The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

Buku Panduan Akademik FSTP Sesi 2025/2026

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by upnmsubscription, 2026-02-15 23:57:01

Buku Panduan Akademik FSTP Sesi 2025/2026

Buku Panduan Akademik FSTP Sesi 2025/2026

Buku Panduan Akademik, FSTP Sesi Akademik 2025/202689Hasil Pembelajaran Program Programme Learning Outcomes (PLO)Graduan berupaya untuk:Graduates are able to:PLO 1Mengintegrasikan pengetahuan lanjutan yang berkaitan dengan isu-isu penyelidikan semasa dalam keselamatan sistem komputer.Integrate advanced knowledge related to current research issues in computer systems security.PLO 2Mengesyorkan penyelesaian inovatif dan terkini selaras dengan perkembangan dalam bidang keselamatan sistem komputer.Recommend innovative solutions that are at the forefront of developments in the field of computer systems security.PLO 3Menilai kebolehgunaan, kecekapan dan keberkesanan perkakasan dan perisian keselamatan sistem komputer.Evaluate computer systems security solutions and tools in terms of their usability, efficiency and effectiveness.PLO 4Menanam semangat kerja berpasukan dan kemahiran bersosial melangkaui pelbagai konteks keselamatan sistem komputer.Instil teamwork and social skills through various contexts of computer systems security.PLO 5Berkomunikasi dan berfungsi dengan berkesan sama ada secara individu atau berkumpulan melangkaui pelbagai konteks dalam bidang keselamatan sistem komputer. Communicate and work effectively either individually or in groups through various contexts in the field of computer systems security.PLO 6Menggunakan kemahiran digital atau pengiraan untuk memperoleh, mentafsirkan dan memperluas pengetahuan dalam keselamatan sistem komputer.Utilise digital or numerical skills to acquire, interpret and extend knowledge in computer systems security.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/202690PLO 7Menunjukkan kemahiran dan kepemimpinan dalam bidang keselamatan sistem komputer ke arah pembangunan negara.Demonstrate skills and leadership in the field of computer systems security, towards national development.PLO 8Menunjukkan keyakinan, kawalan diri, kemahiran sosial dan etika yang betul dalam bidang keselamatan sistem komputer. untuk masyarakat dan Negara.Exert confidence, self-control, social skills and proper etiquette to serve in the field computer systems security for society and the Nation.PLO 9Mempamerkan keupayaan untuk memperluas pengetahuan melalui pembelajaran sepanjang hayat dengan minda keusahawanan yang berkaitan dengan bidang keselamatan sistem komputer.Exhibit capabilities to extend knowledge through life-long learning with an entrepreneurship mindset related to the field of computer systems security.PLO 10Menegakkan amalan profesional dan beretika dalam menjalankan penyelidikan dan memberikan perkhidmatan yang berkaitan dengan bidang keselamatan sistem komputer.Uphold professional and ethical practices in conducting research and delivering services related to the field of computer systems security.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/202691STRUKTUR KURSUS DAN JUMLAH KREDIT KEPERLUAN SARJANA MUDA SAINS KOMPUTER (KESELAMATAN SISTEM KOMPUTER) DENGAN KEPUJIAN (ZC29)JUMLAH KREDITJumlah keperluan kredit yang perlu dipenuhi untuk bergraduat adalah seperti mana jadual di bawah dan tempoh pengajian yang perlu diikuti adalah enam semester lazim dan dua semester pendek. Pecahan kursus yang perlu diambil adalah seperti berikut:KURSUS KREDITKursus Universiti:i. Kursus Teras Universitiii. Kursus Elektif Bebas 1412Kursus Teras Pengkomputeran 18Kursus Teras Disiplin Bidang Ilmu 33Kursus Pengkhususan:i. Terasii. Elektif187Projek Tahun Akhir 6Latihan Industri 12JUMLAH KREDIT UNTUK BERGRADUAT 120KURSUS TERAS PENGKOMPUTERANSARJANA MUDA SAINS KOMPUTER DI JABATAN SAINS KOMPUTERKURSUS TERAS PENGKOMPUTERANKursus-kursus Teras Pengkomputeran wajib diambil oleh semua pelajar di Jabatan Sains Komputer sepertimana berikut:KOD KURSUS NAMA KURSUS KREDITTSP3213 Fundamentals of Programming 3TST3213 Computer Organisation and Architecture 3TST3223 Database Systems 3TST3233 Computer Networks 3TST3243 Operating Systems 3


Buku Panduan Akademik, FSTP Sesi Akademik 2025/202692TST3293 Software Engineering and Design 3JUMLAH KREDIT 18KOD KURSUS NAMA KURSUS KREDITTSK3306 Projek Tahun Akhir 6KOD KURSUS NAMA KURSUS KREDITTSK330C Latihan Industri 12KURSUS TERAS DISIPLIN BIDANG ILMUSARJANA MUDA SAINS KOMPUTER DI JABATAN SAINS KOMPUTERKURSUS TERAS DISIPLIN BIDANG ILMUKursus-kursus Teras Disiplin Bidang Ilmu adalah wajib diambil oleh semua pelajar program Ijazah Sarjana Muda Sains Komputer di Jabatan Sains Komputer seperti berikut:KOD KURSUS NAMA KURSUS KREDITTSI3273 Human-Computer Interaction 3TSJ3213 Discrete Mathematics 3TSJ3223 Statistics 3TSP3223 Object-oriented Programming 3TSP3233 Data Structures 3TSP3243 Web Programming and Development 3TSS3333 Information Security Management 3TST3263 Computer and Network Security 3TST3273 Artificial Intelligence 3TST3283 Ethics and Professionalism in ICT 3TSV3323 Computer Graphics and Visualizaton 3JUMLAH KREDIT 33


Buku Panduan Akademik, FSTP Sesi Akademik 2025/202693KURSUS PENGKHUSUSAN TERASSARJANA MUDA SAINS KOMPUTER (KESELAMATAN SISTEM KOMPUTER) DENGAN KEPUJIAN (ZC29)Bagi Kursus Pengkhususan Teras, pelajar wajib mengambil 6 kursus (18 kredit) sahaja. Kursuskursus Pengkhususan adalah seperti berikut:KURSUS PENGKHUSUSAN ELEKTIFSARJANA MUDA SAINS KOMPUTER (KESELAMATAN SISTEM KOMPUTER) DENGAN KEPUJIAN (ZC29)Bagi kursus Pengkhususan Elektif, pelajar perlu memilih sebanyak 1 kursus 3 kredit dan 2 kursus 2 kredit. Kursus-kursus Pengkhususan Elektif adalah seperti berikut:KOD KURSUS NAMA KURSUS KREDITTSF3323 Digital Crime Investigation 3TSS3313 Cryptography 3TSS3323 Digital Forensics 3TSS3343 Wireless Network Security 3TSS3353 Ethical Hacker 3TSS3743 Network Intrusion Detection System 3KOD KURSUS NAMA KURSUS KREDITTSI3323 Data Mining 3TSI3362 IoT System Development 2TSI3363 Internet of Things 3TSI3372 Mobile Application System Development 2TSI3383 E-Commerce 3TSI3713 Multimedia 3TSF3313 File System Forensics 3TSF3333 Data and Digital Media Forensics 3TSF3723 Network Forensics 3TSF3733 Military and Industry Espionage 3TSP3362 Programming with Phyton 2TSP3372 Web Based System Development 2TSS3733 Defensive Programming 3


Buku Panduan Akademik, FSTP Sesi Akademik 2025/202694STRUKTUR KURIKULUMSARJANA MUDA SAINS KOMPUTER (KESELAMATAN SISTEM KOMPUTER) DENGAN KEPUJIAN (ZC29)TAHUN PERTAMASEMESTER 1 SEMESTER 2KOD KURSUS NAMA KURSUS KREDIT KOD KURSUS NAMA KURSUS KREDITDUS3042 Military Histroy and Leadership 2 MPU3132 Appreciation of Ethics and Civilizations 2MPU3142 Philosophy and Currents Issues 2 LLE3032 Al-Ghazali’s Dialogue: English Communication 2MPU3322/ MPU3332/MPU3342Blue Ocean Strategy and Total Defence /Fiqh Keutamaan /Integrity and Anti – Corruption2 LLF3XX1 Foreign Language II 1LLE3012 English for Academic Writing 2 TST3293 Software Engineering and Design 3LLF3XX1 Foreign Language I 1 TST3223 Database Systems 3TSJ3213 Discrete Mathematics 3 TSP3223 Object-oriented Programming 3TSP3213 Fundamentals of Programming 3 TSJ3223 Statistics 3TST3213 Computer Organisation and Architecture 3ALK 3112/ PLS 31 / QKA 3121Latihan Ketenteraan Umum/ PALAPES 2 / Kesatria Al-Fateh 22 / 1PLS3111/ QKA3111PALAPES / Kesatria Al-Fateh 1 1JUMLAH KREDIT 19 JUMLAH KREDIT 19 / 18SEMESTER PENDEKKOD KURSUS NAMA KURSUS KREDITTSI3723 Human-Computer Interaction 3TST3283 Ethics and Professionalism in ICT 3TSS3333 Information Security Management 3JUMLAH KREDIT 9


