|
CIS 5010 Introduction to Information Systems
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
This course provides fundamental professional skills for students who have no background in IT. The students will be able to specify, design, code and test software programs. Other topics include the norms and common practices of the profession as well as methodologies for design and coding of a typical business application. | 3 | 0 | 0 | | |
CIS 5050 Project Management
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Project management methods, models, software tools and standards for planning, scheduling, costing and control of software and information systems related projects, teambuilding and organizational issues. Course is based on the PMBOK and fulfills all of the PMI educational requirements. | 3 | 0 | 0 | | |
CIS 5100 Object Orient Software Development
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Focuses on abstraction and object based modeling. Students will develop and design programs using the UDL and an object based programming language. The student of this course will have the ability to conceptualize and clearly communicate concrete models of abstract structures. | 3 | 0 | 0 | | |
CIS 5200 Specification
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
This course concentrates on the BOK necessary to do effective requirements specification and development of a Software Requirements Specification (SRS). Emphasis is on formal specification approaches, methods and standards. | 3 | 0 | 0 | | |
CIS 5250 Secure Software Construction
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Prerequisites:
CIS 5200 (Minimum Grade of C, May not be taken concurrently)
This course presents the fundamental methodologies employed in software engineering construction including all of the underlying elements of secure programming. In addition it integrates that perspective into practical approaches to producing secure code. | 3 | 0 | 0 | | |
CIS 5300 Software Assurance
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Prerequisites:
CIS 5010 (Minimum Grade of B, May not be taken concurrently)
This course presents the principles and methods necessary to assure software. It covers all aspects of the assurance life cycle as embodied in the current set of proven best practices for acquiring, developing, and sustaining secure code. | 3 | 0 | 0 | | |
CIS 5350 Metrics and Models for Software Management
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Prerequisites:
CIS 5300 (Minimum Grade of C, May not be taken concurrently)
The fundamentals and applications of metrics and models for security and quality management, security and quality metrics and improvement programs and other quantitative methods. | 3 | 0 | 0 | | |
CIS 5400 Software Management
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Prerequisites:
CIS 5050 (Minimum Grade of C, May not be taken concurrently)
CIS 5200 (Minimum Grade of C, May not be taken concurrently)
CIS 5010 (Minimum Grade of B, May not be taken concurrently)
This course presents the principles and practices of IT lifecycle process management. It includes software lifecycle and process engineering, change management, standards, metrics and models, software maturity/capability and assessment. Tools for managing integrated software environments. The student will be able to organize, plan and lead software process improvement and IT strategic alignment projects. Student will have a complete understanding of the IEEE 12207, CMM, CMMI, ISO 15504 (SPICE) and the CBK models. | 3 | 0 | 0 | | |
CIS 5530 Graphical User Interface Developmnt
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
The techniques for development of optimum processes and applications, with emphasis on human factors. Topics include best practices for design and implementation of interfaces for applications and managing an integrated development environment. The role of conceptual models and ergonomic factors, the importance of human factors for consistent GUIs for human computer interaction, usability testing and integration of components are investigated. | 3 | 0 | 0 | | |
CIS 5540 Post-Release Sustainment
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
This course examines an integrated set of activities embodied in the primary process of post release software management, including preparation of maintenance plans, software understanding and description and secure software sustainment. The ISO/IEC 12207 maintenance process and the Secure Software CBK will provide the framework for planning and managing the work involved in performing software sustainment. | 3 | 0 | 0 | | |
CIS 5550 Database Design
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Qualifies for CNSS Certification. A detailed examination of the database design process and technology like: data modeling, logical and physical design, data administration, enterprise modeling, data warehouses, Standard Query Language (SQL), and database design tools. | 3 | 0 | 0 | | |
CIS 5560 Advanced Database Issues
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Prerequisites:
CIS 5550 (Minimum Grade of C, May not be taken concurrently)
This course examines contemporary issues in databases focused but not limited to: data warehouses, data marts, data mining, database programming, temporal/distributed/heterogeneous databases, application planning and system integration. | 3 | 0 | 0 | | |
CIS 5570 Networks
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
