|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
4.00 Credits
Building on ITM251, this course emphasizes advanced programming techniques using a contemporary programming language to develop business applications. Students complete hands-on exercises and an experiential project.
-
4.00 Credits
This course examines the short-and long-term decisions that are made in manufacturing and service systems relating to the operations function. Emphasis is placed upon maximizing productivity, improving quality and discussing key issues within operations which are of relevance in a firm's ability to remain competitive in a global economy. The course also covers global supply chain management aspects such as outsourcing/offshoring and strategic use of information systems. Students are given realistic exercises and gain hands-on experience using a contemporary enterprise information system.
-
4.00 Credits
This course prepares students to design, implement and maintain a robust information security program. Students will be introduced to various standards that define best practices for creating and maintaining security policies, performing an enterprise risk assessment, business continuity/disaster recovery planning, and security incident response handling. Students will also be exposed to the legal and regulatory requirements of a successful information security program. A practical approach to learning these topics will be taken, requiring students to apply their knowledge to real-world situations in project work and report writing assignments.
-
4.00 Credits
An introduction to network security and cryptography. Students learn about computer network configurations, devices, services, vulnerabilities and threats. Topics include firewalls, intrusion prevention/detection systems, honeypots, wireless systems, remote connectivity, malware threats and common attack types. Students design a network security architecture for an organization. The course also covers cryptography topics including encryption methods, symmetric/asymmetric systems, hashing, public-key infrastructures and attack types. Emphasis is placed on reinforcing concepts with hands-on, lab-based exercises.
-
4.00 Credits
Studies fundamental concepts of data and information management with primary focus on database systems, including identifying organizational requirements, conceptual data modeling, logical and physical database design, SQL and database administration tasks. Other topics include business intelligence technologies, data quality management and emerging trends. This course requires completion of an application prototype on a currently popular DBMS.
-
4.00 Credits
This course explores secure software development and digital forensic analysis. For software security, we cover the most critical application security vulnerabilities and how to mitigate them. The methodologies of developing secure applications are addressed. Secure coding practices are introduced. Additionally, students learn how to conduct vulnerability scans against software as well as take precautionary steps to prevent exploitation. For digital forensics, we explore computer crime types, investigations, and evidence analysis from different devices and operating systems. Students gain experience using digital forensic tools. Understanding cyber risks facing critical national and global infrastructures is also treated.
-
4.00 Credits
This course builds on database, development, and systems analysis knowledge, emphasizing project governance and business processes. Students develop business writing skills to analyze business cases and create project governance documents. Topics include information systems project governance, risk, business process modeling, and stakeholder communications. Additionally, the course includes current topics related to an organization's use and management of technology. Students apply the knowledge acquired in their MIS studies to a real-world business problem in a semester-long project.
-
4.00 Credits
A comprehensive and intense preparation for the Certified Information System Security Professional (CISSP) exam. The course reviews the domains of the CISSP common body of knowledge. Students sharpen test taking skills with practice questions. A comprehensive exam is given that mimics an actual certification exam.
-
4.00 Credits
The course focuses on the use of data, statistical and quantitative analysis, and explanatory and predictive models to generate data-driven insight for decision-making and competitive strategy. Students gain knowledge and skills to manipulate and analyze large data sets. Topics include the strategic value of business intelligence and analytics, relevant concepts related to databases and data warehouses, data and text mining techniques, and business applications of data mining and analytics. Students use software tools to analyze large data sets.
-
4.00 Credits
Provides additional hands-on lab exercises that build upon the concepts learned in ITM 380. The course covers the hacking methodologies used to assess and attack a target computer system. Emphasis is placed on understanding attack exploits and using security tools and techniques to find and fix vulnerabilities. Students engage in offensive and defensive exercises stressing ethical hacking and penetration testing. Exercises are conducted using different operating systems and virtual environments.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Cookies Policy |
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2025 AcademyOne, Inc.
|
|
|