Bachelor of Science in Information Technology Management

 

DEGREE AT A GLANCE:

    • Number of Credits
    • 122
    • Cost Per Credit
    • $ 250
    • Total Tuition*
    • $ 30,500
  • *(Before Transfer Credit)
 

Program Description

The Bachelor of Science in Information Technology Management provides high quality educational opportunities for students interested in pursuing careers in a broad range of fields that support our computer/information-based society and economy. The curriculum focuses on problem-solving skills and techniques needed to provide computer-based solutions to practical problems. Students develop and communicate technological solutions to industrial problems, manage systems operations, improve and evaluate products, provide customer support, and facilitate technology transfer in industry and government. Students learn to apply ethical judgments and critical thinking to assess the impact of information technology on contemporary social, political, and economic issues. Students completing the IT Management program can apply for a broad range of IT related positions, such as: programmer analyst, systems analyst, database analyst, information systems analyst, network analyst, security analyst, security risk assessor/manager, project manager, computer resource manager, and information technology manager.

Read More
 
 
Highlights and Announcements

Explore the academic contributions and professional insights from our faculty scholar practitioners on current industry news, trends, and world events.

 

Program Objectives

In addition to the institutional and general education level learning objectives, the Bachelor of Science in Information Technology Management also seeks the following specific learning outcomes of its graduates. With reference to each of the respective areas of information technology management, graduates in this degree program will be able to:

  • Interpret fundamental computer science concepts and utilize computer applications to enhance productivity.
  • Integrate the theory and practice of information technology with the fundamental principles of business enterprise management, finance, operations, strategic planning, and marketing.
  • Examine the influences of technology on the conduct of business operations, the rise of e-commerce, the globalization of business, and the increase in telecommuting.
  • Apply the principles of Information Technology Management in a modern organization.
  • Identify the prevailing legal principles and issues associated with information technology the workplace and in society at large.
  • Appraise the principles and practices of database systems, local area networks, information systems, information security, and information technology project planning.
 
Core Requirements
33 Hours
NAME
DESCRIPTION
CREDITS
BUSN320
Principles of E Business
3 hours

This course is a study of the fundamental principles of e-business. Students will learn how to build a successful e-business operation with step-by-step guidance for writing an e-business plan and simplified guidance for the development and management of a start-up customer focused website. Students will select an e-business of their choice and, using worksheets from their textbooks, follow a step-by-step process to develop eight sections of the e-business plan: business description, product and services, marketplace analysis, marketing planning, management and organization, operations, business location and equipment, and financial plans. Students will integrate basic start-up web site design plans and concepts into their e-business plan. The major objective of this course is for every student to apply the principles of e-business, e-marketing and basic website design and develop an e-business plan for immediate application or for future reference.

ENTD200
Fundamentals of Programming
3 hours

This course introduces students to writing computer programs. The class presents the principles of structured programming using the BASIC language, perhaps the most common language for personal computers. Because of its ease of use it is ideal as a first programming language and runs on both the PC and Macintosh platforms. The course is designed for people without previous programming experience who do not necessarily plan on becoming professional programmers. However, the knowledge gained in the class can be applied later to other languages such as C and Java. Participants learn to solve problems logically by breaking them into smaller pieces, which can then be solved. Topics include: introduction to computing - how does a computer work?; input and output - getting information to and from the user; variables and expressions - performing arithmetic; data statements - reading information from inside the program; text files - reading information from other files; arrays - groups of variables; debugging - finding errors in your program; graphics - graphs, boxes, shaded areas; and formatting - changing how things look on the screen. NOTE: Alice, an innovative 3D programming software, is used to provide a more interactive and accelerated learning experience in this course. Students should download Alice and conduct system checks by validating the best version for their computer before enrolling into the course. Go to the www.alice.org website for more information. Raptor is also used for flowcharting; however, if you have a Macintosh computer, you may use PowerPoint, hand drawn submissions, or whatever software available.

INFO321
Database Management Systems
3 hours

This course is a study of major advancements in database technology that have taken place in recent years. It does not assume any prior background in the field of databases, and, hence, starts with basic introductory concepts, but covers advanced topics as well. The course will cover both conceptual and hands-on material in the area of database management, thus enabling students to have the maximum amount of comprehension and retention of material covered in the course. The student must have access to MS Access. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site.

