Bachelor of Science in Information Systems Security

 

DEGREE AT A GLANCE:

    • Number of Credits
    • 122
    • Cost Per Credit
    • $ 250
    • Total Tuition*
    • $ 30,500
  • *(Before Transfer Credit)
 

Program Description

This program is for students interested in pursuing careers in Information Systems Security or Information Assurance (IA). Information can provide the competitive edge in both the military and civilian sectors. Protecting this information is of paramount importance. Hacking competitor information is a prevalent business and military strategy. Military and civilian jobs are becoming more technical and complex in nature, and this phenomenon is generating a corresponding requirement for higher level skills and education in Information Systems Security (ISS). Protecting the information assets of an organization is critical to maintaining the trust and the business of their clientele, and to the credibility and survival of the organization. The curriculum focuses on addressing these information security needs in the marketplace. Students completing this program can apply for a broad range of IT-related positions, such as: security analyst, security auditor, security consultant, security risk assessor, security manager, project manager, information technology manager, information security officer, security trainer, and security systems designer.

Read More
 
 
 

Program Objectives

In addition to the institutional and general education level learning objectives, the Bachelor of Science in Information Systems Security also seeks the following specific learning outcomes of its graduates:

  • Utilize analytical, logical, and critical thinking abilities to analyze user requirements and to design, develop, and deploy effective Information Systems Security solutions.
  • Analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and web-based networks.
  • Prescribe Information Assurance initiatives to protect an organization’s information assets by ensuring availability, confidentiality, integrity, authenticity, and non-repudiation.
  • Develop a security architecture consisting of tools, techniques, and technologies to prevent the penetration of networks, to detect attacks, and to design effective countermeasures.

Visit Career Services

Graduates with degrees in information technology have a competitive edge in this growing industry, as positions are readily available in the information technology field and consistently increasing to address new technological requirements. Vigilant information technology warriors are needed to address real and rapid security threats daily, create application software and to address customized requirements. While the information technology field has continued to grow, there have been an increasing number of entry level positions across the industry seeking workers with IT degrees, approved certifications and relevant work experience. Information technology professionals will continue to remain in demand in order to keep the U.S. competitive in our global e-commerce based economy.

Email Career Services

Overview


Useful Skills within the Information Technology Field

Reading Comprehension — Understanding written sentences and paragraphs in work-related documents.

Active Listening — Giving full attention to what other people are saying, taking time to understand the points being made, asking questions as appropriate, and not interrupting at inappropriate times.

Critical Thinking — Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions, or approaches to problems.

Complex Problem Solving — Identifying complex problems and reviewing related information to develop and evaluate options and implement solutions.

Monitoring — Monitoring or assessing performance of yourself, other individuals, or organizations to make improvements or take corrective action.

Writing — Communicating effectively in writing as appropriate for the needs of the audience.

Coordination — Adjusting actions in relation to others' actions.

Speaking — Talking to others to convey information effectively.

Judgment and Decision Making — Considering the relative costs and benefits of potential actions to choose the most appropriate one.

Social Perceptiveness — Being aware of others' reactions and understanding why they react as they do.

 
Careers


Career Options

To identify what education or training is typical for careers within the public administration field, use the O*Net hyperlinks below and click on “Job Zone.” In addition, seek out the advice of fellow students and alumni working in the industry, using our mentoring program on The Quad (for current students and alumni only) or by speaking with a career coach.

As with all majors, the education you receive serves as a foundation of knowledge that prepares you for what you may face in the professional world. The career field you chose may require additional education or experience.

Computer Network Architects
Computer Network Support Specialists
Computer Operators
Computer Programmers
Computer Systems Analysts
Computer Systems Engineers/Architects
Computer User Support Specialist
Database Administrators
Desktop Publishers

Document Management Specialists
Geospatial Information Scientists and Technologists
Information Security Analysts
Network and Computer System Administrators
Software Developers, Applications
Software Developers, Systems Software
Web Administrators
Web Developers
 

Getting Started: Internships

Gaining real life experience is an ideal way to start a new career. The career services website has an extensive list of internships and fellowships. Browse through the internships organized by interest or by federal program.

There are government-organized internship programs which provide students or recent graduates the opportunity to gain real-life experience. Many require students to maintain either a half-time or full-time student status. The best ways to identify potential opportunities such as these is to contact branch offices directly, to search USAJobs.gov, or to look at the agencies' career portals. Keep in mind that these positions are not always posted online, so direct contact with the agency is key.

Pathways
The Pathways Program is a federal initiative that offers internship programs for current students and training and career development opportunities for recent graduates. Recent graduates must apply within two years of degree or certificate completion (except for veterans, due to their military service obligation, will have up to six years to apply).The internship program for current students replaces the former Student Career Experience Program (SCEP) and Student Temporary Employment Program (STEP).

The Presidential Management Fellows Program (PMF)
PMF is designed to attract to federal service outstanding men and women from a wide variety of academic disciplines who have a clear interest in, and commitment to, a career in the analysis and management of public policies and programs. To be eligible for nomination, an individual must be a graduate student completing or expected to complete, during the current academic year, an advanced degree from a qualifying college or university. Graduate students who have had their degree conferred in the preceding two years, from the opening of the vacancy announcement are also eligible for PMF.

The Workforce Recruitment Program (WRP)
WRP is coordinated by the Office of Disability Employment Policy and the U.S. Department of Defense, and aims to provide summer work experience, and in some cases full-time employment, to college students with disabilities. The program develops partnerships with other federal agencies, each of whom makes a commitment to provide summer jobs and a staff recruiter. Each year, recruiters interview about 1,500 students with disabilities at college and university campuses across the nation and develop a database listing the qualifications of each student.

Getting Hired: Government Agencies, Organizations, and Search Engines

There are several government agencies and organizations that seek candidates with degrees in information technology. The list below provides a few places one might find employment specific to this degree.

ADP
Booz Allen Hamilton
Department of Agriculture
Department of Defense
Department of the Treasury
Department of Veteran Affairs

Elevate Technology Solutions
Higher Logic
HP
LivingSocial
National Aeronautics and Space Association
PRISM

While many of the major job search engines will have positions in several fields to choose from, the list below is specific to the information technology field.

Computer Jobs
CIO IT Job Search
Dice

Joint Institute of Engineering
IT Management Central
TechCareers

 
Connect


Keeping Current: Professional Organizations and Associations
Conferences and Expositions

2014 AITP NCC
Oct. 1-4, 2014
Las Vegas, Nev.

The IA Summit
April 22-26, 2015
Minneapolis, Minn.

IACIS 2014 International Conference
Oct. 1-4, 2014
Las Vegas, Nev.

IAPP Global Privacy Summit
TBD 2015

Association for Information, Science and Technology (ASIS&T) 77th Annual Meeting
Oct. 31 - Nov. 4, 2014
Seattle, Wash.

(ISC)2 Security Congress 2014
Sept. 29 - Oct. 2, 2014
Atlanta, Ga.

PMI Global Congress 2014
October 26-28, 2014
Phoenix, Ariz.

Get Connected: Social Media

American Society for Information Science and Technology (ASIS&T) - Facebook
ARMA International - LinkedIn
Association for Computing Machinery (ACM) - LinkedIn
Association of Information Technology Professionals (AITP) - Facebook
IEEE Computer Society - Twitter
TechAmerica - Twitter

Quick Links
 
 
 
General Total Credits - 122 Hours
Core Requirements
36 Hours
NAME
DESCRIPTION
CREDITS
ISSC340
Local Area Network Technologies
3 hours

This course introduces the student to local area networking concepts in an easy to understand way. In today's competitive business world, one needs to have a basic understanding of the networking technology that runs it. Whether they choose to delve full bore into the technical side of networking or use what they learn to make an informed decision regarding the design, implementation, and maintenance of their local area network, this course will give the student a good foundation to build upon. Students must have access to MS Visio software. Course software requirements with the appropriate versions are listed under the course materials site. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical I category.

ISSC342
Operating Systems: Hardening and Security
3 hours

This course is a study of the principles and concepts of Network Security from the perspective of the Operating System (OS). It places emphasis on discovering the vulnerabilities of the standard Operating Systems (OS) to attacks and focuses on the methodologies and measures necessary to take a proactive and preventive stance to address security vulnerabilities. Students will examine the principles, practices, and policies related to hardening and securing Operating Systems so they are impervious to security threats. It focuses on the vulnerabilities and the related countermeasures of various Windows components (Domain structures, domain trusts, security account manager, policies, profiles, file system, IP services (DHCP, DNS, IIS, TCP/IP printing, RPC, RIP for Internet protocol, SNMP), DCOM, Registry, Active Directory, Encrypting File System (EFS), IPSec, and public key certificate services). This course also discusses vulnerabilities and countermeasures related to UNIX (file system, access control, UID, GID, root password, console password, password shadowing, UNIX kernel, IP services, Inetd, TCP wrapper, variants (AIX, IRIX, Solaris, Linux), “r” services, finger services, Telnet, FTP, Gopher, HTTP, and SSL). Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC361
Information Assurance
3 hours

This course is a study of the discipline of Information Assurance that focuses on protecting information assets by ensuring availability, confidentiality, integrity, authenticity, and non-repudiation. This course delves into the deliberate engineering, planning and implementation of the five major areas in any enterprise: hardware, software, networks, people, and policies. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical III, Management II and Management III categories. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC362
IT Security: Attack & Defense
3 hours

This course examines the techniques and technologies for penetration of networks, detection of attacks, and prevention of attacks. This course addresses the techniques, the technologies, and the methodologies used by cyber intruders (hackers) to select a target and launch an attack. An understanding into the mind and psyche of the hacker is essential to anticipating the moves of the hacker and to design effective countermeasures. This course focuses on techniques and technologies to detect such attacks even while the attack is in progress; early detection enables the administrator to track the movements of the hacker and to discover the intent and goals of the hacker. This course assesses the various countermeasures to keep the system out of the “sights” of the hacker and to keep the hacker out of the perimeter of the target network. This course also explores the laws and the legal considerations in prosecuting computer crime. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC363
IT Security: Risk Management
3 hours

This course explores Networking Security from the perspective of risk management and confirms that assessment of IP based Network systems is critical to developing strategies to mitigate and manage risks. This course focuses on effective assessment strategies that ultimately help the student to implement effective and proactive risk mitigation measures and risk management practices. It exposes the vulnerabilities of TCP/IP; and appraises risk assessment, risk analysis, risk mitigation, risk management, networking components and Virtual Private Networks (VPN). This course examines the tools and techniques used to attack, test and assure the security of the remote information, maintenance, FTP, database, email, UNIX RPC, and IP VPN services. The student will apply this knowledge to develop an assessment methodology that identifies, attacks, and penetrates IP based network systems. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC421
Computer and Network Security
3 hours

This course will discuss both computer and network security, from the wetware (human), software, and hardware perspectives. The "wetware" component will deal with identification of potential risk situations, establishing policies for avoidance, recovery, and prosecution, and proactive measures to reduce causal factors for security breaches in an organization. The "software" perspective will examine types of inappropriate software activity, as well as asset protection issues (recognizing software assets). This component will also address software tools available to assist in reducing administrative costs due to both malicious and accidental loss. The "hardware" component will address hardware approaches to protecting assets, as well as hardware techniques used to compromise assets. Specific technologies discussed include firewalls, symmetric key encryption, public key encryption, digital certificates, and cryptographic systems (SSL/TLS, VPNs, and Kerberos). Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC422
Information Security
3 hours

This course allows students to examine a broad range of computer security issues and provides the student with technical knowledge not normally addressed in traditional training. It explores the protection of proprietary information and security planning with an emphasis on networked computer vulnerabilities. It also focuses on detection (e.g. viruses, hackers, types of computer crime, computer forensic examination, etc.), as well as disaster recovery and technology law. A primary focus is put on security of systems and computer crime prevention. Also addressed is the maturing criminal population with increased computer literacy, whose tendency is to move from violent actions to more profitable computer crime. Finally, issues of privacy and freedom of information are examined. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical II and Management I categories. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC461
IT Security: Countermeasures
3 hours

This course is a study of Network Security attacks and countermeasures. This course examines various security technologies, such as: intrusion detection, authentication, session hijacking, sniffing, spoofing, denial of service, buffer overflow attack, port scanning, encryption, IPSec, DES encryption, triple DES encryption, message digest 5 algorithm, point-to-point tunneling protocol (PPTP), layer 2 tunneling protocol (L2TP), Kerberos, RSA Pretty Good Privacy(PGP), Secure Shell (SSH), Secure Sockets Layer (SSL), Stateful Packet Inspection (SPI), Network Address Translation (NAT), proxies, content filters, public/private keys, Public Key Infrastructure (PKI), Virtual Private Networks (VPN), security policies, security tokens, digital certificates, viruses, worms, Trojan horses, virus scanners, virus protection, vulnerability assessment, and vulnerability scanners. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC471
IT Security: Auditing
3 hours

