Bachelor of Science in Information Technology

 

DEGREE AT A GLANCE:

    • Number of Credits
    • 122
    • Cost Per Credit
    • $ 250
    • Total Tuition*
    • $ 30,500
  • *(Before Transfer Credit)
 

Program Description

This program provides high quality educational opportunities for students interested in pursuing careers that support our computer/information-based society and economy. The curriculum focuses on problem-solving skills and techniques needed to provide computer-based and web-based IT solutions in our global ecommerce based economy. The explosive growth of the Internet and Information Technology has generated a significant need for IT professionals and consequently for education in IT. This degree program fills this market driven educational need; it focuses on the acquisition of the theory, principles, practices, methodologies, competencies, tools, and technologies associated with the IT marketplace. This program is designed to produce academically sound and functionally competent IT professionals that have the necessary foundation to be productive in the IT industry. These degree programs are market driven; they prepare learners to exploit the high demand for IT professionals in various sectors in the industry. Students completing the IT program can apply for IT-related positions, such as: web developer, web publisher, programmer analyst, systems analyst, database analyst, database designer, .NET developer, .NET architect, information systems analyst, project manager, and information technology manager.

Read More
 
 
 

Program Objectives

In addition to the institutional and general education In addition to the institutional and general education level learning objectives, this degree also seeks the following specific learning outcomes of its graduates:

  • Use analytical, logical, and critical thinking to analyze user requirements and to design, develop, and deploy effective Information Technology solutions.
  • Analyze the information needs and develop entity relationship models that represent the relationships and the cardinality in an information system.
  • Appraise the principles for designing relational and object-relational database systems.
  • Examine the principles and concepts of Object-Oriented Programming (OOP); also appraise the impact of (OOP) on software quality and on reusability.
  • Evaluate the principles of design and analyze the process for building web sites.
  • Design, develop, and deploy enterprise applications on the desktop and on the Web.
  • Evaluate the impact of the .NET Framework and Visual Basic.NET on IT Management and on Global Economies as it applies to developing, deploying, and managing desktop and web-based applications.

Visit Career Services

Graduates with degrees in information technology have a competitive edge in this growing industry, as positions are readily available in the information technology field and consistently increasing to address new technological requirements. Vigilant information technology warriors are needed to address real and rapid security threats daily, create application software and to address customized requirements. While the information technology field has continued to grow, there have been an increasing number of entry level positions across the industry seeking workers with IT degrees, approved certifications and relevant work experience. Information technology professionals will continue to remain in demand in order to keep the U.S. competitive in our global e-commerce based economy.

Email Career Services

Overview


Useful Skills within the Information Technology Field

Reading Comprehension — Understanding written sentences and paragraphs in work-related documents.

Active Listening — Giving full attention to what other people are saying, taking time to understand the points being made, asking questions as appropriate, and not interrupting at inappropriate times.

Critical Thinking — Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions, or approaches to problems.

Complex Problem Solving — Identifying complex problems and reviewing related information to develop and evaluate options and implement solutions.

Monitoring — Monitoring or assessing performance of yourself, other individuals, or organizations to make improvements or take corrective action.

Writing — Communicating effectively in writing as appropriate for the needs of the audience.

Coordination — Adjusting actions in relation to others' actions.

Speaking — Talking to others to convey information effectively.

Judgment and Decision Making — Considering the relative costs and benefits of potential actions to choose the most appropriate one.

Social Perceptiveness — Being aware of others' reactions and understanding why they react as they do.

 
Careers


Career Options

To identify what education or training is typical for careers within the public administration field, use the O*Net hyperlinks below and click on “Job Zone.” In addition, seek out the advice of fellow students and alumni working in the industry, using our mentoring program on The Quad (for current students and alumni only) or by speaking with a career coach.

As with all majors, the education you receive serves as a foundation of knowledge that prepares you for what you may face in the professional world. The career field you chose may require additional education or experience.

Computer Network Architects
Computer Network Support Specialists
Computer Operators
Computer Programmers
Computer Systems Analysts
Computer Systems Engineers/Architects
Computer User Support Specialist
Database Administrators
Desktop Publishers

Document Management Specialists
Geospatial Information Scientists and Technologists
Information Security Analysts
Network and Computer System Administrators
Software Developers, Applications
Software Developers, Systems Software
Web Administrators
Web Developers
 

Getting Started: Internships

Gaining real life experience is an ideal way to start a new career. The career services website has an extensive list of internships and fellowships. Browse through the internships organized by interest or by federal program.

There are government-organized internship programs which provide students or recent graduates the opportunity to gain real-life experience. Many require students to maintain either a half-time or full-time student status. The best ways to identify potential opportunities such as these is to contact branch offices directly, to search USAJobs.gov, or to look at the agencies' career portals. Keep in mind that these positions are not always posted online, so direct contact with the agency is key.

Pathways
The Pathways Program is a federal initiative that offers internship programs for current students and training and career development opportunities for recent graduates. Recent graduates must apply within two years of degree or certificate completion (except for veterans, due to their military service obligation, will have up to six years to apply).The internship program for current students replaces the former Student Career Experience Program (SCEP) and Student Temporary Employment Program (STEP).

The Presidential Management Fellows Program (PMF)
PMF is designed to attract to federal service outstanding men and women from a wide variety of academic disciplines who have a clear interest in, and commitment to, a career in the analysis and management of public policies and programs. To be eligible for nomination, an individual must be a graduate student completing or expected to complete, during the current academic year, an advanced degree from a qualifying college or university. Graduate students who have had their degree conferred in the preceding two years, from the opening of the vacancy announcement are also eligible for PMF.

The Workforce Recruitment Program (WRP)
WRP is coordinated by the Office of Disability Employment Policy and the U.S. Department of Defense, and aims to provide summer work experience, and in some cases full-time employment, to college students with disabilities. The program develops partnerships with other federal agencies, each of whom makes a commitment to provide summer jobs and a staff recruiter. Each year, recruiters interview about 1,500 students with disabilities at college and university campuses across the nation and develop a database listing the qualifications of each student.

Getting Hired: Government Agencies, Organizations, and Search Engines

There are several government agencies and organizations that seek candidates with degrees in information technology. The list below provides a few places one might find employment specific to this degree.

ADP
Booz Allen Hamilton
Department of Agriculture
Department of Defense
Department of the Treasury
Department of Veteran Affairs

Elevate Technology Solutions
Higher Logic
HP
LivingSocial
National Aeronautics and Space Association
PRISM

While many of the major job search engines will have positions in several fields to choose from, the list below is specific to the information technology field.

Computer Jobs
CIO IT Job Search
Dice

Joint Institute of Engineering
IT Management Central
TechCareers

 
Connect


Keeping Current: Professional Organizations and Associations
Conferences and Expositions

2014 AITP NCC
Oct. 1-4, 2014
Las Vegas, Nev.

The IA Summit
April 22-26, 2015
Minneapolis, Minn.

IACIS 2014 International Conference
Oct. 1-4, 2014
Las Vegas, Nev.

IAPP Global Privacy Summit
TBD 2015

Association for Information, Science and Technology (ASIS&T) 77th Annual Meeting
Oct. 31 - Nov. 4, 2014
Seattle, Wash.

(ISC)2 Security Congress 2014
Sept. 29 - Oct. 2, 2014
Atlanta, Ga.

PMI Global Congress 2014
October 26-28, 2014
Phoenix, Ariz.