INFO331
Management Information Systems
3 hours

This course provides a technical and organizational foundation for understanding the use and importance of information systems and information technology in today's management environment. This course covers the hardware, software, and infrastructure that support management information systems. Information and decision support systems, knowledge management and specialized information systems, database management systems, telecommunications, the Internet, Intranets, Extranets, and wireless networks will be examined. This course also covers systems development, e-commerce, and the ethical and societal impact of management information systems.

ISSC340
Local Area Network Technologies
3 hours

This course introduces the student to local area networking concepts in an easy to understand way. In today's competitive business world, one needs to have a basic understanding of the networking technology that runs it. Whether they choose to delve full bore into the technical side of networking or use what they learn to make an informed decision regarding the design, implementation, and maintenance of their local area network, this course will give the student a good foundation to build upon. Students must have access to MS Visio software. Course software requirements with the appropriate versions are listed under the course materials site. This course meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical I category.

ISSC363
IT Security: Risk Management
3 hours

This course explores Networking Security from the perspective of risk management and confirms that assessment of IP based Network systems is critical to developing strategies to mitigate and manage risks. This course focuses on effective assessment strategies that ultimately help the student to implement effective and proactive risk mitigation measures and risk management practices. It exposes the vulnerabilities of TCP/IP; and appraises risk assessment, risk analysis, risk mitigation, risk management, networking components and Virtual Private Networks (VPN). This course examines the tools and techniques used to attack, test and assure the security of the remote information, maintenance, FTP, database, email, UNIX RPC, and IP VPN services. The student will apply this knowledge to develop an assessment methodology that identifies, attacks, and penetrates IP based network systems. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ITCC111
Basic Productivity Applications
3 hours

This course is a study of the concepts and technology trends essential to office productivity applications. Students will explore the principles, practices, features, and functions of the word processing application in the Microsoft Office 2010 Suite. The course will be taught with a mixture of analytical methods and practical exercises. Students will use Microsoft Word to create and format documents; and use lists, themes, mail merge, watermarks, templates, graphics, navigation tools, tables, charts, citations and bibliographies. Students will also be introduced to the features and capabilities of PowerPoint, the presentation application in the Microsoft Office Suite. This course uses the Microsoft Official Academic Course textbook that is aligned with Microsoft’s Exam--Using Microsoft Office Word 2010. The book meets the topical requirements for the Microsoft Office Specialist (MOS): Microsoft Office Word 2010 Certification; and contains a six month trial of Microsoft Office.

ITCC121
Introduction to Computer Science
3 hours

This course is an overview of computer information systems in which hardware, software, procedures, systems, and databases are explored in relation to their integration and application in business and other segments of society. Telecommunications and network concepts are introduced as a basis for understanding of the Internet and e-commerce capabilities.

ITMG371
Contemporary Internet Topics
3 hours

This course explores the Internet's impact on business and personal dynamics, from a managerial perspective. A review of current literature will examine such issues as: changes in workplace productivity, legal issues arising from company Internet use policies, staff morale in the face of nearly ubiquitous Internet access, institutional liability for employee conduct while on the Internet, telecommuting, and the impact of conducting personal business during work time. Non-workplace issues such as the impact of the Internet on family life, politics and the economy will also be explored.

WEBD311
Internet Concepts
3 hours

This course concentrates on the technical side of the Internet, examining network types, protocols, browsers, search engines, email communication and personal information management, multimedia on the Web, Internet services and tools [newsgroups, telnet, File Transfer Protocol (FTP), and instant messaging], Internet security (encryption, authentication, firewalls, malware, virus detection and prevention, spyware, updates and patches), and IT project management. This course also explores emergent Web 2.0 technologies such as social networking (MySpace), user created content (YouTube), Wikis, Virtual Worlds (Second Life), and online gaming. Students will need access to Microsoft Internet Explorer 7.0 (or higher) with Outlook Express. This software is not provided by the course material grant and must be purchased/provided by the student. This course covers the Internet Business Foundations curriculum of the CIW Foundations certification.

Choose one of the following:
ITMG321
Information Technology Project Management
3 hours

This course is a study of the planning and processes involved in an information system project. Its topics include planning, scheduling, and controlling aspects of a project during its life cycle. The use of project management techniques such as PERT (Project Evaluation and Review Technique) and Gantt charts will be examined in depth as will be other techniques of planning, scheduling and controlling projects. This course meets the topical requirements for the CompTIA Project+ Certification.

ITMG322
Project Management Using MS Project
3 hours

This course is a study of the concepts and technology trends of Project Management. Students will explore the principles, practices, features, and functions of the Microsoft Project application. The course will be taught with a mixture of analytical methods and practical exercises. Students will create project plans, organize (estimate, budget, and schedule) tasks, perform and manage resource allocation, identify project constraints, determine a project’s critical path, create Gantt Charts and establish a project baseline using Microsoft Project. Students must have access to Microsoft Office Project Standard. Course software requirements with the appropriate versions are listed under the course materials site


Major Requirements
12 Hours
NAME
DESCRIPTION
CREDITS
ENTD311
Analysis and Design of Information Systems
3 hours

This course is an overview of the system development life cycle. Emphasis on current system documentation through the use of both classical and structured tools/techniques for describing process flows, data flows, data structures, file designs, input and output designs and program specifications. Discussion of the information gathering and reporting activities and of the transition from analysis to design.

ENTD313
Mobile Application Design and Development
3 hours

This course is an introductory study of mobile application design and development and how mobile devices enhanced by mobile application software are changing the face of technology. The course begins with some basic introductory concepts and lays the foundation for more advanced topics regarding software such as iOS, Palm webOS, Symbian OS, and Windows Mobile, which use customized application software on various mobile devices. The course cements a theoretical overview of mobile application, design and development issues, and practical application concerns. The course will cover both conceptual and scenario based exercises, thus enabling students to experience the maximum amount of comprehension and retention of material covered in the course.

ENTD322
Application Development for the Droid
3 hours

This course is a study of application development for the Motorola Droid and how mobile devices enhanced by mobile application software are changing the face of technology. The course expands on concepts introduced in the mobile application design and development course and expands into more advanced topics regarding Motorola Droid. The course will cover scenario based exercises and requires students to use assigned tools to write, test and deploy mobile software applications into the Android platform environment. The course allows the students to experience maximum amount of application and retention of material covered in the course. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD331
Application Development for the Blackberry
3 hours

This course is a study of application development for the Blackberry mobile device and how mobile devices enhanced by mobile application software are changing the face of technology. The course expands on concepts introduced in the mobile application design and development course and expands into more advanced topics regarding the Blackberry devices. The course will cover scenario based exercises and requires students to use assigned tools to write, test and deploy mobile software applications into the Blackberry platform environment. The course allows the students to experience maximum amount of application and retention of material covered in the course. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

ENTD333
Application Development for the iPhone and iPad
3 hours

This course is a study of application development for the iPhone and iPad mobile devices and how mobile devices enhanced by mobile application software are changing the face of technology. The course expands on concepts introduced in the mobile application design and development course and expands into more advanced topics regarding iPhone and iPad mobile devices. The course will cover scenario based exercises and requires students to use assigned tools to write, test and deploy mobile software applications into the iOS platform environment. The course allows the students to experience maximum amount of application and retention of material covered in the course. Students need the latest XCode installed, which is available from the Appstore, and XCode must be installed before class begins. Students must have access to an Apple Inc. computer with XCode installed to successfully complete this course. Students also need intermediate level programming experiences and/or knowledge to do well in the course. Students must have previous programming experiences using an object-oriented C-based language such as C#, Java, or C++. (Prerequisite: ENTD200 or ENTD211 or ENGR200 (for Engineering majors)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200),Introduction to Engineering and Computing(ENGR200)

ENTD413
Advanced Mobile Application Design and Development
3 hours

This course is an advanced study of mobile application design and development and how mobile devices enhanced by mobile application software are changing the face of technology. The course expands on concepts introduced in the mobile application design and development course and expands into more advanced topics regarding the subject. The course will cover scenario based exercises and requires students to use assigned tools to write, test and deploy mobile software applications into the target platform environment. The course allows the students to experience maximum amount of application and retention of material covered in the course.

ENTD465
Application Development for Windows Mobile Operating Systems
3 hours

This course is a study of Microsoft application development for mobile/embedded devices. The course expands on concepts introduced in the mobile application design and development course and expands into more advanced topics regarding application development using Microsoft’s software. The course will cover scenario based exercises and requires students to use assigned tools to write, test and deploy mobile software applications. The course allows the students to experience maximum amount of application and retention of material covered in the course. (Prerequisite: ENTD200 OR ENTD211)

Pre Reqs: Introduction to Software Design(ENTD211),Fundamentals of Programming(ENTD200)

INFO171
Relational Databases with Oracle: SQL Introduction
3 hours

This course is a study of data modeling and database design. It applies the relational database model to construct Entity Relationship (ER) diagrams using ER Modeling. Through a study and application of the American National Standards Institute (ANSI) Standard Structured Query Language (SQL) constructs the course introduces data definition (create, alter, drop), data manipulation (insert, update, delete), and transaction control (commit, savepoint, and rollback), and defining, altering, and deleting primary keys, foreign keys, and constraints. Students must have access to Oracle software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site.

INFO271
Relational Databases with Oracle: SQL Intermediate
3 hours

This course is a study and application of the American National Standards Institute (ANSI) Standard Structured Query Language (SQL) constructs for an advanced level of data definition (create, alter, drop), data manipulation (insert, update, delete), and transaction control (commit, savepoint, and rollback). The course builds on the techniques learned in the introductory course for database design and implementation. It explores the database life cycle through conceptual, logical, and physical design phases. The course examines the correlation between SQL and relational algebra; user access and control; transactional integrity; referential integrity; concurrency control; and database objects such as views, complex views, SQL functions, and sequences. Advanced topics discussed in the course include: database performance tuning, query optimization, distributed database systems, business intelligence, data analytics, data warehousing, cloud computing services, and the administration of database systems. Students must have access to Oracle software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: INFO171 or equivalent)

Pre Reqs: Relational Databases with Oracle: SQL Introduction(INFO171)

INFO371
Relational Databases With Oracle: PL/SQL
3 hours

This course is a study and application of the procedural language overlay on the ANSI standard Structured Query Language (SQL) to enable students to access tuples, one at a time. Knowledge of this complex procedural component will enable students to develop Programming Units that are characterized by block structure, control structures, variables, constants, operators, implicit and explicit cursors, and exception handling (both system- and user-defined). This course examines study and application of procedures, functions, packages, and triggers. Knowledge of procedures, functions, packages, triggers, events, restrictions on triggers, the trigger firing sequence, and the use of triggers to perform auditing functions. This course also covers Object-Relational database concepts and Object Oriented Programming Structures (OOPS) and explores dependencies in Procedures and Functions. Students must have access to Oracle software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: INFO171 or equivalent)

Pre Reqs: Relational Databases with Oracle: SQL Introduction(INFO171)

INFO399
Information Technology Practicum
3 hours

The field of Information Technology (IT) is multi-faceted; it includes technology areas such as database development, web based applications, business intelligence, visual communications, data analysis, software development, network security, cybercrime, digital forensics, security auditing, security certification, service delivery, and governance. The IT industry requires credentialed professionals that are academically sound and that have the ability to complete real world IT projects. This course provides an opportunity to integrate academic rigor with real world experience; to apply theory to solve real world problems, to make the learning experiential, to facilitate project-based learning, and to integrate scholarship with practice. This course is a supervised practicum; students must submit project plans and obtain Faculty member approval prior to beginning any work on the project. The requirements of the project plan will be provided in the syllabus; it should include the project sponsor, manager, scope, objectives, methodology, progress reporting, deliverables, and schedules. The student must also submit progress reports and a final report that includes an acceptance sign-off from the project sponsor. The Faculty member also has to approve the completed project in order for the student to earn a successful grade in this class. The student is responsible to have access to all the necessary software, documents, and other materials necessary to fulfill the requirements of this course. Enrollment is contingent upon the approval of the faculty member.

