Search Engine Optimization is a core need for today's businesses. Integrating search and social media into the marketing plan boosts visibility and relevance. This class will review guidelines and techniques to plan and executive a comprehensive SEO strategy.
3
This course teaches students how to design, create, maintain, and manage a web site. Students will use a number of tools and programming languages to build the site including: HTML, XML, JavaScript, FrontPage, and Dreamweaver.
3
Prerequisites
63-200
Project based course curriculum to give students a practical exposure to the processes involved in design of a website. A fully functional intranet or Internet website will be developed. Students will collect requirements by interviewing users, analyze data for defining end-user requirements, design, test and implement the website. This course will stress user and task analysis for interface design.
3
Prerequisites
63-280,
63-305 and
63-415.
This course focuses on three of the knowledge areas in project management: risk management, communication management and human resources and stakeholder management. This course considers how to deal with a variety of stakeholders and ways to consider optimizing stakeholder involvement. How and why various social roles are needed on projects. The formation and expectations of differing kinds of teams are covered in order to set up management expectations about results. The results of a project need to be integrated within existing environments.
3
Prerequisites
63-310
Students examine principles of telecommunications and networking as applied in a business environment; communication parameters, protocol, and hardware, including modems, multiplexors, common carriers and microwave and satellite systems; and design and implementation of distributed data processing and network systems.
3
Prerequisites
63-330
This course will address fundamentals of BPs and their management, BPM systems and tools, modeling and documentation of BPs, and finally, BPs simulation and improvement. IT has been gaining increased significance in businesses at all levels. Two particular challenges facing expanding role of IT are better alignment of IT to business goals, and IT role as a driver and enabler of organizational change. To this end, Business Process Management (BPM) is being recognized for its ability in improving organizational agility, IT governance and compliance, and better alignment to strategic goals.
3
This course provides a broad overview of security in an enterprise. Students will learn about the threats to the security of information systems, what makes an organization's resources secure, basic technologies for information security, and the levels of training and expertise needed in organizations to reach and maintain a state of acceptable security. This course covers the technical and managerial aspects of securing your enterprise resources.
3
This course presents hands-on methods to conduct a forensics investigation of a Macintosh computer. Students will learn how to analyze and recover digital evidence from files, documents, pictures, video and emails on a Mac. Recovery of User log on passwords and encrypted files will also be covered in this course.
3
Web Analytics is the measurement, collection, analysis and reporting of detailed statistics about visits to a web site. Internet Analytics provides important information in order to optimize and improve the web site usability and performance. This course discusses a number of analytics techniques such as log files, cookies, web bugs, and paper tagging. It also covers the key performance indicators, website metrics. Additionally, it demonstrates how to setup and use some of the leading web analytics tools available such as Google Analytics and Visistats. These tools will help you track your Twitter, Facebook, and other social media marketing (SMM) technologies and determine if your SMM is working.
3
This course explores the security of enterprise information assets from a hacker's perspective. To improve organizational information security, students are introduced to the methods and techniques employed by hackers to get unauthorized access to these enterprise systems. The best practices for protecting the digital assets are discussed by studying modern hacking techniques.
3
Prerequisites
63-230,
63-335,
63-430
This course presents hands-on techniques for recovering evidence for mobile phones such as iPhones, and windows and android phones. Mobile devices such as iPads, Tablet PCs and iPods will also be covered in this course. Students will learn how to recover passwords, deleted voicemails, photos, and text messages and data from various apps that on mobile devices
3
This internship is designed to provide students with controlled on-the-job experience with participating businesses, industries and governmental organizations. Students may be eligible for an internship with jobs they currently have. A limited number of internships/jobs are also available through the internship coordinator.
3
Prerequisites
MIS major, Junior or Senior status, 2.75 GPA or above and consent of internship coordinator.
This internship is designed to provide students with controlled on-the-job experience with participating businesses, industries and governmental organizations. Students may be eligible for an internship with their current position if it has an international emphasis and is approved by the Internship Coordinator. A limited number of internships/jobs are also available through the internship coordinator. MIS major, Junior or Senior status, 2.75 GPA or above and consent of internship coordinator and the director of the International Business program.
3
This is a hands-on continuation and wrap-up of the MIS project, and an introduction to the last two phases in the system development lifecycle: 1) implementation, and 2) operations, support, and security. Students will complete their projects and e-portfolios by integrating, testing, and documenting all system components developed in 63-315,
63-330,
63-415, and
63-430. Students will also create comprehensive user training plans and materials, as well as documentation for system operation and support.
3
Prerequisites
Must be taken in the final semester;
63-330,
63-415 and
63-430.
This course will help students to analyze the major concepts learned in other courses of the program. The course is designed to help students prepare for Comptia's Security + Certification Exam. This course is designed for students who are nearing the completion of the designated coursework for the B.S. in Information Security and Risk Management Program.
3
Prerequisites
63-230,
63-430 and
63-351
Students are required to conduct a capstone project suited to their individual needs. The capstone project provides an opportunity for students to demonstrate what they have learned from the Information Security degree program.
3
Students undertake independent reading and research in information systems.
3
Prerequisites
MIS major, Senior status, 2.75 GPA or above and a signed Independent Study Form.
This course covers all the aspects of setting up an Information Technology Start-up company. Students will learn finance (Venture Capital funding), Management (Business Plan), Marketing (Marketing and Sales plan), project management and IT Entrepreneurship strategies via a semester long hands-on project. Students will present their projects to a panel of judges at the end of the session.
3
This course is a hands-on introduction to the first three phases of the system development lifecycle: 1) planning/initiation, 2) analysis, and 3) design. Students will learn how to analyze a business case, conduct a preliminary investigation, model business requirements using various tools, select a development strategy, and create a requirements document. Students will use the logical models and documentation created in this course as blueprints for the system development in other courses.
3
Prerequisites
63-310,
63-330
This course provides an overview of information security strategies, procedures and policies necessary to manage and mitigate an organization's risk in information systems. Students will learn to conduct enterprise-wide information security risk assessment using qualitative and quantitative techniques. Security assessment techniques and the information security blueprint will be discussed in detail.
3
Prerequisites
63-230,
63-335,
63-430