Courses in my major:
Connectivity with Lab
This course covers fundamentals of data communication and computer networking, including the Open Systems Interconnection (OSI) model. Network architecture and configurations such as local area networks (LANs) and wide area networks (WANs) are addressed. Grade - B
Principles of Information Systems Security
This course provides a broad overview of information systems security in organizations. Topics include security concepts and mechanisms; mandatory and discretionary controls; basic cryptography and its applications; intrusion detection and prevention; information systems assurance; and anonymity and privacy. Various types of controls used in information systems, as well as security issues surrounding the computer and computer-generated data, are also addressed. Grade - A
Business Application Programming with Lab
Building on analysis, programming and database skills developed in previous courses, this course introduces fundamental principles and concepts of developing programs that support typical business processing activities and needs such as transaction processing and report generation. Students develop business-oriented programs that deal with error handling, data validation and file handling. Java is the primary programming language used. Grade - A
Web Interface Design with Lab
This course introduces Web design and basic programming techniques for developing effective and useful Web sites. Coursework emphasizes Web site structure and navigational models, practical and legal usability considerations, and performance factors related to using various types of media and tools such as hypertext markup language (HTML), cascading style sheets (CSS), dynamic HTML (DHTML) and scripting. Dreamweaver and Flash are the primary software tools used. Grade - A
Object-Oriented Analysis and Design
Building on the foundation established in CIS-321, students explore techniques, tools and methods used in the object-oriented approach to developing applications. Students learn how to model and design system requirements using tools such as Unified Modeling Language (UML), use cases and scenarios, class diagrams and sequence diagrams. Grade - A
Structured Analysis and Design
This course introduces the systems analysis and design process using information systems methodologies and techniques to analyze business activities and solve problems. Students learn to identify, define and document business problems and then develop information system models to solve them. Grade - B
This course focuses on preparing for, reacting to and recovering from events that threaten the security of information and information resources, or that threaten to disrupt critical business functions. Students examine various levels of threats to an organization[Char#25]s information assets and critical business functions, as well as develop policies, procedures and plans to address them. Technology specific to thwarting disruption and to supporting recovery is also covered. Grade - A
Data Privacy and Security
This course focuses on legal, ethical and security issues involving data and information assets organizations must address to ensure operational continuity as well as compliance with standards, policies and laws. Students examine various levels of threats to an organization[Char#25]s data and develop standards, policies, procedures and plans to combat them. Security technology specific to safeguarding data and information assets is also covered.
This course examines issues involved in protecting Web-based applications from external threats while safeguarding customer privacy and accessibility. Students examine external threats to an organization[Char#25]s systems and develop strategies that support systems and business goals.
Information Systems Security Planning and Audit
This course provides an in-depth look at risk factor analysis that must be performed in order to design a flexible and comprehensive security plan. Topics include assessing threats, developing countermeasures, protecting information, and security designs processes. Auditing practices used to verify compliance with policies and procedures, as well as for building a case for presentation in private and public settings, are also covered.