Get Connected: Social Media

American Society for Information Science and Technology (ASIS&T) - Facebook
ARMA International - LinkedIn
Association for Computing Machinery (ACM) - LinkedIn
Association of Information Technology Professionals (AITP) - Facebook
IEEE Computer Society - Twitter
TechAmerica - Twitter

Quick Links

Explore Concentrations

 
 
 
General Total Credits - 122 Hours
Core Requirements
39 Hours
NAME
DESCRIPTION
CREDITS
ENTD200
Fundamentals of Programming
3 hours

This course introduces students to writing computer programs. The class presents the principles of structured programming using the BASIC language, perhaps the most common language for personal computers. Because of its ease of use it is ideal as a first programming language and runs on both the PC and Macintosh platforms. The course is designed for people without previous programming experience who do not necessarily plan on becoming professional programmers. However, the knowledge gained in the class can be applied later to other languages such as C and Java. Participants learn to solve problems logically by breaking them into smaller pieces, which can then be solved. Topics include: introduction to computing - how does a computer work?; input and output - getting information to and from the user; variables and expressions - performing arithmetic; data statements - reading information from inside the program; text files - reading information from other files; arrays - groups of variables; debugging - finding errors in your program; graphics - graphs, boxes, shaded areas; and formatting - changing how things look on the screen. NOTE: Alice, an innovative 3D programming software, is used to provide a more interactive and accelerated learning experience in this course. Students should download Alice and conduct system checks by validating the best version for their computer before enrolling into the course. Go to the www.alice.org website for more information. Raptor is also used for flowcharting; however, if you have a Macintosh computer, you may use PowerPoint, hand drawn submissions, or whatever software available.

ENTD311
Analysis and Design of Information Systems
3 hours

This course is an overview of the system development life cycle. Emphasis on current system documentation through the use of both classical and structured tools/techniques for describing process flows, data flows, data structures, file designs, input and output designs and program specifications. Discussion of the information gathering and reporting activities and of the transition from analysis to design.

ENTD321
Object Oriented Programming and UML
3 hours

This course is a study of the principles, practices, and technical architecture and development characteristics of Object Oriented Programming and an examination of the differences between object oriented programming and traditional programming. It examines objects, instances, classes, inheritance, polymorphism, encapsulation, abstraction, methods, attributes, tight-encapsulation, interfaces, type casting, type conversions, and object libraries. This course differentiates between single-inheritance model and multiple inheritance models. This course also explores the foundations of the Unified Modeling Language (UML), class models, state models, and interaction models. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

INFO161
Relational Databases with MS Access: Introduction
3 hours

This course focuses on the role, function, and operations of relational databases in the management of information. The course will be taught from a mixture of analytical and practical methods. This course introduces the student to the concepts of relational databases and to the principles of relational database design in the context of the Microsoft Access Relational Database Management System (RDBMS). Students will apply their knowledge of the principles of data design and database engineering to design and develop a database application that includes user interfaces, form design, data analysis, and data presentation. They will examine the rudiments of referential integrity and normalization and apply this knowledge to design the database tables that implement validation rules to ensure application integrity. They will also examine and develop advanced queries such as: top values, list of values, cross tab, find duplicates, and find unmatched. Students must have access to Microsoft Access software. This software is not provided by the course material grant and must be purchased/provided by the student. The book meets the topical requirements for the Microsoft Office Specialist (MOS). Course software requirements with the appropriate versions are listed under the course materials site.

INFO221
Relational Database Concepts
3 hours

This course is an introduction to the concepts, management issues, and advantages of relational database management systems. Topics include data definition, data manipulation, relational algebra, Structured Query Language (SQL), and Online Transaction Processing (OLTP) systems. This course examines database design, normalization for OLTP systems, Codd’s rules for OLTP systems, data integrity, database system functions (journaling, forward recovery, backward recovery), database security (authentication and authorization), and database administration. This course also explores distributed databases, Online Analytic Processing (OLAP) systems, data warehouses, and object-oriented databases. Students must have access to Microsoft Access software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site.

INFO261
Relational Databases with MS Access: Advanced
3 hours

This course focuses on developing Microsoft Access Switchboard applications; it includes: designing and building form and report interfaces, interfacing the Access database to a web page, building dynamic web pages, integrating Access with other Office applications such as Excel, building pivot tables and charts, categorizing the various types of join operations, examining the rudiments of the Visual Basic for Applications (VBA) code, debugging VBA code, creating macros and functions, and designing Access applications. Students must have access to Microsoft Access software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: INFO161)

Pre Reqs: Relational Databases with MS Access: Introduction(INFO161)

ISSC340
Local Area Network Technologies
3 hours

This course introduces the student to local area networking concepts in an easy to understand way. In today's competitive business world, one needs to have a basic understanding of the networking technology that runs it. Whether they choose to delve full bore into the technical side of networking or use what they learn to make an informed decision regarding the design, implementation, and maintenance of their local area network, this course will give the student a good foundation to build upon. Students must have access to MS Visio software. Course software requirements with the appropriate versions are listed under the course materials site. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical I category.

ISSC421
Computer and Network Security
3 hours

This course will discuss both computer and network security, from the wetware (human), software, and hardware perspectives. The "wetware" component will deal with identification of potential risk situations, establishing policies for avoidance, recovery, and prosecution, and proactive measures to reduce causal factors for security breaches in an organization. The "software" perspective will examine types of inappropriate software activity, as well as asset protection issues (recognizing software assets). This component will also address software tools available to assist in reducing administrative costs due to both malicious and accidental loss. The "hardware" component will address hardware approaches to protecting assets, as well as hardware techniques used to compromise assets. Specific technologies discussed include firewalls, symmetric key encryption, public key encryption, digital certificates, and cryptographic systems (SSL/TLS, VPNs, and Kerberos). Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ITCC121
Introduction to Computer Science
3 hours

This course is an overview of computer information systems in which hardware, software, procedures, systems, and databases are explored in relation to their integration and application in business and other segments of society. Telecommunications and network concepts are introduced as a basis for understanding of the Internet and e-commerce capabilities.

WEBD121
Web Development Fundamentals
3 hours

This course introduces students to Web site development through a combination of readings and hands-on development exercises. This course covers the Site Development Associate curriculum of the CIW Web Foundations Associate certification. It also covers the Web Design curriculum of the CIW Web Design Specialist certification. It emphasizes Markup Language and Site Development Essentials, HTML5 Coding, Cascading Style Sheets (CSS) and Graphical Elements, Hyperlinks, HTML Tables, Web Forms, Video, Audio and Image Techniques, Extending HTML, GUI HTML Editors and Mobile Web Sites, Web Site Development for Business, JavaScript and DHTML Fundamentals, Plug-Ins and Java Applets, HTTP Servers and Web Applications, Databases, and Web Site Publishing and Maintenance. Fundamentals of JavaScript programming are also introduced in this course. Students will need access to Microsoft Internet Explorer and Firefox. This software is not provided by the course material grant and must be purchased/provided by the student. To succeed in this course, students will also need basic computer knowledge such as creating files and folders, downloading and uploading files, creating zipped files, and working with text editor such as Notepad++.

