2020-2021 Academic Catalog 
    
    May 18, 2024  
2020-2021 Academic Catalog [Archived Catalog]

Courses


Undergraduate Prerequisites Course Numbering
A “C-” or higher is required in all prerequisite courses 100-299 - Lower division undergraduate
  300-499 - Upper division undergraduate
  500-699 - Graduate
Search Tip 700-799 - Doctoral
Use the asterisk (*) key as a wild card.
Example: Select “Prefix” NURS and enter 6* in the “Code or Number” field to return all Nursing courses at the 600 level.

 

 
  
  • ISYS 100 - Digital Foundations


    Credits: Three (3)
    This course covers commonly used software installed on PCs and laptops, web-based technologies, and applications (apps) used on digital devices. Information literacy and database concepts are also covered in this course.


  
  • ISYS 120 - Storyboarding Apps


    Credits: Three (3)
    Storyboarding is a visual way of representing an application’s user interface and interactions prior to undergoing any app development activities. Coupled with sketching, mockups, and prototypes, a person building an application can test and refine their app ideas using less time, effort, and money. This course covers two main topics: designing the user interface of mobile applications and introductory application implementation. Students will work on a team to design a prototype mobile application and refine its interface by testing the prototype with different people. Concurrently, students will learn fundamental ideas in writing application software code while implementing small mobile apps.


  
  • ISYS 220 - Application Development for iOS


    Credits: Three (3)
    This course continues ISYS 120 by diving deeper into the computer programming concepts necessary to develop iOS applications. Students will develop iOS apps in the context of the XCode integrated development environment (IDE) while building experience with the vocabulary and app design patterns supported by XCode and its suite of tools. Students will also begin developing their projects from ISYS 120. By the end of the course project teams will produce a partially completed mobile application.
    Prerequisite: ISYS-120
  
  • ISYS 230 - Advanced Application Development for iOS


    Credits: Three (3)
    iOS provides an array of software frameworks (i.e. ARKit) and sensor frameworks (i.e., GEO positioning) that add powerful functionality to applications. Students will examine these frameworks, particularly those related to web services, in the context of applications they independently design and develop. Further, team mobile applications designed in ISYS 120, and partially implemented in ISYS 220, will carry-over to be completed in this course.
    Prerequisite: ISYS-220
  
  • ISYS 250 - Information Technology Concepts & Applications


    Credits: Three (3)
    This course covers analysis and documentation of business processes and the design and use of information systems to automate these processes on the desktop, web and mobile platforms.


    Note: This course is recommended for students considering a minor or major in Information Systems or as an elective course for those students who successfully completed the ISYS 100 competency exam.

    Prerequisite: ISYS-100

  
  • ISYS 280 - Cyber Security Principles


    Credits: Three (3)
    This course will allow students to implement and audit the Critical Security Controls as documented by the Council on Cyber Security. These Critical Security Controls are rapidly becoming accepted as the highest priority list of what must be done and proven at nearly all organizations.


  
  • ISYS 307 - Database Design


    Credits: Three (3)
    This course covers the business data analysis using spreadsheets and databases. Topics include Excel tables and Pivot tables and the development, administration and management of relational databases. The course uses Microsoft SQLServer and/or MySQL as the primary database management systems with a focus on database design and interaction with other applications.
    Prerequisite: ISYS-100
  
  • ISYS 309 - Geospatial Analytics


    Credits: Three (3)
    This course explores how to better understand and describe the world through geospatial data. Topics include a history of impactful cartographic data visualizations, how to utilize publicly available data sources, and how to form insights and construct a narrative with geographic data. The technical focus of this course is ArcGIS, with a brief introduction to alternative platforms such as Tableau, Power BI and Microsoft SandDance.
    Prerequisite: ISYS-100
  
  • ISYS 320 - Introduction to Programming


    Credits: Three (3)
    This course is an introduction to designing algorithms and implementing them as programs. Emphasis is placed on analyzing problems, designing solutions that are efficient in both expression and execution, and translating the solutions into well-designed programs. No prior experience with computer programming is expected or required.


