Available courses

The word leader first appeared in the English language in the 1300s, coming from the root word leden meaning 'to travel' or 'to show the way'.
Increasingly unpredictable environments now require teamwork and leadership skills in one’s career than ever before. The objective of this course is to provide a thorough familiarity with the literature on leadership (both theory and practice) as well as to take part in a transformative learning experience. This course focuses on leadership skills, leadership development, team building and team leadership. The course requires personal curiosity and reflection, openness and sharing in class discussions. Through self-evaluation and team-building exercises, students will monitor and enhance their own leadership and team-building skills relevant to building relationships and creating positive change. 

The purpose of the course is to provide students with conceptual and practical skills to develop web-enabled database applications and database management systems in organizations.

Course Purpose


The purpose of this course is to provide an understanding and application of system analysis and design processes. Students evaluate and choose appropriate system development methodologies and design a system.


Expected Learning Outcomes


On completion of this course students are expected to:

  1. Explain the key issues in systems analysis and design in the modern, real-world context.

  1. Identify the information and processing need of the organization and know how to analyze an existing information system.

  2. Develop process models, data models and use case models for an information system.

  3. Be able to produce a structured system specification for a simple system from system analysis.


Course Content


Introduction to systems analysis and design; project initiation and management, and requirements determination; analysis modeling: functional modeling, structural modeling, and behavioral modeling; design modeling: moving on to design, class and method design, data management, layer design, human computer interaction layer design, physical architecture layer design; construction, installation, and operations of IT services systems.



Course Description

The contemporary business world demands an understanding of research methods and an ability to apply research skills to a wide range of business problems. This course provides a framework to solve research problems, interpret research, and understand the interaction among the various parts of the research process. It combines both practical and theoretical approaches to the design and execution of research. The course is structured so that students will learn how to develop a research proposal and how to design, conduct, and evaluate research studies. In the end, you will produce a research proposal that represents the culmination of the study experience.

Organizational behavior is a field of study that seeks to understand, explain, and improve human behavior in organizations. Most organizations focus their efforts on improving two aspects of human behavior: (1) job performance—the degree to which individuals perform the behaviors needed for the organization to achieve its goals; and (2) organizational commitment—the degree to which employees remain loyal to the organization rather than seeking employment elsewhere. Through research, cases and assignments, this course will guide you to understand and apply OB concepts to improve the effective functioning of your organisational unit.

The purpose of this course is to introduce and illuminate the range of ethical issues confronting managers, employees and institutions in today’s society. It is designed to stimulate thinking on ethical issues and professional challenges encountered in organizations and to provide plausible frameworks for dealing with those conflicts through the lens of Christian values.My primary goal as your professor is to help you become thinkers and informed citizens who can use what you learn in school to benefit yourselves, organizations, and society. I want you to gain critical thinking skills and become better managers and communicators. As a result, I try to create exams, assignments, and activities that (1) test your knowledge of the material, (2) ask you to apply the theory or concept to specific situations, and (3) ask you to integrate ideas so that critical thinking skills are developed.

I want my courses to be an exciting class. My definition of “exciting” is one where motivated students read the assignment, do their homework, make logical arguments, integrate course concepts into their discussions, and actively participate in class discussions.

 By means of lecture, readings, class discussion, application projects, group presentations and case studies, this course will enable students to recognize ethical issues as they arise and formulate their own standards of integrity and professionalism.

This capstone course deals with the process of strategic management. Strategic management deals with decisions that fundamentally influence the direction of the organization and effective implementation of the direction chosen. The center of attention is the total organization—the industry and competitive environment in which it operates, its long-term direction and strategy, its resources and competitive capabilities, and its prospects for success. A variety of experiential methods are used, including case studies, work sheets/assessments and a strategic project on an existing organization. Students are required to enroll in this course during their last semester.

This course is in twofold: This first part of the course analyzes the forces that drive organizations to change, examines impediments to change, and surveys a range of approaches for making organizational change more effective. The second part of the course details the thinking and planning that is essential to managing and communicating during an organizational crisis.

The purpose of this course is to expose and enlighten students on biblical leadership principles and practices in contrast to the secular leadership principles in society at large. This course will also review a leadership approach that will be referred to as Last Day Leadership; a leadership approach that views leadership from a Seventh-day Adventist perspective using the Bible and the Spirit of Prophecy as the baseline foundation. Generally, the course will be constructed around biblical narratives and characters who demonstrated successful and unsuccessful leadership traits. Emphasis is placed on highlighting concepts and principles that inform effective leadership traits that accomplish spiritual goals and objectives according to God’s divine economy.


