CS/IT Course DescriptionsThe links below will take you to the catalog description for the course you have selected. If you would prefer to view a complete description of the course, including course objectives, major topics covered, labs, etc., please see the detailed course descriptions (i.e., the "Yellow Book") by following the appropriate links below.
View the course matrices for SCS Majors:
View the course matrix for SIT Majors:
Cyber Operations courses:
IC210 Intro to Computer Science (3-2-4)
Introduction to algorithmic development, problem solving and software design. Principles and concepts to provide foundational knowledge and experience upon which later computing courses will build.
This is the first course for computer science and information technology majors.
Prereq: None. [fall]Students will:
- Solve problems using the procedural programming paradigm.
- Design, develop source code for, debug, and document programs using structured programming techniques in order to solve problems. Supports Student Outcome 1.
- Determine an appropriate data structure (such as linked lists, arrays) to be used in order to solve problems.
- Understand the legal issues and responsibilities of copyright law with regard to information found on the Internet and its local and global impact on individuals. Supports Student Outcome 4.
IC211 Object-Oriented Programming (2-2-3)
This course builds on the procedural programming skills developed in the prerequisite course and introduces the student to object oriented programming and design principles using Java. Object oriented topics such as classes, inheritance, information hiding, polymorphism and dynamic binding are presented and used to create robust, reusable, and maintainable software. The fundamentals of Java are presented along with exception handling, I/O, event driven programming, simple GUIs and generics.
Prereq: IC210 or SI204. [spring]Students will:
- Understand the fundamentals of object oriented programming.
- Compare and contrast the differences between object oriented and procedural programming.
- Describe the solution to a simple software requirement in terms of UML diagrams.
- Given a problem specification, apply the principles of encapsulation, inheritance, polymorphism and information hiding to design and implement a software solution using Java. Supports Student Outcome 2.
- Demonstrate the appropriate use of public, private and protected members of a class.
- Be proficient in the use of an off-the-shelf Integrated Development Environment (IDE) to construct and debug a multi-class object oriented application in Java.
- Demonstrate the ability to construct and run a Java program from the command line as well as in an IDE.
- Bring data into a program and present results using command line, GUI and file I/O.
- Design and construct a simple GUI consisting of buttons and text fields using Swing.
- Understand the social issues and responsibilities of computer gaming with regard to violence, graphic content and game addition and its local and global impact on individuals.
IC220 Computer Architecture and Organization (3-0-3)
This course introduces students to performance metrics, instruction set architectures, assembly language, logic design, memory hierarchies, and pipelining.
Prereq: IC210 or SI204 [spring]Students will:
- Critically evaluate the performance of computer systems. Supports Student Outcome 3.
- Discuss modern trends and challenges in computer system design.
- Understand how assembly language instructions are represented and executed by a processor.
- Write short, procedural assembly language programs.
- Specify and minimize digital logic. Supports Student Outcome 2.
- Describe how the data path and control work together in a processor to execute a program.
- Describe the memory hierarchy and be able to evaluate strategies for improving its performance.
- Understand the ethical issues and responsibilities of fair use with regard to hardware and software and its local and global impact on organizations.
IC221 Systems Programming (2-2-3)
The study of an application's interface with the operating system. The operating system is treated as an information resource, and as a facilitator for information flow between processes, including those executing on separate machines. Topics include: process management, multiprogramming, and the basic concepts necessary to understand the design and operation of computer communication networks.
Prereq: IC210 or SI204, Coreq: IC220. [spring]Students will:
- Understand the operation of the Unix OS from the user, systems programmer, and application programmer prospective.
- Learn basic operating system security concepts such as those related to file permissions, user group permissions, unintended execution paths. Supports Student Outcome 4.
- Design software on Unix that uses concurrency to solve problems.
- Use a UNIX command shell.
- Navigate and manipulate the UNIX file system from the command-line.
- Build application software using a make utility.
- Write simple shell scripts and configure resource files.
- Understand the security issues and responsibilities of a systems administrator and the consequence of an unsecure system and its local and global impact on an individual and organization.
IC312 Data Structures (3-0-3)
This course examines abstract data types (ADT), data structures, data representation and information management including storage structures, allocation and collection. ADTs and data structures presented include lists, stacks, queues, trees, heaps, priority queues, maps, dictionaries and graphs. Sorting and searching techniques, hashing and graph algorithm analysis are also covered.
Prereq: IC211, Coreq: SM242 [fall]Students will:
- Understand the fundamentals of algorithm analysis (Big-O, Big-Θ, Big-Omega).
