Computer Science

Course Learning Outcomes

  • CSC 105: Computing Competencies for College and the Workplace

    LAST DATE OF AMENDMENT: 08/20/2014

    At the end of this course, the student should be able to:

    1. Explain how information is stored, accessed, and represented in computers. [IL1].
    2. Be fluent in the language of technology and be able to discuss the state of past, current and emerging technologies. [IL1].
    3. Assess the appropriateness of various technological tools to apply to a given problem. [IL1].
    4. Discuss computer applications in the context of how and when they are best applied. [IL1].
    5. Understand a variety of Web-based sources for accessing information including various methods of Internet searching, communications, commercial transactions and utilities. [IL2], [IL3].
    6. Discuss basic Internet security and privacy issues. [IL2], [IL5].
    7. Understand how databases are created and used. [IL2], [IL4].
    8. Understand and demonstrate appropriate uses of technology including basic proficiency, decision-making, and information evaluation. [IL3], [IL4], [IL5].
    9. Demonstrate appropriate research strategies as applied to a specific task. [IL3].
    10. Demonstrate proficiency using computer applications to organize and disseminate information related to a given task. [IL4].
    11. Develop an awareness of some of the social and ethical issues raised by computers and technology. [IL4], [IL5].
  • CSC 112: Introduction to Computer Programming (for non-majors)

    LAST DATE OF AMENDMENT: 03/31/2017 (addition of SLO 6 and 7)

    At the end of this course, the student should be able to:

    1. Students study and then apply the basic elements of computer programming, including variables, data representation, mathematical and logical expressions, predicates, conditionals, loops, and functions, and object-oriented modeling (QRE 1, Modeling TTC 2).
    2. Students study, interpret, create, and solve various problems, from real-world domains (e.g., finance, biology, physics, chemistry, health care), while writing computer programs that express and solve these problems (QRE 1, Modeling TTC 1).
    3. Students study and practice the construction of algorithms to solve problems and implement these algorithms in a particular programming language (QRE 2, Modeling TTC 3).
    4. Students study and complete the process of the software life-cycle while learning to evaluate, test, and revise computer programs (QRE 2).
    5. Students gain programming experience and knowledge by subdividing problems, devising solutions, and independently implementing their own solutions to these problems in software using a particular programming language (QRE 3, Modeling TTC 3).
  • CSC 131: Introduction to Computer Science

    LAST DATE OF AMENDMENT: 09/16/2013 (adopted the Course Learning Outcomes)

    At the end of this course, the student should be able to:

    1. Students demonstrate an understanding of basic programming concepts including data types, variables, modularity, parameters, conditional statements, iteration, and arrays.
    2. Students demonstrate program development techniques to describe and understand the problem statement, think through input/process/output, leading to problem representation and finally coding.
    3. Students demonstrate the ability to use program control structures (i.e., iteration, conditionals).
    4. Students develop and use algorithms to solve a variety of problems, for instance those related to array processing, statistical calculations, image and audio processing, and text processing.
    5. Students practice modular programming by developing, debugging and integrating modules into a larger program.
    6. Students demonstrate the ability to use programming language specific software libraries.
    7. Students demonstrate the ability to use basic file input and output.
    8. Students demonstrate the ability to use software development tools from command line compile and run commands to an integrated development environment.
  • CSC 133: Discrete Mathematical Structures

    LAST DATE OF AMENDMENT: 09/11/2009 (adopted the Course Learning Outcomes)

    At the end of this course, the student should be able to:

    1. Students develop knowledge of and the capability to use logical forms, valid arguments, direct and indirect proofs, and mathematical induction.
    2. Students develop knowledge of set theory, Boolean algebra, relations, and functions.
    3. Students develop knowledge in the representation of problems in the form of graphs and trees.
    4. Students develop the ability to perform counting and probability calculations on sets.
    5. Students develop the ability to express these concepts and ideas through correct application of standard notation and symbols.
  • CSC 201: Introduction to Computer Programming (for non-majors)

    LAST DATE OF AMENDMENT: 05/06/2020

    At the end of this course, the student should be able to:

    1. Describe the fundamental concepts of the cybersecurity discipline and use them to provide system security. 
    2. Describe potential system attacks and the actors that might perform them.
    3. Describe cyber-defense tools, methods and components and apply cyber-defense methods to prepare a system to repel attacks.
    4. Describe appropriate emasure to be taken should a system compromise occur.
    5. Define the principles of cybersecurity.
    6. Describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies.
    7. Analyze common security failures and identify specific design principles that have been violated.
    8. Given a specific scenario, identify the design principles involved or needed.
    9. Understand the interaction between security and system usability and the importance for minimizing the effects of security mechanisms.
    10. Describe the hardware components of modern computing environments and their individual functions.
    11. Describe the basic security implications of modern computing environments.
    12. Understand the Federal, State and Local Cyber Defense partners/structures.
    13. Describe the DoD system certification and accreditation processes.
    14. Define certification and accreditation.
    15. Properly use the Vocabulary associated with cybersecurity.
  • CSC 220: 3D Computer Graphics Tools and Literacy

    LAST DATE OF AMENDMENT: 09/20/2014

    At the end of this course, the student should be able to:

    1. Demonstrate the ability to critically analyze, appreciate, and make cogent judgments regarding form, lighting, shading, composition, and other visual elements.
    2. Demonstrate an understanding of visual concepts, their development, and their application for creating works with computer graphics tools.
    3. Demonstrate an understanding and appreciation of the significance of major historical, cultural, and technological developments for the medium of computer graphics, as well as its importance to modern visual art and communication.
    4. Demonstrate knowledge of the importance of the medium of computer graphics as a tool for expression, communication, and visualization of meaningful ideas.
    5. Students gain experience in presenting, discussing, and critiquing visual works.
    6. Students gain the artistic and technical knowledge necessary to create their own computer graphics works.
  • CSC 231: Introduction to Data Structures

    LAST DATE OF AMENDMENT: 08/16/2014 (adopted the Course Learning Outcomes)

    At the end of this course, the student should be able to:

    1. Students develop knowledge of basic data structures for storage and retrieval of ordered or unordered data. Data structures include: arrays, linked lists, binary trees, heaps, and hash tables.
    2. Students develop knowledge of applications of data structures including the ability to implement algorithms for the creation, insertion, deletion, searching, and sorting of each data structure.
    3. Students learn to analyze and compare algorithms for efficiency using Big-O notation.
    4. Students implement projects requiring the implementation of the above data structures.
  • CSC 242: Computer Organization

    LAST DATE OF AMENDMENT: 09/18/2009 (adopted the Course Learning Outcomes)

    At the end of this course, the student should be able to:

    1. Students develop knowledge and understanding between hardware/middleware and frameworks for high level programming languages.
    2. Students develop knowledge of combinational and sequential logic circuits.
    3. Students learn how modern computers are constructed from basic logic gates and sequential elements.
    4. Students learn the major components of a modern processor, ALU, Control Unit and Memory.
    5. Students learn how to create and use processor specific assembly language.
  • CSC 302: Introduction to Artificial Intelligence

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. Demonstrate fundamental understanding of the history of artificial intelligence (AI), its foundation, and its challenges.
    2. Apply basic principles of AI in solutions that require problem solving, inference, perception, knowledge representation, and learning.
    3. Demonstrate awareness and a fundamental understanding of various applications of AI techniques in intelligent agents, search algorithms, constraint satisfaction problems.
    4. Develop knowledge of representational issues and their relationship to applications of artificial intelligence.
    5. Demonstrate an ability to share in discussions of AI, its current scope and limitations, and societal implications.
  • CSC 310: Introduction to Quantum Computing

    LAST DATE OF AMENDMENT: 03/10/2023

    At the end of this course, the student should be able to:

    1. Develop knowledge of Quantum bits (Qubits), superposition, measurement, entanglement (Bell states), teleportation, superdense coding. 
    2. Develop an understanding of the models used to represent qubits and the operators that manipulate qubits (vectors, matrices, bloch sphere, and circuits).
    3. Learn to implement quantum circuits in Python.
    4. Develop an understanding of several important quantum algorithms: such as Deutsch-Josza, Bernstein-Vazirani, Simon's sQuantum Forier Transform, and Shor's Quantum Approximate Optimization Algorith (QAOA).
    5. Gain knowledge of the complexity analysis of quantum computing and Quantum SUpremacy.
  • CSC 315: Application Development for Mobile Devices

    LAST DATE OF AMENDMENT: 09/22/2014

    At the end of this course, the student should be able to:

    1. Students learn aspects of a mobile platform language and development environment.
    2. Students refine understanding and application of object-oriented design principles on a larger scale than previously used.
    3. Students learn to navigate and apply classes and methods from a large software framework for Mobile-centric activities such as multimedia, networking, and location-based services.
    4. Students gain understanding of limitations and capabilities of current mobile devices.
    5. Students gain experience in designing mobile-device interfaces.
    6. Students gain experience in mobile application design, programming, and implementation.
  • CSC 320: Computer Animation

