INFT: Information Technology (Graduate)
This course focuses on foundational aspects of both enterprise and network architectural thinking and strategies essential to analyze, design, implement, evaluate, optimize, and manage of modern enterprise networking solutions.
In this course, students will learn how to design enterprise networks that meet an organization’s business and technical requirements. The course will also introduce students to the evolving roles and responsibilities of system administrators in today’s business environments. Students will gain knowledge and practical skills applicable to any organization regardless of its size or industry; they will learn how to effectively utilize their knowledge and skills to recognize and address problems.
This course provides an in-depth treatment of working with Relational DBMS, and manages databases with particular reference to MySQL using PHP, It also provides some coverage of all the developments, issues, challenges and directions in securing databases. Some current trends in database management systems, such as No-SQL database systems will also be discussed.
The course provides a system and management view of information security policies and methodologies, regulator mandates, business drivers, legal considerations and the evolving role of IT leaders to plan and implement successful sets of systems security procedures and frameworks.
The course provides an in-depth coverage of benefits and challenges of mobile system planning, design, development, and management. Students will learn how to design a mobile business system that motivates business innovation and delight their users, that can be deployed on multiple mobile platforms.
Identifying, preserving and extracting electronic evidence. Students learn how to examine and recover data from operating systems, core forensic procedures for any operating or file system, understanding technical issues in acquiring computer evidence and how to conduct forensically sound examinations to preserve evidence for admission and use in legal proceedings.
Student will learn how to implement a new security plan or evaluate an existing one. Students will learn the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment.
This first course in information technology develops foundational skills in computer system and basic computer programming. Students will learn Introduction to computer information technology and basic programming: Architecture of digital computers, design of algorithms for solving various problems, and basic skills in computer programming. Algorithm design, flow charting, and debugging; elements of good programming style. Course may be instructed in any programming language.
In this course, students will learn about the foundations of effectively managing and utilizing information in a business environment. The course will help them gain knowledge and skills to be able to take active roles in making IS decisions. Students will also gain a clear understanding of how information systems can not only support or limit the operations of a business, but also provide the business with new opportunities. IT students need to become knowledgeable and active participants in information systems decisions. The course help student begin to form and point of view of how information systems will help, hinder and create opportunities for any organizations. It is intended to provide a solid foundation of basic concepts relevant to using and managing information.
This course focuses on the planning, design, configuration, operation, and management of computer networks containing data communication devices, servers, workstations, and networked applications and support systems. It introduces students to administrative techniques inherent to basic operating systems, and also to enterprise management systems required by larger organizations. Students examine and discuss issues of scalability, performance management, and integration of internal resources with external resources such as cloud-based systems. Plan, prepare, and operate various enterprise-grade network management systems such as virus protection, intrusion detection, and workstation, server, and work performance, and fault-monitoring systems.
The course offers broad systems perspective that provides a holistic approach to systems architecture. The course covers the latest in new and emerging technologies. All instructional contents are designed to give students the appropriate level and coverage of technical topics needed for ongoing professional success. The learning material are in simple terms to provide a holistic approach to both hardware and software.
The course covers today’s newest technologies, attacks, standards, and trends. The course contents include complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments. The introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. Students start by mastering the field’s basic terms, principles, and concepts. Next, they apply these basics in diverse situations and environments, learning to “think like an attacker” and identify exploitable weaknesses. Then they will switch to defense, selecting the best available solutions and countermeasures. Finally, students will go beyond technology to understand crucial management issues in protecting infrastructure and data.
Students will learn about the conceptual foundations and key elements of IT security and look at its various implementations from physical security to application development security in this course. They will gain a clear understanding of how to recognize and address today’s IT security vulnerabilities in different platforms from cloud-based to mobile through effective management strategies. The course will also teach students how to develop information governance policies and procedures for companies to help them safeguard their information while conducting their operations.
The course provides the knowledge and skills you need to know to for scale products and services for any requirement. This course contents covers new technologies, strategies, and lessons, as well as new case studies from the real world IT practice. The impact on scalability, including architecture, process, people, organization, and technology. Students will learn updated strategies for structuring organizations to maximize agility and scalability. Using this guide’s tools and advice, students can systematically clear away obstacles to scalability–and achieve unprecedented IT and business performance.
The course provides an in-depth coverage of all the developments, issues, challenges and directions in securing data and applications. It focuses on threats to data and applications security including access control violations, integrity violations, unauthorized intrusions and sabotage. Students will learn how to choose a security strategy and how to apply it.
The content of this course will vary by term and section. Students may repeat this course for credit as long as the topic differs. Please refer to the Term Guide for course topic offerings.
The new emphasis on physical security, resulting from the terrorist threat, has forced many cyber security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of cyber security in the strategy of their companies. Until now, however, most books about strategy and planning have focused on the production side of the business, rather than operations. The required readings in this course will integrate the importance of sound security policy with the strategic goals of an organization. It provides IT professionals and management with insight into the issues surrounding the goals of protecting valuable information assets. The text reiterates that an effective cyber security program relies on more than policies or hardware and software, instead it hinges on having a mindset that security is a core part of the business and not just an afterthought.
Students will develop strategies for the successful adoption of an enterprise 3.0 paradigm and the technical solutions that best apply in specific situations. Students will find clear guidelines for using Web 3.0 technologies and standards in a productive way to align with business goals, increase efficiency, and provide measurable bottom line growth. Foster collaboration and accelerate information dissemination with blogs and wikis Implement strategies to achieve business intelligence, analytics, and semantic web goals.