- Possess an understanding of the concept of abstraction and be able to describe the idea of separation of implementation and interface.
- Given a problem specification, recognize and apply the canonical ADTs (Lists, Queues, Stacks, Trees, Priority Queues, Dictionaries, and Graphs) appropriate for solving the problem or designing a computer-based system that meets the desired specifications. Supports Student Outcome 1.
- Demonstrate the ability to implement the canonical ADTs with: arrays, linked lists, binary trees, hash tables, balanced trees, and other similar structures. Supports Student Outcome 2.
- Be proficient in defining and coding recursive algorithms, including recognizing when recursive solutions are appropriate.
- Understand the professional issues and responsibilities of a software development and its local and global impact on an organization.
IC322 Computer Networks (2-2-3)
The course presents the fundamental theoretical concepts, characteristics and principles of computer communications and computer networks, and analyzes and assesses these foundational concepts with respect to network performance and network design.
Prereq: IC221, Coreq: SM242. [fall]Students will:
- Employ the principles of analog and digital data transmission, transmission media, coding techniques, and physical communication limits to analyze and design modems and signaling schemes.
- Evaluate the operation and performance of practical data link protocols using the principles of framing, error detection and correction, ARQ and multiple access control.
- Apply the principles of network layer design to the analysis and evaluation of routing algorithms, congestion control techniques, inter networking and addressing.
- Apply the concepts of addressing and address resolution, connection establishment, reliable transport, flow control and congestion control to install a simple client-server network using multiple stations and multiple media types.
- Understand the legal issues and responsibilities of the trade off between the user's privacy and the organization's ownership of the network and its local and global impact on an organization. Supports Student Outcome 4.
IC411 Operating Systems (3-0-3)
The study of the operating system as a resource manager. This course begins with a brief overview of major evolutionary changes in OS design, then explores the interface between the OS and the architecture. It continues with discussions of processes, threads, concurrency, and synchronization, including scheduling and deadlock. Memory, I/O and files, security, and virtualization are also covered.
Prereq: IC220 or SY303, IC221 or SY204, and IC312 or SY301.
- Explain the principles of mutual exclusion and synchronization of running processes.
- Describe and be able to implement strategies for detection, avoidance, and prevention of process deadlock and starvation.
- Be able to solve problems in a multi-threaded programming environment. Supports Student Outcome 1.
- Understand information system vulnerabilities, system level defenses, and information assurance and security principles and practices. Supports Student Outcome 1.
IC470 Software Engineering (2-2-3)
An introduction to the basic principles of software engineering. Structured, object-oriented, and formal approaches are studied, with emphasis on life cycles, object-oriented techniques and team-oriented software development.
Prereq: IC312. [spring]Students will:
- Develop a substantial team-oriented software application using the major aspects of software development: definition/requirements, analysis, planning, design, implementation, testing and deployment. Supports Student Outcome IT-6.
- Understand advanced concepts in O-O analysis, planning, design, implementation, testing and deployment of software
- Collaborate in a team environment. Supports Student Outcome 5.
- Demonstrate effective communication orally and in writing. Supports Student Outcome 3.
- Understand the social and ethical issues and responsibilities of the Software Engineering Code of Ethics and its local and global impact on an organization and society. Supports Student Outcome 4.
IC480 Research Seminar/Capstone (1-4-3)
This is a capstone course that ties together concepts from the information technology and computer science curricula to solve a practical problem. These team-oriented project solutions will include the requirements gathering, analysis, design and development of a computing system involving a large, multi-layer organization using appropriate information management and computing technologies.
Prereq: IC470. [spring]Students will:
- Apply information technology and/or computer science to solve a real-world problem.
- Design and develop a software-based system using current computing technology; including but not limited to databases, web delivery and networked systems.
- Create and maintain an effective project plan using best practices from IT and CS.
- Access, manipulate and display data to aid in effective strategic decision-making.
- Identify and evaluate emerging information technologies and their impact on the global environment.
- Collaborate in a team environment. Supports Student Outcome 5.
- Demonstrate effective communication orally, in writing, and via multimedia. Supports Student Outcome 3.
- Understand the professional issues and responsibilities developing a software package for a client.
- Understand a project’s ethical issues from a societal perspective using the Software Engineering Code of Ethics. Supports Student Outcome 4.
SI200 Information Technology for the Junior Officer (3-2-4)
SI204 Intro to Computer Science (3-2-4)
Introduction to algorithmic development, problem solving and software design. Principles and concepts to provide foundational knowledge and experience upon which later computing courses will build. This course is intended for non-majors or advanced 4/c midshipmen.