Buku Panduan Akademik, FSTP Sesi Akademik 2025/202695TAHUN KEDUASEMESTER 3 SEMESTER 4KOD KURSUS NAMA KURSUS KREDIT KOD KURSUS NAMA KURSUS KREDITDUS3022 Introduction to Strategic Studies 2 MPU3212 Basic Entrepreneurship 2TSP3243 Web Programming and Development 3 TSV3323 Computer Graphics and Visualisation 3TSP3233 Data Structures 3 TST3243 Operating Systems 3TST3263 Computer and Network Security 3 TSX3XX3 Specialisation I 3TST3273 Artificial Intelligence 3 TSX3XX3 Specialisation II 3TST3233 Computer Networks 3 TSX3XX3 Elective Specialisation I 2ALK3122/ PLS3131/ QKA3132Latihan Ketenteraan Umum / PALAPES 3 /Kesatria Al-Fateh 32 / 1 TSX3XX2 Elective Specialisation II 2QKS3172/ PLS3141/ QXXYYY2Tempur Tanpa Senjata** / PALAPES 4* / Kokurikulum*2 / 1JUMLAH KREDIT 18 / 19 JUMLAH KREDIT 19 / 20SEMESTER PENDEKKOD KURSUS NAMA KURSUS KREDITTSX 3XX3 Specialisation III 3TSX 3XX3 Specialisation IV 3TSX 3XX3 Elective Specialisation III 3JUMLAH KREDIT 9


Buku Panduan Akademik, FSTP Sesi Akademik 2025/202696TAHUN KETIGASEMESTER 5 SEMESTER 6KOD KURSUS NAMA KURSUS KREDIT KOD KURSUSNAMA KURSUS KREDITMPU3412/MPU3422/MPU3432/ MPU3442Human Movement Science / Community Service / Nationhood in World Politics/ Military Law and Laws of Armed Conflict2 TSK 330C Industrial Training 12TSK3306 Final Year Project 6TSX3XX3 Specialisation V 3TSX3XX3 Specialisation VI 3PLS3151 PALAPES 5* 1 PLS3161 PALAPES 6* 1JUMLAH KREDIT 14 / 16 JUMLAH KREDIT 12


Buku Panduan Akademik, FSTP Sesi Akademik 2025/202697SINOPSIS KURSUS TERAS PENGKOMPUTERANSARJANA MUDA SAINS KOMPUTER DI JABATAN SAINS KOMPUTERASAS KEPADA PENGATURCARAAN - TSP 3213FUNDAMENTALS OF PROGRAMMING - TSP 32133 Credit HoursPrerequisite: NoneCourse SynopsisThe course introduces the basic principles of programming concepts and programming structures. It covers introduction, algorithm, primitive data types and operations, selection statements, loops, functions, arrays, and programming laboratory exercises.Course OutcomesAt the end of this course, students are able to:1. Identify basic concepts in java programming language. 2. Determine the theoretical concept of java programming algorithm and code. 3. Practice coding a program correctly and effectively through Java programming language.References1. Liang, Y. D. (2022). Introduction to Java Programming and Data Structures. Comprehensive Version. Pearson Education Limited.2. Farrell, J. (2016). JAVA Programming. 8th edition. Course Technology: Cengage Learning.3. Deitel, P. and Deitel, H. (2013). Java How to Program. 10th edition. Pearson.4. Hortsmann, C. (2016). Big Java. 6th edition. John Wiley & Sons.5. Malik, D.S. (2012). Java Programming: From Problem Analysis to Programming Design. 5th edition. Course Technology: Cengage Learning.6. Charatan, Q. and Kans, A. (2019). Java in Two Semesters: Featuring Java FX. 4th edition. Springer Nature Switzerland AG.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/202698ORGANISASI DAN SENI BINA KOMPUTER - TST 3213COMPUTER ORGANISATION AND ARCHITECTURE - TST 32133 Credit HoursPrerequisite: NoneCourse SynopsisThe course introduces the concept and components of computer organisation and architecture. The topics discussed include memory, CPU, I/O devices and peripherals, von Neumann PC and parallel computer architecture. Various levels of architecture at microprocessor, machine language, data representation and application layers will be covered in detail.Course OutcomesAt the end of this course, students are able to:1. Identify simple machine architecture and instruction set computers. 2. Determining memory control, direct memory access, interruptions, and memory organization. 3. Conduct a basic data flow through the CPU (interfacing, bus control logic, and internal communications, number systems, arithmetic, instruction sets, addressing modes, and data/instruction formats and write a simple assembly language program through experimental work. References1. Ledin, Jim, (2020), Modern Computer Architecture and Organization: Learn x86, ARM, and RISC-V architectures and the design of smartphones, PCs, and cloud servers Illustrated Edition. 2. Stallings, W., 2016. Computer Organization and Architecture: Designing for Performance. 3. Labur, N. 2016. The Essentials of Computer Organization and Architecture. Jones & Bartlett.4. A. Patterson, D., and L. Hennessy, J., 2017. Computer Organization and Design RISC-V: The Hardware Software Interface (The Morgan Kaufmann Series in Computer Architecture and Design), 1st ed. Morgan Kaufmann.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/202699SISTEM PANGKALAN DATA - TST 3223DATABASE SYSTEMS - TST 32233 Credit HoursPrerequisite: NoneCourse SynopsisThe course covers database systems and file systems, relational data modeling, SQL, E-R modeling, normalisation, transaction and concurrency control, database design and implementation. Latest and future trends in database will be discussed. A database management system will be introduced and used for practical sessions. Course OutcomesAt the end of this course, students are able to:1. Identify database management concept and user requirements/views and conceptual data model including all entities, relationships, attributes, and business rules. 2. Conduct normalization techniques on database management based on the user requirements. 3. Develop a prototype of a database management system. References1. Coronel, C., & Morris, S. (2019). Database systems: design, implementation, & management. Cengage Learning. 13th Edition2. Coronel, C., Rob, P. & Morris, S. (2009). Database Systems: Design, Implementation, and Management. Ninth Edition. New York: Thomson Learning.3. Connolly, T.M. & Begg, C.E. (2015). Database Systems: A Practical Approach to Design, Implementation and Management. Sixth Edition. Essex: Pearson.4. Molina, H.G., Ullman, J.D. & Widom, J. (2008). Database Systems: The Complete Book.Second Edition. New York: Prentice Hall.5. Elmasri, R. & Navathe, S.B. (2010). Fundamental of Database Systems. Sixth Edition. New York: Addison-Wesley.6. Date, C.J. (2003). An Introduction to Database System. Eighth Edition. Singapore: AddisonWesley.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026100RANGKAIAN KOMPUTER - TST 3233COMPUTER NETWORKS - TST 32333 Credit HoursPrerequisite: NoneCourse SynopsisThe purpose of this course is to provide an in-depth understanding of computer networking with emphasis on network concepts and protocols. This course exposes students to various computer network technologies and uses both the OSI Model and TCP/IP Protocol Suite as a framework for understanding the concept of communication networking.Course OutcomesAt the end of this course, students are able to:1. Define the concepts in networking, protocols and standards, and to describe and compare network architectures and network technologies. 2. Adapt the concepts, hardware, and technology in planning, designing and managing of the networks. 3. Discuss network problems using hardware and software tools. References1. Ramon Nastase.(2018). Computer Networking for Beginners. First Edition. CISCO Press (US).2. Larry L. Peterson . (2021). Computer Networks: A Systems Approach. Sixth Edition. ELSEVIER SCIENCE (US).3. John Medicine. (2020). Networking for Beginners. First Edi. New Era Publishing Ltd.4. Forouzan, A. (2012). Data Communications and Networking. Fifth Edition. New York: McGraw-Hill.5. Dean, T. (2012). Network+ Guide to Networks. Sixth Edition. Massachusetts: Course Technology.\"


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026101SISTEM OPERASI - TST 3243OPERATING SYSTEMS - TST 32433 Credit HoursPrerequisite: NoneCourse SynopsisThis course introduces the concept of operating system as a resource manager. Students will be exposed to the required algorithms and data structures as essential part in constructing operating system routines based on multiple types of operating system. The main topics in this course are system structures, process concept/management, multithreading programming, memory management strategies, deadlocks, implementing file system, synchronisation and process scheduling. The fundamental concepts and algorithms will be covered based on existing commercial operating systems.Course OutcomesAt the end of this course, students are able to:1. Identify the basic concepts of operating systems. 2. Demonstrate the scheduling methods in the file systems and i/o system management. 3. Discuss the memory and process management that is involved during the operating systems operations.References1. Silberschatz, A., Galvin, P.B., and Gagne, G. 2018. Operating System Concepts (10th Edition), John Wiley & Sons, Inc. 2. Stalings, W. 2017. Operating Systems, Internal & Design Principles, 6th Pearson .3. Garg, R., and Verma, G., 2017. Operating Systems: A Modern Approach, Mercury Learning & Information.\"