WEBD241
Web Development Using JavaScript
3 hours

This course expands on the topics that were introduced in Web Development Fundamentals (WEBD121). This course introduces the student to fundamental JavaScript programming concepts such as variables and data, functions, controlling program flow (branching and iterating), the JavaScript object model (window, document, image, history, location, and navigator objects), and JavaScript language objects (String, Array, Date, and Math objects). This course also addresses the development of interactive forms with JavaScript, cookies and JavaScript security, controlling frames with JavaScript, and custom JavaScript objects. Students must have access to Internet Explorer 7 (or higher) or Netscape 4.0 (or higher) software. This course covers the CIW JavaScript Specialist curriculum of the CIW JavaScript Specialist certification. This software is not provided by the course material grant and must be purchased/provided by the student. (Prerequisite: WEBD121)

Pre Reqs: Web Development Fundamentals(WEBD121)

WEBD242
Web Development Using XHTML
3 hours

This course focuses on the theory and principles of various programming languages that are used on the web, with particular focus on HTML, XHTML, and DHTML. Students will explore the principles of Object Oriented Programming (OOP) and examine inheritance, encapsulation, and polymorphism. They will also examine the components of OOP languages; the scope, protocols and parameters for various methods, such as: dynamic text ranges (move, moveStart, moveEnd, moveToPoint, moveToElement, getElementById, getBookmark, compareEndPoints, setEndPoints, Expand, Collapse, FindText), transition ranges (blendTrans, revealTrans), event propagation (stopPropogation, addEventListener, removeEventListener), dynamic content (createAttribute, createElement, createTextNode, cloneNode), and dynamic styles (CSS) and dynamic positioning (CSS-P) (coordinate systems, absolute positioning, relative positioning, and dynamic data binding). Students will explore the principles governing the animation of text (pulsating text, expanding text, flying text, drag and drop). This course focuses on improving the user-application interactivity via dynamic content, animation, media (audio and video), forms, web-safe colors, styles, and Cascading Style Sheet (CSS).

Pre Reqs: Web Development Fundamentals(WEBD121)

WEBD341
Enterprise Data Exchange Using XML
3 hours

This course is a study of the concepts and applications of the Extensible Markup Language (XML), a general-purpose markup language that can be used to formally specify special-purpose markup languages. This course will be taught from a mixture of analytical and practical methods. Topics include: the history of XML, the XML language, Data Type Definition (DTD), XML Schema, eXtensible Style Sheet Language (XSL), and eXtensible Style Sheet Language Transformations (XSLT). The student will bind values to elements to render them distinct and different from its other instances of that attribute and explore the power of XML as a tool for Enterprise Exchange in both the J2EE and .NET Software Development Frameworks. Knowledge of XML will enable the student to standardize and reuse reference text, paragraphs, and chapters.


Concentration Requirements
15 Hours
Students may not take both ITMG321 and ITMG322 to fulfill Concentration requirements
NAME
DESCRIPTION
CREDITS
INFO331
Management Information Systems
3 hours

This course provides a technical and organizational foundation for understanding the use and importance of information systems and information technology in today's management environment. This course covers the hardware, software, and infrastructure that support management information systems. Information and decision support systems, knowledge management and specialized information systems, database management systems, telecommunications, the Internet, Intranets, Extranets, and wireless networks will be examined. This course also covers systems development, e-commerce, and the ethical and societal impact of management information systems.

ISSC422
Information Security
3 hours

This course allows students to examine a broad range of computer security issues and provides the student with technical knowledge not normally addressed in traditional training. It explores the protection of proprietary information and security planning with an emphasis on networked computer vulnerabilities. It also focuses on detection (e.g. viruses, hackers, types of computer crime, computer forensic examination, etc.), as well as disaster recovery and technology law. A primary focus is put on security of systems and computer crime prevention. Also addressed is the maturing criminal population with increased computer literacy, whose tendency is to move from violent actions to more profitable computer crime. Finally, issues of privacy and freedom of information are examined. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical II and Management I categories. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

Choose 9 Credit Hours from the following:
DSIN141
Image Enhancement using Adobe Photoshop
3 hours

Graphics are valuable tools for communication in Internet applications. This course introduces the student to the principles and practices of image manipulation, image enhancement, and image storage. The student will explore graphical file formats, color and perception, color balance, histograms, web-friendly colors, the impact of image size and resolution on screen size and resolution, brightness, contrast, image noise, noise reduction, digital signal processing (blurring, de-blurring, Gaussian filters, sharpening, softening, spot healing, dodging, burning), transparency, opacity, hue, saturation, image layering, color blending (multiplying, dodging), image transformation (rotation, resizing, shearing), selections (pixel, vector), alpha channels, and image modes (grayscale, RGB, CMYK, HSB, indexed color). Students must have access to Adobe Photoshop CS6 (or higher). This software is not provided by the course material grant and must be purchased/provided by the student.

DSIN143
Design Using Adobe InDesign
3 hours

This course is a study of the principles, practices, processes, and disciplines related to designing print media for maximum communication. This course evaluates the process for planning, preliminary negotiations, pre-visual research and analysis, visual conceptualization, points of view, attitude, document design, document production, and post-production. This course examines the principles of typographic design, word design, page organization, page layout, integration of words and images, character styles, paragraph styles, layout design, tiling, scaling, textures, and illustrations. This course investigates color theory, additive and subtractive color models, complementary colors, patterns and rhythms. Students will apply their knowledge to design flyers, brochures, CD/DVD covers, and product packaging. Students must have access to Adobe InDesign CS5 or higher. This software is not provided by the course material grant and must be purchased/provided by the student.

DSIN241
Illustration & Design Using Adobe Illustrator
3 hours

This course examines the process of designing, developing, and deploying text and graphics in the industry standard vector graphics software application, Adobe Illustrator CS5 or higher. Students will develop illustrations that take advantage of the broad set of tools, effects, and attributes available in Illustrator. They will learn to edit existing vector graphics files, and how to structure and mange vector graphics files for maximum efficiency and effectiveness. They will learn to format files for use in other applications and for output to a variety of imaging devices. Students must have access to Adobe Illustrator CS5 or higher software.

DSIN242
Motion Graphics Using Adobe Flash
3 hours

This course examines the process of designing, developing, and deploying text and graphics in motion in order to create a dynamic and interactive experience for the web user. Students will develop storyboards, perform interaction design, animate type, and set illustrations in motion. Students will examine and apply the theories and concepts behind developing illustrations, character animations, layers, frames, masks, symbols, libraries, motion tweens, shape tweens, nested objects, animated shows, and ActionScript. They will add audio and video to enhance the quality of the visual experience. Adobe Fireworks will also be introduced. Students must have access to Microsoft Internet Explorer 7.0 (or higher), Adobe Fireworks CS5 (or higher), Firefox 2.0 (or higher), and Adobe Flash Professional CS5 (or higher) software. This software is not provided by the course material grant and must be purchased/provided by the student. This course covers lessons 24–29 of the Web Design curriculum of the CIW Web Design Specialist certification.

Pre Reqs: Web Development Fundamentals(WEBD121)

ENTD211
Introduction to Software Design
3 hours

This course will introduce standard notations and metaphors and patterns used in software design, so that the learner becomes familiar with reading and interpreting design documents. Familiarity with design patterns and modeling notations allows software developers, even those who do not actively participate in producing design documents, to better understand software documentation, before, during, and after system implementation. Familiarity with object-oriented programming languages is strongly encouraged. NOTE: Alice, an innovative 3D programming software, is used to provide a more interactive and accelerated learning experience in this course. Students should download Alice and conduct system checks by validating the best version for their computer before enrolling into the course. Go to the www.alice.org website for more information.

ENTD313
Mobile Application Design and Development
3 hours

This course is an introductory study of mobile application design and development and how mobile devices enhanced by mobile application software are changing the face of technology. The course begins with some basic introductory concepts and lays the foundation for more advanced topics regarding software such as iOS, Palm webOS, Symbian OS, and Windows Mobile, which use customized application software on various mobile devices. The course cements a theoretical overview of mobile application, design and development issues, and practical application concerns. The course will cover both conceptual and scenario based exercises, thus enabling students to experience the maximum amount of comprehension and retention of material covered in the course.

