← Back to Home
Course Work
Academic coursework completed as part of my B.S. in Computer Science with a concentration in Cybersecurity, providing a strong foundation in software development and computer systems.
Computer Science Core
Fundamental computer science concepts and programming principles
Data Structures
Study of abstract data types, algorithms for manipulating data structures, and analysis of algorithm complexity.
Key Concepts & Skills
Arrays
Linked Lists
Trees
Hash Tables
Graphs
Algorithm Analysis
Algorithms
Design and analysis of efficient algorithms, including sorting, searching, and graph algorithms.
Key Concepts & Skills
Sorting Algorithms
Graph Algorithms
Dynamic Programming
Greedy Algorithms
Complexity Analysis
Machine Organization
Computer architecture, assembly language programming, and low-level system concepts.
Key Concepts & Skills
Assembly Language
CPU Architecture
Memory Management
Computer Hardware
System Programming
Operating Systems
Principles of operating system design including process management, memory management, and file systems.
Key Concepts & Skills
Process Management
Memory Management
File Systems
Concurrency
System Calls
Parallel Computing
Design and implementation of parallel algorithms, multi-threading concepts, and distributed computing systems.
Key Concepts & Skills
Multi-threading
Parallel Algorithms
Synchronization
Distributed Systems
Performance Optimization
GPU Computing
Automata Theory
Formal languages, finite automata, context-free grammars, and computational complexity theory.
Key Concepts & Skills
Finite Automata
Regular Expressions
Context-Free Grammars
Turing Machines
Computational Complexity
Formal Languages
Software Engineering & DevOps
Modern software development practices, CI/CD pipelines, containerization, and agile methodologies.
Key Concepts & Skills
Agile Development
CI/CD
Docker
Version Control
Testing Strategies
DevOps Practices
Software Architecture
Cybersecurity
Security-focused courses covering cloud infrastructure and system protection
Cloud Computing & Security
Cloud architecture, deployment models, and security considerations for cloud-based systems and services.
Key Concepts & Skills
Cloud Architecture
AWS/Azure/GCP
Cloud Security
Virtualization
Scalability
Infrastructure as Code
Cloud Services
System Hardening & Protection
Techniques for securing systems, implementing defense mechanisms, and protecting against cyber threats.
Key Concepts & Skills
System Security
Vulnerability Assessment
Security Hardening
Access Control
Intrusion Detection
Security Policies
Threat Mitigation
Computer Networks
Network protocols, architecture, and communication systems including TCP/IP, routing, and network security.
Key Concepts & Skills
TCP/IP
Network Protocols
Routing
Network Security
OSI Model
DNS
Socket Programming
Mathematics
Mathematical foundations essential for computer science and problem-solving
Calculus 1
Limits, derivatives, and applications of differentiation including optimization and related rates.
Key Concepts & Skills
Limits
Derivatives
Differentiation Techniques
Optimization
Related Rates
Applications of Calculus
Calculus 2
Integration techniques, sequences and series, and applications of integration.
Key Concepts & Skills
Integration Techniques
Sequences & Series
Parametric Equations
Polar Coordinates
Convergence Tests
Applications of Integration
Statistics 1
Probability theory, statistical inference, hypothesis testing, and data analysis techniques.
Key Concepts & Skills
Probability
Statistical Inference
Hypothesis Testing
Descriptive Statistics
Confidence Intervals
Data Analysis
Discrete Mathematics
Mathematical structures and concepts fundamental to computer science including logic, sets, and graph theory.
Key Concepts & Skills
Logic
Set Theory
Graph Theory
Combinatorics
Proof Techniques
Number Theory
Academic Background
Degree program and academic focus
Bachelor of Science in Computer Science
Concentration in Cybersecurity
This coursework has provided me with a comprehensive understanding of computer science fundamentals, preparing me for software development roles and cybersecurity challenges in modern technology environments.