Academics

Course Catalog

UGRD > IT

INFORMATION TECHNOLOGY

  • IT 110  Information Technology Problem Solving

    Description:
    Several IT concepts are introduced including programming, databases, networking, web servers and how they work together in a modern system. Students work in groups to implement examples of these systems. The course examines the importance of key issues such as security, privacy, and ethics. Students should leave the course with an understanding of the components of modern systems and the scope of knowledge needed to become an IT professional.   More Info

    Offered in:
  • IT 111L  Managerial Statistics

    Description:
    Provides the student with the basic statistical techniques needed for business decision making in areas such as operations management, quality improvement, marketing research, finance, and general management. The course examines collection and presentation of data, frequency distributions, basic probability, statistical inference, and regression. Students use statistical software for data presentation and analysis. IT 111L and MSIS 111L are the same course.   More Info

    Offered in:
  • IT 114L  Introduction To Java

    Description:
    An introductory course in Java programming that exposes students to the concepts involved in using a higher-level, object-oriented programming language. The course will explain the program development process and give students lots of hands-on experience writing small Java programs. The course serves as a prerequisite to other IT courses. CS 114L and IT 114L are the same course.   More Info

    Offered in:
  • IT 115L  Introduction to Java Part 2

    Description:
    A second course in Java programming that exposes students to the concepts involved in using a higher-level, object-oriented programming language. This course, a continuation of CS 114, covers more advanced Java topics and gives students hands-on experience writing small and medium-size Java programs. This course and CS 110 may not both be taken for credit. CS 115L and IT 115L are the same course.   More Info

    Offered in:
  • IT 187SL  Science Gateway Seminar I

    Description:
    This is a two-semester course on technology, in particular information technology (IT) and how it relates to our lives. Students will read both fiction and non-fiction where technology is an issue, and discuss it in written work and orally, both individually and in small groups. The overall goal is to learn about and discuss various facets of information technology and its social implications.   More Info

    Offered in:
    • TBA
  • IT 188SL  Science Gateway Seminar II

    Description:
    This is a two-semester course on technology, in particular information technology (IT) and how it relates to our lives. Students will read both fiction and non-fiction where technology is an issue, and discuss it in written work and orally, both individually and in small groups. The overall goal is to learn about and discuss various facets of information technology and its social implications. CS 188SL and IT 188SL are the same course.   More Info

    Offered in:
    • TBA
  • IT 210L  Intermediate Computing with Data Structures

    Description:
    The design and implementation of computer programs in a high-level language, with emphasis on proper design principles and advanced programming concepts, including dynamic data structures and recursion. The assignments are designed to introduce the student to a variety of topics in computing: data structures and ADTs, Lists, Stacks, Queues, Ordered Lists, Binary Trees, and searching and sorting techniques. The language of instruction is Java. CS 210L and IT 210L are the same course.   More Info

    Offered in:
  • IT 220  Computer Forensics I

    Description:
    This course covers topics related to computer forensics and criminal justice and is, by its nature, a multi-disciplinary course. Forensics is the use of science in a course of law. Computer Forensics and this course looks specifically at how one obtains evidence off of a computer, other digital devices and from network messages and logs, preserving the evidentiary chain, and the legal aspects of the search and seizure of computers and related equipment/information.   More Info

    Offered in:
  • IT 221  Computer Forensics II

    Description:
    This course is designed to expose students to advanced concepts in digital/computer forensic analysis. As with Computer Forensics I, there will be a balance between legal and technical aspects, although this course will focus more on the use of specific tools. For example the students will practice Disk and other digital device analysis using professional proprietary widely-used software tools such as Encase.   More Info

    Offered in:
  • IT 230L  Relational Databases

    Description:
    This course provides a thorough review of basic relational database concepts and how to apply these concepts to a variety of application problems. The course focuses on the use and properties of relational database management systems. Topics covered include DBMS architecture levels, data modeling, data definition and manipulation capabilities of Structured Query Language programming, and programming techniques for accessing relational databases. IT 230L and MSIS 230L are the same course.   More Info

    Offered in:
  • IT 240  Web Fluency

    Description:
    This course develop an in-depth understanding of how the web works from a technical standpoint, meaning how dynamic pages are created and delivered by web servers, and then used by browsers and other clients. Students demonstrate this understanding by achieving competency by using a current integrated development environment (IDE) to develop web applications.   More Info