Security is one of the most important concerns in the world of Information Technology. This course examines the technical issues and the administrative practices to implement and manage security; in particular, this course focuses on the principles of security auditing. This course explores the various technologies and tools to assist with discovery and auditing in the world of security management. This course also assesses the audit practices, audit processes, audit plans, discovery process, discovery software, penetration strategies, identification of potential attacks, log analysis, user baseline analysis, activity analysis, risk assessment, roles and responsibilities, and the roles and responsibilities of security auditing professionals. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC481
IT Security: Planning and Policy
3 hours

This course examines the principles of security planning and policy. It focuses on a variety of security guidelines, policies and plans (security requirements, internal users, external users, operational costs, geography, capacity plan, growth plan, business organization, business scenarios, business factors, business processes, business functions, business products, product life cycle, technical factors, roles and responsibilities, and organizational authority). This course addresses physical security, authentication, network security, encryption, software development, email, Internet, acceptable use, acceptable speech, and viruses/worms. It also covers the need for actionable and maintainable policies and the need for periodic audits of policies and configurations. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC490
IT Security: Business Continuity
3 hours

This course discusses both business continuity and disaster recovery planning. Business continuity investigates Risk Assessment & Management, Business Impact Analysis, and Continuity Strategy Development. The strategy component focuses on incorporating preventive measures, sustaining critical functions, planning for emergency response operations, and implementing recovery plans. This course analyzes employee training & development, chain-of-command, communications, policies & procedures, and fire-drills. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ITMG381
Cyberlaw and Privacy in a Digital Age
3 hours

This course examines how laws have had to change to account for the expanded realm of crimes in the digital age. Despite legislation intended to combat the problem of identity theft, it continues to be one of the most common crimes associated with the Internet. Sexual harassment complaints can now be triggered simply by an employee forwarding questionable email to fellow employees. Some regard intellectual property rights violations to be innocent flattery, while others consider them to be violations that must be stamped out by force of law. Plagiarism by students who pull content from the Internet is a growing problem. Stalkers can log into their victims lives and gain access to highly confidential medical and financial information, and even sabotage their victim's reputations. This course examines current literature on such topics.


Concentration Requirements
15 Hours
NAME
DESCRIPTION
CREDITS
ENTD313
Mobile Application Design and Development
3 hours

This course is an introductory study of mobile application design and development and how mobile devices enhanced by mobile application software are changing the face of technology. The course begins with some basic introductory concepts and lays the foundation for more advanced topics regarding software such as iOS, Palm webOS, Symbian OS, and Windows Mobile, which use customized application software on various mobile devices. The course cements a theoretical overview of mobile application, design and development issues, and practical application concerns. The course will cover both conceptual and scenario based exercises, thus enabling students to experience the maximum amount of comprehension and retention of material covered in the course.

ENTD321
Object Oriented Programming and UML
3 hours

This course is a study of the principles, practices, and technical architecture and development characteristics of Object Oriented Programming and an examination of the differences between object oriented programming and traditional programming. It examines objects, instances, classes, inheritance, polymorphism, encapsulation, abstraction, methods, attributes, tight-encapsulation, interfaces, type casting, type conversions, and object libraries. This course differentiates between single-inheritance model and multiple inheritance models. This course also explores the foundations of the Unified Modeling Language (UML), class models, state models, and interaction models. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD322
Application Development for the Droid
3 hours

This course is a study of application development for the Motorola Droid and how mobile devices enhanced by mobile application software are changing the face of technology. The course expands on concepts introduced in the mobile application design and development course and expands into more advanced topics regarding Motorola Droid. The course will cover scenario based exercises and requires students to use assigned tools to write, test and deploy mobile software applications into the Android platform environment. The course allows the students to experience maximum amount of application and retention of material covered in the course. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD331
Application Development for the Blackberry
3 hours

This course is a study of application development for the Blackberry mobile device and how mobile devices enhanced by mobile application software are changing the face of technology. The course expands on concepts introduced in the mobile application design and development course and expands into more advanced topics regarding the Blackberry devices. The course will cover scenario based exercises and requires students to use assigned tools to write, test and deploy mobile software applications into the Blackberry platform environment. The course allows the students to experience maximum amount of application and retention of material covered in the course. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD333
Application Development for the iPhone and iPad
3 hours

This course is a study of application development for the iPhone and iPad mobile devices and how mobile devices enhanced by mobile application software are changing the face of technology. The course expands on concepts introduced in the mobile application design and development course and expands into more advanced topics regarding iPhone and iPad mobile devices. The course will cover scenario based exercises and requires students to use assigned tools to write, test and deploy mobile software applications into the iOS platform environment. The course allows the students to experience maximum amount of application and retention of material covered in the course. Students need the latest XCode installed, which is available from the Appstore, and XCode must be installed before class begins. Students must have access to an Apple Inc. computer with XCode installed to successfully complete this course. Students also need intermediate level programming experiences and/or knowledge to do well in the course. Students must have previous programming experiences using an object-oriented C-based language such as C#, Java, or C++. (Prerequisite: ENTD200 or ENTD211 or ENGR200 (for Engineering majors)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200),Introduction to Engineering and Computing(ENGR200)

ENTD361
Enterprise Development Using VB.NET: Introduction
3 hours

This course is a study of the .NET framework. Students will examine the differences between Visual Basic (VB) and VB.Net, the Common Language Runtime (CLR), Microsoft Intermediate Language (MSIL), the XML Web Services platform, .NET Framework Class Library, and examine Visual Studio.NET and Visual Basic.NET (VB.NET). They will create classes, properties, methods, constructor methods, sub-procedures, and function-procedures. They will handle events, explore datatypes, build Window forms and Web Forms, add and interact with controls, specify events, develop event-handling code, and add menus. They will also evaluate ADO.Net, choose an ADO.Net provider, connect to a database, and perform database interactions. Students must have access to Visual Studio 2008 or Visual Basic 2008 Express Edition (or higher). This software is not provided by the course material grant and must be purchased/provided by the student. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD381
Object Oriented Programming With Java
3 hours

This course is a study and application of the principles and concepts of Object-Oriented Programming (OOP) as it is implemented in the world of Java; including inheritance, encapsulation, and polymorphism. It appraises the processes and practices used to develop IT solutions that are reusable, modular, and small; all of which are popular objectives in the world of IT management. This course explores the inheritance (is a), containment (has a), and collaboration (use a) relationships; and examines the major packages in the Java Class Library, strings, arrays, classes; instantiation, properties, methods, constructor methods, method overloading, method overriding, inheritance modifiers, access modifiers, interfaces, and packages. This course also assesses exception handling with the use of “try,” “catch,” and “finally.” Students must have access to the latest edition of the Java Development Kit. This software is not provided by the course material grant and must be purchased/provided by the student. (Prerequisite: ENTD200 or ENTD211 or ENGR200)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200),Introduction to Engineering and Computing(ENGR200)

ENTD413
Advanced Mobile Application Design and Development
3 hours

This course is an advanced study of mobile application design and development and how mobile devices enhanced by mobile application software are changing the face of technology. The course expands on concepts introduced in the mobile application design and development course and expands into more advanced topics regarding the subject. The course will cover scenario based exercises and requires students to use assigned tools to write, test and deploy mobile software applications into the target platform environment. The course allows the students to experience maximum amount of application and retention of material covered in the course.