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026102REKABENTUK DAN KEJURUTERAAN PERISIAN- TST 3293SOFTWARE ENGINEERING AND DESIGN - TST 3293 3 Credit HoursPrerequisite: NoneCourse SynopsisThe course introduces students with principles and techniques in software engineering that can be used to build software. The topics include software engineering management, software processes, software requirements, design architecture, software testing, software cost estimation, software verification and validation.Course OutcomesAt the end of this course, students are able to:1. Apply software engineering and design concepts in the software development.2. Differentiate system modelling analysis and requirement to fulfil software specification accordingly. 3. Demonstrate software engineering design methods and techniques to apply to a given case study and mini project. References1. Sommerville, I. (2021). Software Engineering, 10th Edition, Pearson2. Pressman, R and Maxim, B (2020). Software Engineering: A Practitioner’s Approach, McGraw Hill.3. Kenneth, E. Kendall and Julie, E Kendall (2019). Systems Analysis and Design. 10th edition. Prentice Hall.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026103PROJEK - TSK 3306PROJECT - TSK 33066 Credit HoursPrerequisite: Software Engineering and Design - TST 3293Web Programming and Development - TSP 3243Database Systems - TST 3223Course SynopsisThe final year project provides the students with the chance to demonstrate the knowledge and skills they have developed throughout their study in the Computer Science programme. It offers students the opportunity to undertake a significant project in which they will go through a complete software project life cycle under the guidance of a supervisor. At the end of the semester, the student is required to submit a final year project report and to give a project presentation to both the supervisor and the assessors for assessment purpose.Course OutcomesAt the end of this course, students are able to:1. Manage appropriate project development methodology to the project in a professional manner. 2. Develop a project according to the project requirements. 3. Demonstrate project ideas and current work achievement through presentation and documentation. References1. Panduan Projek Sarjana Muda Fakulti Sains Dan Teknologi Pertahanan 20212. Fakulti Sains dan Teknologi Pertahanan. (2009). Panduan Penulisan Tesis dan Projek Penyelidikan Sarjana Muda. Kuala Lumpur: UPNM.3. Hoffer, J.A., George, J.F. & Valacich, J.S. (2007). Modern Systems Analysis and Design. Fifth Edition. Upper Saddle River, NJ: Prentice Hall.4. Mohd Hazali Mohamed Halip, Nor Asiakin Hasbullah & Syahaneim Marzukhi. (2011). Panduan Penulisan Tesis dan Projek Sarjana Muda Sains Komputer. Kuala Lumpur: Jabatan Sains Komputer, Universiti Pertahanan Nasional Malaysia.5. Shelly, G.B. & Rosenblatt, H.J. (2011). Systems Analysis and Design. Ninth Edition. Boston: Course Technology, Thomson Learning.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026104LATIHAN INDUSTRI - TSK 330CINDUSTRIAL TRAINING - TSK 330C12 Credit HoursPrerequisite: Minimum 86 Total Credit Hours TakenFundamentals of Programming - TSP 3213Object-Oriented Programming - TSP 3223Software Engineering and Design - TST 3293Project - TSK 3306Course SynopsisIndustrial Training provides an opportunity for the students to practice and apply knowledge and skills in various actual working environments. The purpose of the training is to expose the students to the nature of work in the real world. All students are required to spend a duration of one semester attached to ICT related organisation for industrial training. The nature of work carried out during the industrial training shall be supervised by an officer of the organisation and a lecturer from the university. Upon completion of the training, the students shall submit a report on the work done in the organisation.Course OutcomesAt the end of this course, students are able to:1. Adapt to working in real environment professionally. 2. Practice all the knowledge that they have learnt during the training. 3. Synthesise the communication and presentation skills through working environment. References1. Heller, Daniel, (2020) Building a Career in Software: A Comprehensive Guide to Success in the Software Industry 1st ed. Edition, Published by Apress (2020).2. Luiz Paulo Favero & Patricia Belfiore (2019), Data Science for Business and DecisionMaking 1st Edition, Kindle Edition.3. Alex Xu (2017) System Design Interview– An insider's guide4. Halip M. H. M., Awang N. F., Yahaya Y. H., Khairuddin M.A. and Ghani S. A. (2011) Panduan Latihan Industri Sarjana Muda Sains Komputer. Jabatan Sains Komputer: Universiti Pertahanan Nasional Malaysia


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026105SINOPSIS KURSUS TERAS DISIPLIN BIDANG ILMUSARJANA MUDA SAINS KOMPUTER DI JABATAN SAINS KOMPUTERINTERAKSI MANUSIA-KOMPUTER - TSI 3723HUMAN-COMPUTER INTERACTION - TSI 37233 Credit HoursPrerequisite: NoneCourse SynopsisThis course is an introduction to the fundamentals of human-computer interaction, user interface design and usability analysis. Students will learn principles and guidelines for usability, quantitative and qualitative analysis methods besides apply them through critiques of existing interfaces and development of new ones. Topics covered will also include cognitive models and visual models. Students will learn the principles of visual design and prototyping methods that inform effective interaction design.Course OutcomesAt the end of this course, students are able to:1. Distinguish the basic theories, tools and techniques in Human Computer Interaction (HCI) and the fundamental aspects of designing and evaluating interfaces. 2. Conduct a variety of simple methods for evaluating the quality of user’s experiences and interfaces. 3. Explain appropriate Human Computer Interaction (HCI) techniques in designing user’s experience and interfaces based on user’s requirements. References1. Helen Sharp, Jennifer Preece, Yvonne Rogers. (2019). Interaction Design: Beyond Human Computer Interaction. 5th Edition. ISBN: 9781119547259. John Wiley and Sons Inc.2. Shneiderman, B., Plaisant, C., Cohen, M. & Jacobs, S. (2016). Designing the User Interface: Strategies for Effective Human-Computer Interaction. Sixth Edition. Boston: AddisonWesley.3. Antti Oulasvirta, Per Ola Kristensson et. al. (2018). Computational Interaction. ISBN: 9780198799603. Oxford University Press.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026106PENGATURCARAAN BERORIENTASIKAN OBJEK - TSP 3223OBJECT-ORIENTED PROGRAMMING - TSP 32233 Credit HoursPrerequisite: NoneCourse SynopsisThis course gives an understanding of basic concepts of object-oriented programming (including the concept of object and class), and illustrates them using Java language. The course also provides a deeper understanding of object-oriented program design and implementation and more advanced features of object-orientation, such as inheritance, polymorphism, abstract classes, exceptions and Java Applet.Course OutcomesAt the end of this course, students are able to:1. Identify basic concepts of object-oriented programming concepts using Java language programming 2. Adapt knowledge and techniques to develop algorithms of object-oriented programming language. 3. Demonstrate a computer programme with object-oriented knowledge correctly and effectively. References1. Dr. Muneer Ahmad Dar (2020). JAVA Programming Simplified: JAVA Programming Simplified2. Matt Weisfeld (2019). Object-Oriented Thought Process, The, 5th Edition, Addison-Wesley.3. Herbert Schildt (2018). Java: A Beginner's Guide, Eighth Edition