    LAST DATE OF AMENDMENT: 09/18/2009 (adopted the Course Learning Outcomes)

    At the end of this course, the student should be able to:

    1. Students gain understanding in mathematical, algorithmic, and conceptual techniques related to animating computer graphics models and environments.
    2. Students develop the ability to model and rig objects and characters in 3-D using constraints, expressions, and scripting in computer animation software.
    3. Students learn aspects of the topology of polygon, NURBs, and subdivision-surface modeling that relate to deformations used in animation.
    4. Students understand and apply concepts of narrative structure and animation technique.
    5. Students model, rig, shade, and animated characters completely of their own creation, presenting their work for class critique.
    6. Students work together as a large, coordinated group to complete a fully realized animated short film project from concept through to post-production and screening.
    7. Students learn aspects of digital production and workflow as applied in current industry.
  • CSC 322: Data & Machine Learning

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. Formulate real-world problems involving data such that they can be solved by data science techniques presented in this course.
    2. Implement and analyze existing learning algorithms.
    3. Employ probability, statistics, calculus, linear algebra, and optimization to construct predictive/analytical models from data.
    4. Select and apply appropriate machine learning techniques for real-world problems including classification, prediction, clustering, and representation learning.
    5. Describe the formal properties of models and algorithms for learning and explain the practical implications of those results.
    6. Compare and contrast different paradigms for learning and algorithm.
    7. Identify ethical issues in related projects and apply professional codes of ethics to analyze and resolve ethical questions.
  • CSC 324: 

    LAST DATE OF AMENDMENT: 

    At the end of this course, the student should be able to:

    1.  
    2. .
    3. .
    4. .
    5. .
  • CSC 331: Object-Oriented Programming and Design

    LAST DATE OF AMENDMENT: 03/02/2023

    At the end of this course, the student should be able to:

    1. Implement basic object-oriented concepts like classes, methods, and objects and refine their knowledge of one and two-dimensional arrays, and basic program control.
    2. Examine and implement more advanced object-oriented concepts (e.g., interfaces, polymorphism, inheritance, graphical user interfaces, event handling, file I/O, exceptions, encapsulation, cohesion, coupling).
    3. Recognize and apply object-oriented approaches to analysis and design of algorithms.
    4. Develop a sizable programming project in small teams (2-3 students).
    5. Present their programming projects to their peers.
    6. Document their code using a tool such as javadoc.
    7. Use software development tools like Eclipse and software development processes like refactoring.
    8. Recognize multi-threaded applications. 
  • CSC 340: Scientific Computing

    LAST DATE OF AMENDMENT: 03/31/2017

    At the end of this course, the student should be able to:

    1. Students develop knowledge of computer data representation and its relationship to computational error and error propagation.
    2. Students develop a knowledge of vector and matrix operations (e.g., addition, subtraction, transpose, multiplication, inverse).
    3. Students learn how to find and use eigenvectors and eigenvalues and students implement programs to find these.
    4. Students implement and learn to use programs to find roots for functions.
    5. Students implement and learn to use programs to fit data using both linear and nonlinear functions.
    6. Students develop a knowledge of algorithm and implementation alternatives that enables them to choose appropriately.
    7. Students develop skills in writing technical reports that describe findings that arise from application of software that they develop.
    8. Students demonstrate knowledge from two or more STEM disciplines.
    9. Students apply STEM problem solving methodologies, such as the scientific method, the engineering design process, or modeling, to real-world problems.
  • CSC 342: Operating Systems

    LAST DATE OF AMENDMENT: 08/27/2009

    At the end of this course, the student should be able to:

    1. Students develop the ability to implement algorithms using the C language.
    2. Students develop knowledge of various concepts and issues pertaining to operating system internals.
    3. Students gain knowledge of solutions and algorithms developed by the computer science community to address issue of operating systems.
    4. Students develop knowledge of computer data representation used by these algorithms.
    5. Students work in teams to implement some of the algorithms used by operating systems.
    6. Students gain knowledge of the methods used by real operating systems such as Windows, Linux, Unix, and Mac operating systems.
  • CSC 344: Computer Networks

    LAST DATE OF AMENDMENT: 03/02/2023

    At the end of this course, the student should be able to:

    1. Identify layered communication architectures (TCP/IP).
    2. Demonstrate knowledge of the fundamental concepts and principles of computer networks.
    3. Discuss the operational details of numerous networking protocols including: TCP, UDP, IP, Ethernet, ARP, DNS, DHCP, ICMP, SMTP, and HTTP.
    4. Discuss the concepts of reliable data transfer and how TCP implements these concepts.
    5. Interpret the basics of error detection including parity, checksums, and CRC.
    6. Perform hands-on tasks experience with protocols by using a network protocol analyzer, such as Wireshark.
    7. Recognize sockets programming, examine how to implement client/server programs, and implemented an application program using socket programming.
    8. Explain the concepts related to distributed computing and implement a distributed application.
    9. Identify network security issues, including public key cryptography, message integrity, and digital signatures.
  • CSC 350: 

    LAST DATE OF AMENDMENT: 

    At the end of this course, the student should be able to:

    1.  
    2. .
    3. .
    4. .
    5. .
  • CSC 351: Applied Software Security

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. Produce software components that satisfy their functional requirements without introducing vulnerabilities.
    2. Describe the characteristics of secure programming.
    3. Understand the vulnerabilities inherent in different programming languages.
    4. Examine vulnerabilities introduced through the use of libraries and how to mitigate those vulnerabilities.
    5. Examine concepts of web application technologies and security issues associated with them.
    6. Describe approaches used in the development and deployment of secure web applications.
    7. Explain how web applications are operated in a secure manner.
  • CSC 358: Cyber Operations

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. Describe the laws that provide US entities the authority to perform cyber operations.
    2. List the phases of a well-organized cyber operation and describe the goals and objectives of each phase.
    3. Identify and explain specific phases of cyber operations.
  • CSC 360: Formal Languages and Computability

    LAST DATE OF AMENDMENT: 09/04/2009

    At the end of this course, the student should be able to:

    1. Students develop knowledge of the mathematical foundations of computer science including set theory, relations, functions, recursion, and mathematical induction.
    2. Students develop knowledge of languages and the ability to express regular languages using regular sets, regular expressions, and context-free grammars.
    3. Students learn how to perform transformations of context-free grammars to normal forms.
    4. Students develop knowledge of and an ability to create finite state automata that can accept regular languages. Further students, can remove non-determinism and produce minimal deterministic finite automata.
    5. Students develop knowledge of and an ability to create pushdown automata that can accept context-free languages.
    6. Students can determine whether a given language is regular, context-free, or neither by application of closure properties and the Pumping Lemmas.
    7. Students can effectively communicate the concepts of this course by employing acceptable standard nomenclature and symbols of mathematics, proofs, sets, relations, functions, and graph theory.
  • CSC 364: Introduction to Cryptography

    LAST DATE OF AMENDMENT: 

    At the end of this course, the student should be able to:

    1.  
    2. .
    3. .
    4. .
    5. .
  • CSC 365: Client-Side Web Development

    LAST DATE OF AMENDMENT: 10/01/2012

    At the end of this course, the student should be able to:

    1. Design and Implement a simple web application. [Usage]
    2. Describe the constraints that the web puts on developers. [Familiarity]
    3. Compare and contrast web programming with general purpose programming. [Assessment]
    4. Discuss how web standards impact software development. [Familiarity]
    5. Review an existing web application against a current web standard. [Assessment]
  • CSC 368: Visual Design for Multi-Media

    LAST DATE OF AMENDMENT: 10/01/2016

    At the end of this course, the student should be able to:

    1. Students integrate key facets of both computer science and studio art courses and understand how these fields complement each other. [IL3]
    2. Students learn modern concepts for visual interface design.
    3. Students gain understanding of user experience and learn how to create designs that better this experience. [IL2]
    4. Students gain experience designing and coding the Internet and displaying visual information in a web browser.
    5. Students will research topics and develop original visual concepts to explain and share information. [IL1][IL3]
    6. Students analyze context of sources used to create web-based information art to evaluate its currency, authority, accuracy, relevance, and purpose. [IL2]
    7. Students learn how and where to cite sources for visual designs on a website. [IL2]
    8. Students complete visual software projects by synthesizing and combining ideas from material covered. [IL2] [IL3]
    9. Students iteratively develop, present, and receive feedback on a portfolio website of their work for future opportunities. [IL3]
    10. Students learn a variety of data visualization methods / technologies
    11. Students learn a variety of digital storytelling methods / technologies
    12. IL 1. Develop questions for research that necessitate information seeking, gathering, and analysis and employ effective and iterative search strategies to address them. [Information Literacy, Inquiry]
    13. IL 2. Critically evaluate and classify sources based on the context in which they were produced and disseminated, their place in the relevant scholarly conversation(s), and their indicators of authority. [Critical Thinking, Information Literacy]
    14. IL 3. Synthesize and effectively use information to create new content (e.g., papers, presentations, data analyses, videos) that addresses the research questions, demonstrates ethical use of information (including the acknowledgement of other's intellectual work), and adheres to any established disciplinary or professional parameters. [Information Literacy, Thoughtful Expression]
  • CSC 370: Computer Graphics

