|
|
-
ISYS 100 - Digital Foundations Credits: Three (3) This course covers commonly used software installed on PCs and laptops, web-based technologies, and applications (apps) used on digital devices. Information literacy and database concepts are also covered in this course.
|
|
-
ISYS 120 - Storyboarding Apps Credits: Three (3) Storyboarding is a visual way of representing an application’s user interface and interactions prior to undergoing any app development activities. Coupled with sketching, mockups, and prototypes, a person building an application can test and refine their app ideas using less time, effort, and money. This course covers two main topics: designing the user interface of mobile applications and introductory application implementation. Students will work on a team to design a prototype mobile application and refine its interface by testing the prototype with different people. Concurrently, students will learn fundamental ideas in writing application software code while implementing small mobile apps.
|
|
-
ISYS 220 - Application Development for iOS Credits: Three (3) This course continues ISYS 120 by diving deeper into the computer programming concepts necessary to develop iOS applications. Students will develop iOS apps in the context of the XCode integrated development environment (IDE) while building experience with the vocabulary and app design patterns supported by XCode and its suite of tools. Students will also begin developing their projects from ISYS 120. By the end of the course project teams will produce a partially completed mobile application. Prerequisite: ISYS-120
|
|
-
ISYS 230 - Advanced Application Development for iOS Credits: Three (3) iOS provides an array of software frameworks (i.e. ARKit) and sensor frameworks (i.e., GEO positioning) that add powerful functionality to applications. Students will examine these frameworks, particularly those related to web services, in the context of applications they independently design and develop. Further, team mobile applications designed in ISYS 120, and partially implemented in ISYS 220, will carry-over to be completed in this course. Prerequisite: ISYS-220
|
|
|
|
-
ISYS 280 - Cyber Security Principles Credits: Three (3) This course will allow students to implement and audit the Critical Security Controls as documented by the Council on Cyber Security. These Critical Security Controls are rapidly becoming accepted as the highest priority list of what must be done and proven at nearly all organizations.
|
|
-
ISYS 307 - Database Design Credits: Three (3) This course covers the business data analysis using spreadsheets and databases. Topics include Excel tables and Pivot tables and the development, administration and management of relational databases. The course uses Microsoft SQLServer and/or MySQL as the primary database management systems with a focus on database design and interaction with other applications. Prerequisite: ISYS-100
|
|
-
ISYS 320 - Introduction to Programming Credits: Three (3) This course is an introduction to designing algorithms and implementing them as programs. Emphasis is placed on analyzing problems, designing solutions that are efficient in both expression and execution, and translating the solutions into well-designed programs. No prior experience with computer programming is expected or required.
Prerequisite: ISYS-100
|
|
-
ISYS 325 - Applied Operating Systems Credits: Three (3) This course will expose students to Windows, Linux, and Unix operating systems. This also includes a review of popular applications on these platforms and scripting with PowerShell.
|
|
-
ISYS 390 - Website Design Credits: Three (3) This course will help students develop websites that are functional and attractive. It will combine an artistic design approach with programming contents to enhance students’ abilities to design, create, develop and publish websites.
Prerequisite: ISYS-100
|
|
-
ISYS 425 - Applied Customer Relationship Management Credits: Three (3) This course prepares students to become administrators for Salesforce, a leading customerrelationship management cloud application. Students will learn to complete administration tasks such as managing users, data, and security along with building reports, dashboards, and workflows. This course covers all material needed for students to take the Salesforce Certified Administrator certification. |
|
-
ISYS 430 - Collaboration and Teaming Credits: Three (3) This course familiarizes students with 21st century collaboration tools utilized in the modern enterprise to include messaging, virtualization, and content management. Students will learn how to effectively lead and work in projects in a virtual team environment. |
|
-
ISYS 470 - Ethical Hacking Credits: Three (3) This course will involve assessing target networks and hosts for security vulnerabilities. Specific penetration testing and ethical hacking methodologies will be discussed and used on network devices, client machines, and mobile devices.
Prerequisite: ISYS-250
|
|
-
ISYS 471 - Advanced Ethical Hacking Credits: Three (3) This course builds on ethical hacking and penetration testing techniques learned in ISYS-470. Specific attention is paid on examining web application security.
Prerequisite: ISYS-470
|
|
-
ISYS 474 - Networks and Security Credits: Three (3) This course will examine both network device security and wireless security issues. For wireless security, specific attention will be paid on WiFi and Bluetooth technologies.
Prerequisite: ISYS-280
|
|
-
ISYS 475 - Mobile Security Credits: Three (3) This course is designed for students to secure their mobile devices by designing, deploying, operating and assessing a well-managed and safe mobile environment. You will learn how to capture and evaluate mobile device network activity, disassemble and analyze mobile code, recognize weaknesses in common mobile applications and conduct full-scale mobile penetration tests.
Prerequisite: ISYS-280
|
|
-
ISYS 480 - Security Information and Event Management Credits: Three (3) This course will examine SIEM capabilities to facilitate the management of security-related events, by assessing log data and correlating information coming from various sources.
Prerequisite: ISYS-280
|
|
-
ISYS 481 - Virtualization and Cloud Security Credits: Three (3) Virtualization technologies require planning with regard to access controls, user permissions and traditional security controls. Virtualized infrastructure is being located in the cloud which will dictate policies and processes that will need to be adapted to work within a cloud structure.
Prerequisite: ISYS-280
|
|
-
ISYS 484 - Digital Forensics Credits: Three (3) This course will focus on digital forensic practices, tools, and exercises for the collection of electronic evidence on network, client, and mobile devices. Specific discussion will also include the introduction process of this electronic evidence in civil and criminal cases. Prerequisite: ISYS-280
|
|
-
ISYS 485 - Incident Response and Malware Analysis Credits: Three (3) This course explores malware analysis tools and techniques that target and infect Windows systems. Knowing the capabilities of malware is critical to an organization’s ability to derive threat intelligence, respond to information security incidents, and establish defenses.
Prerequisite: ISYS-280
|
|
-
ISYS 490 - Cyber Fusion Center Credits: Three (3) In this course, you will be a member of a team that provides real-world cyber security services to local non-profits and schools. You will work as a consultant, helping clients of the CFC improve their cyber security defenses, with an emphasis on performing vulnerability scans and penetration tests and delivering professional results. Cross-listed: ISYS-690 Prerequisite: ISYS-470, ISYS-471
|
|
-
ISYS 491 - Cyber Law, Policy, and Compliance Credits: Three (3) This course will discuss information security and policies in the private sector related to privacy, incident response, computer crime, intellectual property, and pending/recently decided cases.
|
|
-
ISYS 493 - Cooperative Education Credits: One (1) to Four (4) |
|
-
ISYS 495 - Certification Bootcamp Credits: Three (3) This course serves as a boot camp for information security certifications for the cybersecurity professional.
Prerequisite: ISYS-280
|
|
-
ISYS 496 - Independent Study Credits: One (1) to Four (4) |
|
-
ISYS 497 - Special Studies Credits: One (1) to Three (3) |
|
-
ISYS 499 - Internship Credits: One (1) to Four (4) |
|
-
ISYS 600 - Controls for Effective Cyber Defense Credits: Three (3) This course will cover the Controls for Effective Cyber Defense which are a recommended set of actions that will provide specific and actionable ways to deter potential attacks. Discussion will focus on how organizations can use these controls to define the starting point for their defenses, direct their resources on actions with immediate payoff, and focus their attention on additional risk issues that are unique to their business or mission.
|
|
-
ISYS 605 - Database Principles Credits: Three (3) This course examines the design, development and management of relational databases and the integration of these databases with applications across the enterprise. Topics include database tools, basic Structured Query Language, design trade-offs, middleware, database server architectures, web-enabled technologies, security issues and emerging database technologies. Cross-listed: BDAT-605, SWDV-655
|
|
-
ISYS 620 - Agile Systems Analysis and Design Credits: Three (3) Previous system analysis and design methodologies are being replaced with iterative approaches such as agile. This approach leads to faster product deployment at a lower cost with less rework due to missed requirements. This course reviews the development of well written requirements, analysis and design in an agile environment, and enhances student critical thinking skills.
|
|
-
ISYS 631 - Web Page Design Credits: Three (3) This course will be primarily oriented toward E- commerce,
examining ways to set up and manage an intranet, extranet or the
use of the Internet. A variety of tools will be examined for the
creation and publication of Web pages. |
|
-
ISYS 650 - Information Technology Management Credits: Three (3) This course presents the concepts needed to effectively manage information technology resources. This course specifically focuses on the role a CIO plays, the planning, scheduling and risk considerations, along with the strategic role that information technology systems play in an organization.
|
|
|
|
-
ISYS 670 - Pen Testing Credits: Three (3) This course will involve assessing target networks and hosts for security vulnerabilities. Specific penetration testing and ethical hacking methodologies will be discussed and used on network devices, client machines, and mobile devices.
Prerequisite: ISYS-600
|
|
-
ISYS 671 - Advanced Pen Testing Credits: Three (3) This course builds on ethical hacking and penetration testing techniques learned in ISYS-670. Specific attention is paid on examining web application security.
Prerequisite: ISYS-670
|
|
-
ISYS 674 - Network Security Credits: Three (3) This course is intended as an overview of network security principles. The material covered will include various models of encryption - symmetric and asymmetric, pseudo-randomness, digital signatures, and network security.
Prerequisite: ISYS-600
|
|
-
ISYS 675 - Mobile Device Hacking and Forensics Credits: Three (3) This course will familiarize students with mobile devices and technology used by industry. Students will identify and analyze data that can be retrieved from mobile devices, such as cell phones, tablets, smart phones and GPS devices.
Prerequisite: ISYS-600
|
|
-
ISYS 680 - Security Log Management and Analysis Credits: Three (3) This course allows students to interact with security information and event management tools (SIEM) to analyze data and construct queries that allow for data analysis and event triage.
Prerequisite: ISYS-600
|
|
-
ISYS 681 - Designing and Implementing Cloud Security Credits: Three (3) This course covers security issues as they apply to cloud technology and network-based computing systems such as clusters, datacenters, peer to peer, social networking and the Internet of things.
Prerequisite: ISYS-600
|
|
-
ISYS 684 - Forensic Examination And Analysis Credits: Three (3) This course provides students with an overview of digital forensics and analysis to include acquiring, authenticating and analyzing digital evidence. Technical and managerial topics will be explored, providing students with both theoretical and practical hands-on experience using forensic equipment and software.
Prerequisite: ISYS-600
|
|
-
ISYS 685 - Incident Handling and Breaches Credits: Three (3) This course examines the industry standard Computer Emergency Response Team (CERT) processes, including incident response, vulnerability assessment, incident investigation and malicious code analysis.
Prerequisite: ISYS-600
|
|
-
ISYS 690 - Cyber Fusion Center Credits: Three (3) In this course, you will be a senior member of a team that provides real-world cyber security services to local non-profits and schools. You will work as a consultant, helping clients of the CFC improve their cyber security defenses, with an emphasis on performing vulnerability scans and penetration tests and delivering professional results. Students at the graduate level will be expected to take a leadership role in managing client engagements and drafting deliverables. Cross-listed: ISYS-490 Prerequisite: ISYS-670, ISYS-671
|
|
-
ISYS 691 - Legal Aspects of Privacy and Compliance Credits: Three (3) This course explores fundamental questions the digital age raises regarding how existing legal rules/guidelines should be applied to new technologies. This course explores various legal issues that arise in cyberspace, including jurisdiction, regulation of online speech, issues of privacy and security, and intellectual property protection.
Prerequisite: ISYS-600
|
|
-
ISYS 696 - Independent Study Credits: One (1) to Three (3) |
|
-
ISYS 697 - Special Studies Credits: One (1) to Four (4) |
|
-
ISYS 699 - Internship Credits: One Half (0.5) |
|