Network equipment and system, such as Web proxies, firewalls, intrusion detection systems, routers and even switches, provides data sources that contain evidence that can be used to solve a security incident. You will first learn how these equipment and systems are typically used to implement network security in an organization. Subsequently, you will learn how to monitor, capture and analyses traffics and logs from the different network data sources to understand attacks and trace suspect activities.
- Teacher: Sokroeurn Ang
This course is an introduction to multi-user, multi-tasking operating systems and networked operating systems. Specifically, this course will cover the Linux operating system. Students will cover a wide variety of topics including installation procedures, security issues, back-up procedures and remote access. Command line and graphical operating systems will also be covered. Students will also attach peripherals and download and install software drivers. Students will learn how to set up a full-blown Internet server including: samba, DNS, Mail, web, firewall, and more.
- Teacher: Sokroeurn Ang
This course teaches students how to develop Java applications. Topics covered include the Java programming language syntax, OOP programming using Java, exception handling, file input/output, threads, collection classes, and networking. Students will develop and test Java applications (typically) using Eclipse. This course is a pre-requisite to all Application Server courses, and specialty Java Technology courses such as Struts, Spring, and Hibernate.
- Teacher: Mony HO
A database system is a term that is typically used to encapsulate the constructs of a data model, database Management system (DBMS) and database.
A database is an organized pool of logically-related data. Data is stored within the data structures of the database. A DBMS is a suite of computer software providing the interface between users and a database or databases. A DBMS is a shell which surrounds a database or series of databases and through which all interactions take place with the database. The interactions catered for by most existing DBMS fall into 4 main groups:
- Data Definition. Defining new data structures for a database, removing data structures from the database, modifying the structure of existing data.
- Data Maintenance. Inserting new data into existing data structures, updating data in existing data structures, deleting data from existing data structures.
- Data Retrieval. Querying existing data by end-users and extracting data for use by application programs.
- Data Control. Creating and monitoring users of the database, restricting access to data in the database and monitoring the performance of databases.
Both a database and its DBMS conform to the principles of a particular data model. Data models include the hierarchical data model, the network data model, the relational data model and the object-oriented data model.
- Teacher: Virak Thach
This subject introduces you to an object oriented programming. An object-oriented programming language is used to teach object-oriented concepts. The subject aims to help you learn the principles and rationale behind an object-oriented approach to programming. It also intends to help you learn how to develop object oriented applications using an object-oriented programming language to connect a databases and cross database....
- Teacher: Cheapheng Lim