ENTD461
Enterprise Development Using VB.NET: Advanced
3 hours

This course is a study of the theory and application of developing dynamic desktop and web-based applications using the .NET Framework and Visual Basic.NET (VB.NET). This course examines the architecture of the VB.NET IDE, the rudiments of the VB.NET programming language, the .NET Framework Class Library, OOP Design, Design Patterns, overriding members, overloading members, component-based programming, exception handling, interface-based programming, common windows controls, file management, control licensing, ADO.NET, connection pooling, and data validation. They will also interface with relational databases, use the GDI class library, draw graphics, perform graphic transformations, build MDI applications, and use access modifiers to control visibility. Students must have access to Visual Studio 2008 or Visual Basic 2008 Express Edition (or higher) software. This software is not provided by the course material grant and must be purchased/provided by the student. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD462
Enterprise Development Using ASP.NET
3 hours

This course is a study of the theory, concepts, and applications of the Active Server Page (ASP.NET) web development environment. Students will learn about working with the page (HtmlForm class, error handling, tracing, page personalization, and rich page composition), the ASP.NET object Model (request, response, server, session, application, global.asax file, and collaborative data object), data providers (managed providers, SqlConnection class, and SqlCommand class), data containers (SQlDataAdapter, DataSet, DataTable, and DataView objects), data source based data binding, and managing the HTTP Request Context and life cycle. The student will also manage and establish state across HTTP connections, explore caching, and examine ASP.NET’s security architecture (“session hijacking,” Forms authentication, membership and role management, and security related controls). Students must have access to Visual Studio 2008 or Visual Web Developer 2008 Express Edition software (or higher) software. This software is not provided by the course material grant and must be purchased/provided by the student. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD463
Enterprise Development Using C#
3 hours

This course is a study of the C# language and its object-oriented facilities to create applications using the .NET Framework. Students will explore data types, classes, methods, parameters, properties, interfaces, iteration, conditional branching, constructor methods, and destructor methods. They will examine parameter passing, method overloading, method overriding, access modifiers, exception handling, and event handling. They will also create forms with controls, and with event handling for these controls. Students will also use Visual Studio.Net to set profiles, create projects, use the solution explorer, set references, set project properties, use the code editor, define assembly information, compile the code, run the application, and debug the program. Students must have access to Visual Studio software. Students must have access to Microsoft Visual Studio 2010 or Visual C# 2010 Express Edition or higher. (Prerequisite: ENTD200 OR ENTD211 and ENTD361)

Pre Reqs: Introduction to Software Design(ENTD211),Enterprise Development Using VB.NET: Introduction(ENTD361),Fundamentals of Programming(ENTD200)

ENTD465
Application Development for Windows Mobile Operating Systems
3 hours

This course is a study of Microsoft application development for mobile/embedded devices. The course expands on concepts introduced in the mobile application design and development course and expands into more advanced topics regarding application development using Microsoft’s software. The course will cover scenario based exercises and requires students to use assigned tools to write, test and deploy mobile software applications. The course allows the students to experience maximum amount of application and retention of material covered in the course. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD481
Enterprise Development using J2EE
3 hours

This course focuses on the concepts and principles of designing, developing, and deploying N-Tier Java based enterprise web applications. It examines the architectures, the process, the Java Servlet life cycle, and the practices for developing and deploying Java Server Pages (JSP), Java Servlets, and JavaBeans based enterprise web applications. This course also explores the concepts of Java Database Connectivity (JDBC), connection pooling, exception handling, data integrity, and transaction controls. It assesses the impact of enterprise web architectures and applications on global ecommerce and economies. Students must have access to the latest edition of the Java Development Kit, J2EE Development Kit, and J2EE Web Server. This software is not provided by the course material grant and must be purchased/provided by the student. (Prerequisite: ENTD381)

Pre Reqs: Object Oriented Programming With Java(ENTD381)

INFO161
Relational Databases with MS Access: Introduction
3 hours

This course focuses on the role, function, and operations of relational databases in the management of information. The course will be taught from a mixture of analytical and practical methods. This course introduces the student to the concepts of relational databases and to the principles of relational database design in the context of the Microsoft Access Relational Database Management System (RDBMS). Students will apply their knowledge of the principles of data design and database engineering to design and develop a database application that includes user interfaces, form design, data analysis, and data presentation. They will examine the rudiments of referential integrity and normalization and apply this knowledge to design the database tables that implement validation rules to ensure application integrity. They will also examine and develop advanced queries such as: top values, list of values, cross tab, find duplicates, and find unmatched. Students must have access to Microsoft Access software. This software is not provided by the course material grant and must be purchased/provided by the student. The book meets the topical requirements for the Microsoft Office Specialist (MOS). Course software requirements with the appropriate versions are listed under the course materials site.

INFO171
Relational Databases with Oracle: SQL Introduction
3 hours

This course is a study of data modeling and database design. It applies the relational database model to construct Entity Relationship (ER) diagrams using ER Modeling. Through a study and application of the American National Standards Institute (ANSI) Standard Structured Query Language (SQL) constructs the course introduces data definition (create, alter, drop), data manipulation (insert, update, delete), and transaction control (commit, savepoint, and rollback), and defining, altering, and deleting primary keys, foreign keys, and constraints. Students must have access to Oracle software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site.

INFO221
Relational Database Concepts
3 hours

This course is an introduction to the concepts, management issues, and advantages of relational database management systems. Topics include data definition, data manipulation, relational algebra, Structured Query Language (SQL), and Online Transaction Processing (OLTP) systems. This course examines database design, normalization for OLTP systems, Codd’s rules for OLTP systems, data integrity, database system functions (journaling, forward recovery, backward recovery), database security (authentication and authorization), and database administration. This course also explores distributed databases, Online Analytic Processing (OLAP) systems, data warehouses, and object-oriented databases. Students must have access to Microsoft Access software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site.