An examination of standardization and design issues for the security of the communication infrastructure. Topics include communication hardware and software, standards and protocols, and network protection utilities. Special emphasis will be placed on recent advances in network administration and ensuring security of networks and transmitted data. | 3 | 0 | 0 | | |
CIS 5580 System Forensics
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
This course presents the legal concerns, investigation techniques and incident response tactics of forensic investigation and forensic auditing. It centers around the basic operating system concepts that underlie this area. Students will learn evidence gathering and presentation techniques based around the Windows Incident Response Collection Report (IRCR). They will also learn how to employ IDS and CERT for effective incident response. Students will study the real-world investigation issues and concepts developed through the Honeynet Project. | 3 | 0 | 0 | | |
CIS 5590 Advanced Network Security
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Prerequisites:
CIS 5570 (Minimum Grade of C, May not be taken concurrently)
This course prsents a direct and hands-on view of the knowledge required to ensure robust and secure networks. That includces all relevant NETSEC concepts as well as the operation of all typical network management and security tools such as policy managers, sniffers and IDS. At the end of the course the student wil be able to create and sustain a practical defense-in-depth solution to all network security challenges. | 3 | 0 | 0 | | |
CIS 5600 Homeland Security Studies
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
This course integrates the cultural, geographic and linguistic content of classic intelligence work with the scientific and technology content of information assurance. It provides a comprehensive overview of the elements of the BOK that are required to assure the critical elements of the national infrastructure. At the end of this course the student will have the knowledge and cultural know-how necessary to work effectively in national security settings such as DHS, the intelligence community, or the NSA. | 3 | 0 | 0 | | |
CIS 5650 Information and Society
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Qualifies for CNSS Certification. Explores the role of the information professional in today's society. Topics include roles, values and norms, information use, information protection and security, and legal and ethical concerns such as rights of privacy and access. | 3 | 0 | 0 | | |
CIS 5660 Access Technologies
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Contemporary issues in system access and access control focused but not limited to: access authentication technologies, intrusion detection and penetration testing and non-repudiation services. | 3 | 0 | 0 | | |
CIS 5700 Information Assurance
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
This course presents an overview of the multidisciplinary process of information assurance. It is rooted in the information assurance lifecycle. The student will learn about the issues involved in creating a systematic information assurance control structure, how to establish systematic operational security procedures and how to build systematic information assurance capability into day-to-day information assurance work. | 3 | 0 | 0 | | |
CIS 5710 Ethical Hacking
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Prerequisites:
CIS 5010 (Minimum Grade of B, May not be taken concurrently)
This course covers particular genres of cyber attack tools and techniques, examining the most widely used and most damaging tools from each category. Ways to design and implement the most effective defenses to ensure the confidentiality, availability, and integrity of software systems and data will be explored both in lecture and in laboratory exercises with state of the art equipment. Emphasis will be placed on ethical and professional conduct. Exploration of the role of industry, government, and academia in cyber security will be facilitated through guest lectures. Students will conduct a semester project to demonstrate mastery of the ethical hacking process. Literature Reviews will be conducted on contemporary breaches. | 3 | 0 | 0 | | |
CIS 5720 Incident Response
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Prerequisites:
CIS 5010 (Minimum Grade of B, May not be taken concurrently)
This course will present the process, tools, and methodologies used when responding in real-time to computer security incidents. It will present an overview of pre-incident preparation, initial response procedures, and the formulation of responses. Special attention will be paid to identifying and assessing risk in the appropriate context as well as escalation and notification procedures. Students will produce and present a semester project to demonstrate mastery of processes, tools, and methodologies. Literature reviews will be conducted on legal and regulatory issues related to incident response. | 3 | 0 | 0 | | |
CIS 5730 Cyberlaw
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Prerequisites:
CIS 5700 (Minimum Grade of B, May not be taken concurrently)
The purpose of this course is to educate students in the criminal and civil processes that underwrite legal and regulatory compliance in cyberspace. It will present and evaluate a range of legal concepts and models for that purpose; including all of the elements necessary to ensure the contractual compliance with information security. | 3 | 0 | 0 | | |
