This course introduces students to the fundamentals of information systems, starting from computer architecture and the binary number system all the way to ethics of working with information systems. Other topics include: Definition of Information Systems, Enterprise-wide computing and networking, and E-Business. Conceptual foundations; The decision-making process, Concepts of information, Information Strategic Planning, Information system requirements, and the strategic role of information systems.
The objective of the course is to give to the student the basis for developing visual applications. Using a carefully selected visual programming language, the following topics are studied: Data structures review (vectors, linked lists, files). OO design, OO programming techniques, exception handling, modular programming. GUI design rules. Model View Control (MVC) architecture, event handing. Swing model and components, Multithreading, Networking (Client Server Model), and access to databases.
In this course, students should study the following topics: characteristics and advantages of the database management systems (DBMS), database concepts and architecture; data models, database schemes and instances, DBMS and the concept of program-data independence, database languages and interfaces, database models, relational data model and relational algebra, relational model constraints; domains, keys, and integrity constraints, the structured query language (SQL); data definition, queries, update, statements, and views in SQL, database design; functional dependencies, normal forms.
This course is concerned with the fundamental knowledge, methods and skills needed to analyze, design and implement computer-based systems. It addresses the role of the systems analyst, the techniques and technologies used, and the ethical considerations in requirements specification. The structured software development life cycle approach, modeling techniques and development phases are comprehensively discussed and reviewed. In modeling techniques, process models, information models and object oriented models are thoroughly described. A project is given to all students that should cover analysis and design phases of a relatively data-oriented business case; with emphasis on data modeling (ER diagrams) and process modeling (DFDs).
In this course, modern programming trends and techniques are given, and their usage in developing real applications for society organizations. Students go through a learning curve that starts by understanding a problem, analyzing it, sketching and implementing a solution as three-tier by using an object oriented approach. Hence, all these skills must be emphasized in this course. This course is intended to widen the vision of students and gives them a flavor of the real world problems that can be tackled using programming languages, as opposed to higher level tools such as CASE tool or DB packages. Projects must be selected carefully to provide the student with skills in modern applications. Students learn a new programming language that will be used as an implementation tool. Students must be able to finish one project during the period of this course. Modern trends of software development, e.g. component-based programming can be covered
This course covers the following topics: DBMS architecture and administration; centralized and client-server approaches, system catalog, and data dictionary, transaction management; concepts, characteristics, and processing, recovery techniques, concurrency control techniques: serializability, deadlock, locking schemes, time-stamp ordering, multi-version, and optimistic techniques, DB security, distributed databases, distributed DBMS, data fragmentation and replication, distributed transactions management, object-oriented databases, introducing to new emerging DB technologies and applications; Web DBs, multimedia DBs, data warehousing , data Mining, … etc.
This course provides an introduction to management concepts, principles, techniques and terminology with particular reference to IS projects. It addresses issues such as project definition, scope management, planning, organization, resources, scheduling, control, quality, cost estimation, time estimation, risk management, and tools and software of project management. Covered project management tools include Work Breakdown Structure, Gantt charts, PERT, and the critical path method. Topics covered also include project management ethics, and effective project manager skills such as people and leadership skills.
This course offers an introduction to mathematical modeling methods and techniques. The goal is for the students to have a solid mathematical foundation in modeling that allows them to apply mathematical modeling techniques to real-world information system problems. This course covers the following topics: introduction to mathematical modeling for information system, linear programming and integer linear programming, applications of linear and integer programming models in information systems, network models, inventory models, and queuing models.
This course covers the following topics: definition of computer networks and their, objectives and applications, computer network types; LANs, PANs, MANs and WANs, computer network architecture: layering, protocols and standard models, the ISO OSI and TCP/IP reference models, physical layer of computer network: the transmission media; signal types, signal characteristics and impairments, modulation techniques and modems, digital signal encoding schemes; NRZ, Manchester and AMI encoding, physical interface; USART, RS-232C/V.24, and USB, data transmission basics: synchronous and asynchronous transmission, synchronization levels; bit, character and frame, transmission modes; full , half duplex, simplex , parallel and serial, data link layer: data link layer functions and standards, ARQ protocols; stop and wait, Go-back-N, and selective reject, DLC protocol standards; HDLC , Internet PPP and SLIP, local area networks: topology and media access methods, LAN protocols and the IEEE 802 standard, ethernet and IBM token ring LANs, wireless LANs, WANs and data transport networks; GSM cellular, satellite, ATM & ISDN.
