& Student Handbook - Saint Mary's University of Minnesota
& Student Handbook - Saint Mary's University of Minnesota
& Student Handbook - Saint Mary's University of Minnesota
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Bachelor Degree Programs 87<br />
Areas <strong>of</strong> Specialization<br />
IT414<br />
Leveraging Open Source Technologies (3 cr.)<br />
Prerequisite: IT301<br />
This course examines the business and technical value proposition<br />
<strong>of</strong>fered by free or inexpensive Open Source s<strong>of</strong>tware technologies.<br />
Topics include general public license s<strong>of</strong>tware, popular product <strong>of</strong>ferings,<br />
and the concept <strong>of</strong> Web 2.0 – the interactive Internet. Topics include<br />
evaluation <strong>of</strong> Open Source products, how to contribute to general public<br />
projects, and the deployment <strong>of</strong> interactive Internet technologies.<br />
IT415<br />
Leveraging Mobile Technologies (3 cr.)<br />
Prerequisite: IT301<br />
This course provides an introduction to mobile devices, networks, and<br />
applications. Topics include the roles <strong>of</strong> financial institutions, operators,<br />
content providers, and other key parties in the mobile commerce value<br />
chain; core mobile technologies; and the differences between m-<br />
commerce and e-commerce. The current mobile infrastructure, mobile<br />
technology trends, and emerging business opportunities are covered.<br />
IT416<br />
Project Management for IT Pr<strong>of</strong>essionals (3 cr.)<br />
Prerequisites: IT301, MG408<br />
This course builds upon foundational project management concepts by<br />
examining project challenges particular to technology implementations.<br />
Topics discussed include technology specific methodologies, up-to-date<br />
management techniques, and project management tool selection. The focus<br />
is to formulate and start technical projects; identify, analyze, and address<br />
specific informational technology project issues; and obtain optimal results<br />
by communicating effectively with management, team members, staff, and<br />
vendors.<br />
IT417<br />
Advanced IT Project Management (3 cr.)<br />
Prerequisites: IT301, IT412<br />
This course promotes the development <strong>of</strong> expertise in analogous and<br />
parametric estimating, project selection, project scheduling, variance<br />
analysis, and cost management. It considers advanced problems in<br />
organization structure, behavior, and leadership, and explores concepts<br />
and themes introduced in previous project management courses at a<br />
higher and more complex level.<br />
IT430<br />
Information Security I (3 cr.)<br />
Prerequisite: IT301<br />
This course provides an overarching model for information assurance for<br />
businesses, government agencies, and other enterprises needing to<br />
establish a comprehensive security plan. The components <strong>of</strong> security<br />
and protection against the most current security vulnerabilities are<br />
covered. Topics include asset identification, human factors, personnel<br />
security, risk assessment, ethical considerations, and computer and<br />
network security tools and methods.<br />
IT434<br />
Information Security II (3 cr.)<br />
Prerequisite: IT301, IT430<br />
This course provides a continuing exploration <strong>of</strong> information assurance<br />
models for institutions. The components <strong>of</strong> security and how they relate,<br />
and effective security policy development are featured. Topics include<br />
business continuity, security law, and desktop and server security tools<br />
and methods. Hands-on training regarding protection <strong>of</strong> computers and<br />
networks against the most current Windows and UNIX vulnerabilities is<br />
provided.<br />
IT436<br />
Computer Forensics I (3 cr.)<br />
Prerequisite: IT301<br />
This course provides an introduction to the legal, technical, and<br />
investigative skills necessary to consider a career in computer forensics.<br />
Topics include the legal foundations for proper handling <strong>of</strong> traditional and<br />
electronic evidence, investigative tools and procedures, and an<br />
examination <strong>of</strong> large-scale attacks such as identity theft, fraud, phishing,<br />
extortion, and malware infections. The basics <strong>of</strong> conducting a computer<br />
forensics investigation, finding hidden data, and evaluating common<br />
computer forensic tools are covered.<br />
IT437<br />
Computer Forensics II (3 cr.)<br />
Prerequisites: IT301, IT432<br />
This course provides an in-depth examination <strong>of</strong> the technical tools and<br />
techniques utilized by computer forensics examiners. Topics include<br />
criminal timeline recreation, evidence recovery, and the most current PDA<br />
and cell phone investigative techniques. The focus is on deployment <strong>of</strong> an<br />
effective case management strategy to collect material, document<br />
findings, and archive results; the use <strong>of</strong> forensic tools to uncover<br />
obscured code, file mismatches, and invalid signatures; and the<br />
extraction <strong>of</strong> client and Web-based e-mail artifacts using industry<br />
recognized tools.<br />
IT440<br />
Business Intelligence Fundamentals (3 cr.)<br />
Prerequisite: IT301<br />
This course introduces data warehousing and decision support<br />
infrastructures that support organizational performance management.<br />
Information requirements for managerial decisions, dimensional<br />
modeling, data warehouse development, and data analysis techniques<br />
are covered.<br />
IT441<br />
Advanced Business Intelligence Techniques (3 cr.)<br />
Prerequisites: IT301, IT440<br />
This course introduces the computer-assisted process <strong>of</strong> evaluating<br />
enormous sets <strong>of</strong> data to find previously undiscovered patterns, draw<br />
conclusions, and then make decisions based on the patterns. Concepts<br />
are introduced and applied using current s<strong>of</strong>tware tools.