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026107MATEMATIK DISKRET - TSJ 3213DISCRETE MATHEMATICS - TSJ 32133 Credit HoursPrerequisite: NoneCourse SynopsisThis course introduces the mathematical concepts of discrete mathematics in computer science and how to use them in practice. It covers the fundamental topics such as propositional and predicate logic, fundamental principles of counting, set theory, mathematical induction, functions, and relations.Course OutcomesAt the end of this course, students are able to:1. Define the fundamentals of logic, fundamental principles of counting and set theory. 2. Calculate mathematical induction and division algorithm. 3. Discuss relations and functions. References1. Epp, S.S. (2020). Discrete Mathematics with Applications. Fifth Edition. Boston: Cengage Learning, Inc. 2. Fortney, J.P. (2021). Discrete Mathematics for Computer Science: An Example-based Introduction. First Edition. Boca Raton: CRC Press. Grimaldi, R. (2014). Discrete and Combinatorial Mathematics: An Applied Introduction. Fifth Edition. Essex: Pearson Education Limited. 3. Johnsonbaugh, R. (2019). Discrete Mathematics. Eighth Edition. New Jersey: Pearson Education Limited. 4. Rosen, K.H. (2018). Discrete Mathematics and Its Applications. Eighth Edition. New York: McGraw-Hill Education.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026108GRAFIK DAN VISUALISASI KOMPUTER – TSV 3323COMPUTER GRAPHICS AND VISUALISATION – TSV 33233 Credit HoursPrerequisite: NoneCourse SynopsisThe course provides an introduction and fundamental algorithms in computer graphics, their theoretical as well as implementation aspects. The topics discussed include two and three dimensional transformations, projections, view function, modeling and rendering. Elements of multimedia and visualisation shall also be discussed in this course.Course OutcomesAt the end of this course, students are able to:1. Define the fundamental concepts and techniques used in the field of computer graphics and visualisation including the history of computer graphics, concepts, and technologies. 2. Conduct modern hardware and software technologies used in computer graphics and visualisation.3. Develop 2d graphics primitives in battlefield application using opengl programming. References1. David, C. (2019) Computer Graphics and Visualization. LAP LAMBERT Academic Publishing.2. Marschner, S., Shirley, P. (2016). Fundamentals of Computer Graphics. Fourth Edition. Boca Raton: CRC Press, Taylor & Francis. 3. Hughes, J.F., van Dam, A., Foley, J.D., McGuire, M., Feiner, S.K., Sklar, D.F. & Akeley, K. (2014). Computer Graphics: Principles and Practice. New Jersey: Addison-Wesley.4. Hill, F.S. & Kelley, S.M. (2007). Computer Graphics Using OpenGL. Third Edition. India: Pearson Prentice Hall.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026109STRUKTUR DATA - TSP 3233DATA STRUCTURES - TSP 32333 Credit HoursPrerequisite: Object-Oriented Programming - TSP 3223Course SynopsisThis course covers the fundamentals of data structures and algorithms applied in programming solutions to application problems. It is a study of the design, implementation, and use of data abstraction including linked structures, lists, stacks, queues, trees and graph structures.Course OutcomesAt the end of this course, students are able to:1. Apply concept of array in searching and sorting algorithms. 2. Distinguish the concept of recursion and abstract data types for linear (list, stack, queue) and non-linear data structures (tree and graph). 3. Develop computer programs for solving real world problems by applying data structure concept.References1. Liang, Y.D. (2019). Introduction to Java Programming and Data Structures. Pearson International Edition. 11th Edition2. Liang, Y. D. (2017). Introduction to Java Programming and Data Structures. 11th Edition. New York: Pearson Education.3. Goodrich, M.T., Tamassia, R. and Goldwasser, M.H., (2014). Data Structures and Algorithms in Java. 6th Edition. New York: John Wiley & Sons, Inc.4. Drozdek, A. (2010). Data Structures and Algorithm in JAVA. 2nd Edition. Massachusetts: Course Technology.5. Weiss, M.A. (2011). Data Structures and Algorithm Analysis in Java. 3rd Edition. New Jersey: Pearson Education, Inc.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026110PENGATURCARAAN DAN PEMBANGUNAN WEB - TSP 3243WEB PROGRAMMING AND DEVELOPMENT - TSP 32433 Credit HoursPrerequisite: NoneCourse SynopsisThe course introduces the concept, design and development of a web-based application. Markup language and scripts such as HTML, CSS, JavaScript and PHP will be introduced for the development of interactive and dynamic web-based application using client-server technology. This course requires the student to build a web application and implement at least one major website design that interacts with a database.Course OutcomesAt the end of this course, students are able to:1. Explain markup languages and tools such as html, css, java scripts and php web page development. 2. Design a fully functioning e-commerce website. 3. Demonstrate integrated set of web pages/frames (static web page) and an interactive application on a web server (dynamic web page). References1. Robin Nixon, 2021, Learning PHP, MySQL & JavaScript, 6th Edition,O'Reilly Media, Inc.,ISBN-13: 97814920938242. Joe Casabona, 2021, HTML and CSS: Visual Quickstart Guide, 9th Edition, Pearson Education (US), ISBN-13 978013670256.3. Kevin Tatroe, 2020, Programming PHP: Creating Dynamic Web Pages, 4th Edition, O'Reilly Media, Inc., ISBN-13: 9781492054139\"


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026111KESELAMATAN KOMPUTER DAN RANGKAIAN - TST 3263COMPUTER AND NETWORK SECURITY - TST 32633 Credit HoursPrerequisite: NoneCourse SynopsisThis course focuses on the concept of computer and network security. Students examine operating system and network security. Topics include server, encrypted files, intrusion detection, packet filtering, network monitoring, user and group permissions, security template and firewalls. Current issues and trend in system and network security will be discussed.Course OutcomesAt the end of this course, students are able to:1. Define the concept of computer and network security. 2. Produce the security requirements of an organization. 3. Manage malware in a computer system. References1. Computer and Network Security Computer Security: Principles and Practice 4th Edition, William Stallings, Lawrie Brown Pearson Education 04-Aug-17 97801347941052. Computer and Network Security Network Security Essentials: Applications and Standards 6th Edition, William Stallings Pearson Education 28-Jul-16 97801345273383. Computer and Network Security Computer Security Fundamentals 4th Edition, William (Chuck) Easttom II Pearson IT Certification 22-Oct-19 97801357747794. Computer and Network Security (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 2nd Edition, Mike Chapple, David Seidl,James Michael Stewart, Darril Gibson Sybex 19-Jun-18 9781119523260


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026112KECERDASAN BUATAN - TST 3273ARTIFICIAL INTELLIGENCE - TST 32733 Credit HoursPrerequisite: NoneCourse SynopsisThe course aims to introduce the principle, methods and techniques used in artificial intelligence systems. It exposes students to search techniques, logic, knowledge representation and reasoning, intelligent agents, and machine learning. Programming languages such as Prolog and MATLAB will be used in the course in practical sessions and coursework.Course OutcomesAt the end of this course, students are able to:1. Understand concepts and techniques of artificial intelligence through the study of important artificial intelligence techniques. 2. Gain theoretical knowledge to be able to reason about the behaviour of Artificial Intelligence system. 3. Apply artificial intelligence concept to an intelligent system application.References1. Russell, S. J. & Norvig, P. (2020). Artificial Intelligence: A Modern Approach. 4th Edition. New Jersey: Prentice Hall. 2. Tom Taulli. (2019). Artificial Intelligence Basics: A Non-Technical Introduction: APress3. Anuradha, J, Tripathy, B.K., I. (2018). Internet of things (IoT) : technologies, applications, challenges and solutions. CRC Presss: Taylor & Francis4. Bratko, I. (2015). PROLOG Programming for Artificial Intelligence. 4th ed. Singapore: Addison Wesley.5. Negnevitsky, M. (2016). Artificial Intelligence: A Guide to Intelligent Systems. 3rd ed. Addison Wesley Pearson Education.\"


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026113ETIKA DAN PROFESIONALISME DALAM ICT - TST 3283ETHICS AND PROFESSIONALISM IN ICT - TST 32833 Credit HoursPrerequisite: NoneCourse SynopsisThis course provides students with the necessary knowledge and good understanding on the ethical issues in the area of information technology. The topics covered include ICT implications to society, introduction of ethics, privacy, freedom of speech, intellectual property, crime, cybercrime and cyberlaws, evaluating and controlling technology, errors, failures, and risk, Internet user responsibilities, and professional ethics and responsibilities.Course OutcomesAt the end of this course, students are able to:1. Identify the concept of ethics in ict on individuals, organisations, and society. 2. Adopt ethical professionalism procedures for its professionals in delivering tasks given through student collaboration. 3. Justify issues arising from ethics in ict such as privacy, security and infringement of intellectual property. References1. Reynolds, G.W. (2015). Ethics in Information Technology. Fifth Edition. Massachusetts: Course Technology, Cengage Learning.2. Baase, S. (2013). A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology. Fourth Edition. Essex: Pearson Education Limited.3. Hester, D.M. and Ford, P.J. (2001). Computer and Ethics in Cyberage. New Jersey: Prentice Hall.4. Quinn, M.J. (2012). Ethics for the Information Age. Fifth Edition. Massachusetts: Pearson International.5. Tavani, H.T. (2013). Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. Fourth Edition. New Jersey: John Wiley & Sons, Inc.\"


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026114STATISTIK - TSJ 3223STATISTICS - TSJ 32233 Credit HoursPrerequisite: NoneCourse SynopsisThis course covers topics from types of data, describing data sets graphically and numerically, commonly used probability distribution, sampling distribution and confidence interval, hypothesis testing, analysis of variance, goodness of fit and contingency table and finally regression and correlation. This course will focus more on the procedures of the analysis and interpretation of results. Software application is strongly emphasised.Course OutcomesAt the end of this course, students are able to:1. Gathering knowledge on the theoretical foundations on basic concepts in probability and statistics.2. Practice the theoretical foundations of the knowledge to model related problems through experimental works. 3. Test the mathematical models using various tools and methods from the theoretical foundations on basic concepts in probability and statistics together with statistical software to interpret the results from the analysis.References1. Siti Zanariah Satari, Noryanti Muhammad, Siti Roslindar Yaziz, Nor Hafizah Moslim, Roslinazairimah Zakaria & Farahanim Misni, Applied Statistics Module, 3rd Ed. UMP Publisher (2018). 2. William Navidi, Statistics for Engineers and Scientist, 5th Ed. The McGraw-Hill (2020).


