Blended Master of Science in Computer Information Systems concentration in Database Management & Business Intelligence
Students pursuing the blended, eLive Master of Science in Computer Information Systems concentration in Database Management & Business Intelligence will gain extensive hands-on experience with SQL using the Oracle and other leading DBMS and data mining tools. Students who complete this concentration will have extensive skill and experience in the design and implementation of operational databases as well as the data warehousing, data mining, and related business intelligence technologies for managing the enterprise. Database management systems play key roles in the operations and management of every organization across all industries. Career tracks include database and knowledge modelers, designers, developers, and business intelligence analysts.
Students who complete the Computer Information Systems master’s degree concentration in Database Management & Business Intelligence will be able to demonstrate:
- Advanced knowledge in the analysis and documentation of requirements for architecture, design, and implementation of computer applications systems.
- Proficiency in software and computing skills as they pertain to the design and implementation of database systems, data communications, systems analysis, and design.
- Competence sufficient to identify current and emerging information technologies that may have strategic value for enterprise; assess where those technologies have value; and manage the implementation of those technologies in the enterprise.
- Advanced knowledge of database modeling and design, database implementation, distributed databases, object-oriented and object-relational databases, and databases for web applications, as well as typical data mining methods.
- Proficiency in the design, implementation, performance tuning of different types of databases, and in performing data mining tasks on various types of data.
- Competence sufficient to participate in the design and implementation of large, distributed database systems and business intelligence systems.
A total of 40 credits is required. Students must complete both the Core Curriculum and the Concentration Requirements.
(Six courses/24 credits)
MET CS 546 Quantitative Methods for Information Systems
The goal of this course is to provide Computer Information Systems students with the mathematical fundamentals required for successful quantitative analysis of problems in the field of business computing. The first part of the course introduces the mathematical prerequisites for understanding probability and statistics. Topics include combinatorial mathematics, functions, and the fundamentals of differentiation and integration. The second part of the course concentrates on the study of elementary probability theory, discrete and continuous distributions. 4 cr [ 4 cr. ]
|A1||IND||Gorlin||FLR 109||M||6:00 pm – 9:00 pm|
|EL||IND||Gorlin||FLR 109||M||6:00 pm – 9:00 pm|
MET CS 625 Business Data Communication and Networks
This course presents the foundations of data communications and takes a bottom-up approach to computer networks. The course concludes with an overview of basic network security and management concepts. 4 credits. [ 4 cr. ]
|B1||IND||Arena||FLR 109||T||6:00 pm – 9:00 pm|
|EL||IND||Arena||FLR 109||T||6:00 pm – 9:00 pm|
MET CS 669 Database Design and Implementation for Business
Students learn the latest relational and object-relational tools and techniques for persistent data and object modeling and management. Students gain extensive hands-on experience using Oracle or Microsoft SQL Server as they learn the Structured Query Language (SQL) and design and implement databases. Students design and implement a database system as a term project. class. 4 credits. [ 4 cr. ]
|C1||IND||Maiewski||FLR 109||W||6:00 pm – 9:00 pm|
|EL||IND||Maiewski||FLR 109||W||6:00 pm – 9:00 pm|
MET CS 682 Information Systems Analysis and Design
Object-oriented methods of information systems analysis and design for organizations with data- processing needs. System feasibility; requirements analysis; database utilization; Unified Modeling Language; software system architecture, design, and implementation, management; project control; and systems-level testing. [ 4 cr. ]
|D1||IND||Guadagno||FLR 134||R||6:00 pm – 9:00 pm|
|EL||IND||Guadagno||FLR 134||R||6:00 pm – 9:00 pm|
|BCL||IND||Siegel||U||8:00 am – 3:30 pm|
MET CS 782 IT Strategy and Management
This course provides an overview of contemporary I.T. management. It explains the relevant issues of effectively managing information services. The course highlights areas of greatest current and potential application of I.T. to business needs and reviews electronic business, enterprise business systems, and decision support systems. [ 4 cr. ]
|A1||IND||Arakelian||FLR ARR||M||6:00 pm – 9:00 pm|
|EL||IND||Arakelian||FLR ARR||M||6:00 pm – 9:00 pm|
|BCL||IND||Siegel||S||8:30 am – 4:00 pm|
And one of the following:
MET CS 520 Information Structures
This course covers the concepts of object-oriented approach to software design and development using the Java programming language. It includes a detailed discussion of programming concepts starting with the fundamentals of data types, control structures methods, classes, applets, arrays and strings, and proceeding to advanced topics such as inheritance and polymorphism, interfaces, creating user interfaces, exceptions, and streams. Upon completion of this course the students will be able to apply software engineering criteria to design and implement Java applications that are secure, robust, and scalable.
MET CS 200 Fundamentals of Information Technology; recommended to students with no programming background. Or Instructor's Consent. [ 4 cr. ]
MET CS 601 Web Application Development
|C1||IND||Sheehan||SMG 326||W||6:00 pm – 9:00 pm|
|EL||IND||Robertie||SMG 228||W||6:00 pm – 9:00 pm|
|BHA||IND||Staff||S||8:30 am – 4:00 pm|
Students who have completed courses on core curriculum subjects as part of their undergraduate degree program must replace the corresponding core courses with electives. It is recommended that each replacement course be in the same technical area as the original core course. Students who have work-related experience in any of the core curriculum courses may apply for a waiver by submitting appropriate documentation. When a course waiver is granted, the student must substitute a graduate-level elective for the core course.
