INSY - Information Systems
This course offers an overview of computer systems, including how to interact with an operating system, and teaches students how to use productivity applications such as Word, Excel, PowerPoint, and Access.
3
These workshops are intended to give the student a working knowledge of software/skills such as Microsoft Office PowerPoint for Windows and Mac, Mail Merge, and Presentations Software. The student will be introduced to presentation software and will understand the software at an introductory level, be able to create and edit software presentations, and research and obtain web-based content and integrate it into their presentations.
1
This course provides a detailed description of various cybercrime techniques employed by attackers and organization-wide solutions available to information security personnel. Additionally, American laws and Computer and Information Security laws will be discussed. Students will also learn about ethical challenges in a technological environment as well as the social and economic implications of policy.
3
Building websites with multimedia applications such as audio and streaming video with Flash and Dreamweaver.
3
This course provides an exposure to Applications of Cloud technologies currently utilized in business and academic places. Students will gain an understanding of both the technical architecture of a Cloud platform and the Value Proposition gained from utilizing Cloud strategies by enterprises. The course will study different Cloud Service models, Cloud Development models, and different capabilities offered by a typical Cloud ecosystem. Amazon Web Services (AWS) Cloud offering will be used as an example Cloud platform during the course.
3
Prerequisites
CPSC 20000
In this course we will define the attributes of a project, the steps involved in the project management process, the benefits of project management, the project life cycle, and what makes projects successful. The key roles of the Project Manager will be presented. The student will obtain knowledge, skills, tools, and techniques to satisfy the expectations of the project stakeholders. Knowledge areas presented will include project planning, definition of scope, estimating and controlling of time and costs, quality assurance, human resource management, the creation , collection, and distribution of information, risk management, and procurement.
3
Prerequisites
BSAN 20000
This course introduces students to Six Sigma which is one of the most highly evolved quality management methodologies. Six Sigma provides a framework for quality management that ensures companies are achieving the highest level of quality.
3
Prerequisites
INSY 31000
This course provides a broad overview of the threats to the security of information systems, the responsibilities and basic tools for information security, and the levels of training and expertise needed in organizations to reach and maintain a state of acceptable security. Students will also learn about contemporary management theories and concepts applied to information security.
3
This course covers hands-on, practical and industry-used tools related to conducting a computer forensics investigation for business and organizations. Specifically, students will learn analysis of computer evidence related to business data such as emails, documents, and internet files. Students will learn how to use software tools for password recovery, decryption and analysis of registry files.
3
This course provides a detailed description and high level understanding of various operating systems to comprehend the techniques employed by attackers to compromise information systems. All current operating systems used for physical and virtual machines will be discussed in this course. The course will provide hands-on opportunity to students to install, optimize, and compromise various operating systems.
3
This course combines the exciting and emerging fields of cybersecurity, information technology, policy and cyber warfare. Students examine the process for development of strategy based on policy by analyzing emerging threats, current security posture and available information security controls.
3
Prerequisites
INSY 23000
This course provides an overview of information security strategies, procedures and policies necessary to manage and mitigate an organization's risk in information systems. Students will learn to conduct enterprise-wide information security risk assessment using qualitative and quantitative techniques. Security assessment techniques and the information security blueprint will be discussed in detail.
3
Prerequisites
INSY 33500 or CPSC 42000
In this seminar, students will learn the basic concepts of Six Sigma and the tools and techniques necessary to implement a six sigma project successfully. This seminar will cover the different phases (DMAIC) of this methodology: define, measure, analyze, improve and control.
1
This seminar will discuss some of the major technological innovations in the market. class participants are expected to identify and develop a plan for launching a new technological innovation. The different phases of the innovation process will be covered including investigation, preparation incubation, illumination, verification and application.
1
This seminar will explain the necessary concepts and techniques that individuals need to better plan, organize, control and manage the successful completion of a project in order to keep up with the business world's efficiency and professionalism. A comprehensive understanding both on the science of project management and the art of managing projects will be presented.
1
This seminar will briefly review sound project management practices by focusing on the basics of project management. Our discussions will include managing time, cost, scope, and the people side of project management. We will learn step by step how to manage project resources, schedules, and scope with Microsoft Project 2019 Professional which is currently the industry standard project management tool.
1
This seminar is designed to cover the project management body of knowledge (PMBOK) areas tested in the Project Management Professional (PMP) certification exam administered by the Project Management Institute (PMI). The nine PMBOK areas are: Scope, Time, Cost, HR, Risk, Integration, Quality, Communication, and Procurement Management. The focus is going to be on preparing students to pass the PMP certification exam.
1
This seminar discusses the project portfolio process and the different models that are used for selecting a set of projects. It covers the project planning process, which includes the following elements: schedule, cost, resources, potential problems, and evaluation models. It also introduces the Project Management office and its role in an organization.
1
Search Engine Optimization is a core need for today's businesses. Integrating search and social media into the marketing plan boosts visibility and relevance. This class will review guidelines and techniques to plan and executive a comprehensive SEO strategy.
3
This course teaches students how to design, create, maintain, and manage a web site. Students will use a number of tools and programming languages to build the site including: HTML, XML, JavaScript, FrontPage, and Dreamweaver.
3
Prerequisites
BSAN 20000
Project based course curriculum to give students a practical exposure to the processes involved in design of a website. A fully functional intranet or Internet website will be developed. Students will collect requirements by interviewing users, analyze data for defining end-user requirements, design, test and implement the website. This course will stress user and task analysis for interface design.