    Prerequisite: ISYS-100

  
  • ISYS 325 - Applied Operating Systems


    Credits: Three (3)
    This course will expose students to Windows, Linux, and Unix operating systems. This also includes a review of popular applications on these platforms and scripting with PowerShell.


  
  • ISYS 390 - Website Design


    Credits: Three (3)
    This course will help students develop websites that are functional and attractive. It will combine an artistic design approach with programming contents to enhance students’ abilities to design, create, develop and publish websites.


    Prerequisite: ISYS-100

  
  • ISYS 425 - Applied Customer Relationship Management


    Credits: Three (3)
    This course prepares students to become administrators for Salesforce, a leading customerrelationship management cloud application. Students will learn to complete administration tasks such as managing users, data, and security along with building reports, dashboards, and workflows. This course covers all material needed for students to take the Salesforce Certified Administrator certification.
  
  • ISYS 430 - Collaboration and Teaming


    Credits: Three (3)
    This course familiarizes students with 21st century collaboration tools utilized in the modern enterprise to include messaging, virtualization, and content management. Students will learn how to effectively lead and work in projects in a virtual team environment.
  
  • ISYS 470 - Ethical Hacking


    Credits: Three (3)
    This course will involve assessing target networks and hosts for security vulnerabilities. Specific penetration testing and ethical hacking methodologies will be discussed and used on network devices, client machines, and mobile devices.


    Prerequisite: ISYS-250

  
  • ISYS 471 - Advanced Ethical Hacking


    Credits: Three (3)
    This course builds on ethical hacking and penetration testing techniques learned in ISYS-470. Specific attention is paid on examining web application security.


    Prerequisite: ISYS-470

  
  • ISYS 474 - Networks and Security


    Credits: Three (3)
    This course will examine both network device security and wireless security issues. For wireless security, specific attention will be paid on WiFi and Bluetooth technologies.


    Prerequisite: ISYS-280

  
  • ISYS 475 - Mobile Security


    Credits: Three (3)
    This course is designed for students to secure their mobile devices by designing, deploying, operating and assessing a well-managed and safe mobile environment. You will learn how to capture and evaluate mobile device network activity, disassemble and analyze mobile code, recognize weaknesses in common mobile applications and conduct full-scale mobile penetration tests.


    Prerequisite: ISYS-280

  
  • ISYS 480 - Security Information and Event Management


    Credits: Three (3)
    This course will examine SIEM capabilities to facilitate the management of security-related events, by assessing log data and correlating information coming from various sources.


    Prerequisite: ISYS-280

  
  • ISYS 481 - Virtualization and Cloud Security


    Credits: Three (3)
    Virtualization technologies require planning with regard to access controls, user permissions and traditional security controls. Virtualized infrastructure is being located in the cloud which will dictate policies and processes that will need to be adapted to work within a cloud structure.


    Prerequisite: ISYS-280

  
  • ISYS 484 - Digital Forensics


    Credits: Three (3)
    This course will focus on digital forensic practices, tools, and exercises for the collection of electronic evidence on network, client, and mobile devices. Specific discussion will also include the introduction process of this electronic evidence in civil and criminal cases.
    Prerequisite: ISYS-280
  
  • ISYS 485 - Incident Response and Malware Analysis


    Credits: Three (3)
    This course explores malware analysis tools and techniques that target and infect Windows systems. Knowing the capabilities of malware is critical to an organization’s ability to derive threat intelligence, respond to information security incidents, and establish defenses.


    Prerequisite: ISYS-280

  
  • ISYS 490 - Cyber Fusion Center


    Credits: Three (3)
    In this course, you will be a member of a team that provides real-world cyber security services to local non-profits and schools. You will work as a consultant, helping clients of the CFC improve their cyber security defenses, with an emphasis on performing vulnerability scans and penetration tests and delivering professional results.
    Cross-listed: ISYS-690
    Prerequisite: ISYS-470, ISYS-471
  
  • ISYS 491 - Cyber Law, Policy, and Compliance


    Credits: Three (3)
    This course will discuss information security and policies in the private sector related to privacy, incident response, computer crime, intellectual property, and pending/recently decided cases.


