Guidelines for Establishment of Contract Areas Computer Science Department



Similar documents
Ph.D. in Bioinformatics and Computational Biology Degree Requirements

REGULATIONS FOR THE DEGREE OF BACHELOR OF SCIENCE IN BIOINFORMATICS (BSc[BioInf])

Bachelor of Science Degree in Biology

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

Bellevue University Cybersecurity Programs & Courses

Russ College of Engineering and Technology. Revised 9/ Undergraduate GPA of 3.0/4.0 or equivalent.

K 066/875. Master Curriculum. Bioinformatics. (in English)

M.S. AND PH.D. IN BIOMEDICAL ENGINEERING

UF EDGE brings the classroom to you with online, worldwide course delivery!

How To Get A Computer Science Degree

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

PROGRAMME SPECIFICATION

PETITION/PROGRAM SHEET Degree: Bachelor of Science Major: Computer Science

BIO 3350: ELEMENTS OF BIOINFORMATICS PARTIALLY ONLINE SYLLABUS

Doctor of Philosophy in Computer Science

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS

Course Specification

Computer Science Electives and Clusters

k. p MIS program section is replaced with following content.

Advice for Students completing the B.S. degree in Computer Science based on Quarters How to Satisfy Computer Science Related Electives

MD/Ph.D. Degree Requirements

Department of Computer Science and Engineering

MRKT 601 Legal and Ethical Issues in Global Communications (3) MRKT 602 Consumer Behavior (3)

Bachelor of Science in Chemistry

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

GRADUATE CATALOG LISTING

Illinois Mathematics and Science Academy

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

Assessment for Master s Degree Program Fall Spring 2011 Computer Science Dept. Texas A&M University - Commerce

PhD Program An Overview. Department of Health Informatics SHRP

Accelerated Bachelor of Science/Master of Science in Computer Science. Dual Degree Program

Master of Science in Forensics

BIOINFORMATICS METHODS AND APPLICATIONS

What You Need to Know About Computer Science, B.S.A.T. Programs

MS Information Security (MSIS)

THE M.SC. PROGRAMS OF THE FACULTY OF SCIENCE GENERAL INFORMATION THE SCHOOL OF M.SC. STUDIES

American Academy of Forensic Sciences

2. What are your learning objectives or outcomes associated with each student learning goal?

Department of Computer Science

Genomics and Bioinformatics

Please consult the Department of Engineering about the Computer Engineering Emphasis.

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM

M.S. DEGREE REQUIREMENTS

How To Get A Computer Science Degree In Francea

Computer Information Systems

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Bachelor of Information Technology

Appendix I

UPBM CURRICULAR BROCHURE

Department of Information Systems and Cyber Security

Other Required Courses (14-18 hours)

Student Orientation. Department of Health Informatics SHRP-UMDNJ

How To Get A Computer Science Degree

CIS 253. Network Security

CAN I USE THIS COURSE AS A HUMANITIES ELECTIVE?

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce

GUIDELINES FOR HUMAN GENETICS

Network Security Course Specifications

BIOLOGICAL SCIENCES REQUIREMENTS [63 75 UNITS]

Page Overview... 2 Admission Requirements... 2 Additional Requirements... 3 Sample Timeline... 4 Sample Research Proposal... 5

Bioinformatics Graduate Program Requirements Guidelines for Students and Mentors/Supervisors

Master of Philosophy (MPhil) and Doctor of Philosophy (PhD) Programs in Life Science

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

GUIDELINES FOR HUMAN GENETICS

The Masters of Science in Information Systems & Technology

Introduction to Cyber Security / Information Security

Security+ P a g e 1 of 5. 5-Day Instructor Led Course

Web-Based Genomic Information Integration with Gene Ontology

Syllabus. No: CIS 200. Title: Fundamentals of Network Security. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer

Ph.D. Degree in Public Health Sciences Concentration in Environmental Health

Information Security Course Specifications

UNIVERSITY OF MARIBOR FACULTY OF ECONOMICS AND BUSINESS Razlagova ulica 14, 2000 Maribor