INFO261
Relational Databases with MS Access: Advanced
3 hours

This course focuses on developing Microsoft Access Switchboard applications; it includes: designing and building form and report interfaces, interfacing the Access database to a web page, building dynamic web pages, integrating Access with other Office applications such as Excel, building pivot tables and charts, categorizing the various types of join operations, examining the rudiments of the Visual Basic for Applications (VBA) code, debugging VBA code, creating macros and functions, and designing Access applications. Students must have access to Microsoft Access software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: INFO161)

Pre Reqs: Relational Databases with MS Access: Introduction(INFO161)

INFO262
Relational Databases with MS Access: Project
3 hours

This course is a study and application of the MS Access VBA Programming; it takes you from using Access to programming with Access. This course translates ERD diagrams into database designs, examines the VBA programming model, converts macros to VBA code, delves into the rudiments of the Visual Basic for Application (VBA) language system, uses the VBA editor, uses VBA to connect to Access, utilizes VBA to perform DDL actions in Access, creates sub procedures, implements functions, handles errors, performs debugging, and utilizes the built-in functions. This course also includes implementing database access in Windows-based and Web-based solutions. This course also includes an examination of the Security Model in the context of Access and VBA. Students must have access to Microsoft Access software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: INFO261 and INFO221)

Pre Reqs: Relational Database Concepts(INFO221),Relational Databases with MS Access: Advanced(INFO261)

INFO271
Relational Databases with Oracle: SQL Intermediate
3 hours

This course is a study and application of the American National Standards Institute (ANSI) Standard Structured Query Language (SQL) constructs for an advanced level of data definition (create, alter, drop), data manipulation (insert, update, delete), and transaction control (commit, savepoint, and rollback). The course builds on the techniques learned in the introductory course for database design and implementation. It explores the database life cycle through conceptual, logical, and physical design phases. The course examines the correlation between SQL and relational algebra; user access and control; transactional integrity; referential integrity; concurrency control; and database objects such as views, complex views, SQL functions, and sequences. Advanced topics discussed in the course include: database performance tuning, query optimization, distributed database systems, business intelligence, data analytics, data warehousing, cloud computing services, and the administration of database systems. Students must have access to Oracle software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: INFO171 or equivalent)

Pre Reqs: Relational Databases with Oracle: SQL Introduction(INFO171)

INFO321
Database Management Systems
3 hours

This course is a study of major advancements in database technology that have taken place in recent years. It does not assume any prior background in the field of databases, and, hence, starts with basic introductory concepts, but covers advanced topics as well. The course will cover both conceptual and hands-on material in the area of database management, thus enabling students to have the maximum amount of comprehension and retention of material covered in the course. The student must have access to MS Access. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site.

INFO331
Management Information Systems
3 hours

This course provides a technical and organizational foundation for understanding the use and importance of information systems and information technology in today's management environment. This course covers the hardware, software, and infrastructure that support management information systems. Information and decision support systems, knowledge management and specialized information systems, database management systems, telecommunications, the Internet, Intranets, Extranets, and wireless networks will be examined. This course also covers systems development, e-commerce, and the ethical and societal impact of management information systems.

INFO361
Relational Databases with MS SQL Server
3 hours

This course is a study of the principles of relational databases, the ANSI standard Structured Query Language (SQL), and the Microsoft Transact-SQL in the context of Microsoft SQL Server. Students will create, alter, and drop tables; create, alter, and drop constraints; create, alter, and drop views; and create, tune, and drop indexes. They will also build transactions, triggers, Transact-SQL queries, and stored-procedures. They will review triggers to implement data integrity and business rules. They will use DTS packages and transformations, the Enterprise Manager, Query Analyzer, and Database Configuration interfaces. They will also create and manage databases, database devices, backups, and restores; import/export data; and schedule automated tasks. Students must have access to Microsoft SQL Server software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: INFO161 or INFO221 or INFO321)

Pre Reqs: Relational Databases with MS Access: Introduction(INFO161),Relational Database Concepts(INFO221),Database Management Systems(INFO321)

INFO371
Relational Databases With Oracle: PL/SQL
3 hours

This course is a study and application of the procedural language overlay on the ANSI standard Structured Query Language (SQL) to enable students to access tuples, one at a time. Knowledge of this complex procedural component will enable students to develop Programming Units that are characterized by block structure, control structures, variables, constants, operators, implicit and explicit cursors, and exception handling (both system- and user-defined). This course examines study and application of procedures, functions, packages, and triggers. Knowledge of procedures, functions, packages, triggers, events, restrictions on triggers, the trigger firing sequence, and the use of triggers to perform auditing functions. This course also covers Object-Relational database concepts and Object Oriented Programming Structures (OOPS) and explores dependencies in Procedures and Functions. Students must have access to Oracle software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: INFO171 or equivalent)

Pre Reqs: Relational Databases with Oracle: SQL Introduction(INFO171)

INFO471
Relational Databases With Oracle: Forms & Reports
3 hours

This course is a study and application of the User Interaction for enterprise relational database systems. Topics include: the architecture of Forms and Reports interface, the anatomy of the Form Module and its various components, such as: blocks, frames, items, attributes, editors, windows, canvases, messages, alerts, menus, and objects. This course also examines the implementation of data integrity using various types of triggers, including: input, non-input, message, alerts, query, validation, navigational, and transactional; it also addresses reusability and interface efficiency using modular Program Units, Libraries, Menus, and Pop-up Menus. This course is also a study and application of the theory, concepts, and applications associated with parameterized and non-parameterized Data Retrieval and Analysis. It also appraises report template libraries to standardize reports for the enterprise; and the Reports Server to manage and disseminate reports across the enterprise. Students must have access to Oracle software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: INFO171 or equivalent)

Pre Reqs: Relational Databases with Oracle: SQL Introduction(INFO171)

ISSC321
Computer Systems Organization: Intermediate
3 hours

This course is a study of computer systems, computer organization, computer subsystems, and operating systems, This course examines CPUs, motherboards, basic input/output systems, memory subsystems, bus structures, expansion cards, ports, connectivity, interfaces, data storage subsystems, and multimedia interface devices. This course also evaluates computer monitoring, computer systems management, operating systems, networking, and security. This course covers the A+ Certification Essentials curriculum.

ISSC322
Computer Systems Organization: Advanced
3 hours

The course is an advanced study of computer systems and subsystems, processor design, CPU architecture, number systems used in computing, storage subsystems, and memory subsystems, This course also examines the OSI model, networking, , security, performance management, and capacity planning. This course covers the CompTIA A+ Certification curriculum. (Prerequisite: ISSC321)

Pre Reqs: Computer Systems Organization: Intermediate(ISSC321)

ISSC323
Computer Hardware Systems
3 hours

This course is a technical study of the hardware systems and architectures in a computer system; it appraises expansion cards, storage subsystems, IO interface subsystems, operating system, Local Area Networking (LAN), Internet connectivity, and security. This course also examines the processes for analyzing problems and for synthesizing solutions related to computer hardware systems.