ENTD322
Application Development for the Droid
3 hours

This course is a study of application development for the Motorola Droid and how mobile devices enhanced by mobile application software are changing the face of technology. The course expands on concepts introduced in the mobile application design and development course and expands into more advanced topics regarding Motorola Droid. The course will cover scenario based exercises and requires students to use assigned tools to write, test and deploy mobile software applications into the Android platform environment. The course allows the students to experience maximum amount of application and retention of material covered in the course. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD331
Application Development for the Blackberry
3 hours

This course is a study of application development for the Blackberry mobile device and how mobile devices enhanced by mobile application software are changing the face of technology. The course expands on concepts introduced in the mobile application design and development course and expands into more advanced topics regarding the Blackberry devices. The course will cover scenario based exercises and requires students to use assigned tools to write, test and deploy mobile software applications into the Blackberry platform environment. The course allows the students to experience maximum amount of application and retention of material covered in the course. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD333
Application Development for the iPhone and iPad
3 hours

This course is a study of application development for the iPhone and iPad mobile devices and how mobile devices enhanced by mobile application software are changing the face of technology. The course expands on concepts introduced in the mobile application design and development course and expands into more advanced topics regarding iPhone and iPad mobile devices. The course will cover scenario based exercises and requires students to use assigned tools to write, test and deploy mobile software applications into the iOS platform environment. The course allows the students to experience maximum amount of application and retention of material covered in the course. Students need the latest XCode installed, which is available from the Appstore, and XCode must be installed before class begins. Students must have access to an Apple Inc. computer with XCode installed to successfully complete this course. Students also need intermediate level programming experiences and/or knowledge to do well in the course. Students must have previous programming experiences using an object-oriented C-based language such as C#, Java, or C++. (Prerequisite: ENTD200 or ENTD211 or ENGR200 (for Engineering majors)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200),Introduction to Engineering and Computing(ENGR200)

ENTD361
Enterprise Development Using VB.NET: Introduction
3 hours

This course is a study of the .NET framework. Students will examine the differences between Visual Basic (VB) and VB.Net, the Common Language Runtime (CLR), Microsoft Intermediate Language (MSIL), the XML Web Services platform, .NET Framework Class Library, and examine Visual Studio.NET and Visual Basic.NET (VB.NET). They will create classes, properties, methods, constructor methods, sub-procedures, and function-procedures. They will handle events, explore datatypes, build Window forms and Web Forms, add and interact with controls, specify events, develop event-handling code, and add menus. They will also evaluate ADO.Net, choose an ADO.Net provider, connect to a database, and perform database interactions. Students must have access to Visual Studio 2008 or Visual Basic 2008 Express Edition (or higher). This software is not provided by the course material grant and must be purchased/provided by the student. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD371
Database Driven Web Applications Using PHP & MySQL
3 hours

This course focuses on the roles and functions of relational databases in the management of information; it will be taught from a mixture of analytical and practical methods. This course is a study and application of database architecture, logical schema, the full life cycle database application development process, and the principles of relational database design in the context of the MySQL Relational Database Management System (RDBMS). Students will examine the rudiments of referential integrity and normalization and use the ANSI standard Structured Query Language (SQL) to design, develop and deploy databases. They will use PHP to interact with the database, to extract data, deploy it on the web, and examine the syntax and constructs of the language, cookies, system functions, user- defined functions, sessions, and database connectivity. The student will also explore the PHP Framework, PHP syntax, cookies, sessions, database connectivity, database-driven web interfaces, and interactions with ODBC compliant relational databases. Students must have access to MySQL 4.1 (or greater) database software. This software is not provided by the course material grant and must be purchased/provided by the student. (Prerequisite: INFO221 and ENTD200 or ENTD211)

Pre Reqs: Relational Database Concepts(INFO221),Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD381
Object Oriented Programming With Java
3 hours

This course is a study and application of the principles and concepts of Object-Oriented Programming (OOP) as it is implemented in the world of Java; including inheritance, encapsulation, and polymorphism. It appraises the processes and practices used to develop IT solutions that are reusable, modular, and small; all of which are popular objectives in the world of IT management. This course explores the inheritance (is a), containment (has a), and collaboration (use a) relationships; and examines the major packages in the Java Class Library, strings, arrays, classes; instantiation, properties, methods, constructor methods, method overloading, method overriding, inheritance modifiers, access modifiers, interfaces, and packages. This course also assesses exception handling with the use of “try,” “catch,” and “finally.” Students must have access to the latest edition of the Java Development Kit. This software is not provided by the course material grant and must be purchased/provided by the student. (Prerequisite: ENTD200 or ENTD211 or ENGR200)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200),Introduction to Engineering and Computing(ENGR200)

ENTD413
Advanced Mobile Application Design and Development
3 hours

This course is an advanced study of mobile application design and development and how mobile devices enhanced by mobile application software are changing the face of technology. The course expands on concepts introduced in the mobile application design and development course and expands into more advanced topics regarding the subject. The course will cover scenario based exercises and requires students to use assigned tools to write, test and deploy mobile software applications into the target platform environment. The course allows the students to experience maximum amount of application and retention of material covered in the course.

ENTD461
Enterprise Development Using VB.NET: Advanced
3 hours

This course is a study of the theory and application of developing dynamic desktop and web-based applications using the .NET Framework and Visual Basic.NET (VB.NET). This course examines the architecture of the VB.NET IDE, the rudiments of the VB.NET programming language, the .NET Framework Class Library, OOP Design, Design Patterns, overriding members, overloading members, component-based programming, exception handling, interface-based programming, common windows controls, file management, control licensing, ADO.NET, connection pooling, and data validation. They will also interface with relational databases, use the GDI class library, draw graphics, perform graphic transformations, build MDI applications, and use access modifiers to control visibility. Students must have access to Visual Studio 2008 or Visual Basic 2008 Express Edition (or higher) software. This software is not provided by the course material grant and must be purchased/provided by the student. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD462
Enterprise Development Using ASP.NET
3 hours

This course is a study of the theory, concepts, and applications of the Active Server Page (ASP.NET) web development environment. Students will learn about working with the page (HtmlForm class, error handling, tracing, page personalization, and rich page composition), the ASP.NET object Model (request, response, server, session, application, global.asax file, and collaborative data object), data providers (managed providers, SqlConnection class, and SqlCommand class), data containers (SQlDataAdapter, DataSet, DataTable, and DataView objects), data source based data binding, and managing the HTTP Request Context and life cycle. The student will also manage and establish state across HTTP connections, explore caching, and examine ASP.NET’s security architecture (“session hijacking,” Forms authentication, membership and role management, and security related controls). Students must have access to Visual Studio 2008 or Visual Web Developer 2008 Express Edition software (or higher) software. This software is not provided by the course material grant and must be purchased/provided by the student. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD463
Enterprise Development Using C#
3 hours

This course is a study of the C# language and its object-oriented facilities to create applications using the .NET Framework. Students will explore data types, classes, methods, parameters, properties, interfaces, iteration, conditional branching, constructor methods, and destructor methods. They will examine parameter passing, method overloading, method overriding, access modifiers, exception handling, and event handling. They will also create forms with controls, and with event handling for these controls. Students will also use Visual Studio.Net to set profiles, create projects, use the solution explorer, set references, set project properties, use the code editor, define assembly information, compile the code, run the application, and debug the program. Students must have access to Visual Studio software. Students must have access to Microsoft Visual Studio 2010 or Visual C# 2010 Express Edition or higher. (Prerequisite: ENTD200 OR ENTD211 and ENTD361)

