13.07.2014 Views

& Student Handbook - Saint Mary's University of Minnesota

& Student Handbook - Saint Mary's University of Minnesota

& Student Handbook - Saint Mary's University of Minnesota

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Bachelor Degree Programs 87<br />

Areas <strong>of</strong> Specialization<br />

IT414<br />

Leveraging Open Source Technologies (3 cr.)<br />

Prerequisite: IT301<br />

This course examines the business and technical value proposition<br />

<strong>of</strong>fered by free or inexpensive Open Source s<strong>of</strong>tware technologies.<br />

Topics include general public license s<strong>of</strong>tware, popular product <strong>of</strong>ferings,<br />

and the concept <strong>of</strong> Web 2.0 – the interactive Internet. Topics include<br />

evaluation <strong>of</strong> Open Source products, how to contribute to general public<br />

projects, and the deployment <strong>of</strong> interactive Internet technologies.<br />

IT415<br />

Leveraging Mobile Technologies (3 cr.)<br />

Prerequisite: IT301<br />

This course provides an introduction to mobile devices, networks, and<br />

applications. Topics include the roles <strong>of</strong> financial institutions, operators,<br />

content providers, and other key parties in the mobile commerce value<br />

chain; core mobile technologies; and the differences between m-<br />

commerce and e-commerce. The current mobile infrastructure, mobile<br />

technology trends, and emerging business opportunities are covered.<br />

IT416<br />

Project Management for IT Pr<strong>of</strong>essionals (3 cr.)<br />

Prerequisites: IT301, MG408<br />

This course builds upon foundational project management concepts by<br />

examining project challenges particular to technology implementations.<br />

Topics discussed include technology specific methodologies, up-to-date<br />

management techniques, and project management tool selection. The focus<br />

is to formulate and start technical projects; identify, analyze, and address<br />

specific informational technology project issues; and obtain optimal results<br />

by communicating effectively with management, team members, staff, and<br />

vendors.<br />

IT417<br />

Advanced IT Project Management (3 cr.)<br />

Prerequisites: IT301, IT412<br />

This course promotes the development <strong>of</strong> expertise in analogous and<br />

parametric estimating, project selection, project scheduling, variance<br />

analysis, and cost management. It considers advanced problems in<br />

organization structure, behavior, and leadership, and explores concepts<br />

and themes introduced in previous project management courses at a<br />

higher and more complex level.<br />

IT430<br />

Information Security I (3 cr.)<br />

Prerequisite: IT301<br />

This course provides an overarching model for information assurance for<br />

businesses, government agencies, and other enterprises needing to<br />

establish a comprehensive security plan. The components <strong>of</strong> security<br />

and protection against the most current security vulnerabilities are<br />

covered. Topics include asset identification, human factors, personnel<br />

security, risk assessment, ethical considerations, and computer and<br />

network security tools and methods.<br />

IT434<br />

Information Security II (3 cr.)<br />

Prerequisite: IT301, IT430<br />

This course provides a continuing exploration <strong>of</strong> information assurance<br />

models for institutions. The components <strong>of</strong> security and how they relate,<br />

and effective security policy development are featured. Topics include<br />

business continuity, security law, and desktop and server security tools<br />

and methods. Hands-on training regarding protection <strong>of</strong> computers and<br />

networks against the most current Windows and UNIX vulnerabilities is<br />

provided.<br />

IT436<br />

Computer Forensics I (3 cr.)<br />

Prerequisite: IT301<br />

This course provides an introduction to the legal, technical, and<br />

investigative skills necessary to consider a career in computer forensics.<br />

Topics include the legal foundations for proper handling <strong>of</strong> traditional and<br />

electronic evidence, investigative tools and procedures, and an<br />

examination <strong>of</strong> large-scale attacks such as identity theft, fraud, phishing,<br />

extortion, and malware infections. The basics <strong>of</strong> conducting a computer<br />

forensics investigation, finding hidden data, and evaluating common<br />

computer forensic tools are covered.<br />

IT437<br />

Computer Forensics II (3 cr.)<br />

Prerequisites: IT301, IT432<br />

This course provides an in-depth examination <strong>of</strong> the technical tools and<br />

techniques utilized by computer forensics examiners. Topics include<br />

criminal timeline recreation, evidence recovery, and the most current PDA<br />

and cell phone investigative techniques. The focus is on deployment <strong>of</strong> an<br />

effective case management strategy to collect material, document<br />

findings, and archive results; the use <strong>of</strong> forensic tools to uncover<br />

obscured code, file mismatches, and invalid signatures; and the<br />

extraction <strong>of</strong> client and Web-based e-mail artifacts using industry<br />

recognized tools.<br />

IT440<br />

Business Intelligence Fundamentals (3 cr.)<br />

Prerequisite: IT301<br />

This course introduces data warehousing and decision support<br />

infrastructures that support organizational performance management.<br />

Information requirements for managerial decisions, dimensional<br />

modeling, data warehouse development, and data analysis techniques<br />

are covered.<br />

IT441<br />

Advanced Business Intelligence Techniques (3 cr.)<br />

Prerequisites: IT301, IT440<br />

This course introduces the computer-assisted process <strong>of</strong> evaluating<br />

enormous sets <strong>of</strong> data to find previously undiscovered patterns, draw<br />

conclusions, and then make decisions based on the patterns. Concepts<br />

are introduced and applied using current s<strong>of</strong>tware tools.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!