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026115PENGURUSAN KESELAMATAN MAKLUMAT - TSS 3333INFORMATION SECURITY MANAGEMENT - TSS 33333 Credit HoursPrerequisite: NoneCourse SynopsisThe course introduces an understanding of information security management concepts, including planning for security, security policy, risk management, law and ethics and advanced cryptography. It will also provide the knowledge and skills needed to plan the implementation of an information security management system that provides efficient, effective safeguards and responds to the organisation’s needs.Course OutcomesAt the end of this course, students are able to:1. Analyse the concepts of Information Security Management and the standard methods and metrics in managing information security.2. Assess the issues and risks related to information security into job responsibility. 3. Exhibit understanding on information security policy and resources involved in identifying secure networks. References1. Whitman, M. E. and Mattord, H. J. (2019). Management of Information Security. Sixth Edition. Information Security. ISBN-13: 978-1305501256 ISBN-10: 130550125X. 2. Whitman, M. and Mattord, H., (2014), Management of Information Security, 4th Edition, Thomson Course Technology3. O’Hanley, R. and Tiller, J. S (2013), Information Security Management Handbook, Sixth Edition, Volume 7, Auerbach Publication.4. Whitman, M. and Mattord, H. (2012). Principles of Information Security, 4th Edition, Thomson Course Technology5. Tipton, H. F. and Nozaki, M. K (2012), Information Security Management Handbook, Sixth Edition Volume 6, Auerbach Publication. 6. Stamp, M. (2011), Information Security: Principles and Practice, John Wiley & Sons Inc, New Jersey


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026116SINOPSIS KURSUS FIELD ELECTIVEPROGRAM IJAZAH SARJANA MUDA SAINS KOMPUTER DENGAN KEPUJIAN (ZC01)PENGENALAN KEPADA ANALITIK DATA – TSV 3313INTRODUCTION TO DATA ANALYTICS – TSV 33133 Credit HoursPrerequisite: NoneCourse SynopsisThis course introduces the basics of data analytics and modeling for handling of massive databases. The course covers concepts of data analysis for big data analytics, and introduces the students to some practicalities of map-reduce while adopting the big data management life cycle. In this course, students will be taught on how to develop appropriate algorithms for modeling and visualising these high dimensional data sets and gain insights into these algorithms from theoretical and empirical perspectives of analysing massive datasets. The course emphasises that business analytics is not a theoretical discipline: these techniques are only interesting and important to the extent that they can be used to provide real insights and improve the speed, reliability, and quality of decisions. The concepts learned in this class should help students identify opportunities in which data analytics can be used to improve organisation performance and support important decisions.Course OutcomesAt the end of this course, students are able to:1. Explain concepts of knowledge discovery process, data pre-processing techniques. 2. Conduct data exploration and data analytics techniques. 3. Build data analytics model and interpret result. References:1. Nelli, F. (2018). Python data analytics. Apress Media, California. 2. Navlani, A., Fandango, A., & Idris, I. (2021). Python Data Analysis: Perform data collection, data processing, wrangling, visualization, and model building using Python. Packt Publishing Ltd.SIMULASI DAN REKA BENTUK PEMODELAN KOMPUTER – TSV 3333


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026117COMPUTER SIMULATION AND MODELLING DESIGN – TSV 33333 Credit HoursPrerequisite: NoneCourse SynopsisThis course demonstrates to the students on how computers may be used to simulate the behaviour of the real world systems by utilising mathematical models with an emphasis on discrete system simulation. The simulation projects will be done using simulation software packages and structured programming languages. Topics include chain of events, priority queues, random numbers generation, and statistical analyses.Course OutcomesAt the end of this course, students are able to:1. Analyse data structures for writing simulation programs. 2. Practice the method of verification and validation of simulation models. 3. Clarify the statistical data analysis on the simulation of a system, input and output of the model variables and parameters for which the model is designed. References1. Gabriele Guidi, Paulo Roberto Guimer et.al. (2019). Modelling and Simulation. ISBN: 9781642237214. Imprint Scitus Academics.2. Giuseppe Ciaburro. (2020). Hands-on Simulation Modelling with Python. ISBN: 9781838988654. Imprint Packt Publishing.3. Bernard P. Zeigler, Alexandre Muzy, Ernesto Kofman et.al. (2019). Theory of Modelling and Simulation - Discrete Event & Iterative System Foundations. Academic Press.\"


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026118ANALITIK DAN PEMBANGUNAN DATA RAYA – TSV 3343BIG DATA ANALYTICS AND DEVELOPMENT – TSV 33433 Credit HoursPrerequisite: NoneCourse SynopsisThis course aims to provide an overview of advanced machine learning, data mining and statistical techniques that arise in data analytic applications. In this course, students will learn and practice data analytic techniques, including parallel algorithms, online algorithm, locality sensitive hashing, topic modeling, structure learning, time-series analysis, and data development techniques. One or more warfare applications associated with each technique will also be discussed and applied.Course OutcomesAt the end of this course, students are able to:1. Define basic theory and concepts of big data analytics and data science process.2. Apply data science process and machine learning algorithms to solve real world problems (e.g., Linear regression, classification and clustering). 3. Build data analytics model to solve real world problems (e.g., By applying machine learning techniques and using data analytics tool). References1. Agrawal, P., Gupta, C., et. al (2022). Machine Learning and Data Science: Fundamentals and Applications 1st Edition. Wiley-Scrivener.2. Burk, S. & Miner, G.D. (2022). It’s All Analytics!: The Foundations of AI, Big Data, and Data Science Landscape for Professionals in Healthcare, Business, and Government 1st Edition. Productivity Press.3. Li, K.C., Jiang, H., Yang, L.T. & Cuzzocrea, A. (2015). Big Data: Algorithms, Analytics, and Applications. Boca Raton: CRC Press.4. Loshin, D. (2013). Big Data Analytics: From Strategic Planning to Enterprise Integration with Tools, Techniques, NoSQL, and Graph. New York: Elsevier Science.5. Services, E.M.C.E. (2015). Data Science and Big Data Analytics: Discovering, Analysing, Visualising and Presenting Data. Indianapolis: John Wiley & Sons Inc.\"


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026119FORENSIK SISTEM PEMFAILAN – TSF 3313FILE SYSTEM FORENSICS – TSF 33133 Credit HoursPrerequisite: NoneCourse SynopsisIn this course, students gain knowledge on the basic concepts and theories of a volume and file system. Students will also learn how to implement it to an investigation. For each file system, students will learn different analysis techniques and special considerations that an investigator needs to decide. This course also teaches how the information could be used in an actual case scenario.Course OutcomesAt the end of this course, students are able to:1. Explain the components of volume and partition for various file systems analysis such as FAT, NTFS, EXT2 etc. 2. Conduct digital investigation for file systems. 3. Perform investigation using file system forensic tools through team workReferences1. William Oettiger. Learn Computer Forensics: A beginner’s guide to searching, analyzing, and securing digital evidence. Packt Publishing Ltd. 2020. 2. Robinson, M. K., (2015). Digital Forensic Workbook Hands on Activities in Digital Forensics. Createspace, US.\"


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026120PENYIASATAN JENAYAH DIGITAL – TSF 3323DIGITAL CRIME INVESTIGATION – TSF 33233 Credit HoursPrerequisite: NoneCourse SynopsisIn this course, students gain knowledge on the field of computer crime. Basic criminal techniques, the relevant of laws, computer forensics will be introduced to the students. Students will also explore litigation such as depositions, expert reports and trials. This course is the students’ gateway into the world of investigating computer crimes.Course OutcomesAt the end of this course, students are able to:1. Evaluate various types of computer crimes based on the cyber laws of Malaysia. 2. Utilise different computer forensic investigation techniques and tools to solve cybercrimes. 3. Organise digital evidence from computer crime cases using computer forensic tools for the purpose of litigation. References1. Holt, T.J., Bossler, A.M. & Seigfried-Spellar, K.C. (2022). Cybercrime and Digital Forensics: An Introduction 3rd Edition. Routledge.2. Chung-Hao Chen, Wen-Chao Yang & Lijian Chen. (2021). Technologies to Advance Automation in Forensic Science and Criminal Investigation (Advances in Digital Crime, Forensics, and Cyber Terrorism). Information Science Reference.3. Easttom, C. & Taylor, J. (2011). Computer Crime, Investigation, and the Law. Boston: Course Technology.4. Malaysia & Board, I.L.B.S.L.R. (2001). Cyber Laws of Malaysia: Contains Digital Signature Act 1997 (Act 562), Computer Crimes Act 1997 (Act 563), Telemedicine Act 1997 (Act 564): as at 5 January 2001. Malaysia: International Law Book Services.5. Widup, S. (2014). Computer Forensics and Digital Investigation with EnCase Forensic. New York: McGraw-Hill Education.\"