Pre Reqs: Introduction to Software Design(ENTD211),Enterprise Development Using VB.NET: Introduction(ENTD361),Fundamentals of Programming(ENTD200)

ENTD464
Enterprise Development using .NET: Project
3 hours

This course evaluates the process for designing, developing, and deploying .NET enterprise applications. This course is a culmination of courses on Visual Basic.Net, ASP.Net, and C#.Net; the student will apply the knowledge and skills learned in these courses to develop and deploy a web-based application. This course investigates the process for configuring the .Net Framework and examines the issues related to project integration and application deployment. Students must have access to Visual Studio 2008 or Visual Web Developer 2008 Express Edition (or higher) and Microsoft Access 2007 (or higher) software. This software is not provided by the course material grant and must be purchased/provided by the student. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD465
Application Development for Windows Mobile Operating Systems
3 hours

This course is a study of Microsoft application development for mobile/embedded devices. The course expands on concepts introduced in the mobile application design and development course and expands into more advanced topics regarding application development using Microsoft’s software. The course will cover scenario based exercises and requires students to use assigned tools to write, test and deploy mobile software applications. The course allows the students to experience maximum amount of application and retention of material covered in the course. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD481
Enterprise Development using J2EE
3 hours

This course focuses on the concepts and principles of designing, developing, and deploying N-Tier Java based enterprise web applications. It examines the architectures, the process, the Java Servlet life cycle, and the practices for developing and deploying Java Server Pages (JSP), Java Servlets, and JavaBeans based enterprise web applications. This course also explores the concepts of Java Database Connectivity (JDBC), connection pooling, exception handling, data integrity, and transaction controls. It assesses the impact of enterprise web architectures and applications on global ecommerce and economies. Students must have access to the latest edition of the Java Development Kit, J2EE Development Kit, and J2EE Web Server. This software is not provided by the course material grant and must be purchased/provided by the student. (Prerequisite: ENTD381)

Pre Reqs: Object Oriented Programming With Java(ENTD381)

INFO111
Enterprise Data Presentation with Crystal Reports
3 hours

This course is a study of the principles of data presentation and the use of Crystal Reports to visualize data. Students will explore the facilities of Crystal Reports (Design Window, Toolbars, Field Explorer, Database Expert, Record Sort Expert, Group Expert, Formula Workshop, Formula Editor, Select Expert, Section Expert, Business Views, and Repository). They will export and import data to MS Office Applications such as Word and Excel. They will parameterize reports, conditionally format reports, customize the appearance of reports, build custom functions, create business views, specify data security, and control user access. Students must have access to Crystal Reports software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: INFO161 or INFO171 or INFO221)

Pre Reqs: Relational Databases with MS Access: Introduction(INFO161),Relational Database Concepts(INFO221),Relational Databases with Oracle: SQL Introduction(INFO171)

INFO171
Relational Databases with Oracle: SQL Introduction
3 hours

This course is a study of data modeling and database design. It applies the relational database model to construct Entity Relationship (ER) diagrams using ER Modeling. Through a study and application of the American National Standards Institute (ANSI) Standard Structured Query Language (SQL) constructs the course introduces data definition (create, alter, drop), data manipulation (insert, update, delete), and transaction control (commit, savepoint, and rollback), and defining, altering, and deleting primary keys, foreign keys, and constraints. Students must have access to Oracle software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site.

INFO271
Relational Databases with Oracle: SQL Intermediate
3 hours

This course is a study and application of the American National Standards Institute (ANSI) Standard Structured Query Language (SQL) constructs for an advanced level of data definition (create, alter, drop), data manipulation (insert, update, delete), and transaction control (commit, savepoint, and rollback). The course builds on the techniques learned in the introductory course for database design and implementation. It explores the database life cycle through conceptual, logical, and physical design phases. The course examines the correlation between SQL and relational algebra; user access and control; transactional integrity; referential integrity; concurrency control; and database objects such as views, complex views, SQL functions, and sequences. Advanced topics discussed in the course include: database performance tuning, query optimization, distributed database systems, business intelligence, data analytics, data warehousing, cloud computing services, and the administration of database systems. Students must have access to Oracle software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: INFO171 or equivalent)

Pre Reqs: Relational Databases with Oracle: SQL Introduction(INFO171)

INFO321
Database Management Systems
3 hours

This course is a study of major advancements in database technology that have taken place in recent years. It does not assume any prior background in the field of databases, and, hence, starts with basic introductory concepts, but covers advanced topics as well. The course will cover both conceptual and hands-on material in the area of database management, thus enabling students to have the maximum amount of comprehension and retention of material covered in the course. The student must have access to MS Access. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site.

INFO361
Relational Databases with MS SQL Server
3 hours

This course is a study of the principles of relational databases, the ANSI standard Structured Query Language (SQL), and the Microsoft Transact-SQL in the context of Microsoft SQL Server. Students will create, alter, and drop tables; create, alter, and drop constraints; create, alter, and drop views; and create, tune, and drop indexes. They will also build transactions, triggers, Transact-SQL queries, and stored-procedures. They will review triggers to implement data integrity and business rules. They will use DTS packages and transformations, the Enterprise Manager, Query Analyzer, and Database Configuration interfaces. They will also create and manage databases, database devices, backups, and restores; import/export data; and schedule automated tasks. Students must have access to Microsoft SQL Server software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: INFO161 or INFO221 or INFO321)

Pre Reqs: Relational Databases with MS Access: Introduction(INFO161),Relational Database Concepts(INFO221),Database Management Systems(INFO321)

INFO371
Relational Databases With Oracle: PL/SQL
3 hours

This course is a study and application of the procedural language overlay on the ANSI standard Structured Query Language (SQL) to enable students to access tuples, one at a time. Knowledge of this complex procedural component will enable students to develop Programming Units that are characterized by block structure, control structures, variables, constants, operators, implicit and explicit cursors, and exception handling (both system- and user-defined). This course examines study and application of procedures, functions, packages, and triggers. Knowledge of procedures, functions, packages, triggers, events, restrictions on triggers, the trigger firing sequence, and the use of triggers to perform auditing functions. This course also covers Object-Relational database concepts and Object Oriented Programming Structures (OOPS) and explores dependencies in Procedures and Functions. Students must have access to Oracle software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: INFO171 or equivalent)

Pre Reqs: Relational Databases with Oracle: SQL Introduction(INFO171)

INFO399
Information Technology Practicum
3 hours

The field of Information Technology (IT) is multi-faceted; it includes technology areas such as database development, web based applications, business intelligence, visual communications, data analysis, software development, network security, cybercrime, digital forensics, security auditing, security certification, service delivery, and governance. The IT industry requires credentialed professionals that are academically sound and that have the ability to complete real world IT projects. This course provides an opportunity to integrate academic rigor with real world experience; to apply theory to solve real world problems, to make the learning experiential, to facilitate project-based learning, and to integrate scholarship with practice. This course is a supervised practicum; students must submit project plans and obtain Faculty member approval prior to beginning any work on the project. The requirements of the project plan will be provided in the syllabus; it should include the project sponsor, manager, scope, objectives, methodology, progress reporting, deliverables, and schedules. The student must also submit progress reports and a final report that includes an acceptance sign-off from the project sponsor. The Faculty member also has to approve the completed project in order for the student to earn a successful grade in this class. The student is responsible to have access to all the necessary software, documents, and other materials necessary to fulfill the requirements of this course. Enrollment is contingent upon the approval of the faculty member.

