UAT-Online: Master of Science in Technology

Size: px
Start display at page:

Download "UAT-Online: Master of Science in Technology"

Transcription

1 UAT-Online: Master of Science in Technology Program Description The University provides within its graduate program an intellectual atmosphere in which a wide range of multidisciplinary technology, research and innovation creations can thrive. The program is designed to allow graduate students to pursue advanced coursework in applied advancing technology disciplines. Students entering the program without undergraduate and/or professional experience within the discipline being studied will be evaluated for proficiencies in the discipline as part of the admissions process and may be required to complete additional coursework considered foundational to advanced study in the area. Within their disciplines, students incorporate and utilize specialized knowledge leading to the completion of a sophisticated example of their discipline, be it Artificial Life Programming, Information Security, Software Engineering Technology Studies. The program focuses on principles, methods and tools that can be used for creating high-quality applications that serve the needs of end users. Examples of completed works include the utilization of web services, analysis of computer forensic tools and the development of an e-book interface, to name a few. Graduates of the program not only understand advanced concepts and apply best practices to their field, but are leaders within the technology environment. The unique features of this graduate program appeal to candidates already engaged in knowledge creation within their fields and those seeking advancement in their industry where additional educational credentials may be required. The program is accelerated; it offers the flexibility to adapt quickly to the changes endemic to high technology. How UAT-Online Works UAT-Online s Master of Science in Technology degree program has been developed to give students the ability to focus their attention on each individual course needed to become successful in these rapidly growing fields. All curriculum is predetermined, giving students the ability to be objective and goal-focused. In addition to core and elective courses, students are also required to successfully present and defend a Thesis (applied or analytical) displaying their understanding and expertise in their selected areas of study. Master of Science in Technology Tracks Artificial Life Programming Information Security Software Engineering Technology Studies Master of Science Core Course Descriptions MSC525 Organizational Leadership and Group Dynamics The theoretical study of small-group behavior and the role of the individual personality functioning in organizational settings will be explored. Topics covered include situational, physical and personality factors as they relate to group formation, as well as group leadership and effectiveness. MSC530 Research Methods in Technology This course emphasizes developing research methodology used in specific industrial segments. Skills required for conducting alternative approaches to qualitative and quantitative data collection and analysis, hypotheses, models and theories will be developed. The student will develop competence in the use of statistical packages for various analytical approaches. MSC535 Project Management This course covers all phases of project management. This course focuses on successful completion of the project through each phase, from opportunity recognition and strategic integration to team building, tracking and budget management. Included is a survey of tools and best practices. Applications include projects of differing scope. Small entrepreneurial projects are compared to division-level and enterprise-wide projects. Learning activities include exploration of case studies, problemsolving exercises and role-playing. MSC545 Forecasting Emergent Technologies This course explores methods used in industry practice to identify and capture emerging technologies. Learning activities include exploration of case studies and trending within the current market. There will be a project for this course in a technology area of interest to the student. MSC550 Colloquium in Technology Weekly presentations on topics by faculty and leaders from industry, informally describing their views of the state of the art of technology as a field, their experience in the field and informal research talks.