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026121FORENSIK DATA DAN MEDIA DIGITAL – TSF 3333DATA AND DIGITAL MEDIA FORENSICS – TSF 33333 Credit HoursPrerequisite: NoneCourse SynopsisThe area of digital media forensics is not just the art of finding deleted or hidden data but it is also the understanding of the underlying technologies behind the various tools used and the ability to present scientifically valid information. In this course, students will deal with the collection, preservation and analysis of digital media such that the evidence can be successfully presented in a court of law.Course OutcomesAt the end of this course, students are able to:1. Distinguish concepts and methods to acquire digital evidence from various digital media. 2. Practice the underlying technologies behind the various tools used in digital media analysis and forensics. 3. Explain digital evidence using scientifically derived and proven methods that can be used to facilitate or further the reconstruction of events in an investigation. References1. Moreb, M. (2022). Practical Forensic Analysis of Artifacts on iOS and Android Devices: Investigating Complex Mobile Devices. Apress.2. Easttom, C. (2021). An In-Depth Guide to Mobile Device Forensics 1st Edition. CRC Press.3. Bommisetty, S., Tamma, R., Skulkin, O. & Mahalik, H. (2018). Practical Mobile Forensics. Third Edition. Birmingham: Packt Publishing.4. EC-Council. (2016). Computer Forensics: Investigating Data and Image Files (CHFI). Boston: Cengage Learning.5. EC-Council. (2016). Computer Forensics: Investigating File and Operating Systems, Wireless Networks, and Storage (CHFI). Boston: Cengage Learning.\"


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026122FORENSIK DIGITAL - TSS 3323DIGITAL FORENSICS - TSS 33233 Credit HoursPrerequisite: NoneCourse SynopsisUpon completing this course, the students will be able to practice the theory and skills necessary to perform rudimentary computer forensic investigations such as discovering evidences, recovering deleted data or damaged file information, understanding the role of technology and tool needed in investigating computer-based crime (e.g. tracing the originator of defamatory emails to recover signs of fraud), and dealing with the investigative bodies at elementary level to prosecute the necessary evidence.Course OutcomesAt the end of this course, students are able to:1. Distinguish concepts and techniques of digital forensics and its importance. 2. Conduct a systematic digital forensic investigation through student collaboration. 3. Practice proper digital forensics tools to conduct the investigation. References1. Darren R. Hayes (2021). A Practical Guide to Computer Forensics Investigations, 2nd Edition. Pearson.2. Bill Nelson, Amelia Phillips, Christopher Steuart (2019). Guide to Computer Forensics and Investigations, 6th Edition. Cengage.3. Michael W. Graves (2014). Digital Archaeology: The Art and Science of Digital Forensics. Addison-Wesley Professional


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026123PEMPROSESAN IMEJ DIGITAL - TSI 3333DIGITAL IMAGE PROCESSING - TSI 33333 Credit HoursPrerequisite: NoneCourse SynopsisThe course is designed to introduce students to theoretical concepts and practical issues associated with image processing. The following topics are covered: image pre-processing, image enhancement, image segmentation and analysis. A special effort will be made to develop students' problem solving skills and engineering intuition in the subject area. Upon completion of the course, the students should be knowledgeable and competent in applying the concepts, and should be capable of reading advanced textbooks and research literature in the image-processing field.Course OutcomesAt the end of this course, students are able to:1. Describe concepts and techniques of digital image processing through the study of most important digital image models.2. Construct sufficient knowledge to be able to reason about various technique of digital image.3. Build a basic digital image processing application module.References1. Gonzales, R.C. and Woods, R.E. (2019). Digital Image Processing. 4th Edition. New Jersey: Prentice Hall.2. Gonzales, R.C. , Woods, R.E. & Eddins, S.L. (2020). Digital Image Processing Using MATLAB 2nd Edition. New Jersey: Prentice Hall.3. Suzaimah, R. and Norazlin, I. (2022). Asas Pengaturcaraan Matlab. Kuala Lumpur Penerbit UPNM.4. McAndrew, A. (2015). A Computational Introduction to Digital Image Processing 2nd Edition. Chapman and Hall/CRC.5. Norliza, M.N. & Omar, M.R. (2009). Pemprosesan Imej untuk Pengguna Baru Menggunakan MATLAB. Kuala Lumpur: Universiti Teknologi Malaysia.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026124FORENSIK RANGKAIAN – TSF 3723NETWORK FORENSICS – TSF 37233 Credit HoursPrerequisite: TSS 3323 Digital ForensicsTSS 3353 Ethical HackerTSS 3743 Network Intrusion Detection SystemCourse SynopsisThis course enables the understanding of how to recognise hackers' tracks and uncover the network-based evidence. It provides an explanation on how to uncover suspicious e-mail attachment from packet captures. The course also explores tracking intrusion via network and understanding of encryption-cracking attacks and other related tracking mechanism and techniques.Course Learning OutcomesAt the end of this course, students are able to:1. Evaluate methodologies for managing network forensics investigation.2. Manage forensic evidence from multiple communication devices ie routers, firewalls and web proxies. 3. Construct a plan to manage network control in an organisation. References1. Jaswal, N. (2019). Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensic tools. Packt Publishing Ltd. 2. Davidoff, S. & Ham, J. (2012). Network Forensics: Tracking Hackers Through Cyberspace.Westford: Pearson Education Inc. 3. Datt, S. (2016). Learning Network Forensics. Birmingham: Packt Publishing.4. Messier, R. (2017). Network Forensics. Indianapolis: Wiley.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026125PENGINTIPAN KETENTERAAN DAN INDUSTRI – TSF 3733MILITARY AND INDUSTRY ESPIONAGE – TSF 37333 Credit HoursPrerequisite: TSS 3323 Digital ForensicsTSS 3353 Ethical HackerCourse SynopsisIn this course, students will learn to define and describe the espionage. This module examines the motivations for military and industrial espionage and the various methods of attack on the physical security of an organisation, its electronic infrastructures and its staff and suppliers. Students will learn to analyse and mitigate potential attacks through military and industrial espionage, and will carry out risk management processes in military and industrial espionage.Course Learning OutcomesAt the end of this course, students are able to:1. Explain defense and countermeasures for potential attacks in the military and industrial espionage cases..2. Assess the concepts, types and characters of military and industrial espionage. 3. Build basic espionage behaviours and characteristics for analysing military and industrial espionage. References1. Pehlivan, O. K. (2018). Confronting Cyberespionage Under International Law. Routledge. 2. Clancy, T. & Greaney, M. (2012). Threat Vector. New York: Penguin Publishing Group.3. Stoll, C. (2012). Cuckoo’s Egg. New York: Knopf Doubleday Publishing Group.4. Brown, A. (2011). The Grey Line: Modern Corporate Espionage and Counter Intelligence. Columbus: Amur Strategic Research Group.5. Winkler, I. (2005). Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don’t Even Know You Encounter Every Day. Indianapolis: Wiley.6. Carr, J. (2011). Inside Cyber Warfare: Mapping the Cyber Underworld. Sebastopol: O’Reilly Media.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026126PENYELIDIKAN OPERASI – TSI 3743OPERATIONAL RESEARCH - TSI 37433 Credit HoursPrerequisite: NoneCourse SynopsisThis course is designed to expose students with modelling, solution and analysis of such optimisation problems that are found in various industries and application areas. The use of optimisation is common in computer science especially in artificial intelligence and computer security. Examples of applications are widely encountered in transportation and logistics, manufacturing environments, service operations, product design and development and so forth. Topics include linear programming, transportation model, network model, project management, and analytic hierarchy process.Course OutcomesAt the end of this course, students are able to:1. Explain basic concepts of objectives, decision variables, constraints correctly, transportation, assignment, networks, queuing models and simulation. 2. Demonstrates knowledge with the basic notions and techniques for algorithm and basic operations research. 3. Practice simple operational research problems using linear programming, network model, transportation model and simulation model. References1. Knight, V. & Palmer, G. (2022). Applied Mathematics with Open-Source Software: Operational Research Problems with Python and R (Chapman & Hall/CRC Series in Operations Research) 1st Edition. Chapman and Hall/CRC.2. Anderson, S. and Williams, M. (2018). An Introduction to Management Science, 15th Edition. Washington: Cengage Learning. \"


