400
Search Engine Optimization is a core need for today's businesses. Integrating search and social media into the marketing plan boosts visibility and relevance. This class will review guidelines and techniques to plan and executive a comprehensive SEO strategy.
3
This course teaches students how to design, create, maintain, and manage a web site. Students will use a number of tools and programming languages to build the site including: HTML, XML, JavaScript, FrontPage, and Dreamweaver.
3
Prerequisites
LG-200.
This course focuses on three of the knowledge areas in project management: risk management, communication management and human resources and stakeholder management. This course considers how to deal with a variety of stakeholders and ways to consider optimizing stakeholder involvement. How and why various social roles are needed on projects. The formation and expectations of differing kinds of teams are covered in order to set up management expectations about results. The results of a project need to be integrated within existing environments.
3
Prerequisites
LW-310
Students examine principles of telecommunications and networking as applied in a business environment; communication parameters, protocol, and hardware, including modems, multiplexors, common carriers and microwave and satellite systems; and design and implementation of distributed data processing and network systems.
3
Prerequisites
LG-200.
This course provides a broad overview of security in an enterprise. Students will learn about the threats to the security of information systems, what makes an organization's resources secure, basic technologies for information security, and the levels of training and expertise needed in organizations to reach and maintain a state of acceptable security. This course covers the technical and managerial aspects of securing your enterprise resources.
3
Prerequisites
LG-200.
Hands-on introduction to different network operating systems that are commonly used in the industry; Windows NT server, Windows 2000 server, and NetWare; various components of the NOS; the design, installation, implementation, management, and administration of a NOS. Discuss the differences between these systems and how to select the appropriate one for your business.
3
Prerequisites
LW-430.
Web Analytics is the measurement, collection, analysis and reporting of detailed statistics about visits to a web site. Internet Analytics provides important information in order to optimize and improve the web site usability and performance. This course discusses a number of analytics techniques such as log files, cookies, web bugs, and paper tagging. It also covers the key performance indicators, website metrics. Additionally, it demonstrates how to setup and use some of the leading web analytics tools available such as Google Analytics and Visistats. These tools will help you track your Twitter, Facebook, and other social media marketing (SMM) technologies and determine if your SMM is working.
3
This course explores the security of enterprise information assets from a hacker's perspective. To improve organizational information security, students are introduced to the methods and techniques employed by hackers to get unauthorized access to these enterprise systems. The best practices for protecting the digital assets are discussed by studying modern hacking techniques.
3
This course presents hands-on techniques for recovering evidence for mobile phones such as iPhones, and windows and android phones. Mobile devices such as iPads, Tablet PCs and iPods will also be covered in this course. Students will learn how to recover passwords, deleted voicemails, photos, and text messages and data from various apps that on mobile devices.
3
The main objective of this applied ITM capstone course is to teach students how to develop and implement a business information system and create the project e-portfolio. In this course, students will apply and integrate knowledge from previous ITM courses to create a fully functioning business information system. Students will complete their projects and e-portfolios by 1) creating logical and physical models from information gathered in the systems planning and analysis phases, 2) building the system components (Web application, database and network), 3) integrating, testing and documenting all system components developed, 4) creating comprehensive user training plans and materials, and 5) writing documentation for system operation and support.
3
Prerequisites
LW-330,
LW-415, and
LW-430. This capstone course should be complete as one of the student's final ITM courses.
This course covers all the aspects of setting up an Information Technology Start-up company. Students will learn finance (Venture Capital funding), Management (Business Plan), Marketing (Marketing and Sales plan), project management and IT Entrepreneurship strategies via a semester long hands-on project. Students will present their projects to a panel of judges at the end of the session.
3
This course is a hands-on introduction to the first three phrases of the system development lifecycle: 1) planning/initiation, 2)analysis, and 3) design. Students will learn how to analyze a business case, conduct a preliminary investigation, model business requirements using various tools, select a development strategy, and create a requirements document. Students will use the logical models and documentation created in this course as blueprints for the system development in other courses.
3
Prerequisites
LG-200
This course provides an overview of information security strategies, procedures and policies necessary to manage and mitigate an organization's risk in information systems. Students will learn to conduct enterprise-wide information security risk assessment using qualitative and quantitative techniques. Security assessment techniques and the information security blueprint will be discussed in detail.
3