300

LW-305 Cloud Computing

This course provides a thorough and detailed description of cloud computing concepts, architectures and technologies. Computational science is changing to be data-intensive. Supercomputers must be balanced systems, not just CPU farms but also petascale I/O and networking arrays. In the future, working with large data sets will typically mean sending the computations (programs) to the data, rather than copying the data to the workstations. This reflects the trend in IT of moving computing and data from the desktops to large data centers, where there is on-demand provision of software, hardware and data as a service. This data explosion has promoted the idea of cloud computing. Cloud systems presented include the public clouds: Google AppEngine, Amazon Web Service, Facebook, SalesForce.com and many others.

3

Prerequisites

LG-200.

LW-310 Principles of Project Management

In this course we will define the attributes of a project, the steps involved in the project management process, the benefits of project management, the project life cycle, and what makes projects successful. The key roles of the Project Manager will be presented. The student will obtain knowledge, skills, tools, and techniques to satisfy the expectations of the project stakeholders. Knowledge areas presented will include project planning, definition of scope, estimating and controlling of time and costs, quality assurance, human resource management, the creation, collection, and distribution of information, risk management, and procurement.

3

Prerequisites

LG-200

LW-325 Introduction to Six Sigma

This course indtroduces students to Six Sigma which is one of the most highly evolved quality management methodologies. Six Sigma provides a framework for quality management that ensures companies are achieving the highest level of quality.

3

Prerequisites

LW 310

LW-330 Database Management Systems

Database concepts and design; database administration, relational and object-oriented database systems and models; Internet database access; and use of database software.

3

Prerequisites

LG-200.

LW-335 Introduction to Information Security

This course provides a broad overview of the threats to the security of information systems, the responsibilities and basic tools for information security, and the levels of training and expertise needed in organizations to reach and maintain a state of acceptable security. Students will also learn about contemporary management theories and concepts applied to information security.

3

LW-336 Computer Forensics

This course presents methods to properly conduct a computer forensics investigation, beginning with a discussion of ethics while mapping to the objectives of the International Association of Computer Investigative Specialists (IACIS) certification. Students should have working knowledge of hardware and operating systems to maximize their success on projects and exercises throughout the course.

3

LW-340 Survey of Operating Systems

This course provides a detailed description and high level understanding of various operating systems to comprehend the techniques employed by attackers to compromise information systems.  All current operating systems used for physical and virtual machines will be discussed in this course. The course will provide hands-on opportunity to students to install, optimize, and compromise various operating systems.

3

LW-350 Cybersecurity Policy and Strategy

This course combines the exciting and emerging fields of cybersecurity, information technology, policy and cyber warfare. Students examine the process for development of strategy based on policy by analyzing emerging threats, current security posture and available information security controls.
3

LW-364 Coordinating and Managing Supply Chains

This course will focus on operations coordination within a firm and will gradually make the transition to include inter-function, inter-firm, and international coordination. The role of supply chain intermediaries are discussed. Specific modules will focus on retail operations and the role of supply chain intermediaries, e.g., distributors and sourcing agents. The impact of incentives and marketing imperfections, and the changing impact of the Internet and other information technology on supply chain operations are emphasized.

3

Prerequisites

LB-200

LW-365 Outsourcing

This course provides exposure to strategies that help formulate and execute an effective outsourcing strategy. Current trends in business process outsourcing (BPO) will be analyzed to determine an effective outsourcing model in accordance with the organization's mission, objectives, and capabilities.

3

Prerequisites

LG-200.