2 Artificial Life Programming Artificial Life (A-Life) involves breaking old programming paradigms in the software engineering field and moving forward with paradigms that mirror life systems. A-Life programming is revising the traditional scientific approach by simulating biological phenomena in digital environments to model biology and to extend the concepts of computing power into distributed computing networks that operate using biological theory. The graduate studies in A-Life track is appropriate for students with undergraduate degrees in biology, biotechnology, computer science, cognitive science, database, game programming, mathematics or similar majors. Explore and create examples of how A-Life programming is used in game and system security application. Understand and develop programs modeling real life organisms and situations. Research and discuss ways in which creating biological processes through programming can change our environment. Perform data analysis, algorithm and model development, and computational design and implementation. Identify, solve and deliver solutions to problems in areas of prediction algorithms and outcomes analysis. Develop algorithms, strategies and methodologies using the latest technologies in neural networks, machine learning, statistical modeling, pattern recognition and artificial intelligence to support model generation for computationally intelligent software components. Prototype and optimize algorithms in a software language. Develop test cases and strategies to demonstrate correct algorithm performance. Develop computational performance measures and testing strategies to demonstrate satisfactory execution times when solving problems. MSE555 Computer Programming Applications This course is designed to introduce the graduate student to programming complete computer applications for a variety of uses. Students will be given a foundation in programming concepts and applied skills to enable them to serve on applied development teams and complete fundamental programming tasks. MSE557 Life Systems This course is designed to introduce the programmer interested in advanced applications to the concepts and systems associated with natural life. Overviews of systems in biology, chemistry, genetics and evolutionary development are covered as well as modern systems theory overall. MSE590 Introduction to Artificial Life This course addresses issues of modeling and synthesizing life-like agents. Students will learn the theoretical and mathematical modeling of life-as-it-couldbe to applications of artificial life techniques in agent and software systems. Topics can include simulation of real and imaginary life forms and their evolution, selforganization, emergent behaviors, swarm intelligence, evolutionary robotics, agent-based simulations, adaptive, complex and biologically inspired ecosystems. MSE575 Robotics and Autonomous Agents The course gives students a general introduction to the design and programming of artificial autonomous systems. The question "What is an autonomous system?" will be explored. Students will discuss the technical and social aspects of robots in society and cover computer science topics as related to robotics. This course is designed to give students an introduction to the field, historical background and developments, and current research topics, as well as a practical introduction to how to actually make a robot move, learn and adapt to novel situations. MSE576 Evolutionary and Adaptive Systems This course presents an overview of the field of evolutionary and adaptive systems. The historical and philosophical foundations of evolutionary thought are explored within the context of computer simulations that model these behaviors. Topics can include self-organizing systems, natural selection, dynamic systems, Boolean networks, cellular automata, genetic algorithms, evolutionary robotics and others. Students are expected to develop artificial life models. MSE592 Introduction to Artificial Intelligence This course introduces the state-of-the-art in artificial intelligence (AI). Students will learn knowledge representation, inference, expert systems, natural language processing, machine learning, neural networks and robots. Topics can include the following aspects of AI: representation and search (including the predicate calculus, and heuristic and stochastic search methods), representation and intelligence (including knowledgeintensive and strong methods), machine learning (symbolbased, connectionist, social and emergent), problem solving (automated reasoning and natural language), language and programming techniques.

3 Information Security This curriculum track is designed to provide the student with graduate-level experience in applying security to networks and electronic data. Students entering this program without documented and appropriate background in information technology and essentials of security will complete 9 additional credits in applied development curriculum. Analyze network traffic for possible signs of intrusions or attacks. Review information to respond to malicious or covert code and security incidents. Reconstruct portions of a corporate network to recover from security issues. Re-architect a corporate network to address perimeter security and deployment of a firewall. Perform vulnerability assessment and evaluation of an infrastructure. Address layered security and computer network defense needs and challenges. MSE512 Network and Hardware Technology students with the necessary applied hardware knowledge and background to effectively continue with their network security program. Implementing information technology components in enterprise requires specialized knowledge in the design and deployment of networking technologies. This course will provide the applied skills and knowledge to build a network infrastructure and successfully deploy necessary hardware components. A team-based approach will be used to develop a network design, select and implement technologies, perform testing, troubleshooting and problem resolution. MSE513 Applied Systems Administration students with the necessary applied operating systems knowledge and background to effectively continue with their network security program. This course provides the knowledge and skills necessary to install, configure and manage client and server operating systems in standalone and networked environments. Hands-on and theoretical topics include how to install, configure and manage network services and directory services. Current industry standards will be reviewed. MSE514 Applied Security Essentials students with the necessary applied security knowledge and background to effectively continue with their network security program. This course will help you to design and implement an effective security strategy in a corporate network environment. This course will cover anti-virus tools, security policies, password management, risk analysis, security policies, network communication vulnerabilities, enhancing security with cabling and network hardware, understanding different types of firewalls, packet filtering and NAT, setting up and securing a virtual private network and understanding hacker exploits. Current industry trends will be reviewed. MSE520 Federal INFOSEC Standards and Regulations This course is a guide through the world of Federal and International information security standards that guide the way organizations are doing business today. Research and analysis are conducted on how US security regulations vary from industry to industry, including those in healthcare, education, military, federal matters, utilities and financial matters. International security standards will also be reviewed in order to understand the impact of implementing appropriate information security mechanisms in a global organization. MSE535 Security Assessment Methodology This course will examine the NSA's recommendation methods for conducting an organizational security assessment, including coordination with the customer, defining critical information within the organization, and compiling findings based on regulations, legislation, and policies for which the organization is liable to comply. Students will be required to attend the course and then participate in an actual IAM-based assessment. The documentation created during this course can be added to the student's portfolio. MSE539 Network Defense and Countermeasures This course presents the advanced topics in the art of defense for network protection including designing a network defense and security policies. Research and implement firewalls, VPNs and Intrusion Detection Systems, honey pots and other behavior-blocking software for effective setup, design and configuration. This course will provide solutions for identifying, assessing and preventing external and internal threats to your network in a multi-vendor environment. MSE633 Applied Red Team Tactics This course will focus on the application of red teaming concepts to accomplish security reviews through penetration testing, social engineering and other adversarial roles. The foundation of the mindset of the network security adversary is presented to obtain a better understanding of what has to be accomplished to protect systems and networks. MSE634 Covert Channels This course delves into the technical realm of Covert Channels and how to communicate outside the design of many systems. The applied tools and applications of the trade are utilized to create various types of hidden communication in order to better understanding how those mechanisms operate. The tools include steganography, network-based channels, text-based channels and operating system channels.