INFO471
Relational Databases With Oracle: Forms & Reports
3 hours

This course is a study and application of the User Interaction for enterprise relational database systems. Topics include: the architecture of Forms and Reports interface, the anatomy of the Form Module and its various components, such as: blocks, frames, items, attributes, editors, windows, canvases, messages, alerts, menus, and objects. This course also examines the implementation of data integrity using various types of triggers, including: input, non-input, message, alerts, query, validation, navigational, and transactional; it also addresses reusability and interface efficiency using modular Program Units, Libraries, Menus, and Pop-up Menus. This course is also a study and application of the theory, concepts, and applications associated with parameterized and non-parameterized Data Retrieval and Analysis. It also appraises report template libraries to standardize reports for the enterprise; and the Reports Server to manage and disseminate reports across the enterprise. Students must have access to Oracle software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: INFO171 or equivalent)

Pre Reqs: Relational Databases with Oracle: SQL Introduction(INFO171)

ISSC326
Cloud Computing
3 hours

This course will delve into all aspects of a Cloud Computing implementation, starting from a definition of what it actually means and assessment of whether it is suitable for a given company to the strategy alignment, implementation and operation of a working solution. It will cover Infrastructure-as-a-Service, Platform-as-a-Service, and Software-as-a-Service as the many integration and management components that are necessary to make this work together to fulfill business requirements.

ISSC331
Legal Issues in Information Security
3 hours

This course examines information security issues and the law. The rapid growth of technology has given rise to legal issues surrounding technology. Information security is the practice of protecting information to ensure the goals of confidentiality, integrity and availability are met. Information security makes sure that accurate information is available to authorized individuals when it is needed. When governments, private organizations, and individuals do a poor job of protecting the information entrusted to them, legislatures respond with new laws. The course will examine key conflicts involving technology and the legal system to include: privacy issues, civil, criminal, and administrative law, Children’s Online Privacy Protection Act (COPPA), Sarbanes Oxley, and information security governance. This course examines current literature on such topics.

ISSC341
Introduction to Networking
3 hours

This course is a study of the evolution, the concepts, and the principles of local, distributed and enterprise networking. This course examines Network design, topologies, architecture, media, interface cards, protocols, problem resolution, communications, administration, operations, and resources. It introduces the student to the concepts of wireless networking, and web-based networks. This course also explores the Open Systems Interconnection (OSI) and the Transmission Control Protocol/ Internet Packet (TCP/IP) reference models. This course also examines internetworking servers, and hardware and operating systems maintenance. Students will need access to Microsoft Internet Explorer with Outlook Express, Microsoft Visio or equivalent network diagramming software, Java Runtime, Phex, and FineCrypt. The software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site.

ISSC344
Open Source System Security
3 hours

This course is an introductory study of the principles, practices, procedures, and methodologies to provide security on Linux systems. It assesses the security risks, threats and vulnerabilities related to individual and enterprise Linux environments. Course topics include: user privileges and permissions, file systems volumes and encryption and kernel security risk mitigation. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility.

ISSC345
Service Oriented Architecture
3 hours

This course examines the various aspects of a Service-oriented Architecture (SOA). It explores the comprehensive plan to interrelate business with technology. It displays how SOA combines the talents and skills of an entire organization, with its requisite needs and computing know-how. It focuses on the necessary tools—processes, best practices, and standards—for developing a sound SOA, Service-Oriented Modeling: Service Analysis, Design, and Architecture. It also introduces a service-oriented modeling framework that employs an agile and universal business and technology language to facilitate analysis, design, and architecture initiatives.

ISSC361
Information Assurance
3 hours

This course is a study of the discipline of Information Assurance that focuses on protecting information assets by ensuring availability, confidentiality, integrity, authenticity, and non-repudiation. This course delves into the deliberate engineering, planning and implementation of the five major areas in any enterprise: hardware, software, networks, people, and policies. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical III, Management II and Management III categories. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC362
IT Security: Attack & Defense
3 hours

This course examines the techniques and technologies for penetration of networks, detection of attacks, and prevention of attacks. This course addresses the techniques, the technologies, and the methodologies used by cyber intruders (hackers) to select a target and launch an attack. An understanding into the mind and psyche of the hacker is essential to anticipating the moves of the hacker and to design effective countermeasures. This course focuses on techniques and technologies to detect such attacks even while the attack is in progress; early detection enables the administrator to track the movements of the hacker and to discover the intent and goals of the hacker. This course assesses the various countermeasures to keep the system out of the “sights” of the hacker and to keep the hacker out of the perimeter of the target network. This course also explores the laws and the legal considerations in prosecuting computer crime. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC364
IT Security: Access Control and Authentication
3 hours

This course examines a broad range of network security issues. It explores how access controls protect resources against unauthorized viewing, tampering, or destruction and serves as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized access and disclosure. It focuses on access control, such as components, processes, controls, and authentication, as well as security breaches, organizational behavior and social engineering, physical security, remote access control, public key infrastructure and encryption, cryptography, testing, and information assurance. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC366
IT Security: Cryptography
3 hours

Cryptography provides a critical foundation upon which much of computer security is based. Cryptography is necessary to provide both integrity and confidentiality of the data that is exchanged in a computer network. There are many methods of encryption, and each has its strengths and weaknesses in terms of performance, security, and requirements for management of secret information used to hide or disclose information. This course will provide an intensive overview of the field of cryptography, providing a historical perspective on early systems, building to the number theoretic foundations of modern day cryptosystems. Students will learn how cryptosystems are designed, and to match cryptosystems to the needs of an application. Students will also study basic cryptanalysis and will be presented with real life breaches of common cryptosystems so that they better understand the dangers within cryptosystem design and in the design of systems that rely on cryptography. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC368
IT Security: Physical and Peripheral Defense
3 hours

The course covers physical security requirements in a network enterprise on varying levels including physical protection against internal and external threats that may impact people, property, and other data and networked assets. Students will learn how to assess and protect these assets via multiple layers of physical security. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC386
Green Computing: Foundations and Strategies
3 hours

This course provides a basic understanding of the overall environmental need for an organization to adopt a Green IT strategy including: Climate Change, dangerous and exploitive working practices, the effect of hazardous waste use and disposal, consumption of precious resources such as oil, gas and water. The course identifies an organization’s external drivers and opportunities for greening its IT including: political, environmental, social and legal.