    LAST DATE OF AMENDMENT: 07/01/2010

     At the end of this course, the student should be able to:

    1. Students gain understanding of the representation and generation of images using computers.
    2. Students learn and practice mathematics required for representation of graphic primitives in 2D and 3D with transformations.
    3. Students learn and implement algorithms for graphical representations and transformations.
    4. Students gain understanding of and experience using a modern graphics pipeline.
    5. Students gain experience programming 2D and 3D graphical solutions using graphical APIs such as OpenGL.
    6. Students learn mathematics and algorithms for lighting and shading of graphical objects.
    7. Students complete software projects related to graphics by synthesizing and combining ideas from material covered.
  • CSC 380: Design and Analysis of Algorithms

    LAST DATE OF AMENDMENT: xx/xx/xxxx (adopted the Course Learning Outcomes)

    At the end of this course, the student should be able to:

    1. Learn, and demonstrate their knowledge of, algorithm design paradigms and the language of algorithm analysis.
    2. Choose data representations and identify, design, and implement multiple algorithms, based upon design paradigms (such as, divide-and-conquer, greedy algorithms, graph algorithms, randomized algorithms or dynamic programming).
    3. Analyze the algorithmic complexity of algorithms and employ mathematical, analytical, and asymptotic notation to describe their relative merits.
    4. Develop an understanding of NP-completeness.
  • CSC 385: Professional and Ethical Issues in Computer Science

    LAST DATE OF AMENDMENT: 06/02/2017

    At the end of this course, the student should be able to:

    1. Identify ethical issues as they impact computer science and related disciplines. [IL1] [IL3] [WI2]
    2. Differentiate between the main ethical theories and be able to use the ethical theories in evaluating the ethical issues impacting computer science and related disciplines. [IL2] [WI1] [WI2]
    3. Discuss ethical issues in writing, using appropriate reference to the established Code of Ethics of the professional society relevant to that student’s field (ACM, IEEE, etc), and apply professional codes of ethics to analyze and resolve ethical questions. [IL4] [WI1] [WI2]
    4. Demonstrate the ability to write within the computer science discipline including writing one or more research papers that demonstrate the student’s grasp of ethical issues, display a clear understanding of how the ideas of other persons may be properly cited and used in written documents, and illustrate use of popular formats for presenting published papers in computer science. [WI1] [WI2]
    5. Prepare and present information on a technical topic in a professional manner. [IL4]
    6. Identify and locate appropriate sources of information to support decisions and written ideas. [IL1] [IL3] [IL4] [WI1]
    7. Analyze and evaluate arguments using rules of logic and be able to formulate effective arguments based on sound premises. [IL3] [WI2]
  • CSC 402: Advanced Artificial Intelligence

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. Demonstrate awareness and a fundamental understanding of various applications of AI techniques in game trees, decision systems, artificial neural networks, Bayesian networks.
    2. Demonstrate proficiency developing AI applications in an AI programming language.
    3. Develop ability to apply knowledge representation, reasoning, and machine learning techniques to real-world problems.
    4. Develop knowledge of intelligent multi-agent systems.
    5. Understand the fundamentals of reinforcement learning.
  • CSC 421: Game Development

    LAST DATE OF AMENDMENT: 10/01/2021

     At the end of this course, the student should be able to:

    1. Students gain understanding in mathematical, algorithmic, and conceptual techniques related to generating, displaying, and animating meshes for 3D computer games.
    2. Students develop the ability to model and rig objects and characters in 3-D geared for realtime rendering and use in advanced game engines.
    3. Students learn aspects of object representation, scene-graph hierarchy, and algorithms related to real-time rendering of graphical objects.
    4. Students learn and apply mathematical concepts, including linear algebra, parametric equations, and quaternions, needed for 3D computer gaming.
    5. Students learn, discuss, and consider the history, development, and design of computer games as well as basic artificial intelligence and physics for games.
    6. Students design and code their own 2D game, creating all resources (sprites, images, sounds), modifying and expanding a C++ game engine for main control of rendering.
    7. Students design and code their own 3D game in small groups, creating all resources (3D models, 3D terrain, textures, character rigging and animation) necessary for it, modifying and expanding a C++ game engine for game control and rendering.
  • CSC 424: Computer Security