    Offered in:
  • IT 244  Introduction to Linux/Unix

    Description:
    AA course designed to introduce students to Linux and UNIX. Students will install, set up, and operate standard tools and learn how they operate together. By course end students will have installed a fully functional Internet server while understanding its structure. Security issues of operating systems will be studied throughout the course.   More Info

    Offered in:
  • IT 246  Introduction to Networks

    Description:
    We will study basic data communication and networking concepts for LAN and WAN; network protocols with emphasis on Ethernet, PPP, TCP/IP, and WWW protocols, and mobile and wireless networks. Network applications include Telnet, ftp, email, distributed file systems, and client-server applications. We survey network security issues. We will do hands-on network simulation and network sniffing exercises to see how these technologies work in practice.   More Info

    Offered in:
  • IT 285L  Social Issues and Ethics in Computing

    Description:
    This course explores some of the ethical and societal issues that are raised by computing. Topics include privacy, freedom of expression, intellectual property, liability, the effect of computing on social interaction, and human-computer interface issues. Students write an analytical paper on an appropriate topic and also present their findings to the class. CS 285L and IT 285L are the same course.   More Info

    Offered in:
  • IT 341  Introduction to System Administration

    Description:
    This is an introduction to the process of choosing, installing, configuring, and maintaining UNIX operating systems such as Linux. Topics include user management, file system management, security, networked file systems (NFS), networked information systems (NIS), domain name servers (DNS), mail systems and printers. Students will get practice writing shell scripts. Also, students are introduced to general systems administration policy.   More Info

    Offered in:
  • IT 360  Enterprise Software

    Description:
    This course explains the core applications of a typical organization to support their fundamental business functions. It explains the role of IT in attaining competitive advantage and how modern organizations configure commercially available products to satisfy their information needs. The course makes extensive use of collaborative technologies and business applications to demonstrate the work of virtual teams and how they implement their operations.   More Info

    Offered in:
  • IT 370  Business Intelligence Applications

    Description:
    This course introduces concepts in business intelligence and explores how business intelligence (BI) can help improve management effectiveness through better decision-making in several functional areas such as marketing, finance, and manufacturing. This course will explore applications of BI, such as online analytical processing (OLAP), dashboards, management reporting, performance measurement, and data visualization, and how these are developed and applied. It will also investigate BI in the context of decision-making and closely related areas such as data warehousing, data marts, business analytics, web analytics, real-time data, and mobile applications. Students will gain hands-on experience through assignments and projects using a comprehensive set of current BI tools.   More Info

    Offered in:
  • IT 420  Network and Mobile Forensics

    Description:
    This course deals with the collection, preservation, and analysis of network generated digital evidence such that this evidence can be successfully presented ina court of law (both civil and criminal). The course provides a comprehnsive understanding of network forensic analysis principles as well as an introduction to mobile (i.e. Cell-phone/PDA) forensics. Within the context of forensics security, network infrastructures, topologies, and protocols are introduced. Students will understand, learn, and experience the relationship between forensic analysis and network security technologies.   More Info

    Offered in:
  • IT 421  Digital Forensics/Malware Analysis

    Description:
    This course provides an introduction to advanced digital forensics topics relating to malicious software (malware) and its analysis. Malware (virus, worms, rootkits, spam...) represents an increasing information security threat to computer systems and networks. Students will review software engineering design fundamentals and reverse engineering techniques utilized to conduct static and dynamic forensic analysis on computer systems and networks on multiple platforms (e.g.Windows, Linux..). Students will learn about the importance of forensic principles, legal considerations, digital evidence controls, and documentation of forensic procedures in the context of malware. In addition, students will study remediation measures for malware infection.   More Info

    Offered in:
  • IT 425L  Project Management

    Description:
    Covers techniques and managerial concepts of project management. This course prepares students to manage either complex physical projects or complex software development projects. Topics presented in this course include project life cycles, economic analysis of projects, work breakdown structure, cost estimation, and the scheduling, staffing, directing, and controlling of projects. The course also covers the use of management science techniques and computer software for project management. IT 425L and MSIS 425L are the same course.   More Info

    Offered in:
  • IT 428L  Information System Security

    Description:
    This course provides a broad overview of the threats to the security of information systems, the responsibilities and basic tools to ensure information security, and the levels of training and expertise needed in organizations to reach and maintain a state of acceptable security. Students will learn and understand the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. IT 428L and MSIS 428L are the same course.   More Info

    Offered in:
  • IT 441  Network Services Administration

    Description:
    This course builds upon the material learned in IT 341 Introduction to System Administration. It shows how one may better administer networked computer systems by automating many of the administration regimes and by effectively managing those who help. Topics include scripting, heterogeneous networks, remote management, the legal issues of network administration, and introduction to network security, and the design and implementation of policy. Students are also introduced to issues in managing others.   More Info