4 Software Engineering This track furthers advanced application production in the field of software engineering. Students without application development backgrounds receive foundations in the principles of software engineering, while elective courses allow significant applied research. Within the process, students will produce applied research projects and theses representative of the synthesis and analysis that occurs at the graduate level. Architecture of enterprise business applications. Guiding technology migrations. Implementation of cost and quality programs. Understanding all phases of the software development process, from design through final delivery. Requirements, definition, analysis, design, development and testing of enterprise data and services. Collection and creation of interface systems requirements, support, integration, testing and installation. MSE505 Computer Programming MSE515 Database Foundations This course will cover database systems. Students will learn how to develop a useful database, how to express operations on the database and how database programming is combined with conventional programming. Students will learn how to build a DBMS, including such matters as query processing, transaction processing and organizing storage for efficient access. MSE555 Computer Programming Applications This course is designed to introduce the graduate student to programming complete computer applications for a variety of uses. Students will be given a foundation in programming concepts and applied skills to enable them to serve on applied development teams and complete fundamental programming tasks. MSE561.NET Framework Foundation This course discusses.net framework specific issues that are language independent. Students will learn concepts related to the architecture of the.net framework, assemblies, interops, advance exception handling, XML regular expressions, serialization and primitives. MSE571 Application Testing and Metrics A key aspect of software production is reliability and robustness of the application. Application Testing and Metrics explores the most important testing procedures used in Industry. Topics may include Project Life Cycle, test scripts, test scenarios, test items, Static Testing, Dynamic Testing, Black Box Testing, White Box Testing, Function Testing and Non-Function Testing. MSE574 Deployment and Maintenance Issues This course will discuss issues related to techniques to deploy and update software such as patches and version control. MSE665 Advanced Topics in Software Engineering This course is an in-depth study of advanced software engineering tools or techniques. Topics may include C++, Java, JavaScript, and Visual Basic. MSE668 Software Architecture Students will delve into software architecture, its documentation, its design and its analysis. Issues associated with evaluating and facilitating software architectures will be explored.

5 Technology Studies Students in the Technology Studies track come from a wide range of backgrounds including history, anthropology/sociology, philosophy, the natural and physical sciences, engineering and numerous professional disciplines. The research and scholarly pursuits of students and faculty cross a wide range of disciplinary boundaries. Graduates emerge with an ability to identify and examine the conceptual and social dimensions of science and technology simultaneously and in historical perspective. Ability to articulate the cultural, social and economic influence of the Internet. Demonstrate a capacity to analyze and critique the development and deployment of military technologies within a given historical or socio-political framework. Articulate and explore the potential impacts of emerging technologies on the accepted social ethical contexts. Demonstrate a deep understanding of the philosophical underpinnings and relationships between technology and society and the cycle of change. MSE543 Philosophy of Technology This course is an introductory graduate course designed to help students become familiar with several major topics prominent in philosophy of technology and to develop skills in making and evaluating arguments about these and related topics. MSE553 Information Technology: Historical and Cultural Perspectives This is an introductory graduate course designed to provide students with an overview of the prominent developments in Information Technology from both a historical and cultural perspective. Students will develop an understanding of the development path of technologies through this exploration. MSE554 Contemporary Issues in Technology This introductory graduate course will explore contemporary issues within technology from a sociopolitical, economic and ethical perspective. Students will evaluate and discuss the relationship between technological innovation and social change from a value conflict and decision-making perspective. MSE605 Military Technology This graduate-level course is designed to provide the student with an overview of the development of military technologies with a focus on the changing needs of the military from World War II to the present. MSE606 Technology, Science and Labor This course provides the graduate student with an overview of the methods and processes through which technology and science have changed the shape of labor. Additional discussion will incorporate a near-futures perspective to the discussion. MSE607 Influence of the Internet This graduate-level course is designed to help students become familiar with the broad-reaching impact of the Internet from historical, cultural and political perspectives.

