Conflict and Communications
The course introduces the concepts and theories related to conflict communication, conflict styles and conflict resolution techniques. Students will develop and apply skills needed to resolve conflict in various personal and professional arenas. Students will record themselves delivering speeches, thus they will need to know how to use a webcam and how to upload video files from their devices into the assignment dropbox in the Learning Management System.
This course introduces problem-solving concepts needed for programming. It covers fundamental control structure such as the sequential structure, the selection structure and the repetition structure. The use of logic in designing programs has general application.
Programming in C++
This course is an introduction to C++ programming. Topics include control structures, arrays, pointers, classes, overloading, inheritance, file processing and data structures.
This course introduces operating system fundamentals and compares a variety of operating systems. Servers and networking basics are included.
This course explores the methods and tools utilized for collecting and preserving electronic digital evidence for the computer forensic process. Topics include the forensic examination, crime categories, analysis, laws governing forensics and report writing. Experience with forensics tools and techniques are provided.
Cyber Physical Systems and Security
This course introduces the techniques, methodologies, and tools used in building and maintaining secure networks and control systems. These systems rely on unification of technologies such as computers, programmable logic controllers, operator interfaces, and microprocessor based devices together into supervisory, control and data acquisition (SCADA) or industrial control systems (ICS). After exploring the real-world threats and vulnerabilities that exist within the industrial automation and control system architectures, a standards based approach is explored for the protection of such systems, taking into consideration the procedural and technical differences between security for traditional IT environments and those solutions appropriate for SCADA or ICS.
This introductory course provides the student with a basic understanding of personal financial planning. The course is designed to help students understand how to plan for a successful financial future for themselves and their families. The course offers a comprehensive treatment of financial planning to help students understand the complexities of today's financial world and evaluate their financial options through a formal decision-making approach.
Introduction to Information Systems Security
This course provides a broad overview of the principles, policies and technologies for securing computer and information systems. Topics include a survey of computer system vulnerabilities, cryptographic techniques, access control policies and mechanisms, qualitative and quantitative risk assessment and management, and the implications of security technology in the realm of risk management. Designing and implementing computer security policies and standards, formulating contingency plans and analyzing system security architectures, as well as compliance and ethics are examined.
This course covers fundamental, vendor-independent networking concepts. The course is aligned with the CompTIA Network+ certification exam. Various tools are used to analyze networks.
Management Information Systems
This course covers the principles of managing information systems in the context of an enterprise. Topics include coverage of information technology in management, information systems in decision-making, planning of information systems, systems development, controls and security measures, and electronic commerce.
This course covers the principles and practices of secure operation and management of information systems. Principles and practices of analysis and monitoring of systems security are also addressed.
This course presents the fundamental concepts of database systems. The course covers the relational model, structured query language (SQL), data modeling, database design and database administration.
Systems Analysis and Design
This course introduces the concepts, tools and techniques used in the analysis, design and deployment of information systems which support business requirements. Topics include requirements determination, data and process modeling, various development methodologies, project management, data and user interface design, security, implementation and maintenance, and documentation.
Querying in SQL
In this course, databases are planned, designed, created, installed, and manipulated using advanced SQL techniques. SQL query methods and functions are then used to create, move, amend, or delete data in single or multiple tables. After identifying security issues, solutions in the security of databases are implemented.
This course provides a comprehensive review of industry approaches, practices and standards on how to handle risks to organizations' business-critical assets. Topics include identifying and analyzing threats, qualitative versus quantitative risk management, standards and processes to mitigate risk, risk control and risk policy. Through a practical approach, this course explores key topics that enable students to uncover and remediate potential infractions.
This course provides a comprehensive overview of disaster recovery and countermeasures for networks and businesses. Assess risks in the enterprise, determine critical business components, develop an enterprise disaster recovery system, and develop disaster policies, procedures, departmental roles and communication processes for enterprise network. It will provide a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster. Learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster. Produce a disaster recovery document of procedures and policies to implement training, testing and rehearsal of a disaster recovery.
Special Topics in Information Systems
Study of a significant topic in information systems that is not available through other program offerings.
This course introduces the techniques, methodologies and tools used in building and maintaining secure networks. Lab exercises address assessing protocol, network and code vulnerabilities. The course is aligned with the CompTIA Security+ certification examination.
Human Decision and Security Engineering
Providing an exploration of the human aspects of Cybersecurity, this course will educate students on human motivation and interaction, how security controls may be bypassed by a person's intentional or unintentional acts, and methods for reducing the cyber risks associated with people. Topics include human behavior and interaction, motivation and influence, and social engineering. Emphasis is on the human element of cyber incidents in relation to protecting information and technology assets.
Security Trends and Legal Issues
This course examines the legal environment pertinent to security professionals. Topics include the role of government, relevant civil and criminal law, constitutional rights and privacy issues, intellectual property, and compliance. In addition, current trends in cybersecurity are explored.
This course explores the ways in which cryptography can be used to protect communications traffic and sensitive data. Course topics include symmetric vs. asymmetric (public-key) ciphers; hash algorithms; message authentication codes; mathematical underpinnings of cryptography; cryptanalysis; public-key infrastructure; and implementation trade offs. Students gain hands-on experience in state-of-the-art technologies through completion of weekly lab exercises. The primary focus of the course is on building critical-thinking and problem-solving skills.
This course covers the concepts of Linux server administration, including installation, security, networking concepts, file system management, system services, kernel services, and configuration. The topics include important areas of system administration: printer administration, log file administration, and user administration.
Cloud Computing Essentials
IT professionals deal with most phases of planning, building, implementation, and management of cloud services or integration. In this course, multiple aspects of cloud computing and the role it plays in organizations are explored and implemented.
In this course, current virtualization technologies are investigated through simulated and real-world tools and environments. Software-defined data centers employing high-availability clusters, the latest performance and security measures and tools, and virtual desktop infrastructures are created, managed, and maintained.
Cloud Computing Security
This course covers specific security issues unique to a cloud environment. Topics covered are architecture, allocation of resources, and identity. Additionally, rights and access management, foundational strategies for continuity, disaster recovery, securing data, and legal and jurisdictional requirements are explored.
This course is an introduction to the fundamental concepts of algebra. Topics include equations, polynomial and rational functions and graphing and exponential and logarithmic functions. A new textbook may be required in order to ensure needed electronic codes are valid.
Mathematical Statistics I
This course presents methods in making analytical decisions using statistics. The course focuses on the characteristics of numerical and categorical data, methods of presentation, and descriptive statistics. The course also introduces students to basic methods of sampling and of making inferences using one or two independent samples. NOTE: Credit may not be awarded for both MA215 and MA230.
This course is designed for computer science and engineering students. Five major themes are interwoven throughout the course: mathematical reasoning, combinatorial analysis, discrete structures, algorithmic thinking and applications and modeling. The course is specifically tailored to address the practical applications of discrete mathematics to problems of computer science and engineering.