ISSC326
Cloud Computing
3 hours

This course will delve into all aspects of a Cloud Computing implementation, starting from a definition of what it actually means and assessment of whether it is suitable for a given company to the strategy alignment, implementation and operation of a working solution. It will cover Infrastructure-as-a-Service, Platform-as-a-Service, and Software-as-a-Service as the many integration and management components that are necessary to make this work together to fulfill business requirements.

ISSC331
Legal Issues in Information Security
3 hours

This course examines information security issues and the law. The rapid growth of technology has given rise to legal issues surrounding technology. Information security is the practice of protecting information to ensure the goals of confidentiality, integrity and availability are met. Information security makes sure that accurate information is available to authorized individuals when it is needed. When governments, private organizations, and individuals do a poor job of protecting the information entrusted to them, legislatures respond with new laws. The course will examine key conflicts involving technology and the legal system to include: privacy issues, civil, criminal, and administrative law, Children’s Online Privacy Protection Act (COPPA), Sarbanes Oxley, and information security governance. This course examines current literature on such topics.

ISSC341
Introduction to Networking
3 hours

This course is a study of the evolution, the concepts, and the principles of local, distributed and enterprise networking. This course examines Network design, topologies, architecture, media, interface cards, protocols, problem resolution, communications, administration, operations, and resources. It introduces the student to the concepts of wireless networking, and web-based networks. This course also explores the Open Systems Interconnection (OSI) and the Transmission Control Protocol/ Internet Packet (TCP/IP) reference models. This course also examines internetworking servers, and hardware and operating systems maintenance. Students will need access to Microsoft Internet Explorer with Outlook Express, Microsoft Visio or equivalent network diagramming software, Java Runtime, Phex, and FineCrypt. The software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site.

ISSC344
Open Source System Security
3 hours

This course is an introductory study of the principles, practices, procedures, and methodologies to provide security on Linux systems. It assesses the security risks, threats and vulnerabilities related to individual and enterprise Linux environments. Course topics include: user privileges and permissions, file systems volumes and encryption and kernel security risk mitigation. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility.

ISSC345
Service Oriented Architecture
3 hours

This course examines the various aspects of a Service-oriented Architecture (SOA). It explores the comprehensive plan to interrelate business with technology. It displays how SOA combines the talents and skills of an entire organization, with its requisite needs and computing know-how. It focuses on the necessary tools—processes, best practices, and standards—for developing a sound SOA, Service-Oriented Modeling: Service Analysis, Design, and Architecture. It also introduces a service-oriented modeling framework that employs an agile and universal business and technology language to facilitate analysis, design, and architecture initiatives.

ISSC351
Computer Forensics
3 hours

The explosion in the use of the Internet and the ensuing growth in cybercrime have given rise to the field of computer forensics (also called digital forensics). Digital forensics is used to assemble digital evidence to prosecute cybercrime, analyze intrusions, mitigate risk, and for data recovery. This course examines the theory, best practices, and methodologies to conduct computer forensics investigations; it includes the ethical issues, data presentation, and chain-of-evidence procedures. It also appraises current tools and technologies to analyze, acquire, and organize digital evidence. This course maps to the general objectives of the International Association of Computer Investigative Specialists (IACIS) certification. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC364
IT Security: Access Control and Authentication
3 hours

This course examines a broad range of network security issues. It explores how access controls protect resources against unauthorized viewing, tampering, or destruction and serves as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized access and disclosure. It focuses on access control, such as components, processes, controls, and authentication, as well as security breaches, organizational behavior and social engineering, physical security, remote access control, public key infrastructure and encryption, cryptography, testing, and information assurance. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC366
IT Security: Cryptography
3 hours

Cryptography provides a critical foundation upon which much of computer security is based. Cryptography is necessary to provide both integrity and confidentiality of the data that is exchanged in a computer network. There are many methods of encryption, and each has its strengths and weaknesses in terms of performance, security, and requirements for management of secret information used to hide or disclose information. This course will provide an intensive overview of the field of cryptography, providing a historical perspective on early systems, building to the number theoretic foundations of modern day cryptosystems. Students will learn how cryptosystems are designed, and to match cryptosystems to the needs of an application. Students will also study basic cryptanalysis and will be presented with real life breaches of common cryptosystems so that they better understand the dangers within cryptosystem design and in the design of systems that rely on cryptography. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC368
IT Security: Physical and Peripheral Defense
3 hours

The course covers physical security requirements in a network enterprise on varying levels including physical protection against internal and external threats that may impact people, property, and other data and networked assets. Students will learn how to assess and protect these assets via multiple layers of physical security. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC386
Green Computing: Foundations and Strategies
3 hours

This course provides a basic understanding of the overall environmental need for an organization to adopt a Green IT strategy including: Climate Change, dangerous and exploitive working practices, the effect of hazardous waste use and disposal, consumption of precious resources such as oil, gas and water. The course identifies an organization’s external drivers and opportunities for greening its IT including: political, environmental, social and legal.

ISSC387
Green Computing: Advanced Topics
3 hours

This course provides an overview of the current research focusing on ways to make computing greener and more efficient, the reference used in this course is the first research-level book devoted to green computing and large-scale energy efficiency. With contributions from leading experts in the field, the book presents current research and developments in hardware, systems software, run-time systems, programming languages, data center management, and applications. It also covers the emerging green movement in computing, including the Green Grid and the Green 500 list, as well as important programs in grassroots organizations and government agencies. (Prerequisite: ISSC386)

Pre Reqs: Green Computing: Foundations and Strategies(ISSC386)

ISSC411
Application Security
3 hours

This course is an introductory study of the principles, practices, procedures, and methodologies to ensure security of data within web-based applications. It examines secure coding practices and processes, web application security configuration management techniques, and web application security standards. It appraises the convergence between web application security and associated threat vectors/attack methods. It appraises secure development processes, web application secure configuration techniques, and legal issues related to securing vital digital assets. Course topics include: Secure Configuration & Development, Vulnerability & Risk Mitigation, Vulnerability Assessments & QA Testing, and PCI DSS Compliance. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC424
Virtualization Security
3 hours

This course is an introductory study of virtualization security including the types of virtualization, the importance of securing virtualized networks and discussions of the various virtualization program offerings. The course will provide an overview of the current virtualization technologies in use in most environments. Course topics include: Introduction to Virtualization, VMware ESXi on Linux, Microsoft Virtualization, Citrix Xen Virtualization, Sun Virtualization, Red Hat Enterprise Linux Virtualization, and Virtualization Security. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC426
Cloud Security and Privacy
3 hours

