63 - Management Information Systems
Students are introduced to computers and computerized information systems, computer hardware and its uses and interactions; software, software packages and programming languages; the basics of analyzing, and designing business information systems; data communications and networking, distributed data processing and access to the Internet and hands-on uses of microcomputers for spreadsheet and database business applications using the latest, most popular software.
3
This course is a hands-on introduction to basic programming structures, concepts and object-oriented principles. Students will design, code, test and debug programs using contemporary programming languages that comprise computer systems in today's business organizations. Specific topics that will be covered include input/output operations, iteration, arithmetic operations, arrays, classes and objects and other related topics.
3
Prerequisites
63-200.
This course provides a detailed description of various cybercrime techniques employed by attackers and organization-wide solutions available to information security personnel. Additionally, American laws and Computer and Information Security laws will be discussed. Students will also learn about ethical challenges in a technological environment as well as the social and economic implications of policy.
3
Building websites with multimedia applications such as audio and streaming video with Flash and Dreamweaver.
3
The focus of this course is twofold:
First, to provide a look at information systems from a business and managerial point of view. Topics covered will include strategic and competitive technology opportunities, the organization of information using databases and data warehouses, decision support and emerging trends.
Second, this course will provide a technical glimpse into the world of Information Technology (IT). Topics covered will range from computer hardware and software to IT infrastructures and enterprise security. Also covered is an analysis of cloud computing. In the future, working with large data sets will typically mean sending the computations (programs) to the data, rather than copying the data to the workstations. This reflects the trend in IT of moving computing and data from the desktops to large data centers, where there is on-demand provision of software, hardware and data as a service. This data explosion has promoted the idea of cloud computing.
3
Prerequisites
63-200
In this course we will define the attributes of a project, the steps involved in the project management process, the benefits of project management, the project life cycle, and what makes projects successful. The key roles of the Project Manager will be presented. The student will obtain knowledge, skills, tools, and techniques to satisfy the expectations of the project stakeholders. Knowledge areas presented will include project planning, definition of scope, estimating and controlling of time and costs, quality assurance, human resource management, the creation , collection, and distribution of information, risk management, and procurement.
3
Prerequisites
63-200
This course introduces students to Six Sigma which is one of the most highly evolved quality management methodologies. Six Sigma provides a framework for quality management that ensures companies are achieving the highest level of quality.
3
Prerequisites
63-310
Database concepts and design are covered, as well as database administration, relational and object oriented database systems and models, Internet database access and use of database software.
3
Business Intelligence curse offers an in-depth understanding of the modern tools and techniques for improved business decision making by utilizing the knowledge assets of an enterprise. Specifically classification, clustering, segmentation, decision support systems, search algorithms, data mining, factor and discriminate analysis and optimization concepts for both structured and unstructured data are discussed. Students will learn to use and design data analysis based solutions to real life business information problems.
3
This course provides a broad overview of the threats to the security of information systems, the responsibilities and basic tools for information security, and the levels of training and expertise needed in organizations to reach and maintain a state of acceptable security. Students will also learn about contemporary management theories and concepts applied to information security.
3
This course presents methods to properly conduct a computer forensics investigation, beginning with a discussion of ethics while mapping to the objectives of the International Association of Computer Investigative Specialists (IACIS) certification. Students should have working knowledge of hardware and operating systems to maximize their success on projects and exercises throughout the course.
3
This course is a hands-on study of the current data mining applications used for making business decisions. Using data from finance, operations, economics and other disciplines, students will learn various data mining techniques including decision trees, rule based reasoning, neural networks, and cluster analysis.
3
This course provides an overview of information security strategies, procedures and policies necessary to manage and mitigate an organization's risk in information systems. Students will learn to conduct enterprise-wide information security risk assessment using qualitative and quantitative techniques. Security assessment techniques and the information security blueprint will be discussed in detail.
3
This course provides students with practical exposure to setup and operate a wireless network. Common threats to wireless networks will be explained, network attackers will be demonstrated and steps to control attacks will be discussed. Students will be able to detect and prevent wireless attacks by gaining an understanding of various security technologies and common attacks and vulnerabilities.
3
Prerequisites
63-335
This intensive weekend seminar focuses on a single topic, with emphasis on hands-on experience.
1
Prerequisites
Junior/Senior status.
This seminar will explain the necessary concepts and techniques that individuals need to better plan, organize, control and manage the successful completion of a project in order to keep up with the business world's efficiency and professionalism. A comprehensive understanding both on the science of project management and the art of managing projects will be presented.
1
This seminar will briefly review sound project management practices by focusing on the basics of project management. Our discussions will include managing time, cost, scope, and the people side of project management. We will learn step by step how to manage project resources, schedules, and scope with Microsoft Project 2007 which is currently the industry standard project management tool.
1
This seminar is designed to cover the project management body of knowledge (PMBOK) areas tested in the Project Management Professional (PMP) certification exam administered by the Project Management Institute (PMI). The nine PMBOK areas are: Scope, Time, Cost, HR, Risk, Integration, Quality, Communication, and Procurement Management. The focus is going to be on preparing students to pass the PMP certification exam.
1
This seminar discusses the project portfolio process and the different models that are used for selecting a set of projects. It covers the project plannning process, which includes the following elements: schedule, cost, resources, potential problems, and evaluation models. It also introduces the Project Management office and its role in an organization.
1
Search Engine Optimization is a core need for today's businesses. Integrating search and social media into the marketing plan boosts visibility and relevance. This class will review guidelines and techniques to plan and executive a comprehensive SEO strategy.
3
This course teaches students how to design, create, maintain, and manage a web site. Students will use a number of tools and programming languages to build the site including: HTML, XML, JavaScript, FrontPage, and Dreamweaver.
3
Prerequisites
63-200
Project based course curriculum to give students a practical exposure to the processes involved in design of a website. A fully functional intranet or Internet website will be developed. Students will collect requirements by interviewing users, analyze data for defining end-user requirements, design, test and implement the website. This course will stress user and task analysis for interface design.
3
Prerequisites
63-280,
63-305 and
63-415.
This course focuses on three of the knowledge areas in project management: risk management, communication management and human resources and stakeholder management. This course considers how to deal with a variety of stakeholders and ways to consider optimizing stakeholder involvement. How and why various social roles are needed on projects. The formation and expectations of differing kinds of teams are covered in order to set up management expectations about results. The results of a project need to be integrated within existing environments.
3
Prerequisites
63-310
Students examine principles of telecommunications and networking as applied in a business environment; communication parameters, protocol, and hardware, including modems, multiplexors, common carriers and microwave and satellite systems; and design and implementation of distributed data processing and network systems.
3
Prerequisites
63-330
This course will address fundamentals of BPs and their management, BPM systems and tools, modeling and documentation of BPs, and finally, BPs simulation and improvement. IT has been gaining increased significance in businesses at all levels. Two particular challenges facing expanding role of IT are better alignment of IT to business goals, and IT role as a driver and enabler of organizational change. To this end, Business Process Management (BPM) is being recognized for its ability in improving organizational agility, IT governance and compliance, and better alignment to strategic goals.
3
This course provides a broad overview of security in an enterprise. Students will learn about the threats to the security of information systems, what makes an organization's resources secure, basic technologies for information security, and the levels of training and expertise needed in organizations to reach and maintain a state of acceptable security. This course covers the technical and managerial aspects of securing your enterprise resources.
3
This course presents hands-on methods to conduct a forensics investigation of a Macintosh computer. Students will learn how to analyze and recover digital evidence from files, documents, pictures, video and emails on a Mac. Recovery of User log on passwords and encrypted files will also be covered in this course.
3
Web Analytics is the measurement, collection, analysis and reporting of detailed statistics about visits to a web site. Internet Analytics provides important information in order to optimize and improve the web site usability and performance. This course discusses a number of analytics techniques such as log files, cookies, web bugs, and paper tagging. It also covers the key performance indicators, website metrics. Additionally, it demonstrates how to setup and use some of the leading web analytics tools available such as Google Analytics and Visistats. These tools will help you track your Twitter, Facebook, and other social media marketing (SMM) technologies and determine if your SMM is working.
3
This course explores the security of enterprise information assets from a hacker's perspective. To improve organizational information security, students are introduced to the methods and techniques employed by hackers to get unauthorized access to these enterprise systems. The best practices for protecting the digital assets are discussed by studying modern hacking techniques.
3
This course presents hands-on techniques for recovering evidence for mobile phones such as iPhones, and windows and android phones. Mobile devices such as iPads, Tablet PCs and iPods will also be covered in this course. Students will learn how to recover passwords, deleted voicemails, photos, and text messages and data from various apps that on mobile devices
3
This internship is designed to provide students with controlled on-the-job experience with participating businesses, industries and governmental organizations. Students may be eligible for an internship with jobs they currently have. A limited number of internships/jobs are also available through the internship coordinator.
3
Prerequisites
MIS major, Junior or Senior status, 2.75 GPA or above and consent of internship coordinator.
This internship is designed to provide students with controlled on-the-job experience with participating businesses, industries and governmental organizations. Students may be eligible for an internship with their current position if it has an international emphasis and is approved by the Internship Coordinator. A limited number of internships/jobs are also available through the internship coordinator. MIS major, Junior or Senior status, 2.75 GPA or above and consent of internship coordinator and the director of the International Business program.
3
This is a hands-on continuation and wrap-up of the MIS project, and an introduction to the last two phases in the system development lifecycle: 1) implementation, and 2) operations, support, and security. Students will complete their projects and e-portfolios by integrating, testing, and documenting all system components developed in 63-315,
63-330,
63-415, and
63-430. Students will also create comprehensive user training plans and materials, as well as documentation for system operation and support.
3
Prerequisites
Must be taken in the final semester;
63-330,
63-415 and
63-430.
This course will help students to analyze the major concepts learned in other courses of the program. The course is designed to help students prepare for Comptia's Security + Certification Exam. This course is designed for students who are nearing the completion of the designated coursework for the B.S. in Information Security and Risk Management Program.
3
Prerequisites
63-230,
63-430 and
63-351
Students are required to conduct a capstone project suited to their individual needs. The capstone project provides an opportunity for students to demonstrate what they have learned from the Information Security degree program.
3
Students undertake independent reading and research in management information systems.
3
Prerequisites
MIS major, Senior status, 2.75 GPA or above and a signed Independent Study Form.
This course covers all the aspects of setting up an Information Technology Start-up company. Students will learn finance (Venture Capital funding), Management (Business Plan), Marketing (Marketing and Sales plan), project management and IT Entrepreneurship strategies via a semester long hands-on project. Students will present their projects to a panel of judges at the end of the session.
3
This course is a hands-on introduction to the first three phases of the system development lifecycle: 1) planning/initiation, 2) analysis, and 3) design. Students will learn how to analyze a business case, conduct a preliminary investigation, model business requirements using various tools, select a development strategy, and create a requirements document. Students will use the logical models and documentation created in this course as blueprints for the system development in other courses.
3
Prerequisites
63-310,
63-330
This course provides an overview of information security strategies, procedures and policies necessary to manage and mitigate an organization's risk in information systems. Students will learn to conduct enterprise-wide information security risk assessment using qualitative and quantitative techniques. Security assessment techniques and the information security blueprint will be discussed in detail.
3
Prerequisites
63-230,
63-335,
63-430