Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Other

Computer Science and Information Technology Ancillary Materials

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Python Practice Assignments For Computer Science I, Hyrum Carroll, Hillary Fleenor Oct 2019

Python Practice Assignments For Computer Science I, Hyrum Carroll, Hillary Fleenor

Computer Science and Information Technology Ancillary Materials

This set of practice assignments for Computer Science 1 were created under a Round Twelve Mini-Grant for Ancillary Materials Creation and Revision.

The assignments use the Python coding language and the repl.it coding platform and cover the following topics:

  • Modules;
  • Functions;
  • Selections;
  • Loops;
  • Strings;
  • Lists;
  • Files;
  • Dictionaries.


Internet Of Things (Open Course), Rebecca Rutherfoord, Susan Vandeven, Guangzhi Zheng, Hossain Shahriar, Xin Tian Oct 2019

Internet Of Things (Open Course), Rebecca Rutherfoord, Susan Vandeven, Guangzhi Zheng, Hossain Shahriar, Xin Tian

Computer Science and Information Technology Ancillary Materials

This open course for Internet of Things was created through a Round 13 Affordable Materials Grant.


Ethical Hacking For Effective Defense (Modules, Labs, And Lectures), Hossain Shahriar Jul 2019

Ethical Hacking For Effective Defense (Modules, Labs, And Lectures), Hossain Shahriar

Computer Science and Information Technology Ancillary Materials

Summer 2019 Update: Through a Round Twelve ALG Mini-Grant for Ancillary Materials Creation and Revision, five new modules have been added to this collection:

  • Enumeration with Sparta
  • Enumeration with Inguma
  • Hacking Web Servers with Dirbuster
  • Hacking Web Servers with Skipfish
  • Hacking Wireless and IoT with Bluehydra

The following set of materials is used in the Textbook Transformation Grants implementation of Ethical Hacking for Effective Defense:

https://oer.galileo.usg.edu/compsci-collections/8/

Topics include:

  • TCP/IP Level Attacks
  • Port Scanning
  • DDoS
  • Footprinting and Social Engineering
  • Enumeration
  • Programming for Security Professionals
  • Operating System Vulnerabilities
  • Embedded System Security
  • Hacking Web Servers
  • Hacking Wireless Networks
  • Cryptography
  • Protecting Networks with …


Data Visualization Assignments For Principles Of Information Technology Management (Csu), Jennifer Pitts Apr 2019

Data Visualization Assignments For Principles Of Information Technology Management (Csu), Jennifer Pitts

Computer Science and Information Technology Ancillary Materials

This set of ancillary materials for Principles of Information Technology Management was created under a Round Eleven Mini-Grant for Ancillary Materials Creation and Revision. The skills covered in these lessons, using the Tableau data visualization and analysis tool, include:

  • Instructor information for installing Tableau
  • Dashboard creation
  • Worksheet creation
  • Data segmentation and analysis
  • Geographic data visualization