3
Prerequisites
INSY 28000, INSY 30500 and INSY 41500
This course focuses on three of the knowledge areas in project management: risk management, communication management and human resources and stakeholder management. This course considers how to deal with a variety of stakeholders and ways to consider optimizing stakeholder involvement. How and why various social roles are needed on projects. The formation and expectations of differing kinds of teams are covered in order to set up management expectations about results. The results of a project need to be integrated within existing environments.
3
Prerequisites
INSY 31000
Students examine principles of telecommunications and networking as applied in a business environment; communication parameters, protocol, and hardware, including modems, multiplexors, common carriers and microwave and satellite systems; and design and implementation of distributed data processing and network systems.
3
Prerequisites
BSAN 33000
This course will address fundamentals of BPs and their management, BPM systems and tools, modeling and documentation of BPs, and finally, BPs simulation and improvement. IT has been gaining increased significance in businesses at all levels. Two particular challenges facing expanding role of IT are better alignment of IT to business goals, and IT role as a driver and enabler of organizational change. To this end, Business Process Management (BPM) is being recognized for its ability in improving organizational agility, IT governance and compliance, and better alignment to strategic goals.
3
This course provides a broad overview of security in an enterprise. Students will learn about the threats to the security of information systems, what makes an organization's resources secure, basic technologies for information security, and the levels of training and expertise needed in organizations to reach and maintain a state of acceptable security. This course covers the technical and managerial aspects of securing your enterprise resources.
3
Prerequisites
INSY 33500 or CPSC 42000
This course presents hands-on methods to conduct a forensics investigation of a Macintosh computer. Students will learn how to analyze and recover digital evidence from files, documents, pictures, video and emails on a Mac. Recovery of User log on passwords and encrypted files will also be covered in this course.
3
This course presents a hands-on and practical approach for securing a business' digital assets (data, intellectual property, etc.) by exploring tools that are commonly used by hackers to attack businesses and their digital infrastructure. Students will learn how to manage a business' defensive controls by analyzing offensive tools that are used by cybercriminals. Policies and effective management of cybersecurity are also discussed in this course.
3
Prerequisites
CPSC 28100 and CPSC 42000 or instructor approval
Special Topics courses are offered periodically, both in the fall and spring, to upper-division students who wish to expand their knowledge on a particular subject. Such courses are often presented in an independent study format and require significant student participation. These courses are designed to encourage a greater understanding of topics covered in earlier courses so as to prepare Pre-Professional students for future challenges.
3
This internship is designed to provide students with controlled on-the-job experience with participating businesses, industries and governmental organizations. Students may be eligible for an internship with jobs they currently have. A limited number of internships/jobs are also available through the internship coordinator.
3
Prerequisites
MIS major, Junior or Senior status, 2.75 GPA or above and consent of internship coordinator.
This internship is designed to provide students with controlled on-the-job experience with participating businesses, industries and governmental organizations. Students may be eligible for an internship with their current position if it has an international emphasis and is approved by the Internship Coordinator. A limited number of internships/jobs are also available through the internship coordinator.
3
Prerequisites
MIS major, Junior or Senior status, 2.75 GPA or above and consent of internship coordinator and the director of the International Business program.
This is a hands-on continuation and wrap-up of the MIS project, and an introduction to the last two phases in the system development lifecycle: 1) implementation, and 2) operations, support, and security. Students will complete their projects and e-portfolios by integrating, testing, and documenting all system components developed in INSY 31500, INSY 33000, INSY 41500, and INSY 43000. Students will also create comprehensive user training plans and materials, as well as documentation for system operation and support. Must be taken in final semester.
3
Prerequisites
BSAN 33000, INSY 41500 and INSY 43000
This course will help students to analyze the major concepts learned in other courses of the program. The course is designed to help students prepare for Comptia's Security + Certification Exam. This course is designed for students who are nearing the completion of the designated coursework for the B.S. in Information Security and Risk Management Program.
3
Prerequisites
INSY 23000, INSY 35100 and INSY 43000
Students are required to conduct a capstone project suited to their individual needs. The capstone project provides an opportunity for students to demonstrate what they have learned from the Information Security degree program.
3
Students undertake independent reading and research in information systems.
3
Prerequisites
MIS major, Senior status, 2.75 GPA or above and a signed Independent Study Form.
This course covers all the aspects of setting up an Information Technology Start-up company. Students will learn finance (Venture Capital funding), Management (Business Plan), Marketing (Marketing and Sales plan), project management and IT Entrepreneurship strategies via a semester long hands-on project. Students will present their projects to a panel of judges at the end of the session.
3
This course is a hands-on introduction to the first three phases of the system development lifecycle: 1) planning/initiation, 2) analysis, and 3) design. Students will learn how to analyze a business case, conduct a preliminary investigation, model business requirements using various tools, select a development strategy, and create a requirements document. Students will use the logical models and documentation created in this course as blueprints for the system development in other courses.
3
Prerequisites
BSAN 33000 and INSY 31000
This course provides an overview of information security strategies, procedures and policies necessary to manage and mitigate an organization's risk in information systems. Students will learn to conduct enterprise-wide information security risk assessment using qualitative and quantitative techniques. Security assessment techniques and the information security blueprint will be discussed in detail.
3
Prerequisites
INSY 23000, INSY 33500 and INSY 43000