COURSE DESCRIPTIONSIMAN 670 Managing Overseas Operations (3)Prerequisite: 30 credits <strong>of</strong> program coursework (3 credits maybe taken concurrently). An examination <strong>of</strong> a wide range <strong>of</strong>management problems facing both large and midsized enterprisesas they manage overseas operations. The development<strong>of</strong> a full-scale business plan for operating in a foreign marketenhances skills (such as analyzing markets, designing businessfunctions, solving staffing and control issues, and developinga supportive financial plan and organizational structure) forintegrating entry strategy with strategy implementation. Specialattention is paid to identifying the major challenges to implementinga global supply chain strategy and the approaches toovercome these challenges.IMAT (Informatics)IMAT 637 IT Acquisitions Management (3)(Formerly ITSM 637.) A study <strong>of</strong> management practices relatedto the acquisition <strong>of</strong> IT systems, components, and services.Emphasis is on the importance <strong>of</strong> enterprise strategic planningand the concomitant IT strategic planning. Issues related to thedevelopment <strong>of</strong> the IT acquisition plan, financial planning andbudgeting, integration <strong>of</strong> the proposed acquisition within theoverall goals <strong>of</strong> the enterprise, and related IT program managementare examined in the context <strong>of</strong> overarching managementchallenges. Federal IT systems, contract and procurement policies,and procedures provide examples for analysis <strong>of</strong> conceptswith wider relevance.IMAT 639 Internet Multimedia Applications (3)(Formerly CSMN 639.) A study <strong>of</strong> multimedia presentations asessential, strategic components <strong>of</strong> an organization’s competitiveWeb presence. Established principles <strong>of</strong> s<strong>of</strong>tware development,aesthetics <strong>of</strong> typography and layout, benchmarking, and usabilityengineering are used to analyze Web sites and write successfulsite development plans. Emphasis is on basic Web page designtechniques. Topics include standards for representing commonmedia formats, compression algorithms, file format translationtools, hardware requirements and standards, system constraints,Java, CGI scripts, and virtual reality. Assignments require buildinga portfolio <strong>of</strong> rich media content.IMAT 670 Contemporary Topics in Informatics (3)A capstone study <strong>of</strong> emerging and current technologies, as wellas some eternal verities in IT management, that integrates andaugments concepts previously studied. Topics vary and mayinclude aligning IT with the strategic goals <strong>of</strong> the enterprise,leadership in IT, s<strong>of</strong>tware psychology in the design <strong>of</strong> user interfaces,geographical information systems, building and managingInternet communities, technology to ameliorate the digitaldivide, managing an enterprise’s IT portfolio, and the socialimpact <strong>of</strong> information policy decisions.INFA (Information Assurance)INFA 610 Computer Security, S<strong>of</strong>tware Assurance, HardwareAssurance, and Security Management (3)(Formerly CSMN 655.) An overview <strong>of</strong> information securitymanagement. Topics include security architecture, securitymodels, access control systems and methodology, applicationsand systems security, operation security, database security,cryptography, physical security, network and Internet security,business continuity planning, and law and ethics in informationassurance. A brief review <strong>of</strong> the building blocks <strong>of</strong> informationsystems (such as computer organization and architecture,operating systems, data structure and algorithms, principles <strong>of</strong>programming languages, database, and s<strong>of</strong>tware engineering)is provided to illustrate the scope <strong>of</strong> security management.INFA 620 Network and Internet Security (3)(Formerly TLMN 672.) An introduction to the securityconcepts needed for the design, use, and implementation <strong>of</strong>secure voice and data communications networks, includingthe Internet. A brief review <strong>of</strong> networking technology andstandards (including an introduction to Internet communicationprotocols) is provided. Security subjects addressed includedefense models, security policy development, authentication andauthorization controls, firewalls, packet filtering, virtual privatenetworks (VPNs), and wireless network security. A specific projecton network security in a hypothetical scenario, based on theinputs from government agencies and commercial organizations,is assessed by a team <strong>of</strong> experts who are working in the field.108G R A D U A T E C A T A L O G | 2 0 1 0 – 2 0 1 1
INFA 630 Intrusion Detection and Intrusion Prevention (3)(Formerly CSMN 683.) An exploration <strong>of</strong> the theory andimplementation <strong>of</strong> intrusion detection and intrusion prevention.Topics include network-based, host-based, and hybrid intrusiondetection; intrusion prevention; attack pattern identification;deployment; response; surveillance; damage assessment;data forensics; data mining; attack tracing; system recovery; andcontinuity <strong>of</strong> operation. A specific project on intrusion detectionand prevention in a hypothetical scenario, based on the inputsfrom government agencies and commercial organizations, isassessed by a team <strong>of</strong> experts who are working in the field.INFA 640 Cryptology and Data Protection (3)(Formerly CSMN 681.) An overview <strong>of</strong> the theory <strong>of</strong> encryptionusing symmetric and asymmetric keys, current protocolsfor exchanging secure data (including the Data EncryptionStandard and the Advanced Encryption Standard), and securecommunication techniques. A review <strong>of</strong> the historical development<strong>of</strong> cryptographic methods and cryptanalysis tools isprovided. Public key infrastructure and the use <strong>of</strong> digital signaturesand certificates for protecting and validating data areexamined. Strategies for the physical protection <strong>of</strong> informationassets are explored.INFA 650 Computer Forensics (3)An introduction to the fundamental concepts behind the collectionand analysis <strong>of</strong> the digital evidence left behind in a digitalcrime scene. Topics include the identification, preservation,collection, examination, analysis, and presentation <strong>of</strong> evidencefor prosecution purposes. Discussion also covers the laws andethics related to computer forensics and challenges in computerforensics. Network forensics is briefly explored. A specific projecton computer or network forensics in a hypothetical scenario,based on the inputs from government agencies and commercialorganizations, is assessed by a team <strong>of</strong> experts who are workingin the field.INFA 660 Security Policy, Ethics, and the LegalEnvironment (3)(Formerly CSMN 685.) An overview <strong>of</strong> laws and ethics relatedto information assurance. The information security responsibilities<strong>of</strong> major domestic and international agencies (such as theFederal Bureau <strong>of</strong> Investigation, National Security Agency, andNational Institute <strong>of</strong> Standards and Technology) are reviewed.Topics include issues involving information security managementwithin an enterprise, such as suitable organizational policy,plans, and implementation strategies. Discussion also coversethical issues, such as monitoring employee computer use andproper limitations on the use <strong>of</strong> customer data.INFA 670 Information Assurance Capstone (3)Prerequisites: INFA 610, 620, 630, 640, 650, and 660 (3 creditsmay be taken concurrently). A study <strong>of</strong> information assurancethat integrates and applies concepts previously studied. Bestpractices and appropriate technologies to design, implement,manage, evaluate, and further improve information securityare explored. Emerging trends are analyzed to understand theirpotential effect on information security and assurance.INMS (Intelligence Management)INMS 600 Managing Intelligence Activities (3)An introduction to management issues associated with intelligenceactivities in national and homeland security, law enforcement,and the private sector. Intelligence is evaluated fromthe perspectives <strong>of</strong> its consumers in government and business.Topics include the historical issues that led to extensive oversight<strong>of</strong> intelligence agencies and laws restricting their activities.Discussion also covers recent changes in national intelligenceand current issues, such as the debate over security versus civilliberties and how to protect America from foreign espionageand exploitation.INMS 610 Intelligence Collection: Sources and Challenges (3)A study <strong>of</strong> the management challenges related to collectingintelligence for national security, law enforcement, and businesspurposes through case study analysis and planning exercises.Various problems with human source intelligence; open sourceintelligence; signals intelligence; imagery; technical intelligence;and the military’s intelligence, surveillance, and reconnaissance(ISR) approach are assessed. Discussion covers law enforcementand correctional sources and the integration <strong>of</strong> multisourcedintelligence. Topics include how requirements drive collectionefforts, the relationship between collection and analysis, and thecosts associated with collection <strong>of</strong> intelligence.INMS 620 Intelligence Analysis: Consumers, Uses,and Issues (3)An examination <strong>of</strong> the intelligence requirements <strong>of</strong> variousclients in government and the private sector. The various purposes<strong>of</strong> analysis—such as warning, policy planning, researchand development, systems or product planning, support forlaw enforcement and correctional agencies, support for operationalactivities, and investment— are examined. Discussioncovers managing analytical methodologies and techniques, aswell as dissent in analyses, and understanding the reasons forfailures. Case studies illustrate issues in analysis management.The conflict between intelligence analysts and decision makers atnational and local levels is explored.w w w.umuc.edu / grad 109
- Page 1 and 2:
2010-2011CatalogGraduate School of
- Page 3 and 4:
From the DeanWelcome to the Univers
- Page 5 and 6:
IMPORTANT DATESCONTACT INFORMATIONA
- Page 7 and 8:
About the Graduate SchoolMISSION ST
- Page 9 and 10:
Online courses maintain the sameaca
- Page 11 and 12:
Other Dual Degree CombinationsMaste
- Page 13 and 14:
DOCTOR OF MANAGEMENT IN COMMUNITYCO
- Page 15 and 16:
student teaching. Students are advi
- Page 17 and 18:
Career Paths■■■■■■■
- Page 19 and 20:
CAREER PATHS■■■■■■■
- Page 21 and 22:
RELATED CERTIFICATE PROGRAMSInitial
- Page 23 and 24:
PartnershipsUMUC currently offers p
- Page 25 and 26:
program emphasizes development of m
- Page 27 and 28:
RELATED CERTIFICATE PROGRAMSInitial
- Page 29 and 30:
■■■■■■■■Government
- Page 31 and 32:
PartnershipAn articulation agreemen
- Page 33:
CAREER PATHS■■■■■■■
- Page 36 and 37:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 38 and 39:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 40 and 41:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 42 and 43:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 44 and 45:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 46 and 47:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 48 and 49:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 50 and 51:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 52 and 53:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 54 and 55:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 56 and 57:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 58 and 59:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 60 and 61: MASTER’S DEGREE ANDCERTIFICATE PR