CIS 5750 Information Assurance - Electronic Countermeasures
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Prerequisites:
CIS 5400 (Minimum Grade of C, May not be taken concurrently)
This course presents the fundamental concepts that underlie the deployment of a fully functional electronic countermeasure response. As such, it concentrates on those areas that ensure electronic security. These include network assurance, cryptology, and operating system and application assurance. At the end of this course the student will be able to create and maintain a defense-in-depth solution that will meet the protection needs as well as the resource realities of any organization. | 3 | 0 | 0 | | |
CIS 5790 Information Assurance - Organizational Countermeasures
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Prerequisites:
CIS 5750 (Minimum Grade of C, May not be taken concurrently)
This course presents the managerial countermeasure areas that are part of the information assurance lifecycle. These areas encompass every relevant topic in legal and regulatory compliance, physical and personnel security, business continuity and disaster recovery and secure development. The student will learn the details of each of these areas as well as how they interrelate. Students will also learn how to tailor a governance infrastructure as well aas deploy appropriately tailored countermeasures to ensure organizational security. | 3 | 0 | 0 | | |
CIS 5800 Advanced Topics in Information Systems
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
CNSS certification. Discussion of current leading-edge issues. | 3 | 0 | 0 | | |
CIS 5820 IT Portfolio Leadership
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
This course provides a critical overview of the best practices used to bring about effective change in IT organizations. That includes the development of SOW's and SLA's, analytic support of procurement decisions (buy vs. make - own vs. lease), formal offering management, as well as the implementation of common governance and review processes, financial controls and performance management. This embodies steps to formally tie project/programme progress and outcomes to on-going governance and business decision making based on the entire portfolio. | 3 | 0 | 0 | | |
CIS 5840 IT Performance Leadership
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Prerequisites:
CIS 5050 (Minimum Grade of C, May not be taken concurrently)
CIS 5400 (Minimum Grade of C, May not be taken concurrently)
This course provides a critical overview of three fundamental areas of IT work: People Care (team building, personnel issues (pay, bonus, flex time, flex place, performance management, career planning, hiring/interviewing); Client Care (establishing Statements of Work, Service Level Agreements, and developing and/or responding to RFP's, as well as overall Client management; and finally Business Issues (Business Planning, Establishing business cases, Governance, Deal Review Processes, Off Shore resourcing, Ethics and codes of conduct). | 3 | 0 | 0 | | |
CIS 5890 International Studies
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Principles, standards and issues for the international community. | 3 | 0 | 0 | | |
CIS 5900 Certifications
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
This course covers contemporary certifications in the security domain. Topic areas might include CISS, CCNA, and CEH certifications, among others. | 3 | 0 | 0 | | |
CIS 5910 Information Audit
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
This course presents the fundamental concepts of the IT audit and control process. The purpose is to establish the exact status of an IT operation. Students will create an audit based control structure, establish systematic accounting and control procedures and build complete and coherent information assurance capability into the IT function. This will revolve around defining a control framework, the attendant control objectives and the reporting system for an organization. Guidance for carrying this out will be provided in the form of expert models; however, the primary example that will be employed is ISACA's COBIT open standard. The end product of this course should be fully capable of structuring and performing Sarbanes-Oxley, HIPAA and Basel 2 audit programs. | 3 | 0 | 0 | | |
CIS 5950 Directed Research
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
This is an intensive study of some special problem taken under the direction of a supervising faculty member. | 3 | 0 | 0 | | |
CIS 5990 Master's Thesis in Software Management
| Credit Hours | Recitation/Lecture Hours | Studio Hours | Clinical Hours | Lab Hours |
Student should consult the prospective advisor for substantive requirements and the Graduate Business Programs Office for formal requirements. | 6 | 0 | 0 | | |
|
|
College of Business Administration Home | Contacts | Policies | Programs | Website | College of Engineering & Science Home | Contacts | Policies | Programs | Website | College of Health Professions & McAuley School of Nursing Home | Contacts | Policies | Programs | Website | College of Liberal Arts & Education Home | Contacts | Policies | Programs | Website | School of Architecture Home | Contacts | Policies | Programs | Website | School of Dentistry Home | Contacts | Policies | Programs | Website | School of Law Home | Contacts | Policies | Programs | Website |
|