(Six courses/24 credits)
The goal of this course is to provide Computer Information Systems students with the mathematical fundamentals required for successful quantitative analysis of problems in the field of business computing. The first part of the course introduces the mathematical prerequisites for understanding probability and statistics. Topics include combinatorial mathematics, functions, and the fundamentals of differentiation and integration. The second part of the course concentrates on the study of elementary probability theory, discrete and continuous distributions. 4 cr [ 4 cr.]
This course presents the foundations of data communications and takes a bottom-up approach to computer networks. The course concludes with an overview of basic network security and management concepts. 4 credits. [ 4 cr.]
Students learn the latest relational and object-relational tools and techniques for persistent data and object modeling and management. Students gain extensive hands-on experience using Oracle or Microsoft SQL Server as they learn the Structured Query Language (SQL) and design and implement databases. Students design and implement a database system as a term project. class. 4 credits. [ 4 cr.]
Object-oriented methods of information systems analysis and design for organizations with data- processing needs. System feasibility; requirements analysis; database utilization; Unified Modeling Language; software system architecture, design, and implementation, management; project control; and systems-level testing. [ 4 cr.]
This course provides an overview of contemporary I.T. management. It explains the relevant issues of effectively managing information services. The course highlights areas of greatest current and potential application of I.T. to business needs and reviews electronic business, enterprise business systems, and decision support systems. [ 4 cr.]
And one of the following:
This course covers the concepts of object-oriented approach to software design and development using the Java programming language. It includes a detailed discussion of programming concepts starting with the fundamentals of data types, control structures methods, classes, applets, arrays and strings, and proceeding to advanced topics such as inheritance and polymorphism, interfaces, creating user interfaces, exceptions, and streams. Upon completion of this course the students will be able to apply software engineering criteria to design and implement Java applications that are secure, robust, and scalable.
MET CS 200 Fundamentals of Information Technology; recommended to students with no programming background. Or Instructor's Consent. [ 4 cr.]
Computer Networks continue to grow and diversify at unprecedented rate. Much of that diversification is in how the media are utilized. One can not truly understand networking, analyze alternatives or design good networks without a solid founding in how the media are utilized. This course will explore current and expected media technologies with the intent of understanding what they offer and the trade-offs they present. The course will cover both wireline (Ethernet, DOCSIS, MPLS, ATM) and wireless (802.11, Wi-Max, Zigbee, Bluetooth, etc). The course will analyze the technologies to consider their error characteristics, support for quality of service, congestion control, and security, and their manageability. [ 4 cr.]
Grad Prereq: MET CS 231 ; MET CS 232 ; MET TC 535; CS 231 or CS 232 and TC 535 or consent of the instructor.
This course covers computer networks management including configuration, fault, performance, as well as security management. Particular focus and emphasis is given to security management. Problem solving techniques and network management tools are discussed and practiced during extensive laboratory sessions. Topics include LAN and WAN network management, fault detection, configuration, security, performance, accounting management. Strong focus on problem-solving techniques and network management tools based on SNMP, detailed discussion of multi-user computer systems security techniques, basics of cryptography, authentication techniques, and Kerberos, Secure operating systems. Software protection. Electronic mail. Web Security, IPsec, e-commerce: payment protocols, electronic cash. Risk assessment. [ 4 cr.]
This course will cover advanced network security issues and solutions. The main focus on the first part of the course will be on Security basics, i.e. security services, access controls, vulnerabilities, threats and risk, network architectures and attacks. In the second part of the course, particular focus and emphasis will be given to network security capabilities and mechanisms (Access Control on wire-line and wireless networks), IPsec, Firewalls, Deep Packet Inspection and Transport security. The final portion of the course will address Network Application security (Email, Ad-hoc, XML/SAML and Services Oriented Architecture security. As part of our course review we will explore a number of Network Use Cases. 4 credits. [ 4 cr.]
The course provides an in-depth presentation of security issues in computer systems, networks, and applications. Formal security models are presented and illustrated on operating system security aspects, more specifically memory protection, access control and authentication, file system security, backup and recovery management, intrusion and virus protection mechanisms. Application level security focuses on language level security and various security policies; conventional and public keys encryption, authentication, message digest and digital signatures. Internet and intranet topics include security in IP, routers, proxy servers, and firewalls, application-level gateways, Web servers, file and mail servers. Discussion of remote access issues, such as dial-up servers, modems, VPN gateways and clients. [ 4 cr.]