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

Cyber Defense Operation Center (CDOC) Ensuring that Experts are allways watching

Cyber Defense Operation Center (CDOC) Ensuring that Experts are allways watching (CDOC) Ensuring that Experts are allways watching Data Sheet Introduction CyberHat CDOC is an intelligent security operation center; which combines cutting edge technologies and innovative processes ensuring

More information

The Masters of Science in Information Systems & Technology

The Masters of Science in Information Systems & Technology The Masters of Science in Information Systems & Technology College of Engineering and Computer Science University of Michigan-Dearborn A Rackham School of Graduate Studies Program PH: 313-593-5361; FAX:

More information

Business Management and Leadership (MS)

Business Management and Leadership (MS) Business Management and Leadership (MS) ACADEMIC DIRECTOR: B. Loerinc Helft CUNY School of Professional Studies 101 West 31 st Street, 7 th Floor New York, NY 10001 Email Contact: B. Loerinc Helft, b.loerinc.helft@cuny.edu

More information

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT Page 1 of 5 A. Advanced Mathematics for CS A1. Line and surface integrals 2 2 A2. Scalar and vector potentials 2 2 A3. Orthogonal curvilinear coordinates 2 2 A4. Partial differential equations 2 2 4 A5.

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

Doctor of Philosophy in Informatics

Doctor of Philosophy in Informatics Doctor of Philosophy in Informatics 2014 Handbook Indiana University established the School of Informatics and Computing as a place where innovative multidisciplinary programs could thrive, a program where

More information

The Masters of Science in Information Systems & Technology

The Masters of Science in Information Systems & Technology The Masters of Science in Information Systems & Technology College of Engineering and Computer Science University of Michigan-Dearborn A Rackham School of Graduate Studies Program PH: 1-59-561; FAX: 1-59-692;

More information

Masters in Information Technology

Masters in Information Technology Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101

More information

UF EDGE brings the classroom to you with online, worldwide course delivery!

UF EDGE brings the classroom to you with online, worldwide course delivery! What is the University of Florida EDGE Program? EDGE enables engineering professional, military members, and students worldwide to participate in courses, certificates, and degree programs from the UF

More information

Master of Science in Software Engineering Student Guide

Master of Science in Software Engineering Student Guide King Fahd University of Petroleum & Minerals College of Computer Sciences and Engineering Information and Computer Science Department Master of Science in Software Engineering Student Guide http://www.ccse.kfupm.edu.sa/swe/

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT UNDERGRADUATE Bachelor's programs Bachelor of Business Administration with a concentration in information systems and technology management (http:// bulletin.gwu.edu/business/undergraduate-programs/

More information

OVERVIEW DEGREES & CERTIFICATES

OVERVIEW DEGREES & CERTIFICATES OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

More information

KMU International School

KMU International School KMU International School General Education 1. Writing & Critical Reasoning As a modern global intellectual, the student fosters his or her writing ability and capability of expression so that he or she

More information

train, smog check, suspension and steering, brake repair theory and hands-on training.

train, smog check, suspension and steering, brake repair theory and hands-on training. 62 Allied HEALTH Students successfully completing the Allied Health Associate in Science Degree have a solid foundation for pursuing further education in a variety of health care fields. Demonstrate foundational

More information

UF EDGE brings the classroom to you with online, worldwide course delivery!

UF EDGE brings the classroom to you with online, worldwide course delivery! What is the University of Florida EDGE Program? EDGE enables engineering professional, military members, and students worldwide to participate in courses, certificates, and degree programs from the UF

More information

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces

More information

Telecommunication (120 ЕCTS)

Telecommunication (120 ЕCTS) Study program Faculty Cycle Software Engineering and Telecommunication (120 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program This master study

More information

College of Communication and Information. Library and Information Science

College of Communication and Information. Library and Information Science 510 CHILDREN S LITERATURE AND RELATED MATERIALS. (3) A survey of children s literature, traditional and modern. Reading and evaluation of books with multimedia materials with emphasis on the needs and

More information

k. p.142-146 MIS program section is replaced with following content.

k. p.142-146 MIS program section is replaced with following content. j. p.12: Following seven new specializations in MIS are added to the programs list. Knowledge Management Data Management Business Intelligence and Data Analytics Cybersecurity Enterprise Project Management

More information

Curriculum for Doctoral Studies in Information Systems

Curriculum for Doctoral Studies in Information Systems Faculty of Arts and Social Sciences Curriculum for Doctoral Studies in Information Systems Curriculum Approval The curriculum was approved by the Faculty Board of Arts and Social Sciences on 29 January

More information

Masters in Computing and Information Technology

Masters in Computing and Information Technology Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

College of Communication and Information. Library and Information Science

College of Communication and Information. Library and Information Science 510 CHILDREN S LITERATURE AND RELATED MATERIALS. (3) A survey of children s literature, traditional and modern. Reading and evaluation of books with multimedia materials with emphasis on the needs and

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Marketing Communications

Marketing Communications Berkeley College Overview Academic Programs Marketing Communications MKT220 Principles of Marketing Admissions and Finances Administration, Faculty, and Staff Provides an introduction to the fundamental

More information

Curriculum for postgraduate studies in Micro-data Analysis

Curriculum for postgraduate studies in Micro-data Analysis Curriculum for postgraduate studies in Micro-data Analysis Beslut: FuN 2012-10-01 Revidering: FuN 2012-12-04 Dnr: DUC 2012/1533/90 Gäller fr.o.m.: 2012-10-01 Ansvarig för uppdatering: Studierektor för

More information

Development (60 ЕCTS)

Development (60 ЕCTS) Study program Faculty Cycle Software and Application Development (60 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 60 Offered in Tetovo Description of the program The objectives of the

More information

Description of the program

Description of the program Study program Faculty Cycle Software Engineering Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program The Masters programme in Software Engineering

More information

INFORMATION SYSTEMS (INFO)

INFORMATION SYSTEMS (INFO) VCU 1 INFORMATION SYSTEMS (INFO) INFO 160. Digital Literacy: Computer Concepts, Internet, Digital Devices. 1 Hour. Semester course; 1 credit. Overview of basic computer concepts, the Internet, new technologies

More information

The College of Science Graduate Programs integrate the highest level of scholarship across disciplinary boundaries with significant state-of-the-art

The College of Science Graduate Programs integrate the highest level of scholarship across disciplinary boundaries with significant state-of-the-art GRADUATE PROGRAMS The College of Science Graduate Programs integrate the highest level of scholarship across disciplinary boundaries with significant state-of-the-art research centers and experiential

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey

More information

Computer/Information Science Course Descriptions

Computer/Information Science Course Descriptions Computer/Information Science Course Descriptions COMS 1003: Introduction to Computer Based Systems Provides students with both computer concepts and hands-on applications. Although little or no prior computer

More information

Master of Science in Health Information Technology Degree Curriculum

Master of Science in Health Information Technology Degree Curriculum Master of Science in Health Information Technology Degree Curriculum Core courses: 8 courses Total Credit from Core Courses = 24 Core Courses Course Name HRS Pre-Req Choose MIS 525 or CIS 564: 1 MIS 525

More information

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) Computer Science (COSC) courses are offered by the School of Information Arts and Technologies within the Yale Gordon College of Liberal Arts.