The objective of this course is to enable the students to have theoretic and practical knowledge on the Enterprise Resource Planning (ERP). The students will learn the business processes of a company and how they are integrated (sales and distribution, finance, human resources, supply chain management, e-business, and customer relationship management). Each business process is deeply explained in order to learn its modules, techniques and appropriate strategies. The students will have the chance to work on real ERP systems and get the chance to work through the main business scenarios. During this course students will work in groups in order to fulfill a project which will be related to the configuration of a business scenario based on typical company needs.
This course explores advanced and modern concepts and technologies used in the development of electronic business applications. Topics include component development and reuse, distributed object technologies, multi-tier applications, client-side versus server-side technologies, service-oriented architectures, enterprise application integration, data transformation, role of open-source technologies, and finally e-business application installation and deployment issues.
This course offers a general overview on semi-structured data and XML. It covers the following topics: HTML and XML fundamentals, Graph models for semi-structured data, Typing XML (DTD or schema), XPath and XQuery languages, Data transformation by XSLT, XML-Relational Mapping.
This course covers the following topics: Selection of DBMS, Architecture of the chosen DBMS, Installation issues, DB creation, Indexing, Integrity Constraints triggers and assertions, DB Backups, Security management, Recovery issues, Performance management and tuning. Other features of the DBMS: Integration with web technologies, DB connectivity tools, Data distribution, fragmentation, and replication issues, Management issues of the DBA activity.
This course introduces the concepts and practices of data warehousing. It covers the fundamentals of developing and using a data warehouse, developing requirements, designing models, creating a dimensional model, generating population and maintenance plans for a warehouse. Also the course includes, manipulating the data in the warehouse for update, maintenance and data extraction. If possible, various industry partners will demonstrate some of the other major warehouse products used.
This course covers the following topics: the advanced steps in software developing such as types of software testing and user acceptance testing, different strategies used in software installation, processes of maintaining information systems; types of maintenance, measuring and controlling of maintenance effectiveness, software quality assurance, quality concepts, the ISO 9000 & ISO 9126 quality factors, technical metrics for software, testing metrics, technical metrics for software sizing, object-oriented systems metrics, software development methodologies, requirement engineering and configuration management.
This course covers foundations of model-based information systems management. It introduces basic concepts and techniques of simulation modeling as a decision-support tool and a problem-solving approach. Emphasis will be on discrete-event simulation model development methodologies and implementation techniques.
This course offers an introduction to data mining concepts and techniques. The goal is for the students to have a solid foundation in data mining that allows them to apply data mining techniques to real-world problems and to conduct research and development in new data mining methods. Topics include data mining algorithms and methods including association analysis, classification, cluster analysis, as well as emerging applications and trends in data mining.
This course covers the following topics: the decision making process, decision making and support systems (DSS), modeling and support, categorization of problem-solving techniques, data management and concepts of the data warehousing, modeling; forecasting models, simulation models and association analysis models, decision support system construction methods, decision tree induction, knowledge-based systems and expert systems, expert system architecture, representation of knowledge, forward and backward chaining, inferences making process, applications of expert systems in decision making.
This is interdisciplinary course where it brings the information technology along with the health care systems. It serves as an introductory course about how IT, communications and technologies can contribute effectively to manage and link health care information systems. The course will provide students with knowledge and skills towards the use and application of IT to all aspects of health care discipline. This course will cover E-health record, e-public health information systems, E-networking, E-medicine, E-home care, E-diagnosis support systems and E-health Intelligence. The course also introduces E-Health care technology management, E-health security and Mobile health.
In this course the following topics are covered: principles of distributed computing, the Internet as a huge computer system, distributed computing models: client-server model, multiple-server model, mobile agents model, and computer networks, TCP applications, IP layer applications, socket management, inter-process communication, UNIX case study, distributed object oriented architectures; design issues, applications in client-server computing, introduction to distributed file systems, name servers, mobile computing, modern trends in distributed computing.