ISSC387
Green Computing: Advanced Topics
3 hours

This course provides an overview of the current research focusing on ways to make computing greener and more efficient, the reference used in this course is the first research-level book devoted to green computing and large-scale energy efficiency. With contributions from leading experts in the field, the book presents current research and developments in hardware, systems software, run-time systems, programming languages, data center management, and applications. It also covers the emerging green movement in computing, including the Green Grid and the Green 500 list, as well as important programs in grassroots organizations and government agencies. (Prerequisite: ISSC386)

Pre Reqs: Green Computing: Foundations and Strategies(ISSC386)

ISSC411
Application Security
3 hours

This course is an introductory study of the principles, practices, procedures, and methodologies to ensure security of data within web-based applications. It examines secure coding practices and processes, web application security configuration management techniques, and web application security standards. It appraises the convergence between web application security and associated threat vectors/attack methods. It appraises secure development processes, web application secure configuration techniques, and legal issues related to securing vital digital assets. Course topics include: Secure Configuration & Development, Vulnerability & Risk Mitigation, Vulnerability Assessments & QA Testing, and PCI DSS Compliance. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC424
Virtualization Security
3 hours

This course is an introductory study of virtualization security including the types of virtualization, the importance of securing virtualized networks and discussions of the various virtualization program offerings. The course will provide an overview of the current virtualization technologies in use in most environments. Course topics include: Introduction to Virtualization, VMware ESXi on Linux, Microsoft Virtualization, Citrix Xen Virtualization, Sun Virtualization, Red Hat Enterprise Linux Virtualization, and Virtualization Security. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC426
Cloud Security and Privacy
3 hours

This course will provide necessary guidance to build a proper audit to ensure that operational integrity and customer data protection, among other aspects, are addressed for cloud based resources. This course will serve as a cloud computing reference for auditors and IT Security Professionals. It will also provide information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers. (Prerequisite: ISSC326)

Pre Reqs: Cloud Computing(ISSC326)

ISSC431
Database Systems Security
3 hours

This course is an introductory study of the principles, practices, procedures, and methodologies to ensure security of data at rest within databases. It appraises the convergence between database security and associated threat vectors and attack methods. It examines database types, security architecture, platform fundamentals, user administration, password management, security models, virtual private databases, and auditing models. It reviews database security processes, security configuration techniques, and auditing checklists. Course topics include: Secure Architecture, Privilege Management, and Auditing Processes. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC441
Network Telecommunication Concepts
3 hours

This course provides a solid background of fundamentals to tomorrow's information systems professionals. Data communications keeps a balance between the super-technical and the watered-down subject, providing a solid understanding not only of how things work, but how they can be applied to create business solutions. This course also covers technologies such as Bluetooth, highly elliptical orbiting satellites, V.92, code division multiplexing, and wireless technologies.

ISSC452
Cybersecurity
3 hours

This course examines the practices for assuring information security. The various roles and functions within the Cybersecurity practice will be combined and leveraged to produce a secure organization. Case studies will be used to examine theories and practices drawn from real world situations. The numerous pitfalls of Cybersecurity will be presented with everyday practices of securing companies resources from attack. This course will examine the frameworks, roles, and competencies involved with information security. The fundamentals of Cybersecurity will be examined to include: network and security concepts, attacker techniques, data security, system and applications security and incident response techniques. Current literature will be examined on such topics. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ISSC455
Digital Forensics: Investigation Procedures and Response
3 hours

This course is an introduction to Computer Forensics Investigation Procedures and Response. It provides a basic understanding of the importance of computer forensics, how to set up a secure lab, the process for forensic investigation including first responder responsibilities, how to handle various incidents and information on the various reports used by computer forensic investigators. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ISSC456
Digital Forensics: Investigating Wireless Networks and Devices
3 hours

The growth of wireless networking technologies has given rise to many security issues. Wireless technology has become popular because of its convenience and low cost. This course pertains to the study of Computer Forensics Students will be introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. An overview of cybercrime and security will be addressed by explaining the basic security procedures and will include discussions of the various security threats that today’s users face. This course will prepare students to gather all necessary information and evidence to support prosecution in a court of law. This course will examine wireless networks and devices and will discuss how to investigate wireless attacks, as well as PDA, iPod, iPhone, iPad, and Blackberry forensics. Current literature will be examined on such topics. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ISSC457
Digital Forensics: Investigating Network Intrusions and Cybercrime Security
3 hours

The increase in the use of the Internet and ensuing growth in cybercrime have given rise to the field of digital forensics. Students will be introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. This course examines computer related crime and abuse cases in order to gather all necessary information and evidence to support prosecution in a court of law. Collection of evidence, investigating information hiding, and intrusion response techniques will be explored. This course will examine network intrusions, network traffic, web attacks, DoS attacks and corporate espionage. Current literature will be examined on such topics. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ISSC458
Digital Forensics: Investigating Data and Image Files
3 hours

This course is designed to expose the student to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. The course provides a basic understanding of steganography, data acquisition and duplication. It examines how to recover deleted files and partitions and image file forensics. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ISSC459
Digital Forensics: Hard Disc and Operating Systems
3 hours

This course is designed to expose the student to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. The course provides a basic understanding of file systems, hard disks and digital media devices. Boot processes, Windows and Linux Forensics and application of password crackers. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ISSC471
IT Security: Auditing
3 hours

Security is one of the most important concerns in the world of Information Technology. This course examines the technical issues and the administrative practices to implement and manage security; in particular, this course focuses on the principles of security auditing. This course explores the various technologies and tools to assist with discovery and auditing in the world of security management. This course also assesses the audit practices, audit processes, audit plans, discovery process, discovery software, penetration strategies, identification of potential attacks, log analysis, user baseline analysis, activity analysis, risk assessment, roles and responsibilities, and the roles and responsibilities of security auditing professionals. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC481
IT Security: Planning and Policy
3 hours

This course examines the principles of security planning and policy. It focuses on a variety of security guidelines, policies and plans (security requirements, internal users, external users, operational costs, geography, capacity plan, growth plan, business organization, business scenarios, business factors, business processes, business functions, business products, product life cycle, technical factors, roles and responsibilities, and organizational authority). This course addresses physical security, authentication, network security, encryption, software development, email, Internet, acceptable use, acceptable speech, and viruses/worms. It also covers the need for actionable and maintainable policies and the need for periodic audits of policies and configurations. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ITCC112
Advanced Productivity Applications
3 hours

This course is a study of the concepts and technology trends essential to office productivity applications. Students will explore the principles, practices, features, and functions of the electronic spreadsheet application in the Microsoft Office 2010 Suite. The course will be taught with a mixture of analytical methods and practical exercises. Students will use Microsoft Excel to create and format spreadsheets; they will also manipulate data and use formulas, charts, workbooks, styles, hyperlinks, themes, functions, conditional logic, graphics, comments, and security features. Students will also be introduced to Outlook, the electronic mail application in the Microsoft Office 2010 Suite. This course uses the Microsoft Official Academic Course textbook that is aligned with Microsoft’s Exam—Using Microsoft Office Excel 2010. The book meets the topical requirements for the Microsoft Office Specialist (MOS): Microsoft Office Excel Certification; and contains a six month trial of Microsoft Office.

ITCC200
Application Software Integration
3 hours

This course is a study of the applicable skills and technology essential to application software integration. Students will explore the principles, practices, features, and functions of application software processing in the Microsoft Office 2010 Suite. The course will be taught with a mixture of analytical methods and practical exercises. Students will use Microsoft Word, Excel, PowerPoint , Outlook, and Access to create and format documents; build databases and spreadsheets; and design and publish advertising and marketing documents on customized Websites through the use of hypothetical and real-world scenarios and problems. The course will allow students to experience a more comprehensive understanding of commonly used applications software and how they integrate to provide solutions.

ITMG321
Information Technology Project Management
3 hours

This course is a study of the planning and processes involved in an information system project. Its topics include planning, scheduling, and controlling aspects of a project during its life cycle. The use of project management techniques such as PERT (Project Evaluation and Review Technique) and Gantt charts will be examined in depth as will be other techniques of planning, scheduling and controlling projects. This course meets the topical requirements for the CompTIA Project+ Certification.

