Information Technology and Cybersecurity (ITC) courses
ITC 600 Information Systems in Business OrganizationsPrerequisite: permission of a director of a College of Business graduate program.
Comprehensive study of the fundamentals of business information systems. Designed for graduate students who have not had undergraduate information systems courses. Will not be counted in the hours required for a College of Business graduate degree.
ITC 628 Database Application Development with OraclePrerequisite: ITC 466 or ITC 475 or permission of a director of a College of Business graduate program.
Application of database principles toward the development of a business information system. Emphasis will be on the design, construction, testing, and installation of a comprehensive database application using Oracle DBMS, SQL, Pl/SQL, HTML, or other data access tools. A significant course project is required, and may be an individual or group project. May be taught concurrently with ITC 528. Cannot receive credit for both ITC 628 and ITC 528.
ITC 645 Data Infrastructure for Data Analytics
This course focuses on emerging issues surrounding the modern data infrastructures that enable data analytics. Students will explore the challenges of working with Big Data (large, diverse datasets that often include varied data types and streaming data) in addition to traditional data infrastructures such as data warehouses. They will become familiar with capturing data from contemporary sources such as web and social media, mobile and sensors, and a variety of large, publically available datasets. Various data management techniques will be explored, including distributed file systems and associated query methods. The goal of this course is to prepare students to assess and recommend large-scale information storage and retrieval components which enable data analytics. May be taught concurrently with ITC 545. The graduate level (645) students will have a significant research project required above and beyond the undergraduate level (545) students. Cannot receive credit for both ITC 645 and ITC 545.
ITC 655 Data Visualization
This course introduces data visualization concepts, principles, techniques and tools. Data visualization is an effective approach to discover insights from data. It is a necessary component in the skills portfolio of a data analytics professional. Students will learn relevant principles from fields such as psychology and human computer interaction. This course is designed as hands-on, experience oriented. The principles, concepts, ideas and insights discovering are taught by using data visualization software. The designed learning outcome is that students are able to (1) interpret and explain commonly used data visualization presentations, (2) suggest visualization methods for specific decision making purpose, (3) understand special features of visualization formats such as possible biases that readers may be subject to, and (4) use a software package to design and implement a visualization project. May be taught concurrently with ITC 555. The graduate level (655) students will have a significant research project required above and beyond the undergraduate level (555) students. Cannot receive credit for both ITC 655 and 555.
ITC 660 Foundations of CybersecurityPrerequisite: permission of Cybersecurity program director.
This course is an introduction to the basic issues in computer security. While technical in nature, this course is introductory in its approach in that the student is not required to have an extensive background in programming or technical support. A significant research project is required.
ITC 663 Telecommunications and Network SecurityPrerequisite: ITC 660 and admission to the Cybersecurity program or permission.
This hands-on course provides an introduction to tools and techniques used by security professionals to secure corporate networks. Topics include virtual private networks (VPNs), firewalls, and intrusion detection and prevention systems (IDS/IPS). Defense in depth will be taught through the installation and configuration of firewalls, VPNs, and IDS/IPS. Students will be able to recognize and prevent malicious attacks on corporate networks. A significant research project is required.
ITC 664 Ethical Hacking and Incident ResponsePrerequisite: ITC 660 or concurrent enrollment; and admission to the Cybersecurity program or permission.
This hands-on course provides an introduction to tools and techniques used by hackers to penetrate corporate networks. Topics include vulnerabilities of operating systems, incident-handling methods, and an overview of the process and methodologies used in penetration testing including ethical and legal implications. A significant research project is required.
ITC 681 Foundations of Business Analysis
This course provides a foundational overview of Business Analysis (BA), which enables enterprise change by defining needs and recommending solutions that deliver value to stakeholders. Topics covered in the course include foundational principals of IT strategy and governance, IT/business alignment, IT service management, and the BA body of knowledge. May be taught concurrently with ITC 581. Cannot receive credit for both ITC 581 and ITC 681.
ITC 682 Lean IT
Lean principles to manage IT with an emphasis on the reduction of waste and providing value to customers. Additional principles from Lean Six Sigma, continual improvement, IT Service Management, and other relevant areas will be covered. Course requires students to complete a project analyzing one or more of the existing IT processes of an organization.
ITC 683 Cloud Computing
A study of the concepts and applications of cloud computing. Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. May be taught concurrently with ITC 583. Cannot receive credit for both ITC 683 and ITC 583.
ITC 696 Problems in Business: Information Technology and CybersecurityPrerequisite: permission of a director of a College of Business graduate program.
Technical or professional problems growing from particular needs which may require additional depth or breadth of study. Outline of study must be approved prior to enrolling. May be repeated to a maximum of three hours.