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

BA Psychology (2014 2015)

BA Psychology (2014 2015) BA Psychology (2014 2015) Program Information Point of Contact Marianna Linz (linz@marshall.edu) Support for University and College Missions Marshall University is a multi campus public university providing

More information

Master of Science in Software Engineering

Master of Science in Software Engineering Master of Science in Software Engineering The MSc in Software Engineering provides a thorough grounding in how to apply rigorous engineering principles to deliver elegant, effective software solutions

More information

M.S. Computer Science Program

M.S. Computer Science Program M.S. Computer Science Program Pre-requisite Courses The following courses may be challenged by sitting for the placement examination. CSC 500: Discrete Structures (3 credits) Mathematics needed for Computer

More information

Master of Science in Computer Science Information Systems

Master of Science in Computer Science Information Systems Master of Science in Computer Science Information Systems 1. General Admission Requirements. Admission to Graduate Studies (see graduate admission requirements). 2. Program Admission. In addition to meeting

More information

Program Introduction Course Curriculum Individual Course Descriptions Core Courses... 7

Program Introduction Course Curriculum Individual Course Descriptions Core Courses... 7 Contents Program Introduction... 3 Course Curriculum... 4 Individual Course s... 7 Core Courses... 7 BCS Specialization Courses Database Development... 14 BCS Specialization Courses Software Engineering...

More information

Interdisciplinary Master s study program in Computer Science and Mathematics

Interdisciplinary Master s study program in Computer Science and Mathematics Interdisciplinary Master s study program in Computer Science and Mathematics Study program cycle: Second cycle study program. Anticipated academic title: Master Engineer in Computer Science and Mathematics.

More information

Educational Technology Department Updated Course Descriptions. July 1, 2015

Educational Technology Department Updated Course Descriptions. July 1, 2015 Educational Technology Department Updated Course Descriptions July 1, 2015 EDTC 612 Technology in the Math/ Science Curriculum (3) This course focuses on the use of math/ science technology to find new

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

Bachelor of Information Technology

Bachelor of Information Technology Bachelor of Information Technology Detailed Course Requirements The 2016 Monash University Handbook will be available from October 2015. This document contains interim 2016 course requirements information.

More information

Prescriptions and Schedule of Papers for 2008

Prescriptions and Schedule of Papers for 2008 Prescriptions and Schedule of Papers for 2008 Mode of Delivery * = Not available in 2008 B1, B2, B3 = Available as a block course E, E1, E2 = Available extramurally F1 = Face to face teaching I, I1, I2,

More information

The Open Cyber Challenge Platform *

The Open Cyber Challenge Platform * The Open Cyber Challenge Platform * Jacob Fonseca, Kevin Bryan, Lisa DiPippo, Victor Fay-Wolfe * Supported By The U.S. National Science Foundation grants: Federal Cyber Service Scholarship For Service

More information

College of Communications and Information Studies

College of Communications and Information Studies 510 CHILDREN S LITERATURE AND RELATED MATERIALS. (3) A survey of children s literature, traditional and modern. Reading and evaluation of books with multimedia materials with emphasis on the needs and

More information

Master of Science in Artificial Intelligence

Master of Science in Artificial Intelligence Master of Science in Artificial Intelligence Options: Engineering and Computer Science (ECS) Speech and Language Technology (SLT) Big Data Analytics (BDA) Faculty of Engineering Science Faculty of Science

More information

Vanderbilt University Biomedical Informatics Graduate Program (VU-BMIP) Proposal Executive Summary

Vanderbilt University Biomedical Informatics Graduate Program (VU-BMIP) Proposal Executive Summary Vanderbilt University Biomedical Informatics Graduate Program (VU-BMIP) Proposal Executive Summary Unique among academic health centers, Vanderbilt University Medical Center entrusts its Informatics Center

More information

CORE CLASSES: IS 6410 Information Systems Analysis and Design IS 6420 Database Theory and Design IS 6440 Networking & Servers (3)

CORE CLASSES: IS 6410 Information Systems Analysis and Design IS 6420 Database Theory and Design IS 6440 Networking & Servers (3) COURSE DESCRIPTIONS CORE CLASSES: Required IS 6410 Information Systems Analysis and Design (3) Modern organizations operate on computer-based information systems, from day-to-day operations to corporate

More information

General Education Foundations F1 - Composition & Rhetoric 3-6 ENGL 101 & ENGL 102

General Education Foundations F1 - Composition & Rhetoric 3-6 ENGL 101 & ENGL 102 Computer Science 1 Computer Science Nature of Program Computer science is a discipline that involves the understanding and design of computational processes. The discipline ranges from a theoretical study