- Page 62 and 63: MASTER’S DEGREE ANDCERTIFICATE PR
- Page 64 and 65: MASTER’S DEGREE ANDCERTIFICATE PR
- Page 66 and 67: MASTER’S DEGREE ANDCERTIFICATE PR
- Page 68 and 69: EXECUTIVE PROGRAMSEver-sharper comp
- Page 70 and 71: EXECUTIVE PROGRAMSCHIEF INFORMATION
- Page 72 and 73: DUAL DEGREE PROGRAMSMASTER OF BUSIN
- Page 74 and 75: DUAL DEGREE PROGRAMSMASTER OF BUSIN
- Page 76 and 77: DUAL DEGREE PROGRAMSMASTER OF BUSIN
- Page 78 and 79: MASTER’S DEGREE ANDCERTIFICATE PR
- Page 80 and 81: DUAL DEGREE PROGRAMSMASTER OF DISTA
- Page 82 and 83: DUAL DEGREE PROGRAMSMASTER OF SCIEN
- Page 84 and 85: COURSE DESCRIPTIONSINDEX TO COURSE
- Page 86 and 87: COURSE DESCRIPTIONSACCT 613 Federal
- Page 88 and 89: COURSE DESCRIPTIONSASCM 629 Strateg
- Page 90 and 91: COURSE DESCRIPTIONSBSBD (Biosecurit
- Page 92 and 93: COURSE DESCRIPTIONSCJMS 640 Crimina
- Page 94 and 95: COURSE DESCRIPTIONSDBST 667 Data Mi
- Page 96 and 97: COURSE DESCRIPTIONSDMBA (Business A
- Page 98 and 99: COURSE DESCRIPTIONSDMGT 892 Dissert
- Page 100 and 101: COURSE DESCRIPTIONSEDTC 640 Technol
- Page 102 and 103: COURSE DESCRIPTIONSEMBA (Business A
- Page 104 and 105: COURSE DESCRIPTIONSENVM 650 Land an
- Page 106 and 107: COURSE DESCRIPTIONSHAIN 670 Health
- Page 108 and 109: COURSE DESCRIPTIONSHRMD 630 Recruit
- Page 112 and 113: COURSE DESCRIPTIONSINMS 630 Espiona
- Page 114 and 115: COURSE DESCRIPTIONSMGMT 615 Intercu
- Page 116 and 117: COURSE DESCRIPTIONSMSAS (Accounting
- Page 118 and 119: COURSE DESCRIPTIONSPMAN (Project Ma
- Page 120 and 121: COURSE DESCRIPTIONSPRPA 650 Public
- Page 122 and 123: COURSE DESCRIPTIONSTLMN 670 Capston
- Page 124 and 125: ADMINISTRATIONUniversity Systemof M
- Page 126 and 127: ADMINISTRATIONGRADUATE SCHOOL OF MA
- Page 128 and 129: CONTACT INFORMATIONPROGRAM DIRECTOR
- Page 130 and 131: ADMISSION AND ENROLLMENTGeneral Inf
- Page 132 and 133: ADMISSION AND ENROLLMENTBY MAILStud
- Page 134 and 135: ADMISSION AND ENROLLMENTEmployer-Pr
- Page 136 and 137: ACADEMIC AND ADMINISTRATIVEREQUIREM
- Page 138 and 139: ACADEMIC AND ADMINISTRATIVEREQUIREM
- Page 140 and 141: SERVICES AND RESOURCESAvailability
- Page 142 and 143: SERVICES AND RESOURCESStudents must
- Page 144 and 145: SERVICES AND RESOURCESand the compl
- Page 146 and 147: SERVICES AND RESOURCESfor an additi
- Page 148 and 149: FACULTYAbbott, Weldon LeonAdjunct P
- Page 150 and 151: FACULTYBartoo, DianeProgram Directo
- Page 152 and 153: FACULTYCallahan, Caryl A.Collegiate
- Page 154 and 155: FACULTYCrews, Gordon A.Adjunct Prof
- Page 156 and 157: FACULTYEsler, Anne G.Adjunct Assist
- Page 158 and 159: FACULTYGlickstein, Ira S.Adjunct As
- Page 160 and 161:
FACULTYHilliard, Philip E.Adjunct A
- Page 162 and 163:
FACULTYKeenan, Susan L.Adjunct Asso
- Page 164 and 165:
FACULTYLloyd, Karl B.Adjunct Associ
- Page 166 and 167:
FACULTYMerkulov, Gennady V.Adjunct
- Page 168 and 169:
FACULTYParks, Janet M.Adjunct Assis
- Page 170 and 171:
FACULTYRoberts, Judith M.Adjunct As
- Page 172 and 173:
FACULTYSimoncen, Anne LouiseAdjunct
- Page 174 and 175:
FACULTYTurner, Marvin W.Adjunct Ass
- Page 176 and 177:
FACULTYWysocki, Carol D.Adjunct Pro
- Page 178 and 179:
UNIVERSITY POLICIESIV.CRITERIAStude
- Page 180 and 181:
UNIVERSITY POLICIESC. Faculty Advis
- Page 182 and 183:
UNIVERSITY POLICIESREINSTATEMENT OF
- Page 184 and 185:
UNIVERSITY POLICIESB. Directory Inf
- Page 186 and 187:
INDEXAAACRAO. See American Associat
- Page 188 and 189:
INDEXDDatabase systems technologyce
- Page 190 and 191:
INDEXInstructional sites, 4, 127Ins
- Page 192 and 193:
INDEXTechnology managementcourse de
- Page 194 and 195:
NOTES192G R A D U A T E C A T A L O
- Page 196:
ABOUT UMUCUniversity of Maryland Un