ITC 720 Project Management in Information Systems
A study of the concepts, practices, processes, tools, techniques and resources used by information system (IS) project managers. The entire project life cycle will be covered from inception to close-out. The course will closely follow the framework of the Project Management Body of Knowledge (PMBoK). The course will focus on how to manage the scope, schedule, budget and risk of projects, with emphasis on information systems and information technology projects.
ITC 732 Strategic IT PlanningPrerequisite: admission to the MS in Information Technology program.
Introduction to fundamental issues of information system (IS) planning. Current theory and specific IS planning practices are studied. Emphasis on strategic implications of information technology, IS planning vis-a-vis strategic planning, development and maintenance of IS plans, analysis of organization information requirements, and prioritizing IS projects. Implications for business and technology trends and application of planning concepts to IS planning projects are examined.
ITC 734 Staffing the Information Systems FunctionPrerequisite: admission to the MS in Information Technology program.
Focus on current and emerging issues of recruitment, selection, training, motivation, retention and evaluation of IS staff. Issues include developing job descriptions, shifting demands for staffing, performance criteria, alternative approaches to training, alternative career tracks, and the role of personality types on performance. Influence of recent trends including downsizing, outsourcing, centralization and decentralization, and end-user computing will be examined. Current theory and specific practices are studied. Practical applications will be stressed.
ITC 735 Neural Networks for Machine Learning
Artificial neural networks and how they are being used for machine learning, as applied to data analytics in the business environment. Students will be required to collect original data for neural network analysis. Different learning algorithms will be explored, including the Genetic Algorithm. This course will lead to a graduate level paper with possibilities for publication.
ITC 736 Data Communications and NetworkingPrerequisite: admission to the MS in Information Technology program.
Computer network planning, including physical layout, resource requirements, and budgeting. Administration of computer networks, including managing user accounts; selecting and loading applications software; managing upgrades and enhancements; monitoring and optimizing system performance; ensuring physical and logical system security.
ITC 738 Information System Project ManagementPrerequisite: admission to the MS in Information Technology program.
Objectives and techniques of planning, organizing, and managing complex information systems development projects. The course will include a study of resources and tools available for scheduling, tracking, and measuring system development productivity.
ITC 740 IT System DevelopmentPrerequisite: admission to the MS in Information Technology program.
Study of various systems development methodologies used to analyze, design, and implement information systems; selection criteria for a specific methodology, and how to introduce a new methodology within an existing environment. Specific tools and techniques for systems development and for business process reengineering will be explored and applied.
ITC 742 Management of End User ComputingPrerequisite: admission to the MS in Information Technology program.
Planning, organizing, staffing, control, and support of end user computing. Various organizational structures used to support end user computing will be investigated. Methodology for development of end user computing systems will be identified for several forms and types of projects. A case project will involve development of an end user system using an appropriate methodology.
ITC 744 Information Systems ManagementPrerequisite: admission to the MS in Information Technology program.
Overview of managerial applications of information technology (IT) to increase effectiveness. Use of IT to support decision making, cooperative work, organizational competitive advantage, and inter-organizational communication. Various planning approaches will illustrate the use of IT in organizations. Case method will be used.
ITC 746 Data ManagementPrerequisite: admission to the MS in Information Technology program.
Study of data modeling using tools such as Entity-Relationship and Semantic Object Models. Examination of the Database Administrator's responsibilities including monitoring and tuning of the database, establishment of database reliability, and security. A case project will include the development of a data model and a database administration plan for a client/server database system.
ITC 747 IT Legal IssuesPrerequisite: admission to the MS in Information Technology program.
Focus on the legal and ethical environment relevant to advances in technology. Issues include intellectual property, jurisdiction, defamation, invasion of privacy, electronic contracts, computer crime, censorship, unsolicited email, antitrust issues, and encryption. Recent developments, court decisions, federal and state statutes, treaties and international agreements, administrative rulings, and legal literature regarding internet law, will be explored and explained.
ITC 748 Principles of Information SecurityPrerequisite: admission to the MS in Information Technology program.
This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. The students will learn a balance introduction to both security management and technical components of information security; they will be exposed to the spectrum of security activities, methods, methodologies, and procedures. This spectrum includes inspection and protection of information assets, detection of and reaction to threats to information assets, and examination of pre- and post-incident procedures, technical and managerial responses and an overview of the information security planning functions.
ITC 750 Sourcing and ProcurementPrerequisite: admission to the MS in Information Technology program.
