Guidelines for Establishment of Contract Areas Computer Science Department

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Guidelines for Establishment of Contract Areas Computer Science Department"

Transcription

1 Guidelines for Establishment of Contract Areas Computer Science Department Current 07/01/07 Statement: The Contract Area is designed to allow a student, in cooperation with a member of the Computer Science Graduate Faculty (the Advisor ), to design a customized area of specialization. It will consist of 2 courses, selected by the student and the Advisor. The area can be used as one of the two areas tested by the Comprehensive Exam; the questions for the exam will be set by and graded by the Advisor. Alternately, the Contract Area may be used to design and implement a major software development product, possibly in connection with a business or other application area need. In this case, the Comprehensive Examination may take the form of a written and oral report. The student s advisor together with the Director of Graduate Studies will determine when this is appropriate. In addition to the customized areas, certain pre-defined Contract areas may be available. These are described below. Any course included in a Contract Area, especially one being taught for the first time or any Reading Course, must have a well-defined syllabus (including a topic list). Procedure for Establishing a Contract Area: 1. The student identifies and secures the cooperation of a member of the department s Graduate Faculty to serve as an Advisor. 2. The student and Advisor write a description of the area of study and specify the two courses to be taken. The description should a) state the purpose of the Area and b) should explain the learning outcomes and knowledge to be gained as well as c) the rationale for the particular course combination proposed. 3. This proposal and the syllabus/topic list is submitted to the Director of Graduate Studies for approval. It is expected that if any disagreement should arise, the Graduate Studies Committee will be consulted. Pre-defined Contract Areas: The department may from time to time specify pre-defined contract areas which reflect the department s special expertise and/or ongoing research activities. Current Predefined Contract areas may be found here.

2 Further Notes: 1. The creation of a contract area must not be retroactive. That is, the latest that a Contract Area can be established is before the end of the first course in the twocourse sequence. 2. All courses in a Contract Area must be well-defined. That is, a syllabus and topic list, normally including most of the following items must be available: a reading list, a project to be undertaken, software to be developed, specification of a final report, or other activities to be undertaken or products to be produced. This definition must be sufficiently detailed and specific that the Director of Graduate Studies is satisfied that the student s performance in the course can be clearly established. These materials are part of the Contract Area proposal. 3. Two Reading Courses (CSCI 597) may constitute a Contract Area. Students and advisors should be aware that a maximum of 6 credit hours of CSCI 597 is allowed by the catalog rules. 4. There is nothing to prevent a student from using two Contract Areas to fulfill the Comprehensive Exam requirements. 5. If the Director of Graduate Studies rejects a proposed Contract Area, the faculty Advisor for the proposal may appeal to the Graduate Studies Committee. 6. A Director of Graduate Studies wishing to serve as an Advisor for a Contract Area should consult the head of the Graduate Studies Committee for approval.

3 Pre-Defined Contract Areas Computer Science Department Current 07/01/07 The descriptions given below are meant to provide recommendations, but may be modified to some extent according to the student s background and interests, in consultation with the student s Advisor. The Director of Graduate Studies can suggest which faculty members can be approached for further information and to serve as an advisor for these areas. CyberSecurity Contract Area CyberSecurity involves protecting information that is maintained and handled by computer systems by preventing, detecting, and responding to attacks. It seems that everything relies on computers and the Internet now communication ( , cell phones), entertainment (digital cable, mp3s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), and the list goes on. Our new courses on CyberSecurity teach the risks and threats that exist in modern computer systems and networks and how to counteract and protect against them: Contract Area Details: The student must take 2 courses (6 credit hours), consisting of CSCI 550 Principles of Computer Security And one of the following: CSCI 552 Telecommunications and Network Security CSCI 554 Computer Security Management. The comprehensive exam will have a section covering this area. Course Details: CSCI 550: PRINCIPLES OF COMPUTER SECURITY is a survey of security considerations as they apply to computer and information systems. Topics include access control, security models and architecture, physical security, networking security, cryptography, disaster mitigation and recovery, and legal and ethical issues. Computer security, privacy, and authentication are perennial problems in modern networked computer systems. This course will provide graduate students with an opportunity to study the nature of the threats, some of their technical details, prevention, recovery and countermeasures. CSCI 552: TELECOMMUNICATIONS AND NETWORKING SECURITY is a survey of security threats and countermeasures as they apply to a telecommunication and networking system. Topics covered include: network security threats, security protocol

4 and implementation, firewall design, wireless network security, and network security architecture. Telecommunications and networking use various mechanisms, devices, software, and protocols that are interrelated and integrated. Security professionals must know networking software, protocols, services, devices and interoperability issues in order to identify the vulnerabilities within a network. This course studies the nature of the threats in a network, network security protocols and security system that could provide various countermeasures to secure the network. CSCI 554: COMPUTER SECURITY MANAGEMENT is a survey of security considerations as they apply to the management of business processes and information. Topics include: planning, policies, protocols of security practices, access models and frameworks, incident response plans, asset protection and recovery. Information Security is no longer the sole responsibility of technology personnel. Business managers must be aware of the importance and impact of business models and decision on the security of essential business processes and information.

5 Bioinformatics Bioinformatics is the use of mathematics, statistics, computer science, artificial intelligence, chemistry and biochemistry to solve biological problems, usually on the molecular level. An important subfield of bioinformatics is genomics, which deals with the genome, the DNA that stores the sum of an organism s hereditary information. The representation of DNA as a very long string over a 4-character alphabet (A, C, G, and T) allows a variety of computer science concepts and techniques to be brought to bear on important problems in biology. Genome annotation, for example, deals with finding the substrings of the genome that represent genes. Once the genes are located, scientists try to identify the biological function of each gene. Major research efforts in bioinformatics include sequence alignment, gene finding, genome assembly, protein structure alignment, protein structure prediction, prediction of gene expression and protein-protein interactions, and the modeling of evolution. Work in bioinformatics involves many areas of Computer Science, including algorithms, databases, pattern recognition, data mining, string processing, visual display of information, and topics related to storing and processing of very large data sets. For both historical and practical reasons, much programming in bioinformatics is done in Perl. Students interested in further study, research or possible employment in