Course Criteria

Add courses to your favorites to save, share, and find your best transfer school.
  • 4.00 Credits

    Building on ITM251, this course emphasizes advanced programming techniques using a contemporary programming language to develop business applications. Students complete hands-on exercises and an experiential project.
  • 4.00 Credits

    This course examines the short-and long-term decisions that are made in manufacturing and service systems relating to the operations function. Emphasis is placed upon maximizing productivity, improving quality and discussing key issues within operations which are of relevance in a firm's ability to remain competitive in a global economy. The course also covers global supply chain management aspects such as outsourcing/offshoring and strategic use of information systems. Students are given realistic exercises and gain hands-on experience using a contemporary enterprise information system.
  • 4.00 Credits

    This course prepares students to design, implement and maintain a robust information security program. Students will be introduced to various standards that define best practices for creating and maintaining security policies, performing an enterprise risk assessment, business continuity/disaster recovery planning, and security incident response handling. Students will also be exposed to the legal and regulatory requirements of a successful information security program. A practical approach to learning these topics will be taken, requiring students to apply their knowledge to real-world situations in project work and report writing assignments.
  • 4.00 Credits

    An introduction to network security and cryptography. Students learn about computer network configurations, devices, services, vulnerabilities and threats. Topics include firewalls, intrusion prevention/detection systems, honeypots, wireless systems, remote connectivity, malware threats and common attack types. Students design a network security architecture for an organization. The course also covers cryptography topics including encryption methods, symmetric/asymmetric systems, hashing, public-key infrastructures and attack types. Emphasis is placed on reinforcing concepts with hands-on, lab-based exercises.
  • 4.00 Credits

    Studies fundamental concepts of data and information management with primary focus on database systems, including identifying organizational requirements, conceptual data modeling, logical and physical database design, SQL and database administration tasks. Other topics include business intelligence technologies, data quality management and emerging trends. This course requires completion of an application prototype on a currently popular DBMS.
  • 4.00 Credits

    This course explores secure software development and digital forensic analysis.  For software security, we cover the most critical application security vulnerabilities and how to mitigate them. The methodologies of developing secure applications are addressed. Secure coding practices are introduced.  Additionally, students learn how to conduct vulnerability scans against software as well as take precautionary steps to prevent exploitation.  For digital forensics, we explore computer crime types, investigations, and evidence analysis from different devices and operating systems. Students gain experience using digital forensic tools.  Understanding cyber risks facing critical national and global infrastructures is also treated.
  • 4.00 Credits

    This course builds on database, development, and systems analysis knowledge, emphasizing project governance and business processes. Students develop business writing skills to analyze business cases and create project governance documents. Topics include information systems project governance, risk, business process modeling, and stakeholder communications. Additionally, the course includes current topics related to an organization's use and management of technology. Students apply the knowledge acquired in their MIS studies to a real-world business problem in a semester-long project.
  • 4.00 Credits

    A comprehensive and intense preparation for the Certified Information System Security Professional (CISSP) exam. The course reviews the domains of the CISSP common body of knowledge. Students sharpen test taking skills with practice questions. A comprehensive exam is given that mimics an actual certification exam.
  • 4.00 Credits

    The course focuses on the use of data, statistical and quantitative analysis, and explanatory and predictive models to generate data-driven insight for decision-making and competitive strategy. Students gain knowledge and skills to manipulate and analyze large data sets. Topics include the strategic value of business intelligence and analytics, relevant concepts related to databases and data warehouses, data and text mining techniques, and business applications of data mining and analytics. Students use software tools to analyze large data sets.
  • 4.00 Credits

    Provides additional hands-on lab exercises that build upon the concepts learned in ITM 380. The course covers the hacking methodologies used to assess and attack a target computer system. Emphasis is placed on understanding attack exploits and using security tools and techniques to find and fix vulnerabilities. Students engage in offensive and defensive exercises stressing ethical hacking and penetration testing. Exercises are conducted using different operating systems and virtual environments.
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
(Type the name of a College, University, Exam, or Corporation)
(For example: Accounting, Psychology)
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
(For example: Introduction To Accounting)
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
of
(For example: Find all institutions within 5 miles of the selected Zip Code)
Privacy Statement   |   Cookies Policy  |   Terms of Use   |   Institutional Membership Information   |   About AcademyOne   
Copyright 2006 - 2025 AcademyOne, Inc.