The course will provide an opportunity for students to establish or advance their understanding of research through critical exploration of research language, ethics, and approaches. The course introduces the language of research, ethical principles and challenges, and the elements of the research process within quantitative, qualitative, and mixed methods approaches. Participants will use these theoretical underpinnings to begin to critically review literature relevant to their field or interests and determine how research findings are useful in forming their understanding of their work, social, local and global environment. The course also introduces the set of technologies useful for research activities, to support it, improve it and create a strong foundation.


This course continues previous networking courses and covers the skills and  knowledge necessary to install, operate, and troubleshoot a small branch office  enterprise network, including configuring a switch, a router, connecting to a WAN  and implementing network security. This course will set students up for Cisco  CCNA. Topics include TCP/IP models and protocols; LANs and Ethernet;  running Cisco IOS; VLANs and trunks; IP addressing and subnetting; packet  delivery; static and dynamic routing; DHCP and NAT; network security; WANs,  IPv6.

This course introduces students to the principles, models, and algorithms for planning and search under uncertainty in Artificial Intelligence (AI). It explores how uncertainty arises in decision-making, how it can be modeled using probabilistic frameworks such as Markov Decision Processes (MDPs) and Partially Observable MDPs (POMDPs), and how AI systems can make robust, adaptive choices in dynamic and noisy environments. Students will learn theoretical foundations as well as practical methods for applying these concepts in real-world contexts, such as robotics, game AI, and autonomous systems. The course emphasizes hands-on practice with no-code and low-code tools for modeling, simulation, and experimentation.


Advanced Cloud Technology is an 8-module course designed as a continuation of CIT-382, delving deeper into cloud resource management and automation using Microsoft Azure. This course emphasizes hands-on learning, focusing on creating and managing virtual resources through the Azure Portal, PowerShell, and Azure CLI. Students will gain advanced skills in creating and configuring virtual machines, virtual networks, and storage accounts using multiple tools for maximum versatility.


This Course is designed to give students practical knowledge about designing cloud native system with the fundamental building block of Cloud Computing, such as Virtual Machines and Containers. Students will also understand an uses different cloud service models (IaaS, PaaS, SaaS) and deployment models (Public, Private, Hybrid) and the key components of a cloud infrastructure (VMs, Networking, Storage - File, Block, Object, CDN), gaining the foundational knowledge required for understanding cloud computing from a business perspective as also for becoming a cloud practitioner, introduce you to some of the prominent service providers of our times (e.g. AZURE,AWS, Google, IBM, Microsoft, etc.) the services they offer, and look at some case studies of cloud computing across industry verticals.-



This course is designed to provide students with practical experience in deploying, managing, and securing enterprise-grade solutions on Google Cloud Platform (GCP). This intensive four-week program prepares students for the Google Cloud Associate Cloud Engineer (ACE) certification while developing job-ready cloud engineering skills.

In this course, students will begin by understanding the basics of Ethical Hacking, using Khali Linux they will learn the required command line essentials, Linux File and system structure, proxy chains, information gathering, vulnerability analysis, wireless attacks (aircrack-ng), DNS, web reconnaissance, TCP, UDP, connections, file transfer protocols: ftp, http, telnet. faraday, password attacks (crunch, john, bash bunny) 

This course is designed to teach entry to mid-level security practitioners how to engage all functional levels within the enterprise to deliver information system security. To this end, the course addresses a range of topics, each of which is vital to securing the modern enterprise. These topics include inter alia plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity. Each piece of the puzzle must be in place for the enterprise to achieve its security goals; adversaries will invariably find and exploit weak links.

The Data Structures course is designed to introduce students to the fundamental concepts of data structures and algorithms using the Python programming language. This course aims to provide students with a solid understanding of various data structures and their practical implementation in Python. Throughout the course, students will explore collections such as arrays, linked structures, stacks, queues, lists, trees, sets, dictionaries, and graphs, while also delving into important topics such as searching, sorting, complexity analysis, and algorithmic strategies.


To provide a working knowledge of the hardware and architecture of a computer system, particularly focusing on aspects such as memory hierarchy, cache coherence and multi-threaded hardware support that affect a full understanding of how to write multi-threaded software. This is a practical course, grounded in a theoretical understanding of concurrency and the problems and benefits it brings. We will use multi-threaded Java and provide an understanding of how to apply appropriate concurrency control primitives where there is simultaneous access to shared resources.