The College of Liberal Arts and Sciences

Faculty of of Science

(Instructor-led; 3 Days)

COMPUTATIONAL LIFE SCIENCE (MSc) GRADUATE PROGRAM

Course Requirements for the Ph.D., M.S. and Certificate Programs

CHEMICAL SCIENCES REQUIREMENTS [61-71 UNITS]

Bioinformatics & Computational Biology Handbook

Abdullah Mohammed Abdullah Khamis

Agreement on Dual Degree Master Program in Computer Science. Politechnika Warszawska. Technische Universität Berlin

Bachelor of Science in Applied Bioengineering

EXPLORE BIO SIMULATION. COMPUTATIONAL LIFE SCIENCE (MSc) GRADUATE PROGRAM

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

MASTER OF SCIENCE PROGRAMS ADMISSION REQUIREMENTS

Health Informatics Student Handbook

College of Pharmacy & Pharmaceutical Sciences Graduate Catalog

Transcription:

Guidelines for Establishment of Contract Areas Computer Science Department Current 07/01/07 Statement: The Contract Area is designed to allow a student, in cooperation with a member of the Computer Science Graduate Faculty (the Advisor ), to design a customized area of specialization. It will consist of 2 courses, selected by the student and the Advisor. The area can be used as one of the two areas tested by the Comprehensive Exam; the questions for the exam will be set by and graded by the Advisor. Alternately, the Contract Area may be used to design and implement a major software development product, possibly in connection with a business or other application area need. In this case, the Comprehensive Examination may take the form of a written and oral report. The student s advisor together with the Director of Graduate Studies will determine when this is appropriate. In addition to the customized areas, certain pre-defined Contract areas may be available. These are described below. Any course included in a Contract Area, especially one being taught for the first time or any Reading Course, must have a well-defined syllabus (including a topic list). Procedure for Establishing a Contract Area: 1. The student identifies and secures the cooperation of a member of the department s Graduate Faculty to serve as an Advisor. 2. The student and Advisor write a description of the area of study and specify the two courses to be taken. The description should a) state the purpose of the Area and b) should explain the learning outcomes and knowledge to be gained as well as c) the rationale for the particular course combination proposed. 3. This proposal and the syllabus/topic list is submitted to the Director of Graduate Studies for approval. It is expected that if any disagreement should arise, the Graduate Studies Committee will be consulted. Pre-defined Contract Areas: The department may from time to time specify pre-defined contract areas which reflect the department s special expertise and/or ongoing research activities. Current Predefined Contract areas may be found here.

Further Notes: 1. The creation of a contract area must not be retroactive. That is, the latest that a Contract Area can be established is before the end of the first course in the twocourse sequence. 2. All courses in a Contract Area must be well-defined. That is, a syllabus and topic list, normally including most of the following items must be available: a reading list, a project to be undertaken, software to be developed, specification of a final report, or other activities to be undertaken or products to be produced. This definition must be sufficiently detailed and specific that the Director of Graduate Studies is satisfied that the student s performance in the course can be clearly established. These materials are part of the Contract Area proposal. 3. Two Reading Courses (CSCI 597) may constitute a Contract Area. Students and advisors should be aware that a maximum of 6 credit hours of CSCI 597 is allowed by the catalog rules. 4. There is nothing to prevent a student from using two Contract Areas to fulfill the Comprehensive Exam requirements. 5. If the Director of Graduate Studies rejects a proposed Contract Area, the faculty Advisor for the proposal may appeal to the Graduate Studies Committee. 6. A Director of Graduate Studies wishing to serve as an Advisor for a Contract Area should consult the head of the Graduate Studies Committee for approval.