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. Students will be able to identify the elements of a cryptographic system.
    2. Students will be able to describe the differences between symmetric and asymmetric algorithms.
    3. Students will be able to describe which cryptographic protocols, tools and techniques are appropriate for a given situation.
    4. Students will be able to describe how crypto can be used, strengths and weaknesses, modes, and issues that have to be addressed in an implementation (e.g., key management), etc.
    5. Describe the key concepts in network defense (defense in depth, minimizing exposure, etc.).
    6. Explain how network defense tools (firewalls, IDS, etc.) are used to defend against attacks and mitigate vulnerabilities.
    7. Analyze how security policies are implemented on systems to protect a network.
    8. Evaluate how network operational procedures relate to network security.
    9. Compare and contrast different types of standards including: laws, regulations, policies, voluntary, and framework-based standards.
    10. Map the processes for the creation and/or changes to different types of standards.
    11. Describe the impact of legal/regulatory standards on a given system.
    12. Describe how standards may be applied and assessed for a sub-contractor or customer.
    13. List and describe key provisions of common standards.
  • CSC 427: Quantum Cryptography

    LAST DATE OF AMENDMENT: 

    At the end of this course, the student should be able to:

    1.  
    2. .
    3. .
    4. .
    5. .
  • CSC 430: Digital Visual Effects

    LAST DATE OF AMENDMENT: 02/12/2010

    At the end of this course, the student should be able to:

    1. Students gain understanding in mathematical, algorithmic, and conceptual techniques related to representing images and sequences of images with digital technologies.
    2. Students develop the ability to manipulate aspects of digital images to create and composite photo-realistic, synthetic images, either through software or code.
    3. Students learn aspects of digital cinematography and how physical cameras, lenses, and movement relate to digital representations and how to match these virtually.
    4. Students learn techniques and aspects of algorithms for rendering photo-realistic imagery using computer graphics software.
    5. Students model, render, and composite images and videos completely of their own creation, presenting their work for class critique.
    6. Students work together as a large, coordinated group to complete a fully realized short film project from concept through to post-production and screening.
    7. Students learn aspects of digital production and workflow as applied in current industry.
  • CSC 432: Deep Machine Learning

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. Translate latest research into practical tools for deep machine learning solutions.
    2. Leverage pre-existing learning models to solve adjacent problems.
    3. Tune models through hyperparameter tuning, regularization, and optimization.
    4. Structure a real-world deep machine learning problem and execute it from data to training to inference to deployment.
    5. Develop a deep machine learning solution to a practical problem or challenge
  • CSC 433: Natural Language Processing

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. Students can identify the fundamental syntactic structures of natural languages including constituency, grammatical relations, subcategorization, and dependency.
    2. Students can identify and explain the use of common symbolic data structures used in natural language processing such as regular and context-free grammars, finite state automata, unification grammars, and first-order logic.
    3. Students can identify and explain the user of common stochastic data structures used in natural language processing such as n-grams, hidden markov models, and Bayesian networks.
    4. Students can implement solutions to natural language processing problems using both symbolic and stochastic data structures.
    5. Students develop skills in research, analysis, design, implementation, and presentation of natural language processing research questions.
    6. Students demonstrate proficiency in hypothesis formation, experimental design, and the scientific method.
    7. Students demonstrate proficiency in written and oral scientific presentation.
  • CSC 434: Programming Languages

    LAST DATE OF AMENDMENT: 12/27/2022

    At the end of this course, the student should be able to:

    1. Students become familiar with common programming paradigms such as imperative, object-oriented, functional, and logic programming by studying representative programming languages.
    2. Students demonstrate the ability to learn a new programming language well enough to implement simple algorithms
    3. Students demonstrate knowledge of crosscutting concerns, such as types, scope rules, parameter passing techniques, memory management, with respect to programming languages.
    4. Students demonstrate knowledge of issues related to the implementation of programming languages such as grammars, parsing, compiling, linking, and virtual machines.
    5. Students develop the ability to implement algorithms using 5 or 6 different languages.
    6. Students gain the confidence to learn a new programming language well enough to implement simple algorithms.
    7. Students learn the history of programming languages and how they were developed.
    8. Students develop knowledge of various concepts and issues pertaining to programming languages.
    9. Student gain knowledge of the implementation of programming languages.
    10. Students gain knowledge of the strengths and weaknesses of programming languages as well as the domains for which they are intended.
  • CSC 437: Parallel Computing

    LAST DATE OF AMENDMENT: 02/01/2010

     At the end of this course, the student should be able to:

    1. Students develop solutions and implement the solutions for scientific problems using multiple processors in a cluster.
    2. Students acquire knowledge in writing programs which require processes to synchronize and exchange data using Message Passing Interface (API).
    3. Students acquire knowledge in writing programs which require processes to spawn multiple treads that share memory on multiple core processors.
    4. Students learn to profile parallel programs by placing event probes and to log them for analysis and tuning of the program performance.
  • CSC 442: Computer System Architecture

    LAST DATE OF AMENDMENT: 02/17/2010

    At the end of this course, the student should be able to:

    1. Students develop knowledge of single and multi-processor organization alternatives.
    2. Students develop knowledge of I/O sub-system design alternatives.
    3. Students learn how pipelined processing is used to provide instruction level parallelism.
    4. Students learn to use CPU simulation as a tool to evaluate the consequences of processor architectural decisions.
    5. Students learn alternative strategies for multi-level and virtual memory design.
    6. Students develop a knowledge of architectural alternatives that enables them to choose algorithms that exploit architectural features appropriately.
  • CSC 446: Grid Computing

    LAST DATE OF AMENDMENT: 02/17/2010

    At the end of this course, the student should be able to:

    1. Students gain knowledge of the concepts of Grid computing including: job management, security, certificates and digital signatures, scheduling, web and grid services, index services, notification, and workflow management and portal tools.
    2. Students gain knowledge of the infrastructure and mechanics of the software that implements a Grid.
    3. Students implement algorithms in grid services.
    4. Students implement a solution to a problem that requires the use of multiply Grid resources at multiply sites.
  • CSC 450: Software Engineering

    LAST DATE OF AMENDMENT: 03/02/2023

    At the end of this course, the student should be able to:

    1. Construct quality software as part of a team and evaluate software design choices.
    2. Apply current theories, models, techniques and tools during problem identification and analysis, requirements specification, software design, implementation, software testing, software evolution and documentation.
    3. Design alternative solutions to a given problem and describe and reconcile alternate approaches taking into considerations technical and non-technical concerns.
    4. Develop the knowledge, skills, and professional awareness foundational to the practice of software engineers including an appreciation for the need for continuing professional development, leadership, good communication, negotiation, as well as effective work habits.
    5. Defend design decisions as evidenced by artifacts created during the software development lifecycle, and present technical software engineering material both orally and in writing.
    6. Critically analyze, evaluate and discuss in writing theories, models, techniques and tools relevant to problem identification and analysis, requirements specification, software design, implementation, software testing, software evolution, documentation, and product security as well as the ethical and societal impact of software engineering.
    7. Demonstrate the ability to analyze and evaluate arguments using rules of logic and display a clear understanding of how the ideas of other persons may be properly cited and used in written documents.
    8. Identify and locate appropriate sources of software engineering and related information to support decisions and written ideas.
  • CSC 451: Software Assurance

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. demonstrate advanced software testing techniques and strategies
    2. derive and interpret code quality metrics and measurements
    3. describe and identify common classes of software threats, attack vectors, and vulnerabilities
    4. apply contemporary static and dynamic analysis toolsets for assessing software quality
    5. apply software reliability growth models and model-fitting to software failure rate data.
  • CSC 452: Computer Vision

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. Build a deep understanding of the theory of classical computer vision algorithms.
    2. Learn newer approaches to solving the same problems with learning-based techniques.
    3. Be able to compare the requirements and benefits of different types of vision algorithms and apply the best one to a particular scenario.
    4. Develop the ability to use their new knowledge to design and build computer vision programs for real-world applications.
    5. Gain familiarity with the operation, benefits, and limitations of applicable data-acquisition equipment used in computer vision work such as cameras, video cameras, document scanners, RGBD sensors, infrared sensors, laser scanners, hyperspectral cameras, etc.
    6. Consider the societal impacts and ethical matters surrounding the development of the computer vision field.
  • CSC 455: Database Design and Implementation

    LAST DATE OF AMENDMENT: 06/03/2015

    At the end of this course, the student should be able to:

    1. Students understand advantages and disadvantages to using database management systems.
    2. Students comprehend major objectives of database design: reduced redundancy, referential integrity, and normalization.
    3. Students comprehend major objectives of data management: atomicity, consistency, isolation, and durability.
    4. Students gain experience modeling data.
    5. Students gain experience using multiple database products and interfaces.
    6. Students gain experience implementing a fully functional database system.
    7. Students gain experience working with a group on a substantial software development project.
  • CSC 457: Compiler Construction