This course discusses management issues and problems related to the development of database, decision support, and large-scale software systems in business. This course is intended to provide students with a foundation of critical issues in the design and implementation of business process-driven change. The course focuses on managing information technology and information systems in the business environment by examining managing business process redesign and software development, managing projects and changes, managing enterprises, information Systems, and IT Leadership. The course covers also the documentation, analysis, modeling and improvement methodologies, techniques and tools of business process. The course makes a special focus on workflow management systems, building networked-organization, and the development of process-driven, knowledge-based organization.
Overview of e-commerce types: B2B, B2C, and, C2C ; E-marketplaces: structure, mechanisms, economics, and impacts; Retailing in electronic commerce: products and services, consumer behavior, online market research, and customer relationship management; Online advertising, e-procurement, exchanges and portals; E-supply chains, collaborative commerce; Mobile commerce and pervasive computing; Auctions; E-commerce security; Electronic payment systems, order fulfillment, content management, and other support services; E-business strategy, launching a successful online business; Legal, ethical, and social impacts of e-business, building e-commerce applications and infrastructure; E-government, e-learning, and other e-business applications.
The objective of this course is to enable the students to have deep practical knowledge on a select business scenario in the Enterprise Resource Planning (ERP). We propose in this course to teach Supply Chain Management (SCM), since it is the business scenario which is most demanded by companies. The students will learn this business scenario: the techniques used in SCM, the customizing of SCM, the different modules used in SCM. The students will have the chance to work on real ERP system and practice its theory knowledge. During this course the students will have to work in a group in order to fulfill a project which will be related to the implementation of one module of SCM based on company needs.
This course intends to introduce special topics of current trends in information systems and information technology. The department council should approve the selected topics of this course. Such possible topics include: requirement engineering tools and methods, simulation, virtual reality, internet security, data warehousing and mining, geographic information systems, telemedicine and medical informatics, workflow management, quantitative and qualitative methods in information systems, global information technology management, intelligent agent technology and applications, human computer interaction, computer-based learning and training, philosophical foundations of information systems, absorbing continuous it developments in organizations, it professional and organizational needs, organizational learning and collaborative technologies, understanding and managing information users behavior, policy, legal and security issues in is, and virtual organizations.
This course introduces students to a mix of geographic information system theory and applications. Topics include geographic projection and coordinate systems, spatial data management, spatial analysis, concept of topology, models of spatial data (focusing on raster and vector models), spatial analysis techniques, and GIS implementation issues. By the end of the course, students are expected to have a thorough understanding of GIS development, functionality, methodology for implementing the technology, and its potential usefulness in geographic and environmental studies.
Security fundamentals, policies, procedures, and mechanisms. Identification, authentication models, access control models. Data models, concepts and mechanisms for software, hardware, operating system and database security. Basic cryptography (symmetric and asymmetric) and its applications. Security in computer networks and distributed systems. Attacks types and how to prevent them. Prevention and control of viruses and other rogue programs. In addition, the basics of physical security, incidence response, disaster recovery, business continuity, and forensics.
The previous courses have provided the IS students with strong and sufficient knowledge to develop information systems. The next logical stage is that the IS student must acquire hands-on experiences on developing real world information systems. In addition, the students should be familiarized with real world problems encounter during the development of real world information systems. Furthermore, the students should be trained to work in teams. In this course, the students will be organized into groups. The number of students in each group should not exceed three students. In developing an information system, a particular information system development methodology should be used. Each group will develop a real world information system in two stages: The first stage will be carried out in IS 498. In IS 498, the students of each group must identify a problem domain, define a problem, identify the requirements in details, specify requirements in details, analyze and document the current system, proposed alternative systems, and design a particular system in details which includes the definitions of all the required system models such as the data model and the functional model. At the end of the course, each group must submit a formal report documenting the problem domain, the problem, the requirements, the specifications, and the system models.
In this course, each group will continue developing the information systems that started in IS 498. Groups must use particular tools to implement their information systems in a good programming practice. These implementation tools must be new, up to date, and fully approved in IS design and implementation environment. Furthermore, students must generate user manuals for their information systems in an appropriate format. At the end of the term, each group must submit a final report, which documents completely the information system, from the problem definition phase to the implementation phase, and contains a user manual for the information system.
Key concepts and principles involved in the development of enterprise applications. Essential emerging topics such as the service-oriented architectures and enterprise applications integration. Web services technologies and the role they play today in the development and integration of enterprise application. Key technologies, standards, protocols, and platforms being used in the design and implementation of modern enterprise applications.