More information

Course Descriptions November 2014

Course Descriptions November 2014 Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)

More information

Clayton State University Master of Health Administration Program Fall 2009 Assessment

Clayton State University Master of Health Administration Program Fall 2009 Assessment Clayton State University Master of Health Administration Program Fall 2009 Assessment MHA Program Mission: The mission of the Health Care Management program is to prepare ethical and socially responsible

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult

More information

Doctor of Philosophy (Ph.D.), Major in. Geographic Information Science. Ph.D. Program. Educational Goal. Admission Policy. Advancement to Candidacy

Doctor of Philosophy (Ph.D.), Major in. Geographic Information Science. Ph.D. Program. Educational Goal. Admission Policy. Advancement to Candidacy Texas State University 1 Doctor of Philosophy (Ph.D.), Major in Geographic Information Science Ph.D. Program The course curriculum for the doctoral degree is designed to provide depth and breadth of knowledge

More information

BS Environmental Science (2013-2014)

BS Environmental Science (2013-2014) BS Environmental Science (2013-2014) Program Information Point of Contact Brian M. Morgan (brian.morgan@marshall.edu) Support for University and College Missions Marshall University is a multi-campus public

More information

Information Technology Department

Information Technology Department Information Technology Department Information Technology Department About Us The Information Technology Department is one of the largest departments at Ahlia University, offering thirty five undergraduate

More information

Computer Security & Information Assurance MS Program

Computer Security & Information Assurance MS Program Computer Security & Information Assurance MS Program in a Nutshell 2005-2006 Graduate Security and Information Assurance Program in a Nutshell Department of Computer Science Rochester Institute of Technology

More information

CENTER OF BASICS SCIENCE COMPUTER SYSTEMS ENGINEER (Curriculum 2016)

CENTER OF BASICS SCIENCE COMPUTER SYSTEMS ENGINEER (Curriculum 2016) OBJECTIVE To form engineers on Computer Systems that designs, develop, implements and automates technology systems in the areas of: Software, Networking and Hardware adapting the new technologies to the

More information

Accounting. Management. Environment of Business. Business Law for Accountants. Stats Business & Econ I. Management

Accounting. Management. Environment of Business. Business Law for Accountants. Stats Business & Econ I. Management Undergraduate Courses: Course # Course Title Course Description BUS201 Financial An introduction to basic accounting principles for measuring and Accounting communicating financial data about a business

More information

BSc (Honours) Computer Science

BSc (Honours) Computer Science BSc (Honours) Computer Science Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers. Current

More information

College of Business & Economics Courses MANAGEMENT COURSES (250)

College of Business & Economics Courses MANAGEMENT COURSES (250) College of Business & Economics Courses MANAGEMENT COURSES (250) Field trips may be required for any of the courses. Students should check with the Associate Dean, College of Business and Economics, to

More information

Electrical and Computer Engineering

Electrical and Computer Engineering Electrical and Computer Engineering-1 Undergraduate Bulletin 2016-2017 Electrical and Computer Engineering Faculty: Hernandez, Chair, Adegbege, Deese, Katz, Kim, Pearlstein The Department of Electrical

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

Traditional vs Software Defined Networking

Traditional vs Software Defined Networking Traditional vs Software Defined Networking Why a new perspective on network management is inevitable IT industry has enjoyed innovation such as virtualization in computing and storage. The end is nowhere

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

Graphic Communication (GRC)

Graphic Communication (GRC) 2015-2017 Cal Poly Catalog 1 Graphic Communication (GRC) GRC Courses GRC 101. Introduction to Graphic Communication. 3 Graphic communication history, theory, processes, applications, and practices. New

More information

Fighting Advanced Threats

Fighting Advanced Threats Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.