    LAST DATE OF AMENDMENT: 02/17/2010

    At the end of this course, the student should be able to:

    1. Describe the process of translating a high-level program into machine code.
    2. List and explain the algorithms used at various phases of the compile process.
    3. Create and explain the data structures used at various phases of the compile process.
    4. Describe the process of implementing programming language constructs.
    5. Implement a working compiler for a small subset of a high-level language.
    6. Evaluate and describe the impact on performance and space of using various constructs and techniques of a given programming language.
  • CSC 458: Software Practicum

    LAST DATE OF AMENDMENT: 10/01/2021

    At the end of this course, the student should be able to:

    1. Analyze and implement a large-scale software project for an external customer. [CR1] [CR4] [EBC2]
    2. Evaluate related products on the current software market. [CR1]
    3. Elicit, analyze, and negotiate customer requirements. [CR2] [CR3] [EBC1] [EBC2]
    4. Research, learn, and use state-of-the-practice software technologies and tools. [CR1] [CR2]
    5. Apply an iterative software project management process where each iteration consists of planning, execution, review, and retrospection. [CR3]
    6. Document software plans, requirements, designs, test plans, and user documentation using industry best practice. [CR4]
    7. Define and reflect on goals for professional development. [EBC1] [EBC3]
    8. Communicate effectively with an external customer through written and oral communications.[EBC2] [EBC3]
  • CSC 461: Virtual Reality

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. Demonstrate an understanding of fundamental techniques, processes, technologies and equipmentsed in immersive virtual reality.
    2. Begin to explore materials and processes used in immersive virtual reality.
    3. Show a basic awareness and understanding of historical and theoretical contexts relevant to immersive virtual reality.
    4. Build a comprehensive virtual reality experience.
  • CSC 462: Artificial Intelligence for Cybersecurity

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. Understand AI applications in cybersecurity, Threat Intelligence, Malware Analysis. 
    2. Describe threats to AI models. 
    3. Understand advanced AI research topics and case studies such as adversarial learning and advanced threat detection.
  • CSC 464: Advanced Cryptography and Blockchain

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. Describe how various cryptographic algorithms and protocols work.
    2. Evaluate security mechanisms based on cryptography.
    3. Describe the application of cryptography in SSL, virtual private networks, secure storage, and other security applications.
    4. Take a mode or protocol diagram and identify how an error propagates through the cryptosystem.
  • CSC 465: Database-Driven Web Application Development

    LAST DATE OF AMENDMENT: 10/01/2021

    At the end of this course, the student should be able to:

    1. Students can create dynamic Web sites using a server-side scripting language.
    2. Students can use a server-side scripting language to interface with a database.
    3. Students can implement cookies and session tracking and can explain their importance in Web sitedevelopment.
    4. Students can use regular expressions, handle exceptions, and validate data.
    5. Students can discuss security issues and best practices for secure Web sites.
    6. Students can organize large Web sites using industry best-practices.
  • CSC 466: Malware Analysis

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. Describe software security analysis tools and techniques.
    2. Apply their knowledge to perform software security analysis, using common tools, against previously unknown software components.
    3. Describe compilation process that translates high-level code to machine code.
    4. Safely describe and decompose malware samples.
  • CSC 468: Reverse Engineering

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. Students should be able to use common software reverse engineering tools to safely perform static and dynamic analysis of software (or malware) of unknown origin for the purposes of understanding the software functionality and implementation.
    2. Students demonstrate proficiency in reverse engineering methodologies and tools.
    3. Students will gain a basic understanding of software forensics and malware analysis.
    4. Students will be able to trace, understand, and modify binary file execution.
  • CSC 470: Hardware Security

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. Outline physical vulnerabilities of hardware devices.
    2. Explain and make use of security capabilities implemented in hardware.
    3. Describe how systems are initialized and how software is validated and loaded.
    4. Describe the security role of intermediate software such as hardware abstraction layers or other forms of middleware.
  • CSC 472: Generative Deep Learning

    LAST DATE OF AMENDMENT: 10/01/2020

    At the end of this course, the student should be able to:

    1. Students will develop basic knowledge of deep machine learning using popular computing frameworks.
    2. Students will learn basic knowledge of data wrangling and hyperparameter tuning.
    3. Students will understand the difference between discriminative and generative deep learning techniques.
    4. Students will develop basic knowledge of adversarial learning techniques: autoencoders, variational autoencoders, generative adversarial networks, etc.
    5. Students will develop generative deep learning solutions for multiplicity of data types.
    6. Students will understand the impacts of generative modeling and future implications of the technology.