Pre-Defined Contract Areas Computer Science Department Current 07/01/07 The descriptions given below are meant to provide recommendations, but may be modified to some extent according to the student s background and interests, in consultation with the student s Advisor. The Director of Graduate Studies can suggest which faculty members can be approached for further information and to serve as an advisor for these areas. CyberSecurity Contract Area CyberSecurity involves protecting information that is maintained and handled by computer systems by preventing, detecting, and responding to attacks. It seems that everything relies on computers and the Internet now communication (email, cell phones), entertainment (digital cable, mp3s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), and the list goes on. Our new courses on CyberSecurity teach the risks and threats that exist in modern computer systems and networks and how to counteract and protect against them: Contract Area Details: The student must take 2 courses (6 credit hours), consisting of CSCI 550 Principles of Computer Security And one of the following: CSCI 552 Telecommunications and Network Security CSCI 554 Computer Security Management. The comprehensive exam will have a section covering this area. Course Details: CSCI 550: PRINCIPLES OF COMPUTER SECURITY is a survey of security considerations as they apply to computer and information systems. Topics include access control, security models and architecture, physical security, networking security, cryptography, disaster mitigation and recovery, and legal and ethical issues. Computer security, privacy, and authentication are perennial problems in modern networked computer systems. This course will provide graduate students with an opportunity to study the nature of the threats, some of their technical details, prevention, recovery and countermeasures. CSCI 552: TELECOMMUNICATIONS AND NETWORKING SECURITY is a survey of security threats and countermeasures as they apply to a telecommunication and networking system. Topics covered include: network security threats, security protocol

and implementation, firewall design, wireless network security, and network security architecture. Telecommunications and networking use various mechanisms, devices, software, and protocols that are interrelated and integrated. Security professionals must know networking software, protocols, services, devices and interoperability issues in order to identify the vulnerabilities within a network. This course studies the nature of the threats in a network, network security protocols and security system that could provide various countermeasures to secure the network. CSCI 554: COMPUTER SECURITY MANAGEMENT is a survey of security considerations as they apply to the management of business processes and information. Topics include: planning, policies, protocols of security practices, access models and frameworks, incident response plans, asset protection and recovery. Information Security is no longer the sole responsibility of technology personnel. Business managers must be aware of the importance and impact of business models and decision on the security of essential business processes and information.

Bioinformatics Bioinformatics is the use of mathematics, statistics, computer science, artificial intelligence, chemistry and biochemistry to solve biological problems, usually on the molecular level. An important subfield of bioinformatics is genomics, which deals with the genome, the DNA that stores the sum of an organism s hereditary information. The representation of DNA as a very long string over a 4-character alphabet (A, C, G, and T) allows a variety of computer science concepts and techniques to be brought to bear on important problems in biology. Genome annotation, for example, deals with finding the substrings of the genome that represent genes. Once the genes are located, scientists try to identify the biological function of each gene. Major research efforts in bioinformatics include sequence alignment, gene finding, genome assembly, protein structure alignment, protein structure prediction, prediction of gene expression and protein-protein interactions, and the modeling of evolution. Work in bioinformatics involves many areas of Computer Science, including algorithms, databases, pattern recognition, data mining, string processing, visual display of information, and topics related to storing and processing of very large data sets. For both historical and practical reasons, much programming in bioinformatics is done in Perl. Students interested in further study, research or possible employment in Bioinformatics may be interested in this contract area. Students may also be interested in this contract area if they are interested in understanding modern biological science from a computational point of view, or if they simply are interested in a novel application area where they can apply techniques from almost every area of Computer Science. To ensure a solid grounding in the fundamentals of Bioinformatics, the two required courses for the Bioinformatics contract area will generally be: Bioinformatics (may be taken as CSCI 580G or BIOS 545). Pattern Recognition (CSCI 580R). These courses may be taken in either order. The Comprehensive Exam for the Bioinformatics contract area as defined here will be based on these two courses. For students planning continued study, research, or possible employment in Bioinformatics, the following elective is highly recommended: Programming for Bioinformatics (BIOS 546). Students who have completed the Bioinformatics course and are ready for a research experience may be eligible for the following research workshop: Genome Annotation (CSCI 580N).

Students interested in the Bioinformatics contract area should contact Dr. Freedman. Information specifically regarding CSCI 580R Pattern Recognition may be obtained from Dr. Zhou. Further study in biology is valuable for advanced work in Bioinformatics but requires an undergraduate background in biology. Students who believe that their background may be suitable should contact Dr. Johns in the Department of Biological Sciences.