INFO471
Relational Databases With Oracle: Forms & Reports
3 hours

This course is a study and application of the User Interaction for enterprise relational database systems. Topics include: the architecture of Forms and Reports interface, the anatomy of the Form Module and its various components, such as: blocks, frames, items, attributes, editors, windows, canvases, messages, alerts, menus, and objects. This course also examines the implementation of data integrity using various types of triggers, including: input, non-input, message, alerts, query, validation, navigational, and transactional; it also addresses reusability and interface efficiency using modular Program Units, Libraries, Menus, and Pop-up Menus. This course is also a study and application of the theory, concepts, and applications associated with parameterized and non-parameterized Data Retrieval and Analysis. It also appraises report template libraries to standardize reports for the enterprise; and the Reports Server to manage and disseminate reports across the enterprise. Students must have access to Oracle software. This software is not provided by the course material grant and must be purchased/provided by the student. Course software requirements with the appropriate versions are listed under the course materials site. (Prerequisite: INFO171 or equivalent)

Pre Reqs: Relational Databases with Oracle: SQL Introduction(INFO171)

ISSC326
Cloud Computing
3 hours

This course will delve into all aspects of a Cloud Computing implementation, starting from a definition of what it actually means and assessment of whether it is suitable for a given company to the strategy alignment, implementation and operation of a working solution. It will cover Infrastructure-as-a-Service, Platform-as-a-Service, and Software-as-a-Service as the many integration and management components that are necessary to make this work together to fulfill business requirements.

ISSC331
Legal Issues in Information Security
3 hours

This course examines information security issues and the law. The rapid growth of technology has given rise to legal issues surrounding technology. Information security is the practice of protecting information to ensure the goals of confidentiality, integrity and availability are met. Information security makes sure that accurate information is available to authorized individuals when it is needed. When governments, private organizations, and individuals do a poor job of protecting the information entrusted to them, legislatures respond with new laws. The course will examine key conflicts involving technology and the legal system to include: privacy issues, civil, criminal, and administrative law, Children’s Online Privacy Protection Act (COPPA), Sarbanes Oxley, and information security governance. This course examines current literature on such topics.

ISSC344
Open Source System Security
3 hours

This course is an introductory study of the principles, practices, procedures, and methodologies to provide security on Linux systems. It assesses the security risks, threats and vulnerabilities related to individual and enterprise Linux environments. Course topics include: user privileges and permissions, file systems volumes and encryption and kernel security risk mitigation. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility.

ISSC345
Service Oriented Architecture
3 hours

This course examines the various aspects of a Service-oriented Architecture (SOA). It explores the comprehensive plan to interrelate business with technology. It displays how SOA combines the talents and skills of an entire organization, with its requisite needs and computing know-how. It focuses on the necessary tools—processes, best practices, and standards—for developing a sound SOA, Service-Oriented Modeling: Service Analysis, Design, and Architecture. It also introduces a service-oriented modeling framework that employs an agile and universal business and technology language to facilitate analysis, design, and architecture initiatives.

ISSC364
IT Security: Access Control and Authentication
3 hours

This course examines a broad range of network security issues. It explores how access controls protect resources against unauthorized viewing, tampering, or destruction and serves as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized access and disclosure. It focuses on access control, such as components, processes, controls, and authentication, as well as security breaches, organizational behavior and social engineering, physical security, remote access control, public key infrastructure and encryption, cryptography, testing, and information assurance. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC366
IT Security: Cryptography
3 hours

Cryptography provides a critical foundation upon which much of computer security is based. Cryptography is necessary to provide both integrity and confidentiality of the data that is exchanged in a computer network. There are many methods of encryption, and each has its strengths and weaknesses in terms of performance, security, and requirements for management of secret information used to hide or disclose information. This course will provide an intensive overview of the field of cryptography, providing a historical perspective on early systems, building to the number theoretic foundations of modern day cryptosystems. Students will learn how cryptosystems are designed, and to match cryptosystems to the needs of an application. Students will also study basic cryptanalysis and will be presented with real life breaches of common cryptosystems so that they better understand the dangers within cryptosystem design and in the design of systems that rely on cryptography. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC368
IT Security: Physical and Peripheral Defense
3 hours

The course covers physical security requirements in a network enterprise on varying levels including physical protection against internal and external threats that may impact people, property, and other data and networked assets. Students will learn how to assess and protect these assets via multiple layers of physical security. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC386
Green Computing: Foundations and Strategies
3 hours

This course provides a basic understanding of the overall environmental need for an organization to adopt a Green IT strategy including: Climate Change, dangerous and exploitive working practices, the effect of hazardous waste use and disposal, consumption of precious resources such as oil, gas and water. The course identifies an organization’s external drivers and opportunities for greening its IT including: political, environmental, social and legal.

ISSC387
Green Computing: Advanced Topics
3 hours

This course provides an overview of the current research focusing on ways to make computing greener and more efficient, the reference used in this course is the first research-level book devoted to green computing and large-scale energy efficiency. With contributions from leading experts in the field, the book presents current research and developments in hardware, systems software, run-time systems, programming languages, data center management, and applications. It also covers the emerging green movement in computing, including the Green Grid and the Green 500 list, as well as important programs in grassroots organizations and government agencies. (Prerequisite: ISSC386)

Pre Reqs: Green Computing: Foundations and Strategies(ISSC386)

ISSC411
Application Security
3 hours

This course is an introductory study of the principles, practices, procedures, and methodologies to ensure security of data within web-based applications. It examines secure coding practices and processes, web application security configuration management techniques, and web application security standards. It appraises the convergence between web application security and associated threat vectors/attack methods. It appraises secure development processes, web application secure configuration techniques, and legal issues related to securing vital digital assets. Course topics include: Secure Configuration & Development, Vulnerability & Risk Mitigation, Vulnerability Assessments & QA Testing, and PCI DSS Compliance. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC421
Computer and Network Security
3 hours

This course will discuss both computer and network security, from the wetware (human), software, and hardware perspectives. The "wetware" component will deal with identification of potential risk situations, establishing policies for avoidance, recovery, and prosecution, and proactive measures to reduce causal factors for security breaches in an organization. The "software" perspective will examine types of inappropriate software activity, as well as asset protection issues (recognizing software assets). This component will also address software tools available to assist in reducing administrative costs due to both malicious and accidental loss. The "hardware" component will address hardware approaches to protecting assets, as well as hardware techniques used to compromise assets. Specific technologies discussed include firewalls, symmetric key encryption, public key encryption, digital certificates, and cryptographic systems (SSL/TLS, VPNs, and Kerberos). Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC424
Virtualization Security
3 hours

This course is an introductory study of virtualization security including the types of virtualization, the importance of securing virtualized networks and discussions of the various virtualization program offerings. The course will provide an overview of the current virtualization technologies in use in most environments. Course topics include: Introduction to Virtualization, VMware ESXi on Linux, Microsoft Virtualization, Citrix Xen Virtualization, Sun Virtualization, Red Hat Enterprise Linux Virtualization, and Virtualization Security. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC426
Cloud Security and Privacy
3 hours

This course will provide necessary guidance to build a proper audit to ensure that operational integrity and customer data protection, among other aspects, are addressed for cloud based resources. This course will serve as a cloud computing reference for auditors and IT Security Professionals. It will also provide information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers. (Prerequisite: ISSC326)

Pre Reqs: Cloud Computing(ISSC326)

ISSC431
Database Systems Security
3 hours

This course is an introductory study of the principles, practices, procedures, and methodologies to ensure security of data at rest within databases. It appraises the convergence between database security and associated threat vectors and attack methods. It examines database types, security architecture, platform fundamentals, user administration, password management, security models, virtual private databases, and auditing models. It reviews database security processes, security configuration techniques, and auditing checklists. Course topics include: Secure Architecture, Privilege Management, and Auditing Processes. (Prerequisite: ISSC340 or ISSC341 or ISSC343)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Wireless Networks(ISSC343)

ISSC441
Network Telecommunication Concepts
3 hours

This course provides a solid background of fundamentals to tomorrow's information systems professionals. Data communications keeps a balance between the super-technical and the watered-down subject, providing a solid understanding not only of how things work, but how they can be applied to create business solutions. This course also covers technologies such as Bluetooth, highly elliptical orbiting satellites, V.92, code division multiplexing, and wireless technologies.

ISSC452
Cybersecurity
3 hours

This course examines the practices for assuring information security. The various roles and functions within the Cybersecurity practice will be combined and leveraged to produce a secure organization. Case studies will be used to examine theories and practices drawn from real world situations. The numerous pitfalls of Cybersecurity will be presented with everyday practices of securing companies resources from attack. This course will examine the frameworks, roles, and competencies involved with information security. The fundamentals of Cybersecurity will be examined to include: network and security concepts, attacker techniques, data security, system and applications security and incident response techniques. Current literature will be examined on such topics. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ISSC455
Digital Forensics: Investigation Procedures and Response
3 hours

This course is an introduction to Computer Forensics Investigation Procedures and Response. It provides a basic understanding of the importance of computer forensics, how to set up a secure lab, the process for forensic investigation including first responder responsibilities, how to handle various incidents and information on the various reports used by computer forensic investigators. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ISSC456
Digital Forensics: Investigating Wireless Networks and Devices
3 hours

The growth of wireless networking technologies has given rise to many security issues. Wireless technology has become popular because of its convenience and low cost. This course pertains to the study of Computer Forensics Students will be introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. An overview of cybercrime and security will be addressed by explaining the basic security procedures and will include discussions of the various security threats that today’s users face. This course will prepare students to gather all necessary information and evidence to support prosecution in a court of law. This course will examine wireless networks and devices and will discuss how to investigate wireless attacks, as well as PDA, iPod, iPhone, iPad, and Blackberry forensics. Current literature will be examined on such topics. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ISSC457
Digital Forensics: Investigating Network Intrusions and Cybercrime Security
3 hours

The increase in the use of the Internet and ensuing growth in cybercrime have given rise to the field of digital forensics. Students will be introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. This course examines computer related crime and abuse cases in order to gather all necessary information and evidence to support prosecution in a court of law. Collection of evidence, investigating information hiding, and intrusion response techniques will be explored. This course will examine network intrusions, network traffic, web attacks, DoS attacks and corporate espionage. Current literature will be examined on such topics. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ISSC458
Digital Forensics: Investigating Data and Image Files
3 hours

This course is designed to expose the student to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. The course provides a basic understanding of steganography, data acquisition and duplication. It examines how to recover deleted files and partitions and image file forensics. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ISSC459
Digital Forensics: Hard Disc and Operating Systems
3 hours

This course is designed to expose the student to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. The course provides a basic understanding of file systems, hard disks and digital media devices. Boot processes, Windows and Linux Forensics and application of password crackers. (Prerequisite: ISSC340 or ISSC341 or ISSC343 AND ISSC351 or ISSC451)

Pre Reqs: Introduction to Networking(ISSC341),Local Area Network Technologies(ISSC340),Computer Forensics(ISSC351),Cybercrime(ISSC451),Wireless Networks(ISSC343)

ITCC112
Advanced Productivity Applications
3 hours

This course is a study of the concepts and technology trends essential to office productivity applications. Students will explore the principles, practices, features, and functions of the electronic spreadsheet application in the Microsoft Office 2010 Suite. The course will be taught with a mixture of analytical methods and practical exercises. Students will use Microsoft Excel to create and format spreadsheets; they will also manipulate data and use formulas, charts, workbooks, styles, hyperlinks, themes, functions, conditional logic, graphics, comments, and security features. Students will also be introduced to Outlook, the electronic mail application in the Microsoft Office 2010 Suite. This course uses the Microsoft Official Academic Course textbook that is aligned with Microsoft’s Exam—Using Microsoft Office Excel 2010. The book meets the topical requirements for the Microsoft Office Specialist (MOS): Microsoft Office Excel Certification; and contains a six month trial of Microsoft Office.

ITMG421
Virtual Management
3 hours

This course is designed to provide an overview of key individual, group, and organizational issues involved in Virtual Management (technology-assisted employee management). Topics include gauging employer and employee readiness for technology-enabled communication and telecommuting; identifying appropriate job types and flexibility options; applying effective communication strategies and methods when utilizing computers and telecommunication technologies; and implementing and evaluating management procedures and policies in flexible organizations.

ITMG471
Information Systems: Policy and Planning
3 hours

The course focuses on the use of information technology in the design and management of modern organizations including governments and not-for-profits. Information is now recognized as an essential resource in its own right. Technical, organizational, and social aspects of the management of this resource will be covered.

WEBD122
Introduction to Web Analytics
3 hours

This course is an introductory study of Web analytics technology and how businesses and organizations may to use the technology to measure website traffic, enhance business presence, and conduct market research. The course begins with some basic introductory concepts and lays the foundation for more advanced topics regarding the subject. The course will cover both conceptual and scenario based exercises, thus enabling students to experience the maximum amount of comprehension and retention of material covered in the course.

WEBD222
Advanced Web Analytics
3 hours

This course is an advanced study of Web analytics technology and how businesses and organizations may use the technology to measure website traffic, enhance business presence, and conduct market research. The course expands on concepts introduced from the Introduction to Web analytics course and expands into more advanced topics regarding the subject. The course will cover scenario based exercises and requires students to use free Web analytic tools to experience the maximum amount of application and retention of material covered in the course. (Prerequisite: WEBD122)

Pre Reqs: Introduction to Web Analytics(WEBD122)

WEBD321
Web eCommerce Development
3 hours

This course is a study of Web e-commerce development and how businesses and organizations may to use the Web to the buy and sell products and services online. The course begins with some basic introductory concepts and progresses into more advanced topics regarding the subject. The course will cover both conceptual and scenario based exercises, thus enabling students to experience the maximum amount of comprehension and retention of material covered in the course.

WEBD322
Web Videography
3 hours

This course teaches the basic principles of Web videography and how to use software such as Adobe Photoshop Elements to edit photos and videos and create movies to market product and services online. The course begins with some basic introductory concepts and progresses into more advanced implementation of Web videograpy for promoting e-commerce and addressing other business requirements. The course will cover both conceptual and scenario based exercises, thus enabling students to experience the maximum amount of comprehension and retention of material covered in the course.

WEBD323
Search Engine Optimization
3 hours

This course introduces concepts and strategies for successful search engine optimization (SEO). It examines different kinds of searches including image searches, local searches, and industry-specific vertical search engines. Additional topics such as link building, site structure improvements, conversation tracking, research and development keyword strategic development, and understanding barriers of search engine optimization are addressed for the purpose of increasing a website's relevance and to determine how people search for products and services.

WEBD324
Web Content Management Systems
3 hours

This course is a study of Web content management systems and how users may manage the content of their websites anywhere by using features such as easily creating new Web pages, building in-site search engines, uploading files and images, creating photo galleries and videos, and adding, deleting and editing users with a variety of permissions. The course begins with some basic introductory concepts and progresses into more advanced topics regarding the subject. The course will cover both conceptual and scenario based exercises, thus enabling students to experience the maximum amount of comprehension and retention of material covered in the course.


Institutional Requirements
3 Hours
NAME
DESCRIPTION
CREDITS
COLL100
Foundations of Online Learning
3 hours

This course is designed to provide a solid foundation for undergraduate study in the online environment. Students will be introduced to learning theory, the tools available in the online classroom and campus, and online research. Identification of personal learning style allows students to improve their study/learning techniques and prepares them to succeed in college level courses. Students will be introduced to formatting and citation styles. APUS policy and procedure is addressed. There is an emphasis on written communication to assist students in the transition to the online environment.


General Education
38 Hours

Final Program Requirement
3 Hours
NAME
DESCRIPTION
CREDITS
ITMG498
IT Management: Senior Seminar
3 hours

This Capstone course is a senior level course designed to allow the student to review, analyze and integrate the work the student has completed toward a degree in Information Technology Management. The student will complete an approved academic project or paper that demonstrates mastery of their program of study in a meaningful culmination of their learning and to assess their level of mastery of the stated outcomes of their degree requirements. This is a capstone course to be taken after all other IT Management courses have been satisfactorily completed. Student must have SENIOR standing to register. (Prerequisite: Senior Standing and ENGL101)

Pre Reqs: Proficiency in Writing(ENGL101)


General Electives
33 Hours
Electives are typically courses available at your degree level that are not currently required as a part of your degree program/academic plan. Please visit the catalog to view a complete listing of courses.

Program Completion Rates, Median Debt and More

View more details regarding our graduation rates, the median debt of students who completed the program, and other important information.

 

American Public University System, American Public University, and American Military University are not affiliated with American University or the U.S. Military. American Public University System (APUS) is accredited by the Higher Learning Commission (HLC) and a member of the North Central Association. © 2013 American Public University System | 111 W. Congress Street, Charles Town, WV 25414 | Toll Free: 1-877-755-2787 | Privacy Policy | Terms