COURSE DESCRIPTIONSINFA (Information Assurance)INFA 610 Computer Security, S<strong>of</strong>tware Assurance,Hardware Assurance, and Security Management (3)(Formerly CSMN 655.) An overview <strong>of</strong> information securitymanagement. Topics include security architecture, security models,access control systems and methodology, applications and systemssecurity, operation security, database security, cryptography, physicalsecurity, network and Internet security, business continuityplanning, and law and ethics in information assurance. A briefreview <strong>of</strong> the building blocks <strong>of</strong> information systems (such as computerorganization and architecture, operating systems, data structureand algorithms, principles <strong>of</strong> programming languages, database,and s<strong>of</strong>tware engineering) is provided to illustrate the scope<strong>of</strong> security management.INFA 620 Network and Internet Security (3)(Formerly TLMN 672.) An introduction to the security conceptsneeded for the design, use, and implementation <strong>of</strong> secure voiceand data communications networks, including the Internet. Abrief review <strong>of</strong> networking technology and standards (includingan introduction to Internet communication protocols) is provided.Security subjects addressed include defense models, security policydevelopment, authentication and authorization controls, firewalls,packet filtering, virtual private networks (VPNs), and wirelessnetwork security.INFA 630 Intrusion Detection and Intrusion Prevention (3)(Formerly CSMN 683.) An exploration <strong>of</strong> the theory and implementation<strong>of</strong> intrusion detection and intrusion prevention. Topicsinclude network-based, host-based, and hybrid intrusion detection;intrusion prevention; attack pattern identification; deployment;response; surveillance; damage assessment; data forensics; data mining;attack tracing; system recovery; and continuity <strong>of</strong> operation.INFA 640 Cryptology and Data Protection (3)(Formerly CSMN 681.) An overview <strong>of</strong> the theory <strong>of</strong> encryptionusing symmetric and asymmetric keys, current protocols forexchanging secure data (including the Data Encryption Standardand the Advanced Encryption Standard), and secure communicationtechniques. A review <strong>of</strong> the historical development <strong>of</strong> cryptographicmethods and cryptanalysis tools is provided. Public KeyInfrastructure and the use <strong>of</strong> digital signatures and certificates forprotecting and validating data are examined. Strategies for thephysical protection <strong>of</strong> information assets are explored.INFA 650 Computer Forensics (3)An introduction to the fundamental concepts behind the collectionand analysis <strong>of</strong> the digital evidence left behind in a digital crimescene. Topics include the identification, preservation, collection,examination, analysis, and presentation <strong>of</strong> evidence for prosecutionpurposes. Discussion also covers the laws and ethics related to computerforensics and challenges in computer forensics. Networkforensics is briefly explored.INFA 660 Security Policy, Ethics, and the Legal Environment (3)(Formerly CSMN 685.) An overview <strong>of</strong> laws and ethics related toinformation assurance. The information security responsibilities<strong>of</strong> major domestic and international agencies (such as the FederalBureau <strong>of</strong> Investigation, National Security Agency, and NationalInstitute <strong>of</strong> Standards and Technology) are reviewed. Topics includeissues involving information security management within an enterprise,such as suitable organizational policy, plans, and implementationstrategies. Discussion also covers ethical issues, such as monitoringemployee computer use and proper limitations on the use <strong>of</strong>customer data.INFA 670 Information Assurance Capstone (3)Prerequisites: INFA 610, 620, 630, 640, 650, and 660 (3 creditsmay be taken concurrently.) A study <strong>of</strong> information assurance thatintegrates and applies concepts previously studied. Best practices andappropriate technologies to design, implement, manage, evaluate, andfurther improve information security are explored. Emerging trendsare analyzed to understand their potential effect on information securityand assurance.ISAS (Information Systemsand Services)ISAS 600 Information Systems for Managers (3)(Formerly ADMN 640. Designed for managers without a technicalbackground in computers and information systems.) Prerequisite:Basic microcomputer skills. An investigation <strong>of</strong> different types <strong>of</strong>hardware and s<strong>of</strong>tware and their application in organizations froma systems perspective. Case studies are used to reveal technical andorganizational issues, along with operational considerations. Emphasisis on determining managers’ needs for information and procuringand using appropriate computer systems.94GRADUATE <strong>CATALOG</strong> | 2008–2009
ISAS 610 Information Systems Management and Integration(3)(Formerly ADMN 641.) A study <strong>of</strong> the life cycle <strong>of</strong> the informationsystem, from inception, through systems development andintegration, to system operation and maintenance. Emphasis is onthe integration <strong>of</strong> information systems with management systems<strong>of</strong> an organization. Major phases, procedures, policies, and techniquesin the information system life cycle are discussed in detail.ISAS 620 Information Systems Sourcing Management (3)A study <strong>of</strong> how best to make and implement appropriate decisionsin providing information systems to an organization. Focus is onthe frameworks, tools, and techniques for making such decisions.Topics include the “make or buy” sourcing decision and variousmodels <strong>of</strong> outsourcing, from the contracting <strong>of</strong> finite technicalservices, through the use <strong>of</strong> <strong>of</strong>f-the-shelf package s<strong>of</strong>tware (includingenterprise resource planning s<strong>of</strong>tware), to the outsourcing <strong>of</strong>entire business processes. Processes and metrics used in the procurementand managing <strong>of</strong> outsourced services are also examined.Discussion also covers the phenomenon <strong>of</strong> “<strong>of</strong>fshoring” (i.e., outsourcingbusiness processes and functions to other countries) andits ramifications.ISAS 630 Systems Analysis and Design (3)(Formerly ADMN 643.) A study <strong>of</strong> current techniques and practicesin requirements specification, s<strong>of</strong>tware application selection,project management, and analysis and design <strong>of</strong> information systemapplications. Emphasis is on a management perspective inthe specification <strong>of</strong> the information system’s logical and physicalanalysis and design.ISAS 640 Decision Support Systems and Expert Systems (3)(Formerly ADMN 644.) An investigation <strong>of</strong> computer applications formanagement support. The technologies <strong>of</strong> decision support systemsand expert systems and the organizational factors leading to the successor failure <strong>of</strong> such systems are introduced. Topics also include groupdecision support systems, integration and implementation issues, andrelated advanced technologies such as neural networks.ITEC (Information Technology)ITEC 610 Information Technology Foundations (3)A fundamental study <strong>of</strong> technology and its applications, as well asthe economic and social issues they have raised. Topics include computers,peripherals, databases, and networks; operations (<strong>of</strong> business,government, and other enterprises), decision support systems, andacquisition <strong>of</strong> information technology resources; and informationsecurity, productivity, equitable access by users, intellectual propertyrights, and global reach. Discussion also covers current and futuredevelopments in the field and their implications.ITEC 620 Information Technology Infrastructure (3)An introduction to the broad variety in information technology infrastructurefrom the perspectives <strong>of</strong> systems architecture, data communications,and networks. Topics include enterprise information infrastructure,multinational enterprise, servers and Web services, layerednetwork architecture, convergence and Internet protocols, globalWAN services, enterprise network design, wireless technologies, networksecurity, network management, server architectures, storagemanagement and networks, and content management networks.ITEC 630 Information Systems Analysis, Modeling,and Design (3)(Formerly CSMN 635.) A study <strong>of</strong> systems analysis and design,using selected engineering and management science techniquesand practices. Topics include requirements determination, modeling,decision making, and proposal development. The SystemDevelopment Life Cycle Model, including system implementationand postimplementation activities, is examined. Emphasis is onthe specification <strong>of</strong> the information system’s logical and physicalanalysis and design from a management perspective. Researchand project assignments related to information systems analysis,design, implementation, and/or project planning and control,require individual and group work.ISAS 650 Information Technology, the CIO,and Organizational Transformation (3)(Formerly ADMN 645.) An examination <strong>of</strong> how information technologycan affect the strategic direction <strong>of</strong> an organization, how ITenables new ways <strong>of</strong> operating, and how the Chief InformationOfficer can serve as a trusted member <strong>of</strong> the organization’s top managementteam to help it exploit information technology effectively.www.umuc.edu/grad 95
- Page 1 and 2:
GraduateSchool ofManagement& Techno
- Page 4 and 5:
Table of Contents457INTRODUCTION4 W
- Page 6 and 7:
Welcome to UMUCA UNIQUE INSTITUTION
