Advanced Topics in Computer Science
Introduction to Algorithms56Divide-and-Conquer Algorithms55Dynamic Programming50Greedy Algorithms53NP-Completeness50Arrays and Linked Lists50Stacks and Queues53Trees54Hash Tables53Graphs57Object-Oriented Concepts56Java Programming52Design Patterns59Software Engineering54Cloud Computing52Introduction to AI51Machine Learning50Natural Language Processing55Computer Vision58Robotics57Research Design56Data Collection and Analysis51Scientific Writing59Ethics in Research49Research Project52
Advanced Software Engineering
Overview of Advanced Software Engineering Concepts51Current Trends and Challenges in Software Engineering59Research Methods in Software Engineering53Architectural Patterns and Styles53Software Design Principles and Best Practices55Design Patterns for Object-Oriented Software45Software Quality Assurance Techniques57Software Testing Methods and Tools58Agile Testing and Continuous Integration50Cloud Computing and Software Engineering54Big Data and Software Engineering53Artificial Intelligence and Software Engineering50
Artificial Intelligence
Definition and History of AI50Types of AI56Applications of AI58Supervised Learning57Unsupervised Learning53Deep Learning43Text Preprocessing54Natural Language Understanding53Natural Language Generation51Image Processing58Object Detection and Recognition59Video Analysis51Robot Kinematics and Dynamics55Robot Control50Robot Navigation and Planning54Ethical Considerations in AI55Social Impact of AI52AI Policy and Regulation50
Computer Security
Definition and Scope of Computer Security57Security Principles and Models50Risk Management and Security Assessment53Symmetric and Asymmetric Encryption51Hash Functions and Digital Signatures57Network Security Protocols52Operating System Security51Application Security53Cloud Security53Security Policies and Standards51Incident Response and Disaster Recovery58Security Auditing and Compliance50
Machine Learning
Overview of Machine Learning55Machine Learning Process56Ethical Considerations in Machine Learning50Linear Regression50Logistic Regression52Decision Trees50Support Vector Machines52Clustering50Dimensionality Reduction59Association Rule Mining54Neural Networks52Convolutional Neural Networks (CNNs)57Recurrent Neural Networks (RNNs)53Natural Language Processing53Computer Vision58Healthcare57
Advanced Database Systems
Overview of Advanced Database Systems50Data Modeling for Advanced Database Systems51Database Design for Advanced Database Systems43Database Performance Tuning56Database Security and Recovery54Database Administration Tools and Techniques53NoSQL Databases58Big Data and Data Warehousing52Cloud Databases52Artificial Intelligence and Machine Learning in Database Systems53Blockchain and Distributed Ledger Technologies53Quantum Computing and Database Systems54
Advanced Operating Systems
Overview of Operating Systems57Operating System Architectures50Process Management57Memory Management56File Systems56Concurrency and Parallelism53Distributed Operating Systems53Real-Time Operating Systems57Embedded Operating Systems56Operating System Security50Operating System Virtualization51Cloud Computing and Operating Systems52Emerging Operating System Trends51Operating System Design and Implementation52Operating System Performance Evaluation50
Cloud Computing
Introduction to Cloud Computing50Cloud Service Models53Cloud Deployment Models54Cloud Security51Virtualization and Containers59Cloud Storage51Cloud Networking55Cloud Monitoring and Management57Cloud Providers and Platforms53Cloud Databases55Cloud Analytics and Big Data53Cloud Artificial Intelligence and Machine Learning36Cloud Application Design59Cloud Development Tools and Technologies51Cloud Application Deployment and Management54Cloud DevOps and Continuous Integration57Emerging Cloud Technologies47Cloud Computing and Sustainability52Cloud Computing and the Future of Work46
Computer Networks
Overview of Computer Networks57Network Models55Network Protocols56Data Link Layer Concepts52Ethernet56Wireless LANs57Network Layer Concepts54Routing Protocols57Network Address Translation (NAT)54Transport Layer Concepts55Flow Control and Error Control54Application Layer Protocols59Network Security Concepts50Firewalls and Intrusion Detection Systems (IDS)53Virtual Private Networks (VPNs)55Network Management Concepts50Network Management Tools54Network Troubleshooting58
Data Analytics
Definition and Overview of Data Analytics52Data Types and Structures56Data Collection and Preprocessing52Descriptive Statistics52Inferential Statistics56Time Series Analysis55Supervised Learning56Unsupervised Learning56Model Evaluation and Selection58Data Visualization Techniques56Data Storytelling and Communication56Data Privacy and Security55Bias and Fairness in Data Analytics56
Database Systems
Overview of Database Systems52Database Design Principles56SQL Fundamentals54Entity-Relationship Modeling53Normalization52Data Warehousing and Business Intelligence51Database Security and Access Control55Database Performance Tuning51Database Backup and Recovery51NoSQL Databases55Big Data Analytics51Cloud-Based Database Systems25
Distributed Systems
Definition and Characteristics of Distributed Systems24Types of Distributed Systems55Challenges in Distributed Systems50Client-Server Architecture59Peer-to-Peer Architecture54Cloud-Based Architectures48Interprocess Communication54Network Protocols59Distributed Consensus56Data Consistency and Replication52Distributed Databases57Distributed File Systems50Fault Tolerance Techniques57High Availability and Disaster Recovery51Security in Distributed Systems57