This is a 'dummy' course set up for the specific purpose of training.  Faculty can find in this course, templates on how to set up their respective courses in the School of postgraduate studies. 

History of the Seventh-day Adventist Church in Africa (CHIS 678) explores the Seventh-day Adventist movement in Sub-Saharan Africa from the 1850s to the present day. As a background, the first two class sessions will trace the history of Christianity in Africa, from the first century AD, through the Middle Ages and Protestant Reformation, and to the Second Great Awakening. The other eight sessions will explore the origins of the Seventh-day Adventist message in Africa; significant indigenous believers and ministers; important foreign missionaries; the means of the expansion of the message; early Adventist institutions; the organization and development of church administrative structures; the church’s impact on local societies; missional challenges unique to the African setting; the assumption of African leadership; the decades of evangelism from the 1970s onward that have resulted in world church membership being approximately one-third African; the church’s engagement with regional and national politics; and the impact of African Adventists on the global church and the world.   


A formal introduction to the steps and tools for exegesis of the Hebrew text, including practice in the exegesis of selected passages of the Hebrew Bible and the writing of an exegesis paper.

Purpose of the Course

The overall objective of the course is to prepare student to conduct a research work, publish and present his/her results. It provides students with knowledge and skills needed to conduct a research work, and make publications in the arena of computer science and related domains. It enables students to have a clear grasp on what exactly is good research and how to achieve it. The course also explores the role of research methods in computer science, and teaches some writing tools peculiar to computing publications.

Expected Learning Outcomes of the Course

Upon completion of the course, the student should be able to:

1.     Describe and explain the scientific method,

2.     List and explain the peculiarities of research in computer science,

3.     List, describe and explain the different types of research methods and differences between them,

4.     Understand the peer review process,

5.     List and describe the different means of dissemination,

6.     Explain the process of making a good research,

7.     Evaluate the quality of research works and publications in computer science.

8.     Use Latex and Bibtex for writing articles, thesis and books,

9.     Write and make good presentations of his research work,

10.  Write workshop papers outlining research ideas, posters for conferences, abstracts, articles for conferences and journals,

11.  Make research thesis proposal for a given field of interest,

12.  Defend his research work before experts in the area,

13.  Have a good relationship with supervisor/reader. 

 

Course Content

Chapter 1: Definition and process of scientific research

Chapter 2: Peculiarities of research in computer science

Chapter 3: Taxonomy of research methods in computer science

Chapter 4: Dissemination and peer review process

Chapter 5: Process for good research

Chapter 6: Guidelines on making a thesis proposal

Chapter 7: Latex and Bibtex Tools for writing

Chapter 8: Guidelines for presenting research work and publications.

Chapter 9: Understanding Student/Supervisor Relationships

 

Mode of Delivery

  1. Lectures
  2. Media-enhanced Video presentations
  3. Group discussions
  4. Reading / Writing Assignments
  5. Tutorials

 

Course Assessment

The final grade will be evaluated on the following basis

1. Quizzes / Class Tests / Assignments                           20%

2. Exams (Mid and Final Semester Examinations)          40%

3. Reading / Writing and Publications                             40%

 

Instructional Materials

1.     Textbooks

2.     LCD Projector

3.     Lecture Notes

4.     LMS (Moodle) resources

 

Core Reading Materials for the course

1.     Justin Zobel, Writing for Computer Science, 3rd Edition, Springer, 2014, http://www.cse.chalmers.se/edu/year/2015/course/DAT147/Zobel%20-%20Writing%20for%20computer%20science%203rd%20edition.pdf

 

2.     Gordana Dodig - Crnkovic, Theory of Science, gordana.dodig-crnkovic@mdh.se

 

Recommended Reference Materials

1.     Berndtsson, M. Hansson, Olsson, and co, Thesis Projects : A Guide for Students in Computer Science and Informations Systems, Springer, 2008, http://www.springer.com/978-1-84800-008-7

2.     R. Andonie and I. Dzitac, How to write a good paper in computer science and how will it be measured by ISI Web knowledge, International Journal of Computers, Communications and Control, vol. V, No. 4, 2010.