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026127PENGGODAM BERETIKA - TSS 3353ETHICAL HACKER - TSS 33533 Credit HoursPrerequisite: NoneCourse SynopsisThe course introduces the knowledge on how hackers attack computers and networks and how to protect systems from hackers. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform hands-on labs such as port scanning, footprinting, sniffing and other techniques used by computer hackers.Course OutcomesAt the end of this course, students are able to:1. Categorise vulnerabilities in computer networks and systems. 2. Explain hacking techniques used to breach and exploit the computers and networks.3. Report countermeasures to mitigate the security threats. References1. Gregg, Michael. (2017). Certified Ethical Hacker (CEH) Version 9 Cert Guide (Certification Guide). 2nd Edition. Pearson IT Certification, Indiana.2. Oriyano, Sean-Philip. (2016). CEH v9: Certified Ethical Hacker Version 9 Study Guide. 3rd Edition. Sybex. New Jersey.3. Rahalkar, Sagar Ajay. (2016). Certified Ethical Hacker (CEH) Foundation Guide. Apress. New York. 4. Regalado, D., Harris, S., Harper, A., Eagle, C., Ness, J., Spasojevic, B., Linn, R and Sims, S. (2015). Gray Hat Hacking: The Ethical Hacker’s Handbook. 4th Edition. McGrawHill/Osborne. New York.5. Walker, Matt. (2016). CEH Certified Ethical Hacker All-in-One Exam Guide. 3rd Edition. McGraw-Hill Education. New York.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026128PEMPROSESAN BAHASA TABII – TSI 3373NATURAL LANGUAGE PROCESSING – TSI 33733 Credit HoursPrerequisite: NoneCourse SynopsisNatural Language Processing (NLP) covers any kind of computer manipulation of natural language. NLP involves “understanding” complete human utterances. Technologies based on NLP are becoming increasingly widespread. For example, phones and handheld computers support predictive text and handwriting recognition; web search engines give access to information in unstructured text; machine translation etc. By providing more natural human-machine interfaces, and more sophisticated access to stored information, language processing has come to play a central role. Therefore, this syllabus will introduce text corpora, lexical resources, processing raw text, word tagging, text classification, information extraction, sentence structures with context free grammar and sentence meaning.Course OutcomesAt the end of this course, students are able to:1. Describe the concepts and technique in natural language processing for computer manipulation of natural language. 2. Construct technique for the implementation of natural language understanding in computer systems. 3. Practice the NLP techniques to related applications. References1. Hobson Lane, Cole Howard, Hannes Max Hapke. 2019. Natural Language Processing in Action: Understanding, analysing, and generating text with Python. Manning Publications Co.2. Sowmya Vajjala, Bodhisattawa Majumder, Anuj Gupta, Harshit Surana. 2020. Practical Natural Language Processing: A Comprehensive Guide to Building Real-World NLP Systems. O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA.3. Steven Bird, Ewan Klein, and Edward Loper. 2009. Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit. O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472.4. Christopher D. Manning and Hindrich Shütze. 1999. Foundations of Statistical Natural Language Processing 1st Edition. MIT Press Ltd. Cambridge, United States.5. Dan Jurafsky and James H. Martin. 2020. Speech and Language Processing 3rd Edition. Pearson Education,Inc.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026129PERKOMPUTERAN PINTAR - TSI 3313COMPUTATIONAL INTELLIGENCE - TSI 33133 Credit HoursPrerequisite: NoneCourse SynopsisComputational Intelligence is a software program that can sense its environment, choose rational actions based on their percepts, and execute these actions. The course gives a broad introduction to the new and rapidly expanding field of agent-based computing. It introduces the key concepts and models of the field dealing both with the individual agents and with their interactions.Course OutcomesAt the end of this course, students are able to:1. Distinguish the concept of intelligent agents and multi-agents system. 2. Demonstrate agent-based systems with other software applications. 3. Produce an intelligent agent-based system for a practical application. References1. Wooldridge, M. (2009). An Introduction to MultiAgent Systems. New York: Wiley and Sons.2. Padgham, L. & Winikoff, M. (2004). Developing Intelligent Agent Systems: A Practical Guide. New York: John Wiley & Sons.3. Bui, T.D., Tuong, V.H. & Quang, T.H. (2008). Intelligent Agents and Multi-Agent Systems. 11th. Pacific Rim International Conference on Multi-Agents. PRIMA 2008, Hanoi, Vietnam, December 15-16, Proceedings. 4. Dignum, F., Bradshaw, J., Silverman, B.G. & Doesburg, W.V. (2010). Agents for Games and Simulations: Trends in Techniques, Concepts and Design. London: Springer.5. Pechoucek, M., Thompson, S.G. & Voos, H. (2008). Defence Industry Applications of Autonomous Agents and Multi-Agent Systems. London: Springer.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026130SISTEM DAN PEMEROLEHAN BERASASKAN PENGETAHUAN - TSI 3343KNOWLEDGE-BASED SYSTEMS AND ACQUISITION - TSI 33433 Credit HoursPrerequisite: NoneCourse SynopsisThis course provides the students with the knowledge and understanding of knowledge-based systems and their applications, in particular expert systems, Such systems are platforms for the use of fuzzy logic to handle uncertainties. This course introduces the concept of fuzzy logic and fuzzy theory sets including fuzzy relations, construction of membership functions and fuzzy arithmetic. This course will discuss the three important phases in Fuzzy Logic – fuzzification, fuzzy rules/inference, and defuzzification, culminating in a fuzzy system development.Course OutcomesAt the end of this course, students are able to:1. Analyse the fundamental concepts and techniques of knowledge-based in problem solving. 2. Construct the structure of knowledge-based systems, especially in expert systems and fuzzy logic.3. Build knowledge-based application using suitable tools. References1. Joseph, G. & Gary, R. (2005). Expert Systems: Principles and Programming. Boston: PWS Publishing Company. 2. Durkin, J. (1994). Expert Systems: Design and Development. New Jersey: Prentice Hall. 3. Padhy, N. (2006). Artificial Intelligence and Intelligent Systems. Third Edition. Oxford: Oxford University Press.4. Jones, T. (2008). Artificial Intelligence: A System Approach. Sudbury: Infinity Science Press. 5. Belohlavek, R. & Klir, G.J. (2011). Concepts and Fuzzy Logic. Boston: The MIT Press.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026131KRIPTOGRAFI TSS 3313CRYPTOGRAPHY - TSS 33133 Credit HoursPrerequisite: NoneCourse SynopsisThis is a course in modern cryptography emphasising formal definitions and proofs of security. Core topics include private- and public-key schemes for encryption and message authentication, cryptographic hash functions, and authenticated encryption schemes. Additionally, the course includes some analyses of the Data Encryption Standard (DES) block cipher, Rivest Cipher 4 (RC4) stream cipher, and real world security protocol such as Secure Sockets Layer (SSL).Course OutcomesAt the end of this course, students are able to:1. Acquire concepts of cryptography. 2. Investigate cryptographic techniques and principles such as symmetric encryption,asymmetric encryption, key management, hashing and message digest.3. Integrate a secure web server using Hypertext Transfer Protocol Secure (HTTPS) and Secure Socket Layer (SSL). References1. Cryptography and Network Security - Principles and Practice, 8th Edition, William Stallings Pearson Education,134444280 (15-Sept-20)2. Introduction to Modern Cryptography: Third Edition, Jonathan Katz, Yehuda Lindell, Chapman and Hall,815354363 (21-Dec-20) 3. MYSEAL: MySEAL, National Trusted Cryptographic Algorithm List (Senarai Algoritma Kriptografi Terpercaya Negara) retrieved from https://mykripto.cybersecurity.my/index.php/services/myseal


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026132KESELAMATAN RANGKAIAN WAYARLES - TSS 3343WIRELESS NETWORK SECURITY - TSS 33433 Credit HoursPrerequisite: NoneCourse SynopsisSecuring wireless networks is extremely important and challenging due to the nature of wireless connectivity. Unprotected wireless networks are vulnerable to several security attacks including eavesdropping and jamming that have no counterpart in wired networks. The topics that will be discussed are wireless network security fundamentals, types of wireless network security technology, wireless standards, enhanced security for wireless LANs and WANs in the enterprise, handling wireless private information, wireless network security – design issues, cost justification and consideration, standards design issues, implementation plan development, wireless network security planning techniques, testing techniques, installation and deployment and management of wireless network security.Course OutcomesAt the end of this course, students are able to:1. Show the concepts in wireless networking, protocols, and standards. 2. Adapt about threats faced by wireless networks. 3. Demonstrate the concepts in planning, designing, and implementing of a secure network. References1. Yi Q., Feng Y.; Hsiao-Hwa C. (2022). Security in Wireless Communication Networks: WileyIEEE Press2. Wolfgang O. (2021). Wireless Network Security Second Edition: Routledge, Taylor & Francis. 3. Meyers, R. (2019). Wireless Network Security: Introduction and Explanation of Cybersecurity and Hacking Technology for Wireless System, Kali Linux Tools and Other: Independently


