MSI-5010
×
MSI-5010 Foundations of Information TechnologyThis course is a survey course on information technology (IT). It is designed to give students ample opportunity to review critically emerging trends and implications for business managers and IT professionals. Topics covered include IT foundation concepts, data/information management systems, networking systems, enterprise models/systems, IT management processes, IT security, and IT ethics. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Foundations of Information Technology* | 3 |
MSI-5020
×
MSI-5020 Telecommunications and NetworkingThis course examines data communication and networking technologies from the business perspective. Topics covered include the networked enterprise, telecommunication network models, communication hardware, and trends and emerging technology, such as social media, mobile computing, cloud computing, big data, and the internet of things (IoT). Emphasis is on data communications as an integral element of business. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Telecommunications and Networking | 3 |
MSI-5030
×
MSI-5030 Object-Oriented Application DevelopmentThis course provides students with knowledge and skills for object-oriented design and implementation of software applications. Students will learn to apply object-oriented concepts in solving computational problems and implementing structured and easily maintainable software solutions. The course also covers concepts on algorithmic design for problem solving and computer language mechanics. Advisory: This course is designed for students with a basic understanding of computer programming. Specific programming skills or previous programming experience is not required. However, object-oriented application development will be fully explored so having a basic, working knowledge of computer programming is encouraged. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Object-Oriented Application Development | 3 |
MSI-5040
×
MSI-5040 Information Systems Analysis, Modeling, and DesignThe focus of this course is on the identification of an organization problem, the goals and the purpose of information technology (IT) systems, and how to carry out all the activities in the analysis and design of the systems. It addresses the design phases and all the techniques that are used to carry out the activities using a structured approach. Students will be required to apply these techniques to a work group project. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Information Systems Analysis, Modeling, and Design | 3 |
MSI-5050
×
MSI-5050 Principles of Database DesignThis course covers most of the major advancements in the technology of the design, development, and management of database management systems (DBMS) as well as the theoretical concepts and applications of DBMS. Students will have hands-on experience through case study exercises and the design and implementation of projects. Note: This course requires that students use Microsoft Access software, which is a Windows-based product and will not run on Macs. Students can run this software and other Windows software on a Mac using Apple's Boot Camp technology or third-party virtualization tools like Parallels or VMWare Fusion. These tools make it possible to run Mac OSX and a Windows operating system side by side. This solution will require a Windows license. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Principles of Database Design | 3 |
APS-5100
×
APS-5100 Project Management for TechnologyThis course introduces project management from the standpoint of a manager who must organize, plan, implement, and control tasks to achieve an organization's schedule, budget, and performance objectives. Tools and concepts such as project charter, scope statement, work breakdown structure, project estimating, and scheduling methodologies are studied. Students will practice with Microsoft Project software to be able to manage a project from start to deployment. What is a project? How is it managed? What is the best approach? This course will answer those questions and many more. This is an opportunity to learn the project management fundamentals that can guide a project through a maze of challenges to successful completion. Successful projects do not occur by luck or by chance. In fact, many projects do not achieve their organization's goals. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Project Management for Technology | 3 |
IAS-5510
×
IAS-5510 Foundations of Information AssuranceInformation assurance (IA) is concerned with protecting the reliability of information and managing risks related to the use, processing, storage, and transmission of information or data. It includes securing the systems and processes that house and manipulate the data as well. IA includes protection of the integrity, availability, authenticity, nonrepudiation, and confidentiality of organizational data. IA practitioners use physical, technical, and administrative controls to accomplish these tasks. These protections apply to data in transit, both physical and electronic forms as well as data at rest in various types of physical and electronic storage facilities. Information assurance as a field has grown from the practice of information security. As opposed to information security and cybersecurity, IA relates more to the business value and strategic risk management of information and related organizational systems, rather than focusing on the creation and application of security controls. In this course students will learn to defend against malicious attacks while considering corporate governance issues such as privacy, regulatory and standards compliance, auditing, business continuity, and disaster recovery as they relate to an organization's information assets. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Foundations of Information Assurance | 3 |
IAS-5520
×