This course will provide necessary guidance to build a proper audit to ensure that operational integrity and customer data protection, among other aspects, are addressed for cloud based resources. This course will serve as a cloud computing reference for auditors and IT Security Professionals. It will also provide information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers. (Prerequisite: ISSC326)

Pre Reqs: Cloud Computing(ISSC326)

ISSC431
Database Systems Security
3 hours

This course is an introductory study of the principles, practices, procedures, and methodologies to ensure security of data at rest within databases. It appraises the convergence between database security and associated threat vectors and attack methods. It examines database types, security architecture, platform fundamentals, user administration, password management, security models, virtual private databases, and auditing models. It reviews database security processes, security configuration techniques, and auditing checklists. Course topics include: Secure Architecture, Privilege Management, and Auditing Processes. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC451
Cybercrime
3 hours

The rapid change in technology and the exponential growth in the use of the Internet have resulted in an increase in the number of computer and technology related crimes. This course is designed to provide students with the foundational knowledge and technologies needed to detect, investigate, and prevent computer related crimes. Topics to be covered include: cybercrime classification (hacking, denial of service attacks, cyberstalking, cyberbullying, virus dissemination, identity theft, electronic funds transfers, phishing, spoofing, Internet fraud, access device fraud and salami attacks), vulnerability of computer systems and computer applications, computer intrusions and attacks, the impact of cybercrime (social, economic, and legal), investigation of digital evidence, computer forensics, and the prevention of cybercrime. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Wireless Networks(ISSC343)

ISSC452
Cybersecurity
3 hours

This course examines the practices for assuring information security. The various roles and functions within the Cybersecurity practice will be combined and leveraged to produce a secure organization. Case studies will be used to examine theories and practices drawn from real world situations. The numerous pitfalls of Cybersecurity will be presented with everyday practices of securing companies resources from attack. This course will examine the frameworks, roles, and competencies involved with information security. The fundamentals of Cybersecurity will be examined to include: network and security concepts, attacker techniques, data security, system and applications security and incident response techniques. Current literature will be examined on such topics. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ISSC455
Digital Forensics: Investigation Procedures and Response
3 hours

This course is an introduction to Computer Forensics Investigation Procedures and Response. It provides a basic understanding of the importance of computer forensics, how to set up a secure lab, the process for forensic investigation including first responder responsibilities, how to handle various incidents and information on the various reports used by computer forensic investigators. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ISSC456
Digital Forensics: Investigating Wireless Networks and Devices
3 hours

The growth of wireless networking technologies has given rise to many security issues. Wireless technology has become popular because of its convenience and low cost. This course pertains to the study of Computer Forensics Students will be introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. An overview of cybercrime and security will be addressed by explaining the basic security procedures and will include discussions of the various security threats that today’s users face. This course will prepare students to gather all necessary information and evidence to support prosecution in a court of law. This course will examine wireless networks and devices and will discuss how to investigate wireless attacks, as well as PDA, iPod, iPhone, iPad, and Blackberry forensics. Current literature will be examined on such topics. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ISSC457
Digital Forensics: Investigating Network Intrusions and Cybercrime Security
3 hours

The increase in the use of the Internet and ensuing growth in cybercrime have given rise to the field of digital forensics. Students will be introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. This course examines computer related crime and abuse cases in order to gather all necessary information and evidence to support prosecution in a court of law. Collection of evidence, investigating information hiding, and intrusion response techniques will be explored. This course will examine network intrusions, network traffic, web attacks, DoS attacks and corporate espionage. Current literature will be examined on such topics. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ISSC458
Digital Forensics: Investigating Data and Image Files
3 hours

This course is designed to expose the student to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. The course provides a basic understanding of steganography, data acquisition and duplication. It examines how to recover deleted files and partitions and image file forensics. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ISSC459
Digital Forensics: Hard Disc and Operating Systems
3 hours

This course is designed to expose the student to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. The course provides a basic understanding of file systems, hard disks and digital media devices. Boot processes, Windows and Linux Forensics and application of password crackers. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ITMG321
Information Technology Project Management
3 hours

This course is a study of the planning and processes involved in an information system project. Its topics include planning, scheduling, and controlling aspects of a project during its life cycle. The use of project management techniques such as PERT (Project Evaluation and Review Technique) and Gantt charts will be examined in depth as will be other techniques of planning, scheduling and controlling projects. This course meets the topical requirements for the CompTIA Project+ Certification.

ITMG371
Contemporary Internet Topics
3 hours

This course explores the Internet's impact on business and personal dynamics, from a managerial perspective. A review of current literature will examine such issues as: changes in workplace productivity, legal issues arising from company Internet use policies, staff morale in the face of nearly ubiquitous Internet access, institutional liability for employee conduct while on the Internet, telecommuting, and the impact of conducting personal business during work time. Non-workplace issues such as the impact of the Internet on family life, politics and the economy will also be explored.

WEBD121
Web Development Fundamentals
3 hours

This course introduces students to Web site development through a combination of readings and hands-on development exercises. This course covers the Site Development Associate curriculum of the CIW Web Foundations Associate certification. It also covers the Web Design curriculum of the CIW Web Design Specialist certification. It emphasizes Markup Language and Site Development Essentials, HTML5 Coding, Cascading Style Sheets (CSS) and Graphical Elements, Hyperlinks, HTML Tables, Web Forms, Video, Audio and Image Techniques, Extending HTML, GUI HTML Editors and Mobile Web Sites, Web Site Development for Business, JavaScript and DHTML Fundamentals, Plug-Ins and Java Applets, HTTP Servers and Web Applications, Databases, and Web Site Publishing and Maintenance. Fundamentals of JavaScript programming are also introduced in this course. Students will need access to Microsoft Internet Explorer and Firefox. This software is not provided by the course material grant and must be purchased/provided by the student. To succeed in this course, students will also need basic computer knowledge such as creating files and folders, downloading and uploading files, creating zipped files, and working with text editor such as Notepad++.

WEBD122
Introduction to Web Analytics
3 hours

This course is an introductory study of Web analytics technology and how businesses and organizations may to use the technology to measure website traffic, enhance business presence, and conduct market research. The course begins with some basic introductory concepts and lays the foundation for more advanced topics regarding the subject. The course will cover both conceptual and scenario based exercises, thus enabling students to experience the maximum amount of comprehension and retention of material covered in the course.