In-depth study of key factors and issues associated with hardware/software selection, acquisition and implementation. Emphasis on problem definition and analysis, comparative methodologies for evaluation and selection, identifying and qualifying vendors, and developing/evaluating request for proposals (RFP's). Management implications of enterprise-wide software solutions including software distribution, version and release management, and software standards and practices are discussed. Completion of an acquisition project will be included.
ITC 752 IT LeadershipPrerequisite: admission to the MS in Information Technology program.
This course is designed to provide an understanding and appreciation of organizational behavior issues facing senior and mid-level IT managers. Topics to be examined include: organizational behavior from an individual, group and structural perspective, organizational culture, leadership, perception and decision-making values and attitudes, and emotional intelligence. The material should be of interest and benefit to IT professionals, irrespective of technical specialty, who are currently in or aspire to IT management.
ITC 754 Organizational TransformationPrerequisite: admission to the MS in Information Technology program.
Study of interrelated economic, social, political, and technological forces requiring organizations to transform their systems and processes to survive and succeed. Students will examine a variety of typical transformations from the perspective of a work unit member and a manager of the change process.
ITC 756 Special Topics in Information TechnologyPrerequisite: admission to the MS in Information Technology program.
Variable content with topics that can change from semester to semester. Topics are identified by title in the schedule of classes. Practical applications will be stressed. May be repeated to a maximum of six hours.
ITC 761 Management Information SystemsPrerequisite: admission to the MBA program or permission from the MBA Program Director.
This course includes and goes beyond the typical management information system course material. It includes a macro application to the concepts, designs, and implementations of business information systems. Time is spent as well in exploring the importance of balancing technical innovation, business stewardship, and socially responsible and ethical uses of technology.
ITC 762 Legal Issues in CybersecurityPrerequisite: ITC 660 or concurrent enrollment; and admission to the Cybersecurity program or permission.
This course provides an overview of the laws and legal processes involved in e-commerce, privacy, and intellectual property rights and cyberspace law. Risk analysis, incident response, and network forensic investigations. Objectives include recognizing the legal aspects of the security triad: confidentiality, integrity, and availability, examining the concepts of privacy and its legal protections, and being able to explain the importance of forensics examination in legal proceedings.
ITC 765 Computer ForensicsPrerequisite: ITC 660 and admission to the Cybersecurity program or permission.
This hands-on course addresses the fundamentals of computer system forensics. It will provide an overview of computer crimes, forensic methods, the role of computer forensics specialists, computer forensic evidence, and the application of forensic analysis skills. Emerging technology and future directions will be considered along with email, mobile, Window, Mac, and Linux forensics. A significant research project is required. May be taught concurrently with ITC 565. Cannot receive credit for both ITC 765 and ITC 565.
ITC 766 Web Application SecurityPrerequisite: ITC 660 or concurrent enrollment; and admission to the Cybersecurity program or permission.
This hands-on course provides an introduction to tools and techniques used to hack web applications. Security strategies will be presented that can help to mitigate risk associated with web applications and social networking. Course objectives include analyzing the impact of the internet and web applications on the business world, the evolution of social media and social networking, analyzing common website attacks, weaknesses, and security best practices. A significant research project is required. May be taught concurrently with ITC 566. Cannot receive credit for both ITC 766 and ITC 566.
ITC 767 Management of Information Security
This course surveys the management of the information security function within organizations. Topics include establishing and implementing information security policies; assessing and mitigating risk associated with IT infrastructure; and planning/auditing compliance with information security policies, laws and regulations.
ITC 770 Seminar in CybersecurityPrerequisite: 15 hours of graduate Cybersecurity courses and permission from the Cybersecurity Program Director.
Critical evaluation and interpretation of research and literature in Cybersecurity.
ITC 790 Seminar in Management Information SystemsPrerequisite: 15 hours of graduate business administration courses and permission from the MBA Program Director.
Critical evaluation and interpretation of research and literature in information systems.
ITC 794 Internship: Information Technology and CybersecurityPrerequisite: permission of the director of the appropriate graduate program and department head.
In consultation with the coordinating professor, the student is engaged in first-hand experience with a business, organization, or other professional entity. A portfolio of assigned work shall be collected, examined and evaluated during the semester.
ITC 796 Independent Study-Information Technology and CybersecurityPrerequisite: permission of advisor.
In consultation with the advisor, student selects, for intensive study, a specific area of concern related to the student's program, with emphasis on research.
ITC 797 Special TopicsPrerequisite: permission.
Study of topics in Information Technology and Cybersecurity. May be repeated to a maximum of six hours when topic varies.
ITC 799 ThesisPrerequisite: permission of instructor.
Independent research and study connected with the preparation of a thesis.