- Page 8 and 9:
Preparing for Graduate StudyAs most
- Page 10 and 11:
Program OverviewDOCTORAL PROGRAMDoc
- Page 12 and 13:
DOCTORAL DEGREE PROGRAMDOCTOR OF MA
- Page 14 and 15:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 16 and 17:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 18 and 19:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 20 and 21:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 22 and 23:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 24 and 25:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 26 and 27:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 28 and 29:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 30 and 31:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 32 and 33:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 34 and 35:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 36 and 37:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 38 and 39:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 40 and 41:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 42 and 43:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 44 and 45:
MASTER’S DEGREE ANDCERTIFICATE PR
- Page 46 and 47: MASTER’S DEGREE ANDCERTIFICATE PR
- Page 48 and 49: MASTER’S DEGREE ANDCERTIFICATE PR
- Page 50 and 51: MASTER’S DEGREE ANDCERTIFICATE PR
- Page 52 and 53: MASTER’S DEGREE ANDCERTIFICATE PR
- Page 54 and 55: MASTER’S DEGREE ANDCERTIFICATE PR
- Page 56 and 57: EXECUTIVE PROGRAMSEver sharper comp
- Page 58 and 59: EXECUTIVE PROGRAMSCHIEF INFORMATION
- Page 60 and 61: DUAL DEGREE PROGRAMSMASTER OF BUSIN
- Page 62 and 63: DUAL DEGREE PROGRAMSMASTER OF BUSIN
- Page 64 and 65: DUAL DEGREE PROGRAMSNonprofit and A
- Page 66 and 67: DUAL DEGREE PROGRAMSMASTER OF DISTA
- Page 68 and 69: DUAL DEGREE PROGRAMSMASTER OF SCIEN
- Page 70 and 71: NONDEGREE TEACHEREDUCATION PROGRAMS
- Page 72 and 73: COURSE DESCRIPTIONSACCT (Accounting
- Page 74 and 75: COURSE DESCRIPTIONSAMBA 605 Economi
- Page 76 and 77: COURSE DESCRIPTIONSBIFS (Bioinforma
- Page 78 and 79: COURSE DESCRIPTIONSBTMN 670 Capston
- Page 80 and 81: COURSE DESCRIPTIONSDEPM (Distance E
- Page 82 and 83: COURSE DESCRIPTIONSDMGT (Doctoral S
- Page 84 and 85: COURSE DESCRIPTIONSEBUS 640 E-Techn
- Page 86 and 87: COURSE DESCRIPTIONSEDTC 620 Technol
- Page 88 and 89: COURSE DESCRIPTIONSEMBA 640 Strateg
- Page 90 and 91: COURSE DESCRIPTIONSENVM 670 Seminar
- Page 92 and 93: COURSE DESCRIPTIONSHCAD 630 Public
- Page 94 and 95: COURSE DESCRIPTIONSHSMN (Homeland S
- Page 98 and 99: COURSE DESCRIPTIONSITEC 640 Informa
- Page 100 and 101: COURSE DESCRIPTIONSMRKT 606 Integra
- Page 102 and 103: COURSE DESCRIPTIONSOMDE 606 Costs a
- Page 104 and 105: COURSE DESCRIPTIONSPMAN 637 Project
- Page 106 and 107: COURSE DESCRIPTIONSSWEN 646 Softwar
- Page 108 and 109: COURSE DESCRIPTIONSTMAN 625 Economi
- Page 110 and 111: ADMINISTRATIONUniversity Systemof M
- Page 112 and 113: ADMINISTRATIONGraduate School ofMan
- Page 114 and 115: CONTACT INFORMATIONMASTER OF INTERN
- Page 116 and 117: CONTACT INFORMATIONOther Important
- Page 118 and 119: ADMISSION AND ENROLLMENT• Proof o
- Page 120 and 121: ADMISSION AND ENROLLMENTFinancial I
- Page 122 and 123: ACADEMIC AND ADMINISTRATIVEREQUIREM
- Page 124 and 125: ACADEMIC AND ADMINISTRATIVEREQUIREM
- Page 126 and 127: ACADEMIC AND ADMINISTRATIVEREQUIREM
- Page 128 and 129: SERVICES AND RESOURCESGeneral Infor
- Page 130 and 131: SERVICES AND RESOURCES• Possess a
- Page 132 and 133: SERVICES AND RESOURCESVeterans Bene
- Page 134 and 135: SERVICES AND RESOURCESuate school d
- Page 136 and 137: FACULTYAwwad, Ahmad A.Adjunct Assis
- Page 138 and 139: FACULTYBravo, Kathleen M.Adjunct As
- Page 140 and 141: FACULTYCost, Richard S.Adjunct Assi
- Page 142 and 143: FACULTYFitzpatrick, Edmund W.Adjunc
- Page 144 and 145: FACULTYHalstead, John M.Adjunct Ass
- Page 146 and 147:
FACULTYKavoossi, MasoudAdjunct Asso
- Page 148 and 149:
FACULTYMadison, David L.Adjunct Ass
- Page 150 and 151:
FACULTYMustafa, MuhammadAdjunct Pro
- Page 152 and 153:
FACULTYRabin, Bonnie R.Adjunct Prof
- Page 154 and 155:
FACULTYShirani, Ashraf I.Adjunct Pr
- Page 156 and 157:
FACULTYViamonte, GailChair, Teacher
- Page 158 and 159:
UNIVERSITY POLICIESStudent Classifi
- Page 160 and 161:
UNIVERSITY POLICIESReligious Observ
- Page 162 and 163:
UNIVERSITY POLICIESsubsequent semes
- Page 164 and 165:
UNIVERSITY POLICIESV. DisclosuresUM
- Page 166 and 167:
APPENDICESAppendix A: Program-Caree
- Page 168 and 169:
APPENDICESProgram-Career Map, contd
- Page 170 and 171:
APPENDICESProgram-Career Map, contd
- Page 172 and 173:
APPENDICESProgram-Career Map, contd
- Page 174 and 175:
APPENDICESProgram-Career Map, contd
- Page 176 and 177:
APPENDICESProgram—Career Map, con
- Page 178 and 179:
INDEXAAcademic advising, 126Academi
- Page 180 and 181:
INDEXDDatabase systems technologyce
- Page 182 and 183:
INDEXHomeland security managementce
- Page 184 and 185:
INDEXResidency determination, 115,
- Page 186 and 187:
NOTES184GRADUATE CATALOG | 2008-200
- Page 188:
ABOUT UMUCUniversity of Maryland Un