    Offered in:
  • IT 442  Windows System Administration

    Description:
    This is an introduction to the process of choosing, installing, configuring, and maintaining Microsoft Windows client and server systems. Topics include user management, file systems, network domains and domain management, mailers, and printing. Students get practice in writing scripts for performing maintenance tasks. Also, students learn how these tasks fit into the more general system administration processes.   More Info

    Offered in:
  • IT 443  Network Security Administration

    Description:
    This course explores the application of policy and techniques to securing both public and private networks. The course is project-based and includes such topics as threat analysis and management, cryptography, firewalls, isolation, issues in securing wireless networks, and certificates.   More Info

    Offered in:
  • IT 456  Information Storage and Management

    Description:
    This course explains the activities and the relationships between data, information, and knowledge that are created, stored, protected, and optimized for access with the latest storage and communication technologies. The course focuses on the combined network and storage architectures required to provide solutions and provide the ability to scale rapidly to meet the expanded needs of future applications. The course addresses questions such as: how to architect and select an optimal storage network, how to determine and select the correct size and type of storage, how to define and apply the best storage configuration to protect users' data, how to ensure data storage and accessibility align with the business continuity plan, how to select the best techniques for facilitation backup and recovery of lost or corrupted data, how to provide local and remote data replication, and how to monitor, report, and manage large amounts of data over time.   More Info

    Offered in:
  • IT 460  Integration Methodologies and Tools

    Description:
    This course develops an understanding of applications architecture based on building IT systems out of common parts and a service-oriented architecture. These are collections of information services, modules and functional components that can be reused in a variety of common contexts. The course will apply several tools to exemplify the use of heterogeneous reusable modules to fulfill an information service. An underlying methodology for integration will be applied.   More Info

    Offered in:
  • IT 461L  Systems Analysis and Design

    Description:
    Introduces recent approaches to the analysis and design of computer information systems, including the hands-on use of computer aided software engineering (CASE) tools. The changing role of the systems analyst in both operations and systems applications in today's organizations is examined. The course critically analyzes systems development methodologies, including life cycle models and prototyping; reviews user-led developments and current approaches which facilitate user-developer collaboration; discusses effective diagramming and notational techniques now available to define and document functional requirements and operational business processes; and examines current methods used to test and evaluate the accuracy, completeness, and usability of documented requirements and convert them into efficient systems design or re-engineering processes. Topics include CASE tools, module and transaction design, human-computer interfaces, and system configuration. This course includes practical experience in analyzing and designing an organizational application. It discusses the concept of quality as applied to information systems and business process redesign as well as the role of information systems in managing quality within an organization. IT 461L and MSIS 461L are the same course.   More Info

    Offered in:
  • IT 471  Data Warehousing for Business Intelligence

    Description:
    this course provides students with the technical skills required to plan and implement a data warehouse using a database management system. It describes basic data warehousing concepts. The course covers design and implementation of data marts and operational data stores. Topics include dimensional data modeling for warehouses, CUBES and storage modes including MOLAP, ROLAP and HOLAP, and data warehousing infrastructure and analytical service tool selection. This course involves designing a data warehousing system and the implementation of a database with a stare schema, gathering data from primary data sources, transforming data, and loading it into a database management system. Students create cubes using OLAP and analyze cube data using client application.   More Info

    Offered in:
  • IT 472  Data Mining for Management Applications

    Description:
    Data Mining provides a set of techniques that explore large quantities of data to discover meaningful patterns and make predictions. It helps businesses analyze data from different perspectives, gain insights into the vast amount of data extracted from internal and external sources, and to measure performance, reduce costs, and seek competitive advantage. As a result, data mining has become vital to most enterprises today. This course introduces data mining through an investigation of its underlying concepts, and explores practical methods for its application. Students will learn the appropriate use of several data mining methods based on unsupervised algorithms such as cluster analysis and association rules, and those based on supervised algorithms such as decision trees and neural networks. Students will gain experience with applications of data mining using current enterprise software such as IBM SPSS Modeler.   More Info

    Offered in:
  • IT 485  Information Technology Capstone

    Description:
    Students will work on a semester-long project, particular to their track and meet together with an instructor and with students from other tracks to discuss each others projects. Students will deliver a product that is appropriate to their track in the IT program. At the end of the semester, students report on their product, both in oral presentations and demonstrations and in writing.   More Info

    Offered in: