Information Systems (ISYS)
ISYS 5310 Org & Mgt of Bus Databases 3 SCH (3-0)
A study of important issues in the design and implementation of databases for business enterprises with emphasis on the relational model. Study of non-relational database models such as object-oriented, hierarchical and network. Hands-on experience will be provided using a current rational database product. Prerequisite: ISYS 5309 or permission of the instructor.
Fee: $375.00
ISYS 5347 Infor Systems & Bus Analytics 3 SCH (3-0)
This course provides an understanding of issues related to management information systems; the concepts and applications of methods and models to support the managerial decision-making process. Focus is on the understanding of knowledge management, data warehousing, data mining, predictive and prescriptive analytics.
ISYS 5351 Databases & Data Warehousing 3 SCH (3-0)
Database design with emphasis on the Relational Database Model. Concepts on data warehousing and on-line analysis processing (OLAP) and the differences between operational database systems and data warehouses are covered. Prerequisite: ISYS 5347.
ISYS 5352 Exp. Data Analysis & Visual 3 SCH (3-0)
Explore data and data sources. Find, extract, understand, process, aggregate, and summarize data for further analysis and model definition utilizing established procedures and methods, including tabular and visualization reports. Prerequisite: ISYS 5347.
ISYS 5353 Predictive Analytics 3 SCH (3-0)
Explore data mining techniques for efficient data retrieval and process. Learn to identify and discern the right predictive analytic techniques for diverse business problems. Students will be exposed to analytics software. Prerequisite: ISYS 5347.
ISYS 5360 Fundamentals of Cyber Security 3 SCH (3-0)
This course aims to provide a managerial perspective of contemporary issues in computer and network security, including an assessment of state-of-the-art approaches used to address security problems and their integration with organizational/informational systems audit, computer information systems, and management practices. Upon completing the course, students should have a practical understanding of how to design, implement, and maintain a network security plan that successfully defends a network from malicious or accidental intrusion.
ISYS 5361 Legal Issues in Cyber Security 3 SCH (3-0)
This course aims to provide a managerial perspective of contemporary issues in computer and network security, including an assessment of state-of-the-art approaches used to address security problems and their integration with organizational/informational systems audit, computer information systems, and management practices. Upon completing the course, students should have a practical understanding of how to design, implement, and maintain a network security plan that successfully defends a network from malicious or accidental intrusion.
ISYS 5362 Cyber Security Policy & Impl 3 SCH (3-0)
This course aims to provide an end to end understanding of Information Security policies and frameworks. Specifically, this course will focus on the management of, need, and challenges associated with the Information Security policies in an organization environment. In addition, the student will investigate implementation issues associated with policy and methods that can be utilized to overcome barriers to implementation. Effective policy design and maintenance will be investigated along with various frameworks that can be used by an organization to assist with Risk Management and Compliance. Finally, a review of U.S. compliance laws and associated Information Security requirements will be conducted.
ISYS 5363 Aud & Compl in Cyber Domain 3 SCH (3-0)
This course aims to provide a complete understanding of Cyber Security compliance and auditing. Specifically, this course will focus on understanding the basic concepts of the Compliance and the Auditing process to include providing the student an understanding of the scope of a compliance audit. In addition, this course will provide the student an understanding of various tools, techniques, and frameworks that can aid in the auditing process. The student will gain an appreciation of end to end process of an audit to include, preparation, conducting, and completion of an audit report. Finally, the student will look at the various domains that can be audited within the organization.