Prereq: None. [spring]Students will:
- Solve problems using the procedural programming paradigm.
- Design, develop source code for, debug, and document programs using structured programming techniques in order to solve problems.
- Determine an appropriate data structure (such as linked lists, arrays) to be used in order to solve problems.
- Understand the legal issues and responsibilities of copyright law with regard to information found on the Internet and its local and global impact on individuals.
SI221 Data Structures (2-2-3)
This course examines abstract data types (ADT), data structures, data representation and information management including storage structures, allocation and collection. ADTs and data structures presented include lists, stacks, queues, trees, heaps, priority queues, maps, dictionaries and graphs. Sorting and searching techniques, hashing and graph algorithm analysis are also covered. This course is intended for non-majors.
Prereq: SI204 [fall]
- Understand the fundamentals of time analysis with data structures, such as Big-O.
- Possess an understanding of the more difficult concepts in C++ such as abstraction and the idea of separation of implementation and interface.
- Given a problem specification, recognize and apply the canonical ADTs (such as Lists, Queues, Stacks, and Trees) appropriate for solving the problem or designing a computer-based system that meets the desired specifications.
- Demonstrate the ability to design, describe and implement the canonical ADTs with: arrays, linked lists, binary trees, and other similar structures.
- Be able to code in a professional and technical manner across all course topics.
SI335 Computer Algorithms (3-0-3)
Presents techniques for designing and analyzing computer algorithms including divide and conquer, dynamic programming and greedy methods. Introduces classic algorithms for problems such as searching and sorting, graph analysis, file compression and cryptology.
Prereq: IC312, SI340. [spring]Students will:
- Demonstrate an understanding of a variety of classic standard algorithms.
- Employ a variety of standard techniques to devise efficient algorithms on their own.
- Develop effective written arguments regarding algorithmic performance. Supports Student Outcome 3.
- Compare and analyze the performance of algorithms. Supports Student Outcome CS-6.
- Understand the ethical issues and responsibilities of designing an algorithm that would render modern encryption techniques useless and its local and global impact on society. Supports Student Outcome 4.
SI340 Theory of Computing (3-0-3)
This course presents the theoretical foundations for computing, including the study of formal languages, finite state machines, pushdown automata, Turing machines and computability.
Prereq: IC210 or SI204, Coreq: SM242. [fall]Students will:
- Understand the various models of computation, from both the formal language and the corresponding machine model perspective
- Understand some of the practical applications of these formal models of computation and language
- Apply the mathematical methods that let us describe computation and language in order to understand formal algorithms. Supports Student Outcome CS-6.
SI413 Programming Languages and Implementation (2-2-3)
This course examines basic concepts underlying the design of modern programming languages: types, control structures, abstraction mechanisms, inheritance, concurrency and constructs for programming. This course will include programming assignments in several languages.
Prereq: IC312, SI340. [fall]Students will:
- Understand the evolution of programming languages.
- Solve problems using a functional programming language. Supports Student Outcome CS-6.
- Comprehend the nature and structure of language.
- Describe a variety of garbage collection strategies.
- Describe how object-oriented languages implement inheritance, polymorphism, encapsulation, and data-hiding.
- Demonstrate the use of grammars and parsing.
- Implement a simple interpreter.
- Describe how static, just-in-time, and on-the-fly compilers work.
- Understand the security issues and responsibilities of closed specifications versus open specifications and its local and global impact on an organization.
SI420 Artificial Intelligence (3-0-3)
A study of the fundamental concepts and techniques in the design and implementation of functionally intelligent machines. Topics include problem-solving using state-space search, game trees, state and plan space planning, and machine learning.
Prereq: SM242 and (IC312 or SY303)
SI425 Natural Language Processing (2-2-3)
This course introduces students to Natural Language Processing, a subfield within Artificial Intelligence that studies how computers can understand human languages. This course covers algorithms to learn and interpret languages like English. It is a hands-on lab course covering topics like author identification, language modeling, information retrieval from huge datasets, email filtering, syntactic parsing, and sentiment analysis.
- Design and implement language models with smoothing for unseen words.
- Discuss the key components of a probabilistic parser.
- Understand basic English syntax and its use in NLP applications.
- Describe the difference between Naive Bayes and log-linear algorithms.
- Design and implement probabilistic document classifiers.
- Describe basic learning algorithms that use bootstrapping techniques.
SI460 Computer Graphics (2-2-3)
An introductory course focusing on developing applications around various methods of visualizing data. Emphasis will be on 2D/3D graphics and data visualization. Topics include processing and modeling data, image manipulation, and building interactive 2D/3D OpenGL based applications.
Prereq: IC312 [fall]
SI475 Intelligent Robotics (2-2-3)
This course presents a survey of the concepts and theories of modern robot systems, including both manipulators and mobile robots. It covers kinematics, sensing, mapping and navigation, decision making, and learning. Concepts are applied on multiple robotic platforms.
Prereq: IC211 and (IC312 or SY301) [spring]
IT350 Web & Internet Programming (2-2-3)
Web site design and management, clients and servers, client and server side scripting languages, web transmission protocols.
Prereq: IC210 or SI204. [fall]Students will:
- Successfully complete team-based projects.
- Explain how the client-server model of Internet programming works.
- Design and develop interactive, client-side, executable web applications.
- Design and develop server-side web applications.
- Comprehend and describe the importance of web standards.
- Compare the advantages and disadvantages of the core Internet protocols.
- Understand the social issues and responsibilities of customizing online messages and advertising and its local and global impact on society. Supports Student Outcome 4.
IT360 Applied Database Systems (2-2-3)
This course introduces the principles underlying Database Management Systems (DBMS) with a special emphasis on database management system structure and function when integrated with web-based database applications. Note: students MAY take both IT360 and SI440 for credit.
Prereq: IC312, IT350. [spring]Students will:
- Design, create, and query relational databases to satisfy user requirements.
- Design, build and deploy database-backed applications with dynamic website front-end. Supports Student Outcome IT-6.
- Implement data access control mechanisms for database and application security.
- Explain the main functionality provided by modern database management systems: transactions, concurrency control, crash recovery.
- Understand the ethical issues and responsibilities of records management and its impact on privacy, discrimination, etc. and its local and global impact on society.
IT430 Computer and Network Security (2-2-3)
This course is an introduction to the theoretical and practical facets of Computer Security to include: Department of Defense (DoD)/Department of the Navy (DoN) policies and directives, Trusted systems, Access mediation, Cryptography, Public Key Infrastructure (PKI), Information Warfare, Network security and Database security. Laboratory work will include student exercises demonstrating information assurance concepts culminating in a vulnerability analysis of given systems.
Prereq: IC322. [spring]Students will:
- Understand and apply principles and best practices of computer and communications security.
- Analyze network security vulnerabilities and apply appropriate defensive mechanisms.
- Understand cryptographic principles and the implications of their use in computer and network security.
- Analyze ethical, legal, social and professional issues relevant to information assurance
- Demonstrate the ability to work in teams in an integrated approach. Supports Student Outcome 3.
- Understand the security issues and responsibilities of freely available hacker tools and its local and global impact on organizations.
IT432 Advanced Computer and Network Security (2-2-3)
This course provides an introduction to topics in secure system design, including: cryptography, operating system security, and language based security. Where the IT430 course focuses primarily on securing an existing system, this course studies how to design a system to meet security goals. Students will design and implement components of a secure system.
Prereq: IT430. [fall]Students will:
- Understand and apply system security techniques to system design problems.
- Analyze operating systems and program security vulnerabilities and apply appropriate defensive mechanisms.
- Understand cryptographic algorithms and the implications of their use in computer and network security.
- Analyze ethical, legal, social and professional issues relevant to information assurance.
IT452 Advanced Web and Internet Systems (2-2-3)
Web server design and configuration, search engine design and usage,web security and authentication, servlet implementations, web collaboration mechanisms, web services, and knowledge representation on the web.
Prereq: IT350. [fall, spring]Students will:
- Design and implement a dynamic servlet program.
- Select and utilize appropriate web collaboration systems.
- Describe the basic operation of modern search engines.
- Explain and select among different kinds of web security mechanisms.
- Identify and invoke relevant web services to accomplish an information need.
- Assess privacy and security issues related to the remote network storage and retrieval of documents and communications.
IT460 Human Computer Interaction (2-2-3)
An introductory course emphasizing interactive software design, development and evaluation using a human-centered approach. Topics include aspects of human sensation, perception and cognitive psychology.
Prereq: IC312 or IT350. [fall, spring]Students will:
- Understand the scope of issues affecting human-computer interaction (HCI).
- Understand some of the physiological, perceptual and cognitive bases for good user-interface design.
- Design a graphical user-interface and use a UI API to implement a prototype.