WEBD222
Advanced Web Analytics
3 hours

This course is an advanced study of Web analytics technology and how businesses and organizations may use the technology to measure website traffic, enhance business presence, and conduct market research. The course expands on concepts introduced from the Introduction to Web analytics course and expands into more advanced topics regarding the subject. The course will cover scenario based exercises and requires students to use free Web analytic tools to experience the maximum amount of application and retention of material covered in the course. (Prerequisite: WEBD122)

Pre Reqs: Introduction to Web Analytics(WEBD122)

WEBD241
Web Development Using JavaScript
3 hours

This course expands on the topics that were introduced in Web Development Fundamentals (WEBD121). This course introduces the student to fundamental JavaScript programming concepts such as variables and data, functions, controlling program flow (branching and iterating), the JavaScript object model (window, document, image, history, location, and navigator objects), and JavaScript language objects (String, Array, Date, and Math objects). This course also addresses the development of interactive forms with JavaScript, cookies and JavaScript security, controlling frames with JavaScript, and custom JavaScript objects. Students must have access to Internet Explorer 7 (or higher) or Netscape 4.0 (or higher) software. This course covers the CIW JavaScript Specialist curriculum of the CIW JavaScript Specialist certification. This software is not provided by the course material grant and must be purchased/provided by the student. (Prerequisite: WEBD121)

Pre Reqs: Web Development Fundamentals(WEBD121)

WEBD242
Web Development Using XHTML
3 hours

This course focuses on the theory and principles of various programming languages that are used on the web, with particular focus on HTML, XHTML, and DHTML. Students will explore the principles of Object Oriented Programming (OOP) and examine inheritance, encapsulation, and polymorphism. They will also examine the components of OOP languages; the scope, protocols and parameters for various methods, such as: dynamic text ranges (move, moveStart, moveEnd, moveToPoint, moveToElement, getElementById, getBookmark, compareEndPoints, setEndPoints, Expand, Collapse, FindText), transition ranges (blendTrans, revealTrans), event propagation (stopPropogation, addEventListener, removeEventListener), dynamic content (createAttribute, createElement, createTextNode, cloneNode), and dynamic styles (CSS) and dynamic positioning (CSS-P) (coordinate systems, absolute positioning, relative positioning, and dynamic data binding). Students will explore the principles governing the animation of text (pulsating text, expanding text, flying text, drag and drop). This course focuses on improving the user-application interactivity via dynamic content, animation, media (audio and video), forms, web-safe colors, styles, and Cascading Style Sheet (CSS).

Pre Reqs: Web Development Fundamentals(WEBD121)

WEBD321
Web eCommerce Development
3 hours

This course is a study of Web e-commerce development and how businesses and organizations may to use the Web to the buy and sell products and services online. The course begins with some basic introductory concepts and progresses into more advanced topics regarding the subject. The course will cover both conceptual and scenario based exercises, thus enabling students to experience the maximum amount of comprehension and retention of material covered in the course.

WEBD322
Web Videography
3 hours

This course teaches the basic principles of Web videography and how to use software such as Adobe Photoshop Elements to edit photos and videos and create movies to market product and services online. The course begins with some basic introductory concepts and progresses into more advanced implementation of Web videograpy for promoting e-commerce and addressing other business requirements. The course will cover both conceptual and scenario based exercises, thus enabling students to experience the maximum amount of comprehension and retention of material covered in the course.

WEBD323
Search Engine Optimization
3 hours

This course introduces concepts and strategies for successful search engine optimization (SEO). It examines different kinds of searches including image searches, local searches, and industry-specific vertical search engines. Additional topics such as link building, site structure improvements, conversation tracking, research and development keyword strategic development, and understanding barriers of search engine optimization are addressed for the purpose of increasing a website's relevance and to determine how people search for products and services.

WEBD324
Web Content Management Systems
3 hours

This course is a study of Web content management systems and how users may manage the content of their websites anywhere by using features such as easily creating new Web pages, building in-site search engines, uploading files and images, creating photo galleries and videos, and adding, deleting and editing users with a variety of permissions. The course begins with some basic introductory concepts and progresses into more advanced topics regarding the subject. The course will cover both conceptual and scenario based exercises, thus enabling students to experience the maximum amount of comprehension and retention of material covered in the course.

WEBD341
Enterprise Data Exchange Using XML
3 hours

This course is a study of the concepts and applications of the Extensible Markup Language (XML), a general-purpose markup language that can be used to formally specify special-purpose markup languages. This course will be taught from a mixture of analytical and practical methods. Topics include: the history of XML, the XML language, Data Type Definition (DTD), XML Schema, eXtensible Style Sheet Language (XSL), and eXtensible Style Sheet Language Transformations (XSLT). The student will bind values to elements to render them distinct and different from its other instances of that attribute and explore the power of XML as a tool for Enterprise Exchange in both the J2EE and .NET Software Development Frameworks. Knowledge of XML will enable the student to standardize and reuse reference text, paragraphs, and chapters.


Institutional Requirements
3 Hours
NAME
DESCRIPTION
CREDITS
COLL100
Foundations of Online Learning
3 hours

This course is designed to provide a solid foundation for undergraduate study in the online environment. Students will be introduced to learning theory, the tools available in the online classroom and campus, and online research. Identification of personal learning style allows students to improve their study/learning techniques and prepares them to succeed in college level courses. Students will be introduced to formatting and citation styles. APUS policy and procedure is addressed. There is an emphasis on written communication to assist students in the transition to the online environment.


General Education
38 Hours

Final Program Requirement
3 Hours
NAME
DESCRIPTION
CREDITS
ISSC498
IT Security: Implementation Plan: Capstone
3 hours

This Capstone course is a senior level course designed to allow the student to review, analyze and integrate the work the student has completed toward a degree in Information Systems Security. Students will complete various security related plans and policies that demonstrate mastery of their program of study and results in a meaningful culmination of their learning; these plans and policies will be used to assess their level of mastery of the stated outcomes of their degree requirements. This is a capstone course to be taken after all other Information Systems Security courses have been satisfactorily completed. Student must have SENIOR standing to register. (Prerequisite: Senior Standing and ENGL101)

Pre Reqs: Proficiency in Writing(ENGL101)


General Electives
27 Hours
Electives are typically courses available at your degree level that are not currently required as a part of your degree program/academic plan. Please visit the catalog to view a complete listing of courses.

Program Completion Rates, Median Debt and More

View more details regarding our graduation rates, the median debt of students who completed the program, and other important information.

 

American Public University System, American Public University, and American Military University are not affiliated with American University or the U.S. Military. American Public University System (APUS) is accredited by the Higher Learning Commission (HLC) and a member of the North Central Association. © 2013 American Public University System | 111 W. Congress Street, Charles Town, WV 25414 | Toll Free: 1-877-755-2787 | Privacy Policy | Terms