More information

INSTRUCTIONAL TECHNOLOGY

INSTRUCTIONAL TECHNOLOGY INSTRUCTIONAL TECHNOLOGY Department of Computer Science and Information Technology Program Contact Information Yefim Kats, Ph.D., Department Chair and Graduate Program Coordinator Program Offerings Master

More information

CAST Center for Advanced Security Training

CAST Center for Advanced Security Training CAST Center for Advanced Security Training Advanced Security Training (CAST) EC-Council s Center for Advanced Security Training (CAST) was created to address the need for highly technical and Advanced

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

HAMPTON UNIVERSITY ONLINE Hampton University School of Business PhD in Business Administration

HAMPTON UNIVERSITY ONLINE Hampton University School of Business PhD in Business Administration Program Overview The PhD in Business Leadership and Administration is designed for professionals located nation wide who desire an advanced degree in business to excel in their careers. In addition, the

More information

Curriculum for Doctoral Studies in Business Administration at Karlstad University

Curriculum for Doctoral Studies in Business Administration at Karlstad University HS 2014/499 Faculty of Arts and Social Sciences Curriculum for Doctoral Studies in Business Administration at Karlstad University 1. Curriculum Approval The curriculum was approved by the Faculty Board

More information

Faculty of Organizational Sciences

Faculty of Organizational Sciences Faculty of Organizational Sciences Management EC TS: 60/ L anguage of instruc tion: serbian/ degree: Specialis t Specialized academic study program in Management is the continuation of Master s studies

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Bryan Rolle Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Apply today: strayer.edu/apply FLEXIBLE /

More information

Faculty of Organizational Sciences

Faculty of Organizational Sciences Faculty of Organizational Sciences Management EC TS: 60/ L anguage of instruc tion: Serbian/ degree: M A S TER The Master s degree study program of Management is the continuation of undergraduate studies

More information

School of Advanced Studies Doctor Of Management In Organizational Leadership/information Systems And Technology. DM/IST 004 Requirements

School of Advanced Studies Doctor Of Management In Organizational Leadership/information Systems And Technology. DM/IST 004 Requirements School of Advanced Studies Doctor Of Management In Organizational Leadership/information Systems And Technology The mission of the Information Systems and Technology specialization of the Doctor of Management

More information

Department of Management

Department of Management Department of Management Course Student Learning Outcomes (ITM and MGMT) ITM 1270: Fundamentals of Information Systems and Applications Upon successful completion of the course, a student will be able

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMANT (MSc[LIM])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMANT (MSc[LIM]) 268 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMANT (MSc[LIM]) (See also General Regulations) Any publication based on work approved for a higher degree should contain

More information

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments. Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?

More information

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

The Department of Education. in Science and Technology

The Department of Education. in Science and Technology The Department of Education in Science and Technology Graduate Studies M.Sc. and Ph.D. Programs January 2013 Table of Contents 1. Overview: M.Sc. and Ph.D. Graduate Studies programs in Science and Technology

More information

Communication, Journalism, Telecommunications (Graduate)

Communication, Journalism, Telecommunications (Graduate) 601 PROSEMINAR IN COMMUNICATION. (3) Introduction to graduate study; theory and systems, research strategies. Prereq: Graduate standing in communication or consent of instructor. 608 MASS COMMUNICATIONS

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

A New Undergraduate Major: Interactive Media and Game Development

A New Undergraduate Major: Interactive Media and Game Development A New Undergraduate Major: Interactive Media and Game Development David Finkel, Mark Claypool, Michael A. Gennert Department of Computer Science Fred Bianchi, Dean O Donnell, Patrick Quinn Department of

More information

COME JOIN US ON THE FRONTIER

COME JOIN US ON THE FRONTIER COME JOIN US ON THE FRONTIER YOUR PASSION IS TECHNOLOGY Whether it s designing video games, writing programs or developing network security, you love it and you spend many of your waking hours intensely

More information

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

Cisco Security Certifications

Cisco Security Certifications Cisco Security Certifications Learning@Cisco Increasing Demand for Practical Network Security Skills Cisco has taken note of the evolution of the role of the network security professional and its relevance

More information

National Qualifications Framework for Higher Education in Thailand IMPLEMENTATION HANDBOOK

National Qualifications Framework for Higher Education in Thailand IMPLEMENTATION HANDBOOK National Qualifications Framework for Higher Education in Thailand IMPLEMENTATION HANDBOOK November 2006 National Qualifications Framework for Higher Education in Thailand Implementation Handbook Table

More information

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP belka@att.net Security Security is recognized as essential to protect vital processes and the systems that provide those

More information

Computer Information Systems

Computer Information Systems Computer Information System Courses Description 0309331 0306331 0309332 0306332 0309334 0306334 0309341 0306341 0309353 0306353 Database Systems Introduction to database systems, entity-relationship data

More information