Course Syllabus

The table below gives the planned syllabus for the course. This syllabus will be changed as needed. When it becomes necessary to revise the schedule, this page will be updated to reflect the changes.

Material describing the course and its objectives and grading policies is available elsewhere.

All course meetings are concerned with all of the course's essential learning outcomes.

Dates Topics Assignment or Presentation
Jan. 12 Introduction and Course Overview  
Jan. 14 Presentation Basics Aug. 27: HW1
Jan. 19 Presentations for HW1 HW1 presentations
Jan. 21 Presentations for HW1, Group Formation  
Jan. 26 Business and Other Considerations, Discussion of HW2, Group Formation  
Jan. 28 Critical Thinking About Innovations Topic email for HW2
Feb. 2 Sources of Information  
Feb. 4 Presentations for HW2 HW2 presentations.
  • Abello-Ujoodha: Solving the limitations of 5G with small cell networks for Airvoice Ltd
  • Brinson-Cuvier: Solving the Loss of Projected Income Growth Due to Covid-19 with the Introduction of NearYou for East Colonial Outdoor Flea Market
  • Montes-Rung: Solving the Problem of Certifications Requirements Using Billable Hour Certificate Tracker and Manager for Kratos Defense
Feb. 9 Presentations for HW2 HW2 presentations.
  • Altman-Lambert: Solving the lack of security between applications with NSX Advanced Load Balancer for Netflix
  • Kelly-Rey: Simplifying security processes and workflow by using a SOAR tool for Orlando Health
  • Luchenko-Milanko: Solving Customer Support Ratings with a Gamification Website for Verizon
Feb. 11 Presentations for HW2 HW2 presentations
  • Luiz-Trosine: Solving traditional database limitations with Hyperconverged Infrastructure for Health Express
  • Mack-Stephen: Solving Business Operations with IT/OT Convergence for Microsoft Corporation
  • Bashir-Phan: Solving the lack of security with an automated system that detects threats and analyzes security risks for Teladoc
Feb. 16 Presentations for HW2, Discussion of HW3 HW2 presentations
  • Archibald-Oliphant: Solving Profitability Issues by Limiting Employee Internet Interactions for Hero Facility Services
  • Cruz-Tapia: Using Machine Learning and Computer Vision on Social Networks to Prosecute Criminals for the FBI
  • Kenny-Williams-Carr: Solving Customer Usability and User Growth Problems with Search Engine Innovations for Twitch
  • Leszkowicz-Thelifort: Solving Remote Network Capabilities with SD-WAN for Pfizer
Feb. 18 Presentations for HW2 HW2 presentations
  • Caputo-Estevez: Solving WFH and security issues with a SASE Network Model for Convergy's
  • Choksi-Rinaldo: Preventing Onsite Data Breaches with RFID Chip Implantations for HostDime Data Center
  • Rumbaugh-Walton: Solving database exposure with DBDefence for Oneclass
Topic email for HW3
Feb. 23 Presentations for HW2, Discussion of HW4 and Reports HW2 presentations
  • Burtt-Hallstrand: Solving Communication Issues with Satellite Mega-constellations for the Australian Department of Infrastructure, Transport, Regional Development and Communications
  • Austin-Camp: Solving human risk factors in security with Cofense's Phishing Attack Prevention and Detection solutions for GoDaddy
  • Shah-Schmuck: Solving the lack of information Using Prometeo for HHS
Feb. 25 Presentations for HW3 HW3 presentations
  • Brinson-Cuvier: Using a Hybrid Network Monitoring tool to Solve the Problem of Inefficient SD-WAN Root Cause Analysis for Citrix
  • Montes-Rung: Using hardware authenticity practices to Solve counterfeit hardware sales for Cyxtera data centers
  • Luchenko-Milanko: Using android/iOS app development to solve the lack of covid COVID-19 safety measures/awareness for AirBnB's app
Mar. 2 Presentations for HW3 HW3 presentations
  • Leszkowicz-Thelifort: Using BioCatch's Behavioral Biometrics to solve unsecure mobile banking for Fairwinds Credit Union
  • Kelly-Rey: Using Security Awareness Training to Solve Social Engineering Attacks for PWC Enterprise
  • Cruz-Tapia: Using quantum computing to aid in the prevention and response to highly transmissible diseases for the CDC
  • Abello-Ujoodha: Using Blockchain to Solve Identity and Source Anonymity Problems for Journalists for Civil
Mar. 4 Presentations for HW3 HW3 presentations
  • Burtt-Hallstrand: Using Adaptive Security Systems to Solve Possible Data Breaches for Verizon Communication Inc.
  • Altman-Lambert: Using the Ethereum Network to Solve overpaying and insecurity with centralized crouwdfunding platforms for Wefund
  • Bashir-Phan: Using BSIMM to solve the repeated hacking of user's accounts for Sony's PSN