  
  • ISYS 493 - Cooperative Education


    Credits: One (1) to Four (4)
  
  • ISYS 495 - Certification Bootcamp


    Credits: Three (3)
    This course serves as a boot camp for information security certifications for the cybersecurity professional.


    Prerequisite: ISYS-280

  
  • ISYS 496 - Independent Study


    Credits: One (1) to Four (4)
  
  • ISYS 497 - Special Studies


    Credits: One (1) to Three (3)
  
  • ISYS 499 - Internship


    Credits: One (1) to Four (4)
  
  • ISYS 600 - Controls for Effective Cyber Defense


    Credits: Three (3)
    This course will cover the Controls for Effective Cyber Defense which are a recommended set of actions that will provide specific and actionable ways to deter potential attacks. Discussion will focus on how organizations can use these controls to define the starting point for their defenses, direct their resources on actions with immediate payoff, and focus their attention on additional risk issues that are unique to their business or mission.


  
  • ISYS 605 - Database Principles


    Credits: Three (3)
    This course examines the design, development and management of relational databases and the integration of these databases with applications across the enterprise. Topics include database tools, basic Structured Query Language, design trade-offs, middleware, database server architectures, web-enabled technologies, security issues and emerging database technologies.
    Cross-listed: BDAT-605, SWDV-655
  
  • ISYS 620 - Agile Systems Analysis and Design


    Credits: Three (3)
    Previous system analysis and design methodologies are being replaced with iterative approaches such as agile. This approach leads to faster product deployment at a lower cost with less rework due to missed requirements. This course reviews the development of well written requirements, analysis and design in an agile environment, and enhances student critical thinking skills.
    Cross-listed: SWDV-650
  
  • ISYS 631 - Web Page Design


    Credits: Three (3)
    This course will be primarily oriented toward E- commerce, examining ways to set up and manage an intranet, extranet or the use of the Internet. A variety of tools will be examined for the creation and publication of Web pages.
  
  • ISYS 650 - Information Technology Management


    Credits: Three (3)
    This course presents the concepts needed to effectively manage information technology resources. This course specifically focuses on the role a CIO plays, the planning, scheduling and risk considerations, along with the strategic role that information technology systems play in an organization.


  
  • ISYS 660 - Data Analytics 1


    Credits: Three (3)
    This course serves as an introduction to data analytics. Data analytics is generally defined as the use of data, quantitative analysis, and modeling to drive business decisions. An overview of different analytics techniques (descriptive, predictive and prescriptive) with a focus on descriptive analytics technique to illustrate business decision-making situations is discussed.
    Cross-listed: ACCT-660, BDAT-600
  
  • ISYS 670 - Ethical Hacking


    Credits: Three (3)
    This hands-on course applies a penetration testing framework to ethical hacking. Emphasis is placed on penetrating testing methodologies for various types of penetration tests, including Reconnaissance, Social Engineering, and Network Penetration Testing. This course in conjunction with ISYS 671 prepares you for the EC-Council CEH exam.
    Prerequisite: ISYS-600
  
  • ISYS 671 - Ethical Hacking II


    Credits: Three (3)
    This hands-on course builds on ethical hacking and penetration techniques learned in ISYS-670. With emphasis on SQL injection, Wireless, Mobile, Web server and Web Application hacking. This course and prereq ISYS 670 will prepare you for the Certified Ethical Hacker CEH exam.
    Prerequisite: ISYS-670
  
