Credits: 1–6
This course provides the opportunity to offer a new topic in Liberal Arts Seminars.
Credits: 3
Provides a global perspective on cyber security and the impact of cyber threats. Addresses a variety of topics that are all part of the cyber ecosystem, to include current threat trends, defense in-depth techniques, attack case studies, risk management, disaster recovery, security policy, and awareness training. Examines current best practices, compliance requirements, and evolving security architectures.
Credits: 3
Provides overview of cyber security (CS) policies, laws, regulations, and ethical considerations that can be used to help protect and improve an organization's security posture. Explores related topics including ethics, CS policy requirements and controls, compliance, and implementation issues. Examines modern CS regulations and frameworks, and the various policies and procedures that may be used in an organization's security strategy.
Credits: 3
Explores human aspects of cyber security -- including security training and awareness, cyber ethics, hacktivism, hacker culture -- with emphasis on human motivations and responses. Examines common human-centered attacks, such as phishing, social engineering, and other psychological manipulation.
Credits: 3
Develops strong writing competencies for technical fields, including communication of complex information to a variety of audiences through various print and online media. Teaches students to write, organize, edit, and design information with clarity and accuracy. Covers organizing, managing, communicating, and facilitating technical information. Topics include conciseness, simplicity, information arrangement, presentation, and readability.
Credits: 3
Studies key structures, concepts, and applications needed to write programs with Java, an object-oriented programming language used for developing user interfaces on the Web.
Credits: 3
Focuses on how to assess the value of IT investments and align technical strategies with business strategies. Introduces Porter's Five Forces Model, the value chain, technology payoff metrics, and risk analysis. Explores ways to leverage disruptive technologies for competitive advantage.
Credits: 3
Master the basics of website construction, design, and maintenance using XHTML and CSS. The course provides an overview of aesthetic, business, and technical website design concepts. Attention is also given to the underlying concepts of website design such as navigation for websites, usability, accessibility issues, and the process of putting a completed website online.
Credits: 3
Applies common frameworks and methodologies to the examination of enterprise system architecture needs. Includes coverage of the systems development life cycle and the methodologies in use characterized by their varying degrees of iteration, structure, and user involvement. Emphasizes analytical and design concepts and related tools such as use cases and Unified Modeling Language.
Credits: 3
Introduces the principles of Agile Project Management and covers the frameworks and practices used by agile teams. Explores innovative ways of gathering requirements, estimation, release planning, performance metrics, and scaling with the Agile Manifesto in mind. Emphasizes software development while applying the principles to any type of project..
Credits: 3
Learn and apply the fundamentals of relational database modeling and database management systems technology in the development of business information systems. Encompasses entity/relationship diagrams, relational theory, normalization, integrity constraints, the Structured Query Language (SQL), and physical and logical design. Students will also be exposed to core concepts and tools associated with data warehousing.
Credits: 3
Introduces smart cities within the context of sustainability: economic, environmental, and equity. Provides a multidisciplinary look at innovative smart city approaches to solve complex problems on the local level with global impact; includes topics from environmental studies, information technology, data science, engineering, and social science.
Credits: 3
Introduces students to the fields of cybersecurity. Both non-technical issues, such as ethics and policy, and technical issues are covered. Students see and experiment with a wide range of areas within cybersecurity, including: binary exploitation, encryption, digital forensics, networks, and modern threats. Prerequisites: CS 2150 or CS 2501 topic DSA2 with a grade of C- or higher.
Credits: 3
Examines cybercrimes and the digital forensics processes and techniques needed to discover, prosecute, and mitigate cybercrime. Explores the threats of cybercrime and mitigating countermeasures. Topics include discovering, preserving, and presenting digital evidence for legal prosecution; digital forensics tools and techniques; and anti-forensics techniques.
Credits: 3
Explores mobile device architecture and cyber threats. Examines the security strengths and weaknesses of mobile devices and platforms, as well as corporate mobile security policies and procedures. Topics include mobile device operating system software architecture, mobile application architecture, mobile device and application vulnerability assessment testing, and mobile device forensic analysis.
Credits: 3
Explores the tools and techniques used to assess the security posture of a target system. Topics include footprinting, reconnaissance, vulnerability discovery, and malware. Covers vulnerability discovery in a variety of systems, including web applications, mobile platforms, and cloud computing. Aligns with the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.