Mar. 9 Presentations for HW3, Overview of HW4 HW3 presentations
  • Mack-Stephen: Using Generative Adversarial Networks to Make Advertisement Improvements for Nike
  • Kenny-Williams-Carr: Using Dynatrace to Solve Server Instability for Discord Inc.
  • Ruiz-Torsine: Using Edge Computing to Solve Inefficiencies & Quality-of-Life Issues for the City of Orlando
Mar. 11 Presentations for HW3 HW3 presentations
  • Choksi-Rinaldo: Using Ironscales Email Security platform to prevent email attacks for Yahoo
  • Austin-Camp: Using Qualys VMDR to Solve IoT and other vulnerabilities for AdventHealth
Mar. 16 Presentations for HW3 HW3 presentations
  • Schmuck-Shah: Using MedWand to Solve the need of needing a doctor or specialist during a disaster for the Department of Health and Human Services
  • Rumbaugh-Walton: Using Ideal's machine learning candidate screening process to reduce resume review bias and workload for AeroDef
  • Archibald-Oliphant: Using Improved ticket processing to Solve Communication needs for Hero Facility Services
Topic email for HW4
Mar. 18 HW3 delayed presentation, Report Writing and Formatting (for HW4)
  • Caputo-Estevez: Solving Grocery Checkout Queues with IoT for Whole Foods
  • Mar. 23 Presentations for HW4 HW4 presentations
    • Leszkowicz-Thelifort: Using Eclypsium's Device Monitoring to protect Smart Charging stations against cyberattacks for ChargePoint Inc.
    • Luchenko-Milanko: Solving the lack of exposure/customers for Adrijanas Salon by creating an AI-powered 3D face shaping application
    Mar. 25 Presentations for HW4 HW4 presentations
    • Kenny-Williams-Carr: Solving Poor Quality Investments with Steam Greenlight 2 for Valve Corporation
    • Cruz-Tapia: Using advanced video analytics to optimize security screenings for the TSA
    • Montes-Rung: Solving the problem of fake accounts for Snapchat using an Account Tracker
    HW4 report draft
    Mar. 30 Presentations for HW4 HW4 presentations
    • Austin-Camp: Using ImmuniWeb AI to solve mobile application vulnerabilities for Walgreens
    • Brinson-Cuvier: BotNulify, Netflix's Response on fighting the dark web
    Apr. 1 Presentations for HW4 HW4 presentations
    • Altman-Lambert: Solving the lack of live assistance in the process of learning how to code for Codeacademy
    • Choksi-Rinaldo: Using Smart Glass technology to display time critical information for the City of Orlando
    • Abello-Ujoodha: Solving the limitations of Internet Access on Planes with Li-Fi for Air France
    Apr. 6 Presentations for HW4 HW4 presentations
    • Mack-Stephen: Using Graphene to Improve the Efficiency of Microchips for AMD
    • Kelly-Rey: Using Virtual Security Analysts for Delta Airlines to Bridge the Cybersecurity Skills Gap
    • Ruiz-Trosine: Addressing insecure IoT devices using Palo Alto's IoT security for the city of Austin
    Apr. 8 Presentations for HW4 HW4 presentations
    • Rumbaugh-Walton: Returning to Safe International Travel using Mastercard's Trust Stamp technology for American Airlines
    • Schmuck-Shah: Using Flowcytobot to Solve the growing concern of polluted water supplies for HHS
    • Bashir-Phan: Using GRC audit software to reduce risk of fraud in Wells Fargo's banking system
    HW4 final report
    Apr. 13 No class, Spring Break, no class  
    Apr. 15 No class, Spring Break, no class  
    Apr. 20 Presentations for HW4 HW4 presentations
    • Burtt-Hallstrand: Using Biometric Security measures to prevent data breaches for Target Department Stores
    • Archibald-Oliphant: Solving the problem of distance learning using Microsoft Teams for Hero Facility Services
    • Caputo-Estevez: Improving Road Safety using V2I & V2V Communication for Central FL Expressway Authority
    Apr. 22 Summary and Review (no presentations)  

    Return to top

    Bibliography

    [Charan17]
    Ram Charan. What the CEO Wants You to Know: How Your Company Really Works. Crown Business, 2017 edition. ISBN 9780553417784.

    Return to top

    Course Content and Policies

    The course's content and grading polices are described on separate web pages. See the links on the top left of this page.

    Return to top

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    Last modified Thursday, April 8, 2021.

    This web page is for COP 4910 at the University of Central Florida. The details of this course are subject to change as experience dictates. You will be informed of any changes. Please direct any comments or questions to Gary T. Leavens at Leavens@ucf.edu. Some of the policies and web pages for this course are quoted or adapted from other courses I have taught, in partciular, COP 4020.