3.     http://www.mrtc.mdh.se/publications/0446.pdf

4.     http://www.cs.iastate.edu/~honavar/research-methods-workshop.html


Purpose of the Course

The aim of the course is to provide the student with all the knowledge and understanding of the   mathematical background used to secure computer networks and information. The course has a significant mathematical component. It complements Computer and Network Security courses which focuses more on "high-level" issues. The course looks "under the hood" and attempts to present the various cryptographic protocols and algorithms. 

Expected Learning Outcomes of the Course

Upon completion of the course, the student should be able to:

1.     Define Cryptography, Encryption, Decryption, Keys, Certificates, Digital Signatures.

2.     Identify and describe the different types of ciphers and their context of application.

3.     Select the appropriate type of cipher to use in a given context.

4.     Compare various Encryption techniques with respect to some given criteria

5.     Discuss the validity and efficiency of a given Encryption technique in a given context.

6.     Describe the limits of existing methods and techniques.

7.     Design and implement ad-hoc Encryption/Decryption methods as well as protocols that use them.

Course Content

Introduction (Definitions, concepts & purpose) 

Part #1 Symmetric Ciphers

            Chapter #1: Classical Encryption Techniques

            Chapter #2: Block Ciphers and Data Encryption Standard

            Chapter #3: Basic Concepts in Number Theory and Finite Fields

            Chapter #4: Advanced Encryption Standard

            Chapter #5: Block Cipher Operation

            Chapter #6: Pseudorandom Number Generation and Stream Ciphers

Part #2 Asymmetric Ciphers

            Chapter #7: Advanced Number Theory

            Chapter #8: Public-Key Cryptography and RSA

            Chapter #9: Other Public-Key Cryptosystems

Part #3 Cryptographic Data Integrity Algorithms

            Chapter #10: Cryptographic Hash Functions

            Chapter #11: Message Authentication Codes

            Chapter #12: Digital Signatures

Mode of Delivery

  1. Lectures
  2. Media-enhanced Video presentations
  3. Group case study
  4. Reading / Writing Assignments
  5. Tutorials and Labs

 

Course Assessment

The final grade will be evaluated on the following basis

1. Quizzes / Class Tests / Assignments                           20%

2. Exams (Mid and Final Semester Examinations)          60%

3. Labs                                                                              20%

 

Instructional Materials

1.     Textbooks

2.     LCD Projector

3.     Lecture Notes

4.     LMS (Moodle) resources

5.     Virtual servers

 

Core Reading Materials for the course

1.     William Stallings, Cryptography and network security: Principles and Practice, 7th Edition, Pearson Education, 2016.

2.     Jonathan Katz and Yehuda. Lindell, Introduction to Modern Cryptography, 2nd Edition, CRC Press, 2014

Recommended Reference Materials

1.     Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography, 2015, https://crypto.stanford.edu/~dabo/cryptobook/draft_0_2.pdf

Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, 2014, http://cacr.uwaterloo.ca/hac/

ACSP 618 Security Risk Management and Policy


The dynamics of our society have been completely transformed by the digitalisation of the recent years. These transformations have revolutionised the way we interact, communicate, think and view the world. Many organisations have seen their business model changed because the Internet allowed them to be redefine how they conduct their activities.


We live in an era where everything can be connected. The explosion of cyber-physical systems has greatly influenced how our physical systems are managed. Many benefits are derived from these technological changes. However, these successful changes come with their challenges. The level of financial transactions that take place over the internet has attracted many criminals. Governments rise against governments using the internet to impact of their opponents stability.


Many companies, governments, people have to make a decision on how much time and money they can afford to protect their digital life, their technologies, their services, their assets. The reality is that is not always easy to determine how best to protect what we own. Many companies do not have actually an accurate account of what they own. There are opportunities for failure at all levels: the procedures, the people and the tools are not always aligned in order to ensure an appropriate risk management. The cyberspace is fast changing and bring unpredictable challenges.


In this course, as we look at risk management and policy, we seek to understand the root cause of problems. We look into the concept of risk management as a hole and we look at some practical applications in the world of cybersecurity in particular. This course will challenge our reasoning.


Expected Learning Outcomes


  1. Explain the key elements of risk in the context of the current threat landscape

  2. Examine component-driven and system-driven approaches to risk management

  3. Develop practical skills to manage the risk within Enterprise environments

  4. Be able to create policies as part of a risk management strategy


Course content


  1. Exploration of the cyberspace and its threat landscape

  2. Risk management principles

  3. Writing security policies

  4. Governance of cyber risk

  5. Hand s-on risk management


This course provides various documentation on AUA Library Resources.