{"id":544,"date":"2022-03-08T12:17:50","date_gmt":"2022-03-08T12:17:50","guid":{"rendered":"https:\/\/afit.edu.ng\/home\/?page_id=544"},"modified":"2022-03-25T11:07:38","modified_gmt":"2022-03-25T11:07:38","slug":"faculty-of-computing","status":"publish","type":"page","link":"https:\/\/afit.edu.ng\/home\/faculty-of-computing\/","title":{"rendered":"Faculty of Computing"},"content":{"rendered":"<p>[vc_row][vc_column][vc_cta h2=&#8221;FACULTY OF COMPUTING&#8221; h2_font_container=&#8221;font_size:80px|color:%23ffffff&#8221; h2_google_fonts=&#8221;font_family:Abel%3Aregular|font_style:400%20regular%3A400%3Anormal&#8221; txt_align=&#8221;center&#8221; use_custom_fonts_h2=&#8221;true&#8221; css=&#8221;.vc_custom_1646750199344{background-color: #1b0066 !important;}&#8221;][\/vc_cta][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;3\/4&#8243;][vc_tta_tour color=&#8221;sky&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Faculty of Computing&#8221; tab_id=&#8221;1646755749173-a16477c2-0e1e&#8221;]\t<div\n\t\t\t\t\tclass=\"bs-shortcode bs-text bscb-43687  vc_custom_1647612125195 have_bg\">\n\t\t\t\t<h3 class=\"section-heading sh-t2 sh-s1\">\n\t\t\t\t<span class=\"h-text\">Faculty of computing<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t<div class=\"bs-text-content\">\n\t\t\t<p>The Faculty of Computing provides the education and variety of skills necessary to succeed within high technology environments in industry, society and the church, and for software and hardware design, manufacture and maintenance in this decade. Through projects involving real life applications, students are given broad background knowledge of the technological enterprise system within a framework of moral and ethical guiding principles. Specifically, students are exposed to experiences that enable them to:<\/p>\n<p>1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Know why information processing is essential in the electronic world.<\/p>\n<p>2\u00a0\u00a0\u00a0\u00a0\u00a0 Value modern technology, and appreciate the role computers play in the society.<\/p>\n<p>3\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Handle simple tasks differently and better, e.g. process \u00a0data, \u00a0store \u00a0and \u00a0retrieve information through the use of existing smart microcomputer applications.<\/p>\n<p>4\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Use the available software and hardware to simulate the physical world for improvement.<\/p>\n<p>5\u00a0\u00a0\u00a0\u00a0\u00a0 Acquire the ability to integrate information systems into the business environment, and to exploit methods of leveraging business functions through information systems.<\/p>\n<p>6\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Receive technical orientation and managerial skills for strategic use of information systems.<\/p>\n<p>7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Acquire\u00a0 fundamental electronic knowledge \u00a0of \u00a0the \u00a0digital computer<\/p>\n<p>8\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Proceed to graduate study in computer science, computer engineering, software Engineering, Information Technology<\/p>\n<p><strong>MISSION STATEMENT<\/strong><\/p>\n<p>Our mission is to build minds for leadership through quality information systems and computing integrated with Christian education, transforming lives, impacting society for positive change through the pervading influence of our graduates and staff, computing services to humanity.<\/p>\n<p><a href=\"https:\/\/www.babcock.edu.ng\/school\/COEN#cyb_sec\"><strong>Cybersecurity<\/strong><\/a><\/p>\n<p>Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It&#8217;s also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories such as application security, network security, information security, end-user training, operational security and disaster recovery among others.<\/p>\n<p>Cybersecurity is of significant importance in our current age as many medical services, private, public, and even government entities experience an increasing number of security breaches every day. Some of these sectors are more appealing to cybercriminals because they collect financial and medical data, but all businesses that use networks can be targeted for customer data, corporate espionage, or customer attacks.<\/p>\n<p>The increasing number of users, devices, and programs in the modern enterprise, combined with the increasing deluge of data \u2013 much of which are sensitive or confidential \u2013 brings to light the importance of cybersecurity. Also, the growing volume and sophistication of cyber attackers and attack techniques compound the problem even further. Hence, this specialization can equip students with the requisite knowledge and skills necessary to provide an organization with a good security position against malicious attacks designed to access, alter, delete, destroy or extort such an organization&#8217;s or its user&#8217;s systems and sensitive data.