Information Systems Technology Course Listing

Use this course listing to view descriptions of the courses offered for the term indicated as well as other course information such as prerequisites (if applicable) dates, times and campus location when available. Some courses are offered only in specific terms.

To view all courses for this program, uncheck "Hide Courses Not Offered This Term." If a course you need is not offered this term, please contact the department to find out when it next will be offered.

This course is an introduction to data structures, algorithms, programming methodologies and software architectures in support of computer simulation. Topics include lists, queues, sets, trees, searching, sorting, reusable code and order of complexity. Simulation structures developed include event lists, time management and queuing models. Software models are implemented and tested.
This course provides an introduction to computer taxonomy, description languages, conventional computer architecture, microprogramming, instruction sets, I/O techniques, memory, survey of non-conventional architecture and software interfaces.
Software development concepts are introduced in the context of hands-on project implementation. SDLC, version control, design with UML, documentation, testing, 2 and 3-tier architecture.
A continuation of Software Development I (CEN 3024) with larger and more complex projects. Enterprise-level applications are covered, including distributed and web-based systems using n-tier architecture.
Professional-level database programming, including the use of complex SQL queries, reading from and modifying databases from application code. Hands-on exercises with current RDBMS software. Term project required.
This course addresses approaches and issues associated with integration of software subsystems and components into one system and ensures that the subsystems function together as a software system.
This course is an introduction to network maintenance and repair. Preventative maintenance and diagnosis of the microcomputer will be emphasized along with basic-to-advanced troubleshooting skills. Software and hardware tools will be used and evaluated in class. Preventative maintenance, upgrades, system diagnostics, configuration files, power, memory, drives, input/output (I/O), modems, communications, printing and how these topics interact in the network will be examined. Lab fee required.
This course is an introduction to computer networks and operating systems. Computer components are identified and their functions explained. Operating system functions include command execution, disk drive operations, file maintenance, directory maintenance, batch files and system configurations. Network topics include proper logging in, logging out, network security and network questions and solutions. Operating typical business software such as word processing, spreadsheets and database management of a network will be introduced. Lab fee required.
This course introduces students to the UNIX Operating System. The course includes an overview of UNIX, simple commands, the VI Editor, file system, shell, communication, program development, shell programming and shell scripts. Lab fee required.
This course is designed to prepare the student to apply and understand the basics of networking. The course introduces the architecture, structure, functions, components and models of the Internet and computer networks. The principles of IP addressing, fundamentals of Ethernet concepts, media and operations are introduced to provide a foundation for the curriculum. Students will be able to build simple LANs, perform basic configurations for routers and switches, implement IP addressing schemes, and apply security best practices. This is the first part of a three-part series designed to prepare students for the Cisco Certified Networking Associate (CCNA) exam. Lab fee required.
This course is designed to prepare the student to apply and understand the architecture, components, and operations of routers and switches in small networks and introduces wireless local area networks (WLAN) and security concepts. Students will be able to configure and troubleshoot routers and switches for advanced operation using security best practices, resolve common issues with protocols in both 1Pv4 and 1Pv6 networks, configure VLANs and inter-VLAN routing, configure redundancy on a switched network using STP and EtherChannel and configure switch security to mitigate LAN attacks. This is the second of a three-part series designed to prepare students for the Cisco Certified Networking Associate (CCNA) exam. Lab fee required.
Advanced features of the UNIX operating system will be covered in this course. Topics will include, but not be limited to, networking protocols, shell scripting, awk programming and system administration. Lab fee required.
This course is designed to prepare student to apply and understand the architecture, components, operations, and security to scale for large, complex networks, including wide area network (WAN) technologies. This course emphasizes network security concepts and introduces network virtualization and automation. Students will be able to configure, troubleshoot, and secure enterprise network devices and understand how application programming interfaces (API) and configuration management tools enable network automation. This is the third of a three-part series designed to prepare students for the Cisco Certified Networking Associate (CCNA) exam. Lab fee required.
In the Building Cisco Remote Access Networks (BCRAN) course, students learn how to build, configure and troubleshoot a remote access network to interconnect central sites to branch offices and home offices. Students also learn how to access the central site, as well as to maximize bandwidth utilization over the remote links. BCRAN is part of the recommended training path for those students seeking the Cisco Certified Network Professional (CCNP), Cisco Certified Design Professional (CCDP) and Cisco Certified Internetwork certifications. Lab fee required.
