COMPUTER ENGINEERING PROGRAM DR. YAN LINDSAY SUN

Similar documents
Telemedicine Technology Low Cost Solutions

Capabilities for Cybersecurity Resilience

Multi State Information Sharing and Analysis Center. Briefing Paper. Keeping Your Broadband Internet Connection Secure

Some important words and phrases:

Computer Networking. Definitions. Introduction

Been in technology for 22 years Westinghouse Senior Manager at Clifton Gunderson-7th largest CPA and consulting firm in the U. S. Partner / Director

Computer Security Maintenance Information and Self-Check Activities

INTRODUCTION TO ELECTRICAL ENGINEERING

Jort Kollerie SonicWALL

Chapter 7 Information System Security and Control

T141 Computer Systems Technician MTCU Code Program Learning Outcomes

Office of Information Technology Service Catalog FY2015

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Frame of IoT in China

The Internet of Things: Opportunities & Challenges

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

Office of Information Technology Service Catalog FY2015


network PRoteCtion and information L G S H a S P e R F o R M e D assurance networks R e D t e a M S e C U R i t Y

Home Networking MR-002. ABC s of Home Networking User s Guide to Understanding the Basics of Home Networks

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Signal Customized Helpdesk Course

Unit 1: INTRODUCTION TO ADVANCED ROBOTIC DESIGN & ENGINEERING

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

COMPUTER ENGINEERING ELECTRONIC ENGINEERING MECHANICAL ENGINEERING EMBEDDED SYSTEM DESIGN YOU THINK YOU MIGHT WANT TO STUDY:

SEMICONDUCTOR WIRELESS SENSOR NETWORK MARKET EXECUTIVE SUMMARY. Wireless Sensor Network Energy Harvesting And Storage Applications

IT Infrastructure and Emerging Technologies

What will I learn as an Electrical Engineering student?

Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis

Computing Services and Systems Development PittStart

College of Science, Engineering and Technology. School of Computing. college of science, engineering and technology. Learn without limits.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices

Information Systems Perspective 1. An Introduction to Information Systems in Organizations 2

Page 1 of 7. Computer Networking

LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST. Developed by the Toolkit Working Group for the Media Security and Reliability Council

Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission

An Introduction to High-Frequency Circuits and Signal Integrity

Home Automation and Cybercrime

TUSKEGEE CYBER SECURITY PATH FORWARD

The I.T. Experience Service and Pricing List 2015

Revistas IEEE ANII 2009

Cyber Threats in Physical Security Understanding and Mitigating the Risk

Orientation to Computer Engineering

Robotics Core School 1

Catalog Month 20XX Living Space Smart Home. Guide Sublinefor network security in building systems control

How To Learn To Understand And Understand The Physics Of Chemistry

RIMS ANNUAL CONFERENCE & EXHIBITION DEADLINE FOR ADVANCED RATE

The Wireless Last Hop WHITE PAPER. What is it?...and why is it important? networks. - Improving the way the world connects -

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

Analyze. Secure. Defend. Do you hold ECSA credential?

NATIONAL SUN YAT-SEN UNIVERSITY

A Systems Engineering Approach to Developing Cyber Security Professionals

Information Technology

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Introduction. Chapter Scope of Electrical Engineering

Computer and Information Science

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

YOU THINK YOU MIGHT WANT TO STUDY:

Protecting Organizations from Cyber Attack

High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC

Area 3: Analog and Digital Electronics. D.A. Johns

E-Business, E-Commerce

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Module 3 Applications of Information Systems: Enterprise Systems

The Internet of Things (IoT) Opportunities and Risks

FACULTY OF POSTGRADUATESTUDIES Master of Science in Computer Engineering The Future University

Loophole+ with Ethical Hacking and Penetration Testing

Section 12 MUST BE COMPLETED BY: 4/22

Using Smartphones and Tablets in Embedded Applications

The Emerging Trends in Electrical and Computer Engineering

Introduction to Computer Engineering ENGIN112-1

Draft dpt for MEng Electronics and Computer Science

Creating A Data-Safe Employee Mobile Device Policy

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan ACCEPTABLE USE POLICY

Introduction to Computer Networks and Data Communications

a pocket guide to: what engineers do engineering.asu.edu

Eye with Intelligence. Connecting CCTV to Big Data, Hadoop and R

BUILDING BLOCKS AND CHALLENGES. of the Internet of Things

The focal point of the IoT era shifts from cars to houses - Trends in smart homes at the Consumer Electronics Show -

Curriculum of Electronics Engineering Program

Hackers are here. Where are you?