<\/p>\n<p><strong>Computer Science:<\/strong>\u00a0Gives the scientific foundation for software engineering, just as electrical engineering mainly depends on physics.<\/p>\n\t\t<\/div>\n\t<\/div><!-- .bs-text -->\n[\/vc_tta_section][vc_tta_section title=&#8221;Computer Science Department&#8221; tab_id=&#8221;1646744012926-4d5a73a3-7813&#8243;]\t<div\n\t\t\t\t\tclass=\"bs-shortcode bs-text bscb-27861  vc_custom_1647612268952 have_bg\">\n\t\t\t\t<h3 class=\"section-heading sh-t2 sh-s1\">\n\t\t\t\t<span class=\"h-text\">Department of Computer Science<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t<div class=\"bs-text-content\">\n\t\t\t<p>Recent developments in computing, network technologies, internet, cloud technologies have made reliability and secure exchange of digital information vital to most human activities including banking, medicine, infrastructure management and elections.<\/p>\n<p><a class=\"btn btn-default btn-lg\" style=\"color: #ffff!important;\" href=\"https:\/\/afit.edu.ng\/home\/computer-science\/\">Read More<\/a><\/p>\n\t\t<\/div>\n\t<\/div><!-- .bs-text -->\n[\/vc_tta_section][vc_tta_section title=&#8221;Cyber Security Department&#8221; tab_id=&#8221;1646750003233-986bc85e-c965&#8243;]\t<div\n\t\t\t\t\tclass=\"bs-shortcode bs-text bscb-79465  vc_custom_1647612292974 have_bg\">\n\t\t\t\t<h3 class=\"section-heading sh-t2 sh-s1\">\n\t\t\t\t<span class=\"h-text\">Department of Cyber Security<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t<div class=\"bs-text-content\">\n\t\t\t<p>Recent developments in computing, network technologies, internet, cloud technologies have made reliability and secure exchange of digital information vital to most human activities including banking, medicine, infrastructure management and elections.<\/p>\n<p><a class=\"btn btn-default btn-lg\" style=\"color: #ffff!important;\" href=\"https:\/\/afit.edu.ng\/home\/faculty-of-computing\/cyber-security\/\">Read More<\/a><\/p>\n\t\t<\/div>\n\t<\/div><!-- .bs-text -->\n[\/vc_tta_section][\/vc_tta_tour][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;923&#8243; img_size=&#8221;large&#8221; add_caption=&#8221;yes&#8221; alignment=&#8221;center&#8221; title=&#8221;DEAN&#8221;][vc_cta h2=&#8221;Gp Capt PP Okonkwo&#8221; h2_font_container=&#8221;font_size:20px|color:%23ffffff&#8221; h2_google_fonts=&#8221;font_family:Abel%3Aregular|font_style:400%20regular%3A400%3Anormal&#8221; txt_align=&#8221;center&#8221; color=&#8221;sky&#8221; use_custom_fonts_h2=&#8221;true&#8221; css=&#8221;.vc_custom_1647612031123{background-color: #0a005b !important;}&#8221;][\/vc_cta][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_cta h2=&#8221;FACULTY OF COMPUTING&#8221; h2_font_container=&#8221;font_size:80px|color:%23ffffff&#8221; h2_google_fonts=&#8221;font_family:Abel%3Aregular|font_style:400%20regular%3A400%3Anormal&#8221; txt_align=&#8221;center&#8221; use_custom_fonts_h2=&#8221;true&#8221; css=&#8221;.vc_custom_1646750199344{background-color: #1b0066 !important;}&#8221;][\/vc_cta][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;3\/4&#8243;][vc_tta_tour color=&#8221;sky&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Faculty of Computing&#8221; tab_id=&#8221;1646755749173-a16477c2-0e1e&#8221;][\/vc_tta_section][vc_tta_section title=&#8221;Computer Science Department&#8221; tab_id=&#8221;1646744012926-4d5a73a3-7813&#8243;][\/vc_tta_section][vc_tta_section title=&#8221;Cyber Security Department&#8221; tab_id=&#8221;1646750003233-986bc85e-c965&#8243;][\/vc_tta_section][\/vc_tta_tour][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;923&#8243; img_size=&#8221;large&#8221; add_caption=&#8221;yes&#8221; alignment=&#8221;center&#8221; title=&#8221;DEAN&#8221;][vc_cta h2=&#8221;Gp Capt PP Okonkwo&#8221; h2_font_container=&#8221;font_size:20px|color:%23ffffff&#8221; h2_google_fonts=&#8221;font_family:Abel%3Aregular|font_style:400%20regular%3A400%3Anormal&#8221; txt_align=&#8221;center&#8221; color=&#8221;sky&#8221; use_custom_fonts_h2=&#8221;true&#8221; css=&#8221;.vc_custom_1647612031123{background-color: #0a005b !important;}&#8221;][\/vc_cta][\/vc_column][\/vc_row]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-544","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/afit.edu.ng\/home\/wp-json\/wp\/v2\/pages\/544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afit.edu.ng\/home\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/afit.edu.ng\/home\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/afit.edu.ng\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afit.edu.ng\/home\/wp-json\/wp\/v2\/comments?post=544"}],"version-history":[{"count":18,"href":"https:\/\/afit.edu.ng\/home\/wp-json\/wp\/v2\/pages\/544\/revisions"}],"predecessor-version":[{"id":1009,"href":"https:\/\/afit.edu.ng\/home\/wp-json\/wp\/v2\/pages\/544\/revisions\/1009"}],"wp:attachment":[{"href":"https:\/\/afit.edu.ng\/home\/wp-json\/wp\/v2\/media?parent=544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}