- Evaluate a user-interface using techniques such as observation, survey, and experiments.
- Participate in discussions of situations involving ethical dilemmas related to HCI.
IT462 Advanced Database Systems (2-2-3)
This course will discuss advanced issues in database systems, including parallel, distributed and peer-to-peer databases, data warehousing and data mining, XML and service-oriented architectures. The course incorporates hands-on exercises using commercial database systems and products, as well as a web-database project.
Prereq: IT360 or SI440. [fall, spring]Students will:
- Apply data warehousing and data mining technologies to decision support.
- Illustrate and explain the use of client-server architecture for distributed database systems.
- Compare the basic concepts, data modeling and architectures between relational, object-oriented, and object-relational databases.
- Design and implement database-backed websites using a service-oriented architecture.
- Analyze ethical and legal issues related to peer-to-peer systems.
IT470 Enterprise Computing (2-2-3)
This course develops architectures and concepts for the development of multi-tier (typically 3 tiered) distributed applications for an entire organization or enterprise. This includes a user interface called the client tier or tier 1, a server component which is controlled by the organization and provides for interaction with and data collection from the user (tier 2) and a database component that stores transactions and updates client profiles (tier 3). The course teaches advanced techniques for network programming as well as server management and programming.
Prereq: IC322 and IT360. [fall, spring]Students will:
- Explain the basic principles of distributes applications and distributed databases.
- Understand the evolution of the application integration and interoperability.
- Examine the critical elements involved in application integration, including middleware and components.
- Manage the impact of changes in information systems on the user.
- Design and implement an application integration environment.
- Analyze the role of and reasons for using commercial off-the shelf (COTS) software products as an alternative to custom-developed solutions.
- Appraise the fundamental criticality of system integration in the emerging Electronic Business environment.
- Analyze the social impact of enterprise information systems.
IT472 Mobile OS Development (2-2-3)
This course teaches students how to write software for mobile devices while reinforcing the principles of good object-oriented software development. To that end, this course covers all the necessary topics required for writing Android applications. It applies the fundamentals of object-oriented programming using Java. Students become well versed in XML, the Android Software Development Kit, the Android Studio IDE, Android application components and features, and many other topics of interest.
- Apply the principles of Object Oriented programming in the development of software for mobile devices.
- Understand how code is organized in an Android application, the purpose of each part and their relationship with each other.
- Demonstrate an understanding of the major components of Android applications, including Views, Activities, Services, Intents and Receivers.
- Design, develop and debug mobile applications for the Android operating system.
- Understand the security concerns unique to mobile devices.
SY301 Data Structures for Cyber Operations (3-2-4)
This course covers many of the topics of a traditional Data Structures class, but with a focus on cyber operations. Students will learn how to design programs in an object-oriented fashion, and use this approach in implementing a variety of standard data structures. Students will also develop a theoretical understanding of software complexity, covering abstract data types and basic run-time complexity analysis. They will explore how complexity in representation enables more sophisticated software, but also creates complex vulnerabilities. Examples will segue into the Web and Database course.
Prereq: SY204 [fall]
SY306 Web and Databases for Cyber Operations (2-2-3)
The course covers basic web-based application development with a database back-end, with a focus on security. Topics include client side and server side web applications development, the SQL language for relational databases, web authentication, secure web protocols, attack and defense of web-based applications with a database back-end.
Prereq: SY301 [spring]
- Develop static and interactive client-side web applications.
- Query relational databases to satisfy user requirements.
- Develop database-backed web applications, for a given database.
- Implement data access control mechanisms for database security.
- Implement application-level security measures to prevent unauthorized access to data.
- Understand the principles of common web-based attacks such as cross-site scripting, cross site request forgery, SQL injections.
SY308 Security Fundamental Principles (3-0-3)
This course will cover the fundamental principles in security: cryptography, identity, and access control. Topics will include symmetric encryption, public key encryption, RSA, Steganography, man-in-the-middle attacks, digital signatures, JVM and signed code, open SSL, block cypher modes, hashing, white and black lists, X.509 certificates, CAC cards, challenge/response authentication, multi-factor authentication, password cracking, salt, replay attacks, and message authentication codes.
Prereq: SY202 [spring]
SY402 Cyber Operations II (2-2-3)
A defensive Cyber Operations course focusing on protecting our networks, hosts, and infrastructure, with emphasis on detecting intrusions on networked devices and servers. Topics include understanding large scale network design, defining risks to both networks and data, and signature and anomaly based detection systems.
Prereq: SY401 [spring]