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5

Electrical and Computer Engineering

YOUR INTERACTIVE SECURITY

Certified Cyber Security Analyst VS-1160

Online Banking Fraud Prevention Recommendations and Best Practices

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Securing Smart City Platforms IoT, M2M, Cloud and Big Data

Huawei Network Edge Security Solution

Endpoint protection for physical and virtual desktops

Understand VLANs, Wired LANs, and Wireless LANs

Northwest RPC Sector Summary

cs.nyu.edu/courses/fall13/csci-ua /

Appendix A. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Information Technology Career Cluster Introduction to Digital Technology Course Number

Transcription:

COMPUTER ENGINEERING PROGRAM DR. YAN LINDSAY SUN Department of Electrical, Computer and

https://www.youtube.com/watch?v=bioonzsike0

You are probably aware that an amazing computer revolution has rapidly changed the way much of the world works. Developments in radio, television, radar, transistors, computers, robotics, and Internet have fundamentally altered human life.

Then Pope s Inauguration When smartphones and tablets light up the sky, load up the clouds. Now Source : http://www.alternet.org/speakeasy/alyssa-figueroa/recording-memories-why-must-we-capture-our-every-moment 6

Era of Internet and Cloud 7 *Source: Intel 2012

The field of Computer is at the epicenter of this development. CE is a discipline that integrates several fields of electrical engineering and computer science. CE majors usually have training in electronic engineering, software design and hardware-software integration. (instead of only software engineering or electronic engineering).

CE CURRICULUM

IT IS A MAJOR IN DEMAND. Software engineering companies, Telecommunications firms Designers of digital hardware Network companies Security, Digital forensics firms Many other business enterprises hire Computer majors right out of college and pay them well. Computer also makes great preparation for medical school, business school, and law school (particularly if you want to specialize in patent law).

OVERVIEW All about designing and building computers, computing, and communication systems Silicon chip design Combining chips into systems Combining systems into networks Helping systems recover from failure Software design to help computers run faster and more efficiently Security mechanisms to protect the systems/networks/applications against malicious attacks.

SNAPSHOT 1 - INTEGRATED CIRCUIT DESIGN

SNAPSHOT 2 ARCHITECTURE https://www.youtube.com/watch?v=fy-bcau1w9y

ELE 408 Computer Organization Lab COMPUTER ARCHITECTURE: A CRITICAL INTERFACE software Computer Architecture hardware

SNAPSHOT 3 ROBOTICS https://www.youtube.com/watch?v=7c1msgvoqr4

SNAPSHOT 4 COMPUTER NETWORKS Samples of student projects Remote Camera Whiteboard Sharing Application Real Time Streaming Video Active Flood Response Firewall Chat Application which uses Blue Tooth Technology Wireless Temperature Sensor Using ZigBee

SNAPSHOT 5- INFORMATION & NETWORK SECURITY Samples of Project Topics Security mechanisms at EBay On-line shopping security Video scrambling in Cable TV Jamming and anti-jamming techniques for wireless networks Digital rights management solutions Virus, worm and spyware

SNAPSHOT 6 - CYBER SECURITY

WORKING WITH OTHER ENGINEERS Building neural controlled artificial leg https://youtu.be/ckyvbuvi_b0 Securing US Power Grid

CASE STUDY II Securing online reputation systems

SO WHAT'S IN IT FOR ME? ELE 408 Computer Organization Lab

ELE 408 Computer Organization Lab A Computer Controlled Car Using Wireless Remote: It works!

DESIGNING NETWORK ROUTERS AND BRIDGES ELE 408 Computer Organization Lab

IMPLEMENTING DISK CONTROLLER AND NETWORK INTERFACE ELE 408 Computer Organization Lab

JOB OPPORTUNITIES Our graduates have the necessary background and technical skills to work professionally in one or more of the following areas: Computer hardware and software design Computer-based systems Computer network design System integration Electronic design automation

DOWN THE ROAD The following materials are borrowed from Dr. Bruce Jacob s talk career path in computer engineering.