  • ISYS 672 - Auditing of Cybersecurity


    Credits: Three (3)
    This course will cover the principles of cybersecurity auditing which include a recommended set of examination methodologies to provide specific methods and practices to audit a virtual enterprise. Discussion will focus on how organizations and individuals can use these practices to define responsible auditing practices for proper cyber defense, evaluation and response that are inherent in today’s ever changing technology landscape. This course will provide the student with skills necessary to take the CISA Industry Certification Examination.
    Prerequisite: ISYS 600, ISYS 670, and one of the following: ISYS 684 or 685 or 686
  
  • ISYS 673 - Data Security and Analysis


    Credits: Three (3)
    This course will cover data security and analysis. Focusing on the tools, process and analysis practices that can be used to monitor and protect the enterprise. Discussion will focus on how organizations and individuals can leverage analysis practices to develop and implement responsible actions for proper defense directing their resources effectively to mitigate potential cyber risk.
    Prerequisite: ISYS 600, ISYS 670, and one of the following: ISYS 684 or 685 or 686
  
  • ISYS 674 - Network Security


    Credits: Three (3)
    This course is intended as an overview of network security principles. The material covered will include various models of encryption - symmetric and asymmetric, pseudo-randomness, digital signatures, and network security.


    Prerequisite: ISYS-600

  
  • ISYS 675 - Mobile Device Hacking and Forensics


    Credits: Three (3)
    This course will familiarize students with mobile devices and technology used by industry. Students will identify and analyze data that can be retrieved from mobile devices, such as cell phones, tablets, smart phones and GPS devices.


    Prerequisite: ISYS-600

  
  • ISYS 676 - Risk Metrics and Analysis


    Credits: Three (3)
    This course will cover cybersecurity risk metrics and analysis. Focusing on the tools, process and analysis practices that can be used to monitor and protect the enterprise. Discussion will focus on how organizations and individuals can leverage risk metrics to develop and implement responsible actions for proper defense directing their resources effectively to mitigate potential cyber risk.
    Prerequisite: ISYS 600, ISYS 670, and one of the following: ISYS 684 or 685 or 686
  
  • ISYS 677 - Cybersecurity Governance


    Credits: Three (3)
    This course will cover the facets of cybersecurity governance. Emphasis on developing and implementing effective policies for mitigating cybersecurity risk. Discussion will focus on how organizations and individuals can responsibly implement responsible governance policies to effectively manage information security risk. The course also covers many compliance programs under cybersecurity and privacy mandates such as GLBA, HIPAA, FISMA, and PCI-DSS.
    Prerequisite: ISYS 600, ISYS 670, and one of the following: ISYS 684 or 685 or 686
  
  • ISYS 680 - Security Log Management and Analysis


    Credits: Three (3)
    This course allows students to interact with security information and event management tools (SIEM) to analyze data and construct queries that allow for data analysis and event triage.


    Prerequisite: ISYS-600

  
  • ISYS 681 - Cloud Migration and Security


    Credits: Three (3)
    This course covers security issues as they apply to cloud technology and network-based computing systems such as clusters, datacenters, peer to peer, social networking and the Internet of things.
    Prerequisite: ISYS-600
  
  • ISYS 684 - Forensic Examination And Analysis


    Credits: Three (3)
    This course provides students with an overview of digital forensics and analysis to include acquiring, authenticating and analyzing digital evidence. Technical and managerial topics will be explored, providing students with both theoretical and practical hands-on experience using forensic equipment and software.


    Prerequisite: ISYS-600

  
  • ISYS 685 - Incident Handling and Breaches


    Credits: Three (3)
    This course examines the industry standard Computer Emergency Response Team (CERT) processes, including incident response, vulnerability assessment, incident investigation and malicious code analysis.