Network Security
Definition and Scope of Network Security56Security Threats and Attacks54Security Controls and Mechanisms57Secure Socket Layer (SSL) and Transport Layer Security (TLS)51IP Security (IPsec)55Virtual Private Networks (VPNs)55Security Policy and Risk Management53Security Monitoring and Incident Detection50Security Auditing and Compliance51Cloud Security52Mobile Device Security58Emerging Trends in Network Security53
Operating Systems
Definition and Concepts of Operating Systems57Operating System Structures58Operating System Services51Process Scheduling56Process Synchronization54Deadlock Management43Memory Allocation Techniques53Virtual Memory53Memory Protection53File System Structures51File System Implementation55File System Recovery56Device Management50Disk Scheduling54Network Management58Security Threats and Vulnerabilities56Security Mechanisms54Security Best Practices59Linux Operating System50Windows Operating System54Real-Time Operating Systems54
Advanced Algorithms
Algorithm Design Paradigms50Analysis of Algorithms50Data Structures for Advanced Algorithms52Graph Traversal and Connectivity50Shortest Paths and Network Flows54Planar Graphs and Graph Coloring51String Matching57Regular Expressions and Automata51String Compression and Bioinformatics52Convex Hulls and Voronoi Diagrams54Range Trees and k-d Trees55Geometric Algorithms for Graphs52Greedy and Local Search Algorithms54Approximation Schemes and Hardness of Approximation54Applications of Approximation Algorithms39
Advanced Networking
Overview of Advanced Networking54Networking Models and Architectures51Network Security Concepts52Routing Protocols51Switching Technologies52Network Optimization47Network Management Systems57Network Monitoring Techniques53Network Security Management51Software-Defined Networking (SDN)50Network Function Virtualization (NFV)515G and Beyond54
Computer Graphics
Overview of Computer Graphics50Graphics Hardware57Graphics Software582D and 3D Geometric Primitives52Geometric Transformations50Modeling Techniques56Fundamentals of Shading50Lighting Models52Global Illumination57Keyframe Animation50Procedural Animation55Motion Capture58Virtual Reality and Augmented Reality31Computer Vision54Computational Photography57
Human-Computer Interaction
Definition and Scope of HCI51History and Evolution of HCI56User-Centered Design Principles58Human Perception and Cognition56Human Error and Safety52Accessibility and Inclusive Design56Interaction Design Principles51Prototyping and Evaluation Techniques55User Interface Design Patterns53Information Architecture Principles50Navigation Design and Usability53Search and Information Retrieval56Mobile HCI and Context-Aware Computing51Wearable and Augmented Reality Technologies56Social Computing and Collaboration52HCI Evaluation Methods51Research Methods in HCI58Ethical Considerations in HCI Research52
Mobile Computing
Overview of Mobile Computing50Mobile Operating Systems56Mobile Networks and Protocols55Android Application Development52iOS Application Development52Cross-Platform Mobile Development56Cloud Computing for Mobile Devices50Mobile Cloud Application Development50Mobile Edge Computing54Mobile Security Threats49Mobile Security Measures56Mobile Privacy Concerns505G and Mobile Computing57Artificial Intelligence in Mobile Computing53Internet of Things and Mobile Computing50
Natural Language Processing
Overview of NLP58Natural Language Understanding55Natural Language Generation50Supervised Learning for NLP51Unsupervised Learning for NLP53Deep Learning for NLP51Text Classification51Machine Translation37Information Extraction52Question Answering58Chatbots and Conversational AI58Neural Machine Translation58Generative Language Models50Multilingual NLP57Ethical Considerations in NLP54
Advanced Computer Architecture
Overview of Advanced Computer Architecture57Instruction Set Architectures52Pipelining53Cache Memory51Virtual Memory58Solid State Drives (SSDs)59Symmetric Multiprocessors (SMPs)56Non-Uniform Memory Access (NUMA) Architectures48Cluster Computing43Quantum Computing53Neuromorphic Computing59Energy-Efficient Computing54
Bioinformatics
What is Bioinformatics?51History and Evolution of Bioinformatics44Data Management in Bioinformatics57DNA and Protein Sequences56Sequence Alignment55Sequence Assembly52Genome Structure and Organization48Comparative Genomics57Genome Evolution53RNA Structure and Function52RNA Sequencing and Analysis51Gene Regulation53Protein Structure and Function50Proteomics Techniques53Protein Function Prediction59Bioinformatics Software and Databases56Bioinformatics Pipelines58Cloud Computing in Bioinformatics52
Formal Methods
What are Formal Methods?54Formal Specification Languages52Introduction to Model Checking54Model Checking Tools52Introduction to Theorem Proving53Theorem Proving Tools51Introduction to Abstract Interpretation51Abstract Interpretation Tools51Formal Methods in Software Engineering54Formal Methods in Hardware Design52
Information Retrieval
Overview of Information Retrieval54The Retrieval Process57Evaluation of Information Retrieval Systems55Inverted Indexes51Vector Space Model57Relevance Feedback52Tokenization and Stemming56Stop Words and Thesaurus52Natural Language Processing58Web Search53Multimedia Retrieval59Information Extraction54