Foundations for Systems Development, Object-Oriented Analysis & Design: Determining System Requirements, Structuring System Process Requirements, Object-Oriented Analysis & Design with UML notation, Rational Unifed Process Methodolgy, IS Reuse(Design Patterns and Frameworks). IS Service oriented architecture.
Kowledge concepts, Types of knowledge, Knowledge life cycle and the ways to identify, create, represent and distribute knowledge in organisations, Ubiquitous Kowledge Management, Knowledge Management in the cloud, Social Network, Tools for KM, Case studies (real-life cases and experiences of implementing KM in organisations)
Information Systems types-An overview: Information Retrieval Systems, DBMS, MIS, Decision Support Systems, Dialog Systems. Fundamentals of Retrieval Systems: Adjacency and term frequency features, Text analysis and automatic indexing, Thesaurus rules and construction, Retrieval evaluation. Document storage technology and techniques. Emerging technology: Hypertext systems, Multimedia and hypermedia systems, Hardware requirements.
Enterprise Resource Planning (ERP), organization, business processes, and integration, ERP implementation, Change Management (CM), Customer Relationship management, Supply Chain Management.
Database Systems: Semantic data modeling, Object-oriented databases, Query optimization, Semantic Integrity. Distributed Databases (DDB), Data fragmentation and distributed transparency, Distributed query processing, Concurrence control methods: Serializability in a DDB and the two-phase locking method, Concurrence control based on timestamps, The two-phase COMMIT protocol. Recovery management.
How quality can be maintained and assured throughout the entire information system’s project phases from system’s selection and implementation all the way to system’s decommissioning. Students will be exposed to the modern methodologies and standards being adopted in the industry, including TQM, COBIT, ITIL, CMMI, etc. Modern project management methodologies and concepts such as project management office, project portfolio management, maturity models, and IT governance will also be covered in this course.
Overview of skills, knowledge, techniques, and tools required by information-technology security professionals. Topics include security and risk management, physical security, access control, cryptography, security architecture and design, security for networks and telecommunications, application security, and legal considerations.
Artificial Intelligence (AI) problem-solving concepts, Knowledge-based systems (KBS) defined, KBS domain of applications. Problem formulation and state space search. Knowledge representation: Rules, semantic nets, and frames. Knowledge acquisition techniques. Deduction with formal logic. Rule-based systems. Inexact reasoning. Expert systems (ES) Development. Building a business ES: A case study.
Preparing for project: Project financial analysis and risk evaluation, Procurement models, Proposal strategies, technical, management and cost proposal. Project planning. Managing the project design effort and team: Preparing the system design, functional, and program specification; Technical quality assurance, Managing the project’s implementation and acceptance phases. Post-completion analysis.Advanced project management techniques. Software quality assurance and control, Software metrics.
The main principles and technologies applied in the domain of business process and workflow management systems. It discusses the background, origins, and evolution of business process management systems. It also covers the full lifecycle of business process management systems including modeling and design, and also highlights the key relevant technologies, standards, and frameworks. In particular, it explores the evolving role played today by web services technologies and service-oriented architectures, in the composition, choreography, execution, and management of business processes.
Architectural models for distributed systems, server techniques, remote procedure call and multicast communication, RFID technology, Distributed transactions, concurrency control, reliability and security issues. Mobile Computing Platform, Wireless Network Principles, Wireless LAN and PAN, Cellular and Satellite Networks, Wireless Architectures, Wireless Security, Mobile Computing Strategic Planning, Mobile Computing Management and Support. Mobile Applications (M-Business, M-Government, M-Life, Positional Apps).
The history and evolution of health records and the limitation of paper-based ones. The course will show the challenges the health care is facing by having multiple records for the same patient, and show the advantages patients can have by having a unique record. Students will learn how to analyze, design, implement, maintain and manage a national and global electronic health record. Students will be introduced to the privacy and social issues in addition to the technology challenges.
Foundations of Information Engineering; Information Planning Components; Requirements Engineering; Meta-modeling and Modeling; Method Engineering; Method Engineering Support.
The management activities that health care professionals will perform on information such as the electronic health records and coding. The business and domain of health care that give the opportunity to analyze requirements and data structure before the start of developing the IT application. While Health Informatics mainly deals with the application of technology to health care business, health information management is rather concerned with the management of personal health information in health care organization to deliver a quality health care. records management, terminology, coding, transaction and the business of health care related to medical records management. Types of health care information systems such as hospital management system, labs and imaging systems, treatment, billing and prescribing systems.