ITMG322
Project Management Using MS Project
3 hours

This course is a study of the concepts and technology trends of Project Management. Students will explore the principles, practices, features, and functions of the Microsoft Project application. The course will be taught with a mixture of analytical methods and practical exercises. Students will create project plans, organize (estimate, budget, and schedule) tasks, perform and manage resource allocation, identify project constraints, determine a project’s critical path, create Gantt Charts and establish a project baseline using Microsoft Project. Students must have access to Microsoft Office Project Standard. Course software requirements with the appropriate versions are listed under the course materials site

ITMG371
Contemporary Internet Topics
3 hours

This course explores the Internet's impact on business and personal dynamics, from a managerial perspective. A review of current literature will examine such issues as: changes in workplace productivity, legal issues arising from company Internet use policies, staff morale in the face of nearly ubiquitous Internet access, institutional liability for employee conduct while on the Internet, telecommuting, and the impact of conducting personal business during work time. Non-workplace issues such as the impact of the Internet on family life, politics and the economy will also be explored.

ITMG381
Cyberlaw and Privacy in a Digital Age
3 hours

This course examines how laws have had to change to account for the expanded realm of crimes in the digital age. Despite legislation intended to combat the problem of identity theft, it continues to be one of the most common crimes associated with the Internet. Sexual harassment complaints can now be triggered simply by an employee forwarding questionable email to fellow employees. Some regard intellectual property rights violations to be innocent flattery, while others consider them to be violations that must be stamped out by force of law. Plagiarism by students who pull content from the Internet is a growing problem. Stalkers can log into their victims lives and gain access to highly confidential medical and financial information, and even sabotage their victim's reputations. This course examines current literature on such topics.

ITMG421
Virtual Management
3 hours

This course is designed to provide an overview of key individual, group, and organizational issues involved in Virtual Management (technology-assisted employee management). Topics include gauging employer and employee readiness for technology-enabled communication and telecommuting; identifying appropriate job types and flexibility options; applying effective communication strategies and methods when utilizing computers and telecommunication technologies; and implementing and evaluating management procedures and policies in flexible organizations.

ITMG471
Information Systems: Policy and Planning
3 hours

The course focuses on the use of information technology in the design and management of modern organizations including governments and not-for-profits. Information is now recognized as an essential resource in its own right. Technical, organizational, and social aspects of the management of this resource will be covered.

WEBD122
Introduction to Web Analytics
3 hours

This course is an introductory study of Web analytics technology and how businesses and organizations may to use the technology to measure website traffic, enhance business presence, and conduct market research. The course begins with some basic introductory concepts and lays the foundation for more advanced topics regarding the subject. The course will cover both conceptual and scenario based exercises, thus enabling students to experience the maximum amount of comprehension and retention of material covered in the course.

WEBD220
Web 2.0 Fundamentals
3 hours

This course provides an introduction to Web 2.0 trends and technologies. Students will profile the various features, tools, communities, and practices available in Web 2.0. Also included is a survey of the concepts, tools, and practices used to build blogs and wikis. The course also reviews the various methods of posting information from the blog into web pages using RSS & Atom techniques. Students will also appraise other Web 2.0 technologies, such as forums, collaborative web sites, discussion boards, and wikis. Students will apply the knowledge gained in this course to design and create blogs and forums. Students must have access to a microphone.

WEBD222
Advanced Web Analytics
3 hours

This course is an advanced study of Web analytics technology and how businesses and organizations may use the technology to measure website traffic, enhance business presence, and conduct market research. The course expands on concepts introduced from the Introduction to Web analytics course and expands into more advanced topics regarding the subject. The course will cover scenario based exercises and requires students to use free Web analytic tools to experience the maximum amount of application and retention of material covered in the course. (Prerequisite: WEBD122)

Pre Reqs: Introduction to Web Analytics(WEBD122)

WEBD321
Web eCommerce Development
3 hours

This course is a study of Web e-commerce development and how businesses and organizations may to use the Web to the buy and sell products and services online. The course begins with some basic introductory concepts and progresses into more advanced topics regarding the subject. The course will cover both conceptual and scenario based exercises, thus enabling students to experience the maximum amount of comprehension and retention of material covered in the course.

WEBD322
Web Videography
3 hours

This course teaches the basic principles of Web videography and how to use software such as Adobe Photoshop Elements to edit photos and videos and create movies to market product and services online. The course begins with some basic introductory concepts and progresses into more advanced implementation of Web videograpy for promoting e-commerce and addressing other business requirements. The course will cover both conceptual and scenario based exercises, thus enabling students to experience the maximum amount of comprehension and retention of material covered in the course.

WEBD323
Search Engine Optimization
3 hours

This course introduces concepts and strategies for successful search engine optimization (SEO). It examines different kinds of searches including image searches, local searches, and industry-specific vertical search engines. Additional topics such as link building, site structure improvements, conversation tracking, research and development keyword strategic development, and understanding barriers of search engine optimization are addressed for the purpose of increasing a website's relevance and to determine how people search for products and services.

WEBD324
Web Content Management Systems
3 hours

This course is a study of Web content management systems and how users may manage the content of their websites anywhere by using features such as easily creating new Web pages, building in-site search engines, uploading files and images, creating photo galleries and videos, and adding, deleting and editing users with a variety of permissions. The course begins with some basic introductory concepts and progresses into more advanced topics regarding the subject. The course will cover both conceptual and scenario based exercises, thus enabling students to experience the maximum amount of comprehension and retention of material covered in the course.

WEBD361
Web Application Development Using ColdFusion
3 hours

This course is a study of the design, development, and deployment of database-driven applications on the Internet using ColdFusion. Students will review the architecture of a ColdFusion application and understand the flow of ColdFusion applications and processing over the Internet. The student will use ColdFusion variables and functions, query relational databases, display and format data, evaluate form variables, and interact with forms. They will develop dynamic SQL, dynamic database search applications, data manipulation applications, client-side validations, and server-side validations. Students must have access to ColdFusion MX 7 (or higher) software. This software is not provided by the course material grant and must be purchased/provided by the student.


Institutional Requirements
3 Hours
NAME
DESCRIPTION
CREDITS
COLL100
Foundations of Online Learning
3 hours

This course is designed to provide a solid foundation for undergraduate study in the online environment. Students will be introduced to learning theory, the tools available in the online classroom and campus, and online research. Identification of personal learning style allows students to improve their study/learning techniques and prepares them to succeed in college level courses. Students will be introduced to formatting and citation styles. APUS policy and procedure is addressed. There is an emphasis on written communication to assist students in the transition to the online environment.


General Education
38 Hours

Final Program Requirement
3 Hours
NAME
DESCRIPTION
CREDITS
INFO498
Information Technology: Capstone
3 hours

This capstone course is a senior level course designed to allow the student to review, analyze and integrate the work the student has completed toward a degree in Information Technology. The student will complete an approved academic project and paper that demonstrates mastery of their program of study in a meaningful culmination of their learning, and assesses their level of mastery of the stated outcomes of their degree requirements. This is a capstone course to be taken after all other Information Technology courses have been satisfactorily completed. Students must have senior standing in the program and must demonstrate that they have taken all other IT courses in their degree plan prior to registering for this course. (Prerequisite: Senior Standing and ENGL101)

Pre Reqs: Proficiency in Writing(ENGL101)


General Electives
24 Hours
Electives are typically courses available at your degree level that are not currently required as a part of your degree program/academic plan. Please visit the catalog to view a complete listing of courses.

Program Completion Rates, Median Debt and More

View more details regarding our graduation rates, the median debt of students who completed the program, and other important information.

 

American Public University System, American Public University, and American Military University are not affiliated with American University or the U.S. Military. American Public University System (APUS) is accredited by the Higher Learning Commission (HLC) and a member of the North Central Association. © 2013 American Public University System | 111 W. Congress Street, Charles Town, WV 25414 | Toll Free: 1-877-755-2787 | Privacy Policy | Terms