In addition to the blended MS in Computer Information Systems core curriculum (24 credits), students pursuing a concentration in Database Management & Business Intelligence must also satisfy the following requirements:
Required Database Management & Business Intelligence Courses
(Three courses/12 credits)
MET CS 674 Database Security
The course provides a strong foundation in database security and auditing. This course utilizes Oracle scenarios and step-by-step examples. The following topics are covered: security, profiles, password policies, privileges and roles, Virtual Private Databases, and auditing. The course also covers advanced topics such as SQL injection, database management security issues such as securing the DBMS, enforcing access controls, and related issues. [ 4 cr. ]
|C1||IND||Wolfe||FLR ARR||W||6:00 pm – 9:00 pm|
|EL||IND||Wolfe||FLR ARR||W||6:00 pm – 9:00 pm|
MET CS 699 Data Mining and Business Intelligence
Data mining and investigation is a key goal behind any data warehouse effort. The course provides an introduction to concepts behind data mining, text mining, and web mining. Algorithms will be tested on data sets using the Weka Data mining software and Microsoft SQL Server 2005 (Business Intelligence Development Studio). 4 credits. [ 4 cr. ]
|D1||IND||Lee||FLR ARR||R||6:00 pm – 9:00 pm|
|EL||IND||Lee||FLR ARR||R||6:00 pm – 9:00 pm|
MET CS 779 Advanced Database Management
This course covers advanced aspects of database management systems including advanced normalization and denormalization, query optimization, object-oriented and object-relational databases, data warehousing, data mining, distributed databases, XML, XSL, and databases for web applications. There is extensive coverage of SQL and database instance tuning. Students learn about the advanced object-relational features in DBMS such as Oracle, including navigational query, BLOBs, abstract data types, and methods. 4 credits. [ 4 cr. ]
|B1||IND||Schudy||FLR ARR||T||6:00 pm – 9:00 pm|
|EL||IND||Schudy||FLR ARR||T||6:00 pm – 9:00 pm|
(One course/4 credits)
Choose one additional course from the following:
MET CS 632 Information Technology Project Management
This course provides students with a comprehensive overview of the principles, processes, and practices of software project management. Students learn techniques for planning, organizing, scheduling, and controlling software projects. There is substantial focus on software cost estimation and software risk management. Students will obtain practical project management skills and competencies related to the definition of a software project, establishment of project communications, managing project changes, and managing distributed software teams and projects. [ 4 cr. ]
|D1||IND||Heda||FLR ARR||R||6:00 pm – 9:00 pm|
|EL||IND||Heda||FLR ARR||R||6:00 pm – 9:00 pm|
MET CS 633 Distributed Software Development and Management
This course prepares students to justify, lead, participate in, and maintain geographically distributed development (GDD) projects. Students study the technical and business implications of GDD. They also work in geographically dispersed teams to produce documented applications. No programming background is required. Prerequisites: MET CS 520 or MET CS 601 and MET CS 682. 4 credits. [ 4 cr. ]
MET CS 684 IT Security Policies and Procedures
This course enables IT professional leaders to identify emerging security risks and implement highly secure networks to support organizational goals. Discussion of methodologies for identifying, quantifying, mitigating and controlling risks. Students implement a comprehensive IT risk management plans (RMP) that identify alternate sites for processing mission-critical applications, and techniques to recover infrastructure, systems, networks, data and user access. The course also discusses related topics such as: disaster recovery, handling information security; protection of property, personnel and facilities; protection of sensitive and classified information, privacy issues, and criminal terrorist and hostile activities. [ 4 cr. ]
|D1||IND||Burgoyne||FLR ARR||R||6:00 pm – 9:00 pm|
|EL||IND||Burgoyne||FLR ARR||R||6:00 pm – 9:00 pm|
MET CS 693 Digital Forensics and Investigations
Provides a comprehensive understanding of digital forensics and investigation tools and techniques. Laboratory and hands-on assignments either in solo or in teams. 4 credits. [ 4 cr. ]
MET CS 695 Enterprise Information Security
The course provides an in-depth presentation of security issues in computer systems, networks, and applications. Formal security models are presented and illustrated on operating system security aspects, more specifically memory protection, access control and authentication, file system security, backup and recovery management, intrusion and virus protection mechanisms. Application level security focuses on language level security and various security policies; conventional and public keys encryption, authentication, message digest and digital signatures. Internet and intranet topics include security in IP, routers, proxy servers, and firewalls, application-level gateways, Web servers, file and mail servers. Discussion of remote access issues, such as dial-up servers, modems, VPN gateways and clients. [ 4 cr. ]
|A1||IND||Jacobs||FLR ARR||M||6:00 pm – 9:00 pm|
|EL||IND||Jacobs||FLR ARR||M||6:00 pm – 9:00 pm|
MET CS 703 Network Forensics
This course provides a comprehensive understanding of network forensic analysis principles. Within the context of forensics security, network infrastructures, topologies, and protocols are introduced. 4 credits. [ 4 cr. ]
MET CS 713 Advanced Digital Forensics
This course provides an introduction to the advanced digital forensic topic relating to malicious software (malware), which represents an increasing information security threat to computer systems and networks. Students will review software engineering design fundamentals and reverse engineering techniques utilized to conduct static and dynamic forensic analysis on computer systems and networks. Students will learn about the importance of forensic principles, legal considerations, digital evidence controls, and documentation of forensic procedures. This course will incorporate demonstrations and laboratory exercises to reinforce practical applications of course instruction and will require an independent research paper related to the course topic. [ 4 cr. ]
MET CS 783 Enterprise Architecture
This course builds upon the strong technical foundation of our MSCIS and MSCS curricula, by providing students with the CIO-level management perspective and skills of enterprise architecture, in the context of the technologies that implement those architectures. The course provides students with the understanding and skills needed to define and implement successful enterprise architectures that provide real value to organizations, such as substantially reducing IT costs while improving performance, agility and alignment of information technology to business goals. 4 credits. [ 4 cr. ]
View all Computer Science & IT graduate courses.