Geographic Data manipulation, Representation of spatial objects, Vector model, Network and topological models, raster model, Computational geometry of GIS, Spatial Access Methods, Terrain modeling, GPS systems, Commercial systems: ArcInfo, ArcView GIS.
Key principles and concepts involved in e-payment systems. Different schemes and mechanisms of payments systems, online payments, digital cash, mobile payments, micropayments, peer-to-peer payments, etc. Electronic markets along with the different auction types and algorithms. E-payment security to ensure the integrity of electronic payments. Main technologies and platforms being adopted in the industry, and also insights into the key industry players and products available in this domain.
An introduction to enterprise content management, ECM components, document imaging, electronic content capture, indexing and classification. document management (DM), records management (RM), business process management (BPM) and collaboration, XML and meta data, Web Content Management (WCM), Web services, Web content delivery and RSS, WCM trends.
Principles of simulation: Model building, Handling time in models, Model attributes and parameters. Simulation languages and systems. Business application: Finance, Production, Inventory. Simulation of human decision-making, AI and simulation. Corporate simulation models and case studies.
Processes associated with governance, policy, monitoring, incident management and management of the information security function, processes associated with the implementation of security configurations, processes associated with the selection and maintenance of security technologies. In addition, the following audit/assurance reviews will be covered. They are: Identity management, security incident management, network perimeter security, systems development, project management, IT risk management, data management, and vulnerability management.
Priniciples of developing secure applications. Common programming errors that lead to software vulnerabilities, how these errors can be exploited, and effective mitigation strategies for preventing the introduction of such errors. Common programming vulnerability causes such as buffer overflows, dynamic memory management, integer overflows, sign errors, truncation errors, I/O vulnerabilities, etc. A specific programming language will be used throughout the course to demonstrate discussed concepts.
Special topics of current interest of IS/IT. Topics covered in this course will be determined by the department and may be conducted by more than one instructor.
Special topics of current interest in Enterprise Information Systems, students will develop, an in-depth understanding of the role of semantics and ontology in the enterprise, new patterns for enterprise architectures, Enterprise Application Integration. Enterprise Messaging, new Artificial Intelligence techniques and trends for Enterprise Information Systems.
Covering and discussing the recent trends, technologies, systems, and emerging topics, in all key matters concerning E-commerce such as new trends for Electronic Payment Systems, Internet Marketing, Customer Relationship Management, Web services. Recent Data Mining Techniques for E-Commerce could be studied.
Recent trends in knowledge, techniques, and tools required by information-technology security professionals. Selected Topics may include topics related to security and risk management, new security architectures and designs, security for networks and telecommunications, new security applications.
A survey of the theoretical and technical aspects of some topic to be agreed Upon with the student’s advisor. An oral presentation and a written report are required.
Bridging the gap between the academic study and training needed by industry and businesses. Students are initiated to work under close faculty supervision on real-world problems of sufficient magnitude. Project implementation and documentation are main concerns. The final report should be comprehensive, well written and organized to reflect an effective approach to carry out the work involved.
Basic elements and considerations of an enterprise computing solution, including systems integration issues, people versus technology issues, plus project management and implementation issues. Concepts of production planning and control with ERP systems, relationship with manufacturing and logistics strategies. Other ERP related topics, including technical, management, and global issues common to a typical business and manufacturing environment.
Introduction to Project Management. The nine project management knowledge areas – project, integration, scope, time, cost, quality, human resource, communications, risk, and procurement management. The five process groups – initiating, planning, executing, controlling, and closing. Project Management and Information Technology Context, Project Integration Management, Project Scope Management, Project Time Management, Project Cost Management, Project Quality Management, Human Resource Management, Project Communications Management, and Project Risk Management.
Approaches used by information system developers to discover and model the requirements. Construct an acceptable design to implement a successful system solution. Tools and techniques that the programmer or analyst uses to develop information systems.
Knowledge as a manageable asset. Organizations classes, adaptive systems, information and knowledge environment. Information handling. Organizational setting and technologies used for handling information and knowledge.
