Computing Technology & Information Systems (CTIS)
Introduces students to the behavior of the fundamental building blocks of modern electronic devices and the underlying scientific principles that make these devices work. Topics will be derived from analog and digital electronics and include resistance, capacitance, diodes, signal filtering, positive and negative feedback, operational amplifiers, Boolean logic, logic gates, and digital to analog conversion. This course is designed for the general student population (but not physics majors and physics minors) who are interested in exploring the fundamentals of electronics.
Exploration of computer programming with emphasis on scientific, educational and entertainment applications. Topics include programming fundamentals, user interaction, graphics display, data processing, problem solving and artificial intelligence. Prior programming experience not required.
The percentage of crimes which utilize computers and networks has been increasing over the past 20 years. This course introduces students to the collection, preservation, presentation and preparation of computer- and network-based evidence for the purpose of corporate investigation and criminal law enforcement, activities that define the central roles of computer and network forensic practitioners. Students will be introduced to cybercrime and the tools available to them to be able to appropriately investigate cybercrime. Network intrusions, foot printing, computer numbering, financial crimes and malware are among the topics to be discussed.
Introduction to the management of computing and information resources in organizations. Course topics include computer hardware and software, telecommunications, database management, electronic commerce and business intelligence. Students explore information technology and business problems and use spreadsheet and database applications to create effective solutions.
Introduction to basic principles and elements of graphic design, form/ symbol development, color theory and typography. Provides practical experience in essential software processes and procedures including Adobe Illustrator, Photoshop and InDesign. Create digital designs while engaging in critiques and group discussions. Fulfills arts requirement (1998). Arts/humanities requirement (2019).
A continuation of the study of program development begun in CTIS 210. The main areas of study are advanced programming features such as recursion and dynamic memory; a further investigation into object-oriented principles such as object-oriented design, inheritance and polymorphism; an introduction to simple data structures ? lists, queues, stacks and binary trees; and an introduction to algorithm analysis using searching and sorting algorithms.
This course focuses on ethical issues faced by security professionals, including those related to networks, intellectual property, privacy, security, reliability, liability, data collection and storage, and relevant current laws. This seminar examines the ethics of cyber security technologies and relevant current laws, in terms of the often-competing priorities of governments, corporations and citizens. This seminar also covers the professionalism for cyber and network security administrators such as job searching, interviewing skills and resume building. These topics are covered through readings, video/ multimedia, writings, discussions and presentations.
Evaluation of computer operating systems and their basic organization. Includes concurrent programming and synchronization techniques such as locks, barriers, semaphores and monitors. Addresses message passing, memory management, interrupts and file systems. Students will examine the coding used to implement the algorithms and learn to modify these structures to satisfy the specific requirements of a project.
In-depth exposure to the terms, concepts and configurations that have historically been, are currently being, and may in the future be used to accomplish inter-computer communication. Lab exercises focus on the installation of operating systems and configuration of their networking components, design and construction of examples of computer networks, and experimentation with performance and configuration of those networks.
Theory and application of human-computer interaction, information architecture, usability and markup languages. Examination of communication and information transfer from the perspectives of both the provider and the consumer. Role of test, video, interactivity and other methods of providing information in computer and network-based settings.
Introduction to theory and practice of enterprise-level relational database systems. Using a database engine, students will learn the principles of entity relationship modeling and normalization. By modifying a database in a project, students will learn how to create queries using SQL, triggers, stored procedures, cursors, forms and reports.
This course will provide a prospective systems analyst or system architect the techniques used in the analysis, design and implementation of computer-based information systems. The course will enable students to study user requirements, create requests for proposals, prepare project plans, address systems project scope, conduct feasibility studies by providing an understanding of the systems study, project evaluation, planning and systems design phases of the system life cycle.
The objective of this course is to build on the fundamental concepts of cyber and network security. Students will experience multiple cyber security technologies, processes, and procedures; learn how to analyze the threats, vulnerabilities and risks present in these environments; and develop appropriate strategies to mitigate potential cyber security problems. Topics include security risk assessment and management; policies, procedures and guidelines for information security plans; IT security controls and technologies, security standards, compliance, and cyber laws; IT auditing; cyber insurance strategies; and emerging trends.
This course introduces students to the techniques and tools of computer forensics investigations specifically designed for analyzing the Windows operating system. Students will receive step-by-step explanations on how to use a wide variety of forensic tools. Topics include registry analysis, file analysis, internet artifact analysis, volatile evidence collection, live incident response and metadata.
Project management in the context of the skills and knowledge developed in CTIS courses. Team approach and solution-oriented.
This course will cover advanced network and cyber security issues and solutions. It takes an operational approach to implementing and managing effective cyber security policies in complex networked enterprises. Topics include an evaluation of security management models, security program development, risk assessment and mitigation, threat/vulnerability analysis and risk remediation, and cyber security operations. Students also will learn incident handling, business continuity planning and disaster recovery, security policy formulation and implementation (security management cycle), in addition to information-sharing, and privacy, legal, compliance, and ethical issues.