    Prerequisite: ISYS-600

  
  • ISYS 686 - Cybersecurity Incident Response and Examination


    Credits: Three (3)
    This course will cover the principles of cybersecurity incident response and forensics which include a recommended set of forensic principles to provide specific methods to identify and the management of security related events. Discussion will focus on how to leverage practices used by industry to identify and analyze forensic data received from devices and the responsible actions to manage a security incident. Students will learn proper cyber defense, evaluation and response methods that are inherent in today’s ever changing technology landscape.
    Prerequisite: ISYS-600
  
  • ISYS 687 - Management of Information Security


    Credits: Three (3)
    This course will cover the management of information security. Emphasis on managing security-related risk, as well as the process of developing, implementing, and maintaining organizational policies, standards, procedures, and guidelines. Discussion will focus on how organizations and individuals can responsibly identify and evaluate information assets, threats, and vulnerabilities to effectively manage information security risk.
    Prerequisite: ISYS 600, ISYS 670, and one of the following: ISYS 684 or 685 or 686
  
  • ISYS 690 - Security Operations Management


    Credits: Three (3)
    This course will cover cybersecurity operations management. Emphasis on developing and implementing responsible information security operations, access control, risk management, systems and application life cycle management, physical security, business continuity planning, telecommunications security, disaster recovery, software piracy, investigations, ethics and more. Discussion will focus on how organizations and individuals can responsibly implement responsible management practices to effectively manage information security risk.
    Prerequisite: ISYS 600, ISYS 670, and one of the following: ISYS 684 or 685 or 686
  
  • ISYS 691 - Legal Aspects of Privacy and Compliance


    Credits: Three (3)
    This course explores the laws and policies governments, organizations, and individuals leverage to protect the confidentiality, integrity, and availability of information and technology. This course explores various legal issues that arise in cyberspace, including contracting online, common and tort law, cybercrime, jurisdiction, security and privacy issues and practices, and intellectual property protection. It delves into industry-specific legal, privacy, and ethical considerations in the areas of healthcare, financial reporting, government information, and protecting children online. Lastly, the course provides students with tools for ethical-decision making in a security and privacy context.
    Prerequisite: ISYS-600
  
  • ISYS 692 - Information Security and Research


    Credits: Three (3)
    This course will allow a student to independently explore a cybersecurity topic of interest under the close supervision of a faculty member. The course may include directed readings, applied work, assisting a faculty member with a research project, carrying out an independent research project, or other activities deemed appropriate.
    Prerequisite: ISYS 600, ISYS 670, and one of the following: ISYS 684 or 685 or 686
  
  • ISYS 693 - Practical Applications of Cybersecurity – Partnerships


    Credits: Three (3)
    This course will focus on developing and completing a practical business cybersecurity project developed in collaboration with industry. This will allow the student to explore and develop a project of interest under the guidance of an industry partner. The course may include applied work, developing a research project, or other activities deemed appropriate to allow the student to develop practical business expertise in partnership with an industry sponsor.
    Prerequisite: ISYS 600, ISYS 670, and one of the following: ISYS 684 or 685 or 686
  
  • ISYS 694 - Domains of Cybersecurity


    Credits: Three (3)
    This course will cover the domains of cybersecurity which include a recommended set of methodologies to provide specific and actionable practices to protect the virtual enterprise. Discussion will focus on how organizations and individuals can identify and implement responsible steps to define methods for proper defense, directing their resources effectively and focusing attention on cyber risk issues that are unique to their business or mission. This course will provide the student with skills necessary to take the CISSP Industry Certification Examination.
    Prerequisite: ISYS 600, ISYS 670, and one of the following: ISYS 684 or 685 or 686
  
  • ISYS 695 - Emerging Topics in Cybersecurity


    Credits: Three (3)
    This course will cover emerging cybersecurity topics including current trends, landscapes, vulnerabilities and tools that can be used to monitor and protect the enterprise. Discussion will focus on how organizations and individuals can leverage the practices to define responsible methods for proper defense and direct their resources effectively to focus attention on cyber risk.
    Prerequisite: ISYS 600, ISYS 670, and one of the following: ISYS 684 or 685 or 686
  
  • ISYS 696 - Independent Study


    Credits: One (1) to Three (3)
  
  • ISYS 697 - Special Studies


    Credits: One (1) to Four (4)
  
  • ISYS 699 - Internship


    Credits: One Half (0.5)