In the Building Cisco Multilayer Switched Networks (BCMSN) course, network administrators learn how to build campus networks using multi-layer switching technologies over high speed Ethernet. This course includes both routing and switching concepts, covering both Layer 2 and Layer 3 technologies. Students taking this course should already know how to configure routers, switches, VLANs access lists, ISL and STP. BCMSN is part of the recommended training path for those students seeking the Cisco Certified Network Professional (CCNP) and Cisco Certified Internetwork Expert (CCIE) certifications. Lab fee required.
In today's world, organizations must be prepared to defend against threats in cyberspace. Students must be familiar with the basic principles and best practices of cybersecurity to best protect their enterprises. In this course, examples from industry will be explored to give students the principles, the state of the practice and strategies for the future. Students will develop advanced skills by using ATTIVO (or similar) software to simulate real-world cyber attacks.
This course lays the foundation for gaining hands-on skills and significant understanding of packet telephony by presenting the technologies that are common for both Enterprise and Service Provider students. The course is designed to capture the breadth of technical issues surrounding the design of Voice-Over-Data networks and explain a methodology that brings order to approaching problems. The purpose of this class is to discuss the technical issues of designing Voice-Over-Data networks. This course will teach the student a methodology for implementing Voice-Over-Data networks. Upon completion of this course, students will be prepared for the Cisco Voice-Over IP certification exam. Lab fee required.
This course prepares students to setup, configure and manage a Web server. The course includes examining Internet and Intranet solutions and how to access/connect to the internet. It also includes the fundamentals of installing and configuring a Web server. Lab fee required.
This course is intended for students who seek an overall understanding of cloud computing concepts, independent of specific technical roles. It provides a detailed overview of cloud concepts, AWS core services, security, architecture, pricing and support.
This course is designed to provide students the opportunity to apply classroom theory to practical, work-related applications. Seminars may be a component of this course and regular contact with the assigned faculty advisor is required. Students may earn cooperative education credits based on the completion of the required work experience and satisfactory completion of assignments including, but not limited to, seminars and a project. This course may be repeated based upon the student’s academic program.
This course is designed to provide students the opportunity to apply classroom theory to practical, work-related applications. Seminars may be a component of this course and regular contact with the assigned faculty advisor is required. Students may earn cooperative education credits based on the completion of the required work experience and satisfactory completion of assignments including, but not limited to, seminars and a project. This course may be repeated based upon the student’s academic program.
This course is designed to provide students the opportunity to apply classroom theory to practical, work-related applications. Seminars may be a component of this course and regular contact with the assigned faculty advisor is required. Students may earn cooperative education credits based on the completion of the required work experience and satisfactory completion of assignments including, but not limited to, seminars and a project. This course may be repeated based upon the student’s academic program.
This course is a study of the fundamental concepts, structures and organization of operating systems. It includes the study of processes, threads, multi-tasking, concurrency and deadlocks, memory management and file management.
This is an introductory-level course in telephony technology. The telephony environment, tele-management, telephony connectivity and services of telephony will be covered.
This course provides an introduction and overview of security issues for organizational and institutional computing. Physical, software and computing systems security will be discussed. Students will be required to perform introductory security analyses, write code to automate some security preparedness tasks and set up a protection scheme for a simple PC computer.
This course is an introduction to the fundamentals of modeling and simulating continuous-state, time-driven systems. Topics include mathematical equation representation of systems, formulation of state variable equations and numerical integration techniques including Taylor series, families of Runge-Kutta and Adams methods. Application domains considered include physical, biological, electrical systems and real-time simulations.
This course provides topics in issues of security vulnerabilities and protection. Instruction includes hands-on laboratories to apply techniques and tools. Also included are current issues that impact personal and corporate computing.
This course covers how to properly manage IT projects, including technology-specific issues and concerns. The focus of the course is on how IT projects are managed and the tools and techniques that are unique to these projects.
Students will develop on an information systems project working in teams. The project will include analysis, design, development, testing and implementation. Teams will create and present a project proposal, design documentation, test plan and implementation plan to make the information system operational. Note: Students must complete this capstone course with a grade of "C" or higher as a graduation requirement for the IST-BS degree.
Students will develop an information systems project working in teams. The project will include analysis, design, development, testing and implementation. Teams will create and present a project proposal, design documentation, test plan and implementation plan to make the information system operational. Note: Students must complete this capstone course with a grade of “C” or higher as a graduation requirement for the IST-BS degree.