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026133INTERNET BENDA – TSI 3363INTERNET OF THINGS – TSI 33633 Credit HoursPrerequisite: NoneCourse SynopsisThe objective of the course is to expose the students to the concept, task, technique and algorithm in of Internet of Things. Students will also be exposed to apply of Internet of Things techniques to a particular applications such as for smart and remote monitoring system. Internet of Things (IoT) is presently a hot technology worldwide. Government, academia, and industry are involved in different aspects of research, implementation, and business with IoT. IoT cuts across different application domain verticals ranging from civilian to defence sectors. These domains include agriculture, space, healthcare, manufacturing, construction, water, and mining, which are presently transitioning their legacy infrastructure to support IoT. IoT-based applications such as innovative shopping system, infrastructure management in both urban and rural areas, remote health monitoring and emergency notification systems, and transportation systems, are gradually relying on IoT based systems. Therefore, it is very important to learn the fundamentals of this emerging technology.Course OutcomesAt the end of this course, students are able to:1. Describe concepts and techniques of Smart Objects and IoT Architectures.2. Discover about various IOT-related programming and protocols.3. Develop simple IoT Systems using Arduino and Raspberry Pi.References1. Adeel Javed. (2016). Building Arduino Projects for the Internet of Things, Apress .2. Adrian McEwen, Hakim Cassimally. (2013). Designing the Internet of Things. Wiley3. Anuradha, J, Tripathy, B.K., I. (2018). Internet of things (IoT) : technologies, applications, challenges and solutions. CRC Presss: Taylor & Francis4. Dimitrios Serpanos, Marilyn Wolf, (2018). Internet-of-Things (IoT) Systems: Architectures, Algorithms, Methodologies.Springer International Publishing.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026134E-DAGANG – TSI 3383E-COMMERCE – TSI 33833 Credit HoursPrerequisite: NoneCourse SynopsisThis course focuses on e-commerce principles from a business perspective, providing an overview of business and technology topics, business models, virtual chains, social innovation and marketing strategies. In addition, some major issues associated with e-commerce include security, privacy, intellectual property rights, authentication, encryption, acceptable use policies, and legal liabilities. Topics covered include E-business Models, E-business Infrastructure, Selling and Marketing on the Web, Web Server Hardware and Software, B2C and B2B strategies, Virtual Communities, Web Portals, E-commerce Software, Payment Systems, Social Media, Security and User Experience.Course OutcomesAt the end of this course, students are able to:1. Determining electronic commerce and the stakeholders and their capabilities and limitations in the strategic convergence of technology and business.2. Organise components, systems and/or processes to meet required specifications for a web presence.3. Develop awareness of ethical, social and legal aspects of e-commerce and propose features of existing e-commerce businesses, future directions or innovations for specific businesses.References1. Laudon, K.C,& Traver, C.G., (2020), E-Commerce 2020–2021: Business, Technology and Society, Global Edition, 16th edition, Pearson InternationalEC-Council. (2016).2. Hammersley, I. & Hammersley, M. (2018), Ultimate Guide To E-commerce Growth. Smartebusiness Ltd.3. Norfolk, M. & Holden, (2011) G. Starting an Online Business For Dummies, John Wiley & Sons Australia Ltd


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026135SINOPSIS KURSUS PENGKHUSUSANPROGRAM IJAZAH SARJANA MUDA SAINS KOMPUTER(KEPINTARAN BUATAN) DENGAN KEPUJIAN (ZC21)PERKOMPUTERAN PINTAR - TSI 3313COMPUTATIONAL INTELLIGENCE - TSI 33133 Credit HoursPrerequisite: NoneCourse SynopsisComputational Intelligence is a software program that can sense its environment, choose rational actions based on their percepts, and execute these actions. The course gives a broad introduction to the new and rapidly expanding field of agent-based computing. It introduces the key concepts and models of the field dealing both with the individual agents and with their interactions.Course OutcomesAt the end of this course, students are able to:1. Distinguish the concept of intelligent agents and multi-agents system. 2. Demonstrate agent-based systems with other software applications. 3. Produce an intelligent agent-based system for a practical application. References1. Wooldridge, M. (2009). An Introduction to MultiAgent Systems. New York: Wiley and Sons.2. Padgham, L. & Winikoff, M. (2004). Developing Intelligent Agent Systems: A Practical Guide. New York: John Wiley & Sons.3. Bui, T.D., Tuong, V.H. & Quang, T.H. (2008). Intelligent Agents and Multi-Agent Systems. 11th. Pacific Rim International Conference on Multi-Agents. PRIMA 2008, Hanoi, Vietnam, December 15-16, Proceedings. 4. Dignum, F., Bradshaw, J., Silverman, B.G. & Doesburg, W.V. (2010). Agents for Games and Simulations: Trends in Techniques, Concepts and Design. London: Springer.5. Pechoucek, M., Thompson, S.G. & Voos, H. (2008). Defence Industry Applications of Autonomous Agents and Multi-Agent Systems. London: Springer.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026136PERLOMBONGAN DATA - TSI 3323DATA MINING - TSI 33233 Credit HoursPrerequisite: NoneCourse SynopsisThe course introduces the concept and techniques of data mining. The main topics discussed include knowledge discovery process, data preprocessing and data mining techniques such as decision tree, regression, neural network, and clustering. The course will teach the students to find hidden pattern of information from large volume of data using selected data mining tools. Course OutcomesAt the end of this course, students are able to:1. Explain the fundamental concepts and models of data mining techniques.2. Analyse the given data set using appropriate data mining techniques.3. Describe the results of data mining techniques correctly and precisely.References1. Han, J. & Kamber, M. (2011). Data Mining: Concepts and Techniques. Third Edition.Massachusetts: Morgan Kaufmann Publisher.2. Georges, J. (2008). Applied Analytics using SAS Enterprise Miner Course Notes. Cary, NC: SAS Institute Inc.3. Tan, P.N., Steinbach, M. & Kumar, V. (2006). Introduction to Data Mining. Boston: Pearson Addison-Wesley.4. Cerrito, P.B. (2007). Introduction to Data Mining using SAS Enterprise Miner. Cary, NC: SAS Institute Inc.5. Roiger, R.J. & Geatz, M.W. (2003). Data Mining: A Tutorial-based Primer. Boston: Pearson Addison-Wesley.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026137PEMPROSESAN IMEJ DIGITAL - TSI 3333DIGITAL IMAGE PROCESSING - TSI 33333 Credit HoursPrerequisite: NoneCourse SynopsisThe course is designed to introduce students to theoretical concepts and practical issues associated with image processing. The following topics are covered: image pre-processing, image enhancement, image segmentation and analysis. A special effort will be made to develop students' problem solving skills and engineering intuition in the subject area. Upon completion of the course, the students should be knowledgeable and competent in applying the concepts, and should be capable of reading advanced textbooks and research literature in the image-processing field.Course OutcomesAt the end of this course, students are able to:1. Describe concepts and techniques of digital image processing through the study of most important digital image models.2. Construct sufficient knowledge to be able to reason about various technique of digital image.3. Build a complete digital image processing systemReferences1. Gonzales, R.C. and Woods, R.E. (2017). Digital Image Processing. 4th Edition. New Jersey: Prentice Hall.2. Gonzales, R.C. , Woods, R.E. & Eddins, S.L. (2012). Digital Image Processing Using MATLAB 2nd Edition. New Jersey: Prentice Hall.3. McAndrew, A. (2015). A Computational Introduction to Digital Image Processing 2nd Edition.Chapman and Hall/CRC.4. Norliza, M.N. & Omar, M.R. (2009). Pemprosesan Imej untuk Pengguna Baru Menggunakan MATLAB. Kuala Lumpur: Universiti Teknologi Malaysia.5. Solomon, C. and Breckon, T. (2011). Fundamentals of Digital Image Processing: A Practical Approach with Examples in MATLAB. Prentice Hall. 1st Edition. Wiley.


Buku Panduan Akademik, FSTP Sesi Akademik 2025/2026138SISTEM DAN PEMEROLEHAN BERASASKAN PENGETAHUAN - TSI 3343KNOWLEDGE-BASED SYSTEMS AND ACQUISITION - TSI 33433 Credit HoursPrerequisite: NoneCourse SynopsisThis course provides the students with the knowledge and understanding of knowledge-based systems and their applications, in particular expert systems, Such systems are platforms for the use of fuzzy logic to handle uncertainties. This course introduces the concept of fuzzy logic and fuzzy theory sets including fuzzy relations, construction of membership functions and fuzzy arithmetic. This course will discuss the three important phases in Fuzzy Logic – fuzzification, fuzzy rules/inference, and defuzzification, culminating in a fuzzy system development.Course OutcomesAt the end of this course, students are able to:1. Analyse the fundamental concepts and techniques of knowledge-based in problem solving. 2. Construct the structure of knowledge-based systems, especially in expert systems and fuzzy logic.3. Build knowledge-based application using suitable tools. References1. Joseph, G. & Gary, R. (2005). Expert Systems: Principles and Programming. Boston: PWS Publishing Company. 2. Durkin, J. (1994). Expert Systems: Design and Development. New Jersey: Prentice Hall. 3. Padhy, N. (2006). Artificial Intelligence and Intelligent Systems. Third Edition. Oxford: Oxford University Press.4. Jones, T. (2008). Artificial Intelligence: A System Approach. Sudbury: Infinity Science Press. 5. Belohlavek, R. & Klir, G.J. (2011). Concepts and Fuzzy Logic. Boston: The MIT Press.


Click to View FlipBook Version