Concepts and techniques in website content representation, organization, presentation, and development with the eXtensible Markup Language (XML). Basic XML syntax, XML vocabulary specification, data modeling, XML style sheets and transformation, and Document Object Model (DOM). Design the Document Type Definitions (DTDs) and XML schemas. Creation and manipulating of XML documents. Advanced topics in manipulating XML data, including standards, namespaces and schemas, XML Transformation Language, and databases in relation to XML.
Policies, models, and mechanisms for secrecy, integrity, and availability. Operating system models and mechanisms for mandatory and discretionary controls, data models, concepts and mechanisms for database security, basic cryptography and its applications, security in computer networks and distributed systems, controlling and preventing viruses and other rogue programs. Authentication, access control, non-repudiation; and their integration in network protocols. Key management, cryptographic protocols and their analysis. Access control, delegation and revocation in distributed systems. Security architectures, multilevel systems, and security management and monitoring.
Advanced topics in deductive, active, temporal and OR DBs, extensible databases, spatial queries and storage structures, time series, data warehouses and knowledge discovery, and databases and the Web (queries on semi-structured data). Modern Trends in Intelligent Information Systems and DBMSs, Deductive Databases and knowledge bases, Temporal Queries and Reasoning, Active Databases, Object-Relational DBMSs.
Enterprise resource planning (ERP) client/server systems and e-business. The marketplace for ERP, CRM, SCM, and e-procurement; and management issues, strategy, business value, risks, usability and outsourcing. Future and predicted enterprise system trends.
Principles in representing and organizing spatial data in geographic databases, and procedures of spatial analysis utilizing geospatial data. Concepts of the nature of spatial problems, the properties of spatial data, the entity and field approaches, Euclidean and fractal geometries, topology and graphs, regular and irregular tessellations, hierarchical data structures, spatial addressing, spatial data operations, and computational geometry. Representation for hydrological modeling and land use analyses; map overlay modeling, using grid and vector data; and geocoding and network analyses for transportation analyses.
Foundational techniques in Artificial Intelligence: history, symbol system hypothesis, intelligent modeling and modeling intelligence, critique of classic AI problems. Problem spaces and search: State space, search, heuristics, graph methods. Knowledge representation and inference: Inference, inheritance, slot and filler structures, sets and attributes, frames and frame languages. Knowledge representation and logic: Predicate logic, Non-classical logics: fuzzy logic, non-monotonic reasoning. AI Applications including Planning and Scheduling, Computer-based Vision, Neural Networks, Natural language Understanding, Generation and Translation, Intelligent Agents.
Dynamical systems theory. Simulation systems and their classification. Principles of simulation system design and implementation. Using general programming languages for simulation. Algorithms for control of simulation. Continuous simulation; numerical methods, spatial models. Discrete simulation; events, processes, quasi-parallel execution. Combined simulation; state events. Advanced and special simulation methods. Basics of sensitivity analysis. Digital system models. Qualitative simulation. Models of uncertainty, using fuzzy logic in simulation. Knowledge-based simulation. Model optimization. Parallel and distributed simulation. Modern visualization methods. User interfaces of simulation systems and models. Simulation for virtual reality. Theoretical foundations of model validation and verification. Simulation results analysis. Application of artificial intelligence principles to system modeling and simulation.
Different aspects of conducting business over the Internet. Business-to-business and business-to-consumer e-Business models. The history and future of the Internet, Internet infrastructure, website design, Internet security, web server platforms, the components that comprise an e-Business strategy and demonstrate methods strategy. Software tools and protocols for web-based applications, identify the components of e-Business strategies and methods. Integration of e-business applications to back-office.
Advanced tools and techniques that the programmer or analyst uses to develop information systems. Object-oriented tools and the Unified Modeling Language (UML), objects, use cases, actors, structured scenarios, hierarchies, dependencies, message flows, state transition, and user interfaces. object-oriented CASE tool.
The student selects a research topic and conducts a literature review in relation to the topic.
The student selects a research topic and conducts a literature review in relation to the topic.
In this course, students are able to study advanced topics in Information Systems. The content and syllabi of this course is designed by a member of staff and approved by the department council.
Training is an important aspect of the educational process in the College of Computer and Information Sciences. Student is required join an IT center in a government or private sector as a full time for at least 8 weeks in the last summer prior to his graduation. The aim of the student training is to acquire the experience in applying what he learned in real life and in team working. The student training is evaluated through both his training advisor at the IT center and the training committee through the report he provides about his training.