This course prepares the non-technical student to understand how Cybersecurity affects them in their personal and career lives. A basic understanding of cybersecurity terminology provides the foundation to consider the best practices and behaviors related to laptop/desktop systems, mobile devices, accessing free Wifi, utilizing social media, working with personal and work-related email accounts and utilizing the cloud for storage.
This course covers the issues of providing computer security in an enterprise environment. Students will learn the threats to any enterprise and how to properly address these threats with an appropriate response.
This course is designed to provide students the opportunity to apply classroom theory to practical, work-related applications. Seminars may be a component of this course and regular contact with the assigned faculty advisor is required. Students may earn cooperative education credits based on the completion of the required work experience and satisfactory completion of assignments including, but not limited to, seminars and a project. This course may be repeated based upon the student’s academic program.
This course covers the intricacies of providing security in cloud-based computing. Students will learn how to provide a sturdy and stable framework to secure their organization's piece of the cloud through consideration of alternate approaches, such as private vs. public clouds, SAAS vs IAAS and loss of control and trust.
In this course, students will study architectures, protocols and layers in distributed communication networks and develop client-server applications. Topics include the OSI and TCP/IP models, transmission fundamentals, flow and error control, switching and routing, local and wide-area networks, wireless networks and client-server models. Students will extend course topics via programming assignments, library assignments and other requirements.
Students in this course will study wireless and emerging network technologies. They will examine the effects of mobility on network issues such as architecture, security, privacy, file systems, resource discovery, resource management (including energy usage), personal online identities and other areas. Students will acquire hands-on experience with mobile and sensor platforms.
This course covers the issues of providing information security for mobile devices in our ever-changing corporate environment. As each generation of portable electronic devices and storage media becomes smaller, higher in capacity and easier to transport, it is becoming increasingly difficult to protect the data on these devices while still enabling their productive use in the workplace.
In this course students will examine computer network goals, models and designs for both local-area and wide-area networks with specific emphasis on internetworking principles. They will evaluate current network technologies and use these in the planning of a network. Through simulation techniques and graph and queuing theory, students will plan the capacity of a network and analyze its performance.
In this course, students will examine computer network goals, models and designs for both local-area and wide-area networks with specific emphasis on internetworking principles. They will evaluate current network technologies and use these in the planning of a network. Through simulation techniques and graph and queuing theory, students will plan the capacity of a network and analyze its performance.
This course will examine the latest trends and topics in the field of study. Students will learn and work with these new technologies and research the latest trends and topics.
Students learn the concepts, techniques, skills, and tools needed for developing programs in Python. Core topics include types, variables, functions, iteration, conditionals, data structures, classes, objects, modules, and I/O operations. Students get an introductory experience with several development environments, including Jupyter Notebook, as well as selected software development practices, such as test-driven development, debugging, and style. Course projects include real-life applications on enterprise data and document manipulation, web scraping, and data analysis.
This course is an in-depth study of database management systems. The course focuses on the relational database which is the most common model used by businesses. Key topics include an overview of database systems, database design, the relational model, physical design, indexing, transaction management, concurrency management, recovery and tuning. In addition, some non-relational topics will be addressed such as data warehousing, decision support and data mining databases.
Students will study mobile app development concepts using a popular mobile development environment. Topics covered include mobile user interfaces, using the device location, storing data on the device, and reading data from external services. Hands-on exercises with current mobile development software. Term project required.
This course covers the development of distributed multi-tier, web-based applications using the modern programming language(s). The use of a current programming platform will be integral to this process. Key topics include web apps, data validation, static vs dynamic pages, programming models, state, and other relevant topics.
This course applies basic mathematical logic skills and foundations used in computer science and information systems technology. It is designed for students in a major of IT or IST and includes logic rules, tautologies, Boolean algebra, set theory, mathematical induction and other topics of discrete computational analysis.
This course examines the principles, mechanisms and implementation of network security and data protection. The topics presented will help students gain the fundamentals of network security and explain what happens behind the scenes and from the point of view of a computer. Topics include definition and use of password crackers, operating system exploits, what is a Hacker, IP Spoofing, Session Hijacking, Denial of Service attacks (DOS), Buffer Overloads, general concepts of password security, how to create a company-wide security policy, how to perform security audits and how to recover from such attacks. Lab fee required.
This course prepares the student to install, configure, manage, and administer the Windows Client in enterprise environments. The student will learn to install, implement, configure, support, manage and maintain Windows as a modern desktop administrator. Additionally, this course prepares students for the Microsoft Certification Exam: Microsoft 365 Modern Desktop Administrator.
This course will provide a comprehensive overview of the skills, knowledge and tools needed to effectively manage projects with special emphasis on the unique challenges of the computing and information technology industries. The course will cover all nine areas of A Guide to the Project Management Body of Knowledge (PMBOK Guide) established by the Project Management Institute as the industry standard for project management instruction.
In this course students will apply the skills required to evaluate and implement standard deployments. Students will implement, maintain and deliver cloud technologies including network, storage and virtualization technologies to create cloud solutions. Students solutions and ensure security of cloud implementations through the use of cybersecurity best practices. In addition, this course prepares students to pass the CompTIA Cloud+ exam and earn the corresponding certification.
This course examines in great depth the principles, mechanisms and implementation of network security and data protection. Students learn to understand the topics Cipher Block Mode, Key Distribution methodology, Public Key Infrastructure, Kerberos, X.509 Directory Security, IP/Web/Email Security, SLS (Secured Sockets Layer), PGP (Pretty Good Privacy) and Network Security Management from both an internal and external security reference. Basic networking concepts and security principles required. Lab fee required.
This course addresses all of the concepts, terminology and technology covered through Networking with Microsoft Windows Server 2016 and it provides students with the opportunity to get hands-on practice with virtual labs for a complete learning experience. Through this course students can prepare for the 70-741: Networking with Windows Server 2016 exam.
This course addresses all of the concepts, terminology and technology covered in the installation, storage and computing of Microsoft Windows Server 2016, and it provides students with the opportunity to get hands-on practice with virtual labs for a complete learning experience. Through this course students can prepare for the 70-740: Installation, Storage, and Compute with Windows Server 2016 exam.
This course addresses all of the concepts, terminology and technology covered through a deep investigation into the world of Active Directory and its associated technologies. Students will also learn a lot of PowerShell along the way, and it provides students with the opportunity to get hands-on practice with virtual labs for a complete learning experience. Through this course students can prepare for the 70-742: Identity with Windows Server 2016 exam.
In this course, students learn the concepts and capabilities of virtual architecture with a focus on the installation, configuration and management of a VMware virtual infrastructure. This course covers fundamentals of virtual network design and implementation, fundamentals of storage area networks, virtual switching, virtual management and engineering for high availability.
This course focuses on the deployment, security and analysis of the VMware virtual infrastructure, including scripted installations, advanced virtual switching for security, server monitoring for health and resource management, high availability management, system backups and fault analysis.
In this course, students learn the deployment, planning and analysis of the Citrix server, including the designing of terminal services and application planning.
This course is the first of two courses designed to provide students with the knowledge and skills necessary to design, implement and maintain a Windows Server 2012 R2 Infrastructure in an enterprise-scaled, highly virtualized environment. The course provides guidance on developing the ability to plan, configure, manage and implement the Windows Server 2012 R2 services, such as server deployment, server virtualization and network access and infrastructure, identity and access, high availability and the server infrastructure.
This course is the second of two courses designed to enable students to design, implement and maintain a Windows Server 2012 R2 infrastructure in an enterprise-scaled, highly virtualized environment. Students will learn to plan, configure, manage and implement the Windows Server 2012 R2 services, such as server deployment, server virtualization and network access and infrastructure, identity and access, high availability and the server infrastructure.
In this course students learn how to manage advanced storage systems, protocols and architecture including Storage Area Networks (SAN), Network-Attached Storage (NAS), Fiber Channel Networks, Internet Protocol SANs (IPSAN), ISCI and Content-Addressable Storage (CAS).
The goal of this course is to provide students with the knowledge and skills required to implement a database solution with a Microsoft SQL Server client/server database management system. Students will also gain a deeper understanding of the architecture of Microsoft SQL Server. Knowledge of the Windows 9X interface, Windows NT, DOS and hardware is required. Lab fee required.
In this course, topics of current interest are presented in group instruction.
Course topics include the structured design and development of information systems. Quality control, security and testing will be emphasized in the information systems lifecycle.
This course covers management processes and procedures for planning, implementation and operation of information systems with an emphasis on operational management. The course stresses the relationship between the strategic and operational planning of information systems.
This course covers management processes and procedures for planning, implementation and operation of information systems with an emphasis on operational management. The course stresses the relationship between the strategic and operational planning of information systems.

Contact

Janell Robinson
Program Manager
407.708.2298 | Fax: 407.708.2322
Office: V102-P