IAS-5520 Vulnerabilities, Threats, and AttacksThe impact of a security breach can be devastating to any organization. Information technology (IT) practitioners must have the skills to identify and address system vulnerabilities including weaknesses related to hardware, software, interrelated systems, and personnel. In this course, students will explore current and potential threats to information assets and will develop a comprehensive awareness of prevailing trends in malicious attacks. This course will provide students with the skills and knowledge needed to secure organizational resources and to develop effective methods to detect and monitor internal and external malicious activity. Topics covered in this course include: passive and active attacks, technology audits, physical security, computer security policies, contingency planning, business impact analysis, password management, information warfare, intrusion detection, risk assessment and auditing, operational security, permissions and user rights, service patches, securing network services, and security baseline analyzers. Students will learn to identify threat vectors and to develop strategies for implementing a prioritized, risk-based approach to mitigating security. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Vulnerabilities, Threats, and Attacks | 3 |
IAS-5530
×
IAS-5530 Countermeasures Design and ImplementationA countermeasure in computer security is any action, device, procedure, or method that can be used to mitigate a threat, vulnerability, or attack by either eliminating it, preventing it, minimizing its effect, or by discovering and reporting it so that corrective action can be taken in the future. In this course students will learn the principles of active defense. They will develop the skills and knowledge needed to design and implement multilayered (defense in depth) security strategies as well as expertise in using tools to harden and secure networks and organizational assets. Course topics include: threat vectors; data encapsulation at Open Systems Interconnect (OSI) layers 2, 3, 4, and 5; packet decoding; network firewalls; intrusion prevention; network address translation (NAT); access control lists (ACLs); virtual private networks (VPNs); virtual local area networks (VLANs); proxies; border routers; web application, and database security; securing the operating system (OS) and services; vulnerability assessment; baseline audits; forensics; logging; encryption; authentication; wireless security; and network access control and security tools. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Countermeasures Design and Implementation | 3 |
IAS-5540
×
IAS-5540 Policies and Procedures Development and ImplementationInformation technology professionals, whether in the public or private sector, must ensure that their information systems comply with privacy and security laws, regulations, directives, and any organizational policies, procedures, and guidelines. This challenge can be a daunting task and confronts both public and private organizations alike. To meet this charge, they develop and implement security policies and procedures that explicitly define the organization's security protocols. Security policies are custom-created, dynamic standards of business conduct. While the best practices of the information security field form the basis of any security policy, each organization has unique requirements that shape policies used to manage security. Students in this course will develop the skills and knowledge needed to access the security posture of an organization and then apply the information gathered during this assessment to inform stakeholders about the challenges inherent to their unique information assurance landscape. They will learn to develop processes and define policies that achieve the targeted level of security for an organization based on the level of risk mitigation required. With respect to securing networks and systems people are often the weakest link. To address this challenge, students in this course will learn to develop policies and best practices for members of technology groups as well as for system users. Students will develop training documentation for management, technical, and user populations that exposes them to the policies and processes required to secure information technology and to align these with the business objectives of the organization. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Policies and Procedures Development and Implementation | 3 |
IAS-5550
×
IAS-5550 Computer Forensics and Information Systems AuditingComputers are increasingly used to commit crimes and evidence of these crimes is often recorded on those computers. Computer forensics is the application of computer investigation and analysis techniques to the process of discovering and preserving potential legal evidence. Systems auditing is concerned with ensuring that adequate security controls are in place to prevent or at least discover fraud or other misuse of information technology (IT) resources. Legal evidence might be sought in a wide range of computer crimes or misuse. and students in this course will develop an understanding of forensic and auditing and will develop the skills needed for discovering and preventing theft of trade secrets, theft of or destruction of intellectual property. and fraud. They will learn how to recover deleted, encrypted, or damaged file information and to plan and execute audits of security and other related IT procedures. This course is intended to provide a foundation in computer forensics and auditing, and provide hands-on practice in applying forensic and auditing techniques. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Computer Forensics and Information Systems Auditing | 3 |
APS-7000
×
APS-7000 Master Project in Applied Science and TechnologyThe Master Project in Applied Science and Technology is designed to provide a guided in-depth experience in defining, measuring, analyzing, improving, and controlling a significant opportunity or challenge relevant to the learner's applied science or technology workplace or profession. The learner will be expected to acquire knowledge, apply real-life experience, and conduct research to make recommendations that are based upon solid data and benchmarking. Credits: 6 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Master Project in Applied Science and Technology | 6 |
Total Credit Hours: 36-39