Credits: 3
This course serves as a capstone course to be taken after all other required courses in the program. Using a project-based approach, students will develop Web applications using the PHP scripting language and MySQL databases. Topics include PHP scripting, data-driven interactivity, writing secure PHP programs, and code frameworks.
Credits: 3
A first course in communication networks for upper-level undergraduate students. Topics include the design of modern communication networks; point-to-point and broadcast network solutions; advanced issues such as Gigabit networks; ATM networks; and real-time communications. Cross-listed as CS 4457. Prerequisite: CS 3330 or ECE 3430
Credits: 1–3
Content varies annually, depending on instructor interests and the needs of the department. Similar to CS 5501 and CS 7501, but taught strictly at the undergraduate level. Prerequisite: Instructor permission; additional specific requirements vary with topics.
Credits: 3
Provides an introduction to sustainability concepts within the framework of environment, economics, and equity. Covers foundational principles of sustainability and emerging topics, including population, energy, food, water and technology. Emphasizes the interrelationship between humans and the environment, and includes discussion of ecosystems, human behavior, ethics, and policy.
Credits: 3
Provides managers with the essential framework needed to design and develop an effective cyber security program. Explores methods used to raise general security awareness, review current industry practices, and develop expertise needed to adapt policies to achieve confidentiality, integrity, and availability of organizational assets and data.
Credits: 3
Examines the steps required in policy development including password protection, acceptable use of organization information technology assets, risk acceptance, identification of threats, countermeasures, intellectual property, proprietary info and privacy issues, compliance reporting, and escalation procedures. Discusses access controls, security standards, and policy implementation.
Credits: 3
Explores the building blocks needed to implement security within the System Development Life-Cycle (SDLC). Focuses on how to analyze internal applications, computing platforms/network infrastructure, and corporate objectives with an eye toward designing flexible security architecture that is best suited for the enterprise. Studies in-depth defense techniques and how they are applied to optimize security architecture.
Credits: 3
Reviews the essential components of a security assessment and explores how to integrate methodology with company needs. Covers the pitfalls connected with conducting a security assessment. Addresses how to create security assessment reports, identifying threats and vulnerabilities and managing organizational audits and compliance metrics. Case studies are used to illustrate course concepts.
Credits: 3
Learn how to anticipate and respond to threats using an arsenal of security tools, appliances, and devices including encryption, firewalls, intrusion detection systems, vulnerability assessment systems, single sign on, virtual private networks, and authentication systems. Includes implementing practical network security measures including the importance of hardening operating systems and applications to minimize vulnerabilities.
Credits: 3
Covers the technologies enabling the migration of computing applications, communications, and information to the cloud environment. Explores the technologies that facilitated back-end integration and front-end deployment. Reviews the information assurance challenges and popular solutions of cloud computing. Discusses communications concepts such as TCP/IP, ISP delivery channels, and wireless technology.
Credits: 3
An overview of the ethical challenges in the information age - introduces the complex and dynamic state of the law as it applies to behavior in cyberspace. Topics include the legal pitfalls of doing business in an interconnected world and an intro to the various organizations and materials that can be turned to for assistance in understanding how to ethically and legally provide services and operate modern computer-based systems and networks.
Credits: 3
Examines the security and ethical issues of smart devices known as the Internet of Things (IoT). The IoT consists of smart devices that sense, anticipate, and respond to our needs as we manage them remotely. Explores IoT technology, security vulnerabilities and attacks, and mitigation controls. Assesses the health, safety, privacy, and economic impacts of IoT security events.
Credits: 3
Focuses on how to assess the value of IT investments and align technical strategies with business strategies. Introduces Porter's Five Forces Model, the value chain, technology payoff metrics, and risk analysis. Explores ways to leverage disruptive technologies for competitive advantage. Application of various models and frameworks is achieved through assignment. Prerequisite: Admission to Graduate Certificate in HSM or Instructor Permission.
Credits: 3
Provides students with practical, real-world experience with the various wireless network security core competencies. Specifically, the course provides the most popular hacking, cracking, and wireless security network analysis tools on a CD ROM and trains students to use them to assess and secure wireless networks.