Course Category: Information Technology
See description for IT 310
The course introduces the student to machine to machine communication architectures for the modern computer systems. The student will be able to select, design, deploy, integrate, and administer network and communication infrastructures in an organization. In this course the student will develop a deep understanding of how networks work and how to work with them. Topics include LANs, WANs, service providers, packets, hubs, routers, switches, internet protocols, network administration and security. The course also covers the mathematical relationship of networking with trees, graphs, signal and network analysis.
This course is an introduction to web technologies and systems integration. The course covers basic web design, configuration, management and security. The course also covers various P2M, M2P,and P2P, M2M communication standards and protocols and various frameworks and architectures used in web systems and system integration. Topics included are hypertext, self-descriptive text, web page design and development, web navigation systems, digital media,web services and vulnerabilities of web systems.
See description for IT 320
This course covers the basic knowledge needed to design current and future networks capable of providing ubiquitous high-quality support in heterogeneous environments. This course also provides an in-depth view of networking issues and solutions which strengthens the student’s understanding of fundamental concepts of network communication. Topics include the requirements and design of networks,congestion control, routing, scheduling, and overlay and wireless architectures.
This course is an introduction to the steps and techniques required for effective response to cybersecurity incidents. The course covers how to detect an incident,the actions that must be taken to mitigate harmful effects of the incident, how to identify of the vulnerabilities that led to incident, and the actions required to prevent similar occurrences in the future. The course also covers the strategies for developing appropriate security policies and procedures, as well as techniques for preserving evidence.
This course is an introduction to the application of networking concepts related to the management of computer networks. The course covers the general challenges faced in the management of modern data and telecommunications networks with an emphasis on data network management. The OSI and TMN compliant Network Management Packageis used as a real-world reference. Real-world examples are utilized to illustrate lecture topics and a case study/team project is researched and presented.
This is an advanced web programing course focusing on multi-tiered design on Internet applications, transactions, creating components, and Web services using the .NET framework. Client-side and server-side facilities are covered.
IT 320, Or consent of instructor
IT 320, Or consent of instructor
This course covers emerging online technologies and trends and their influence on the electronic commerce marketplace. While the focus of this course is electronic commerce information technology, e-commerce web site planning, online store implementation, installation, administration, and security, students will be introduced to search engine prioritization concepts, web site statistics collection and analysis, online auctions, and various legal and ethical issues.
This course is an introduction to Information Assurance and Security (IAS). The course covers the knowledge required for information assurance and security and how to apply this knowledge to manage the threats against computing, communication, and organizational systems. The course also covers the frameworks to be security aware, operational issues, policies and procedures, attacks and defense mechanisms, risk analysis, and incident recovery.
This course is an introduction to the knowledge and implementation of attacks on systems for system security and testing purposes. The course goes into the hacker classification, the culture of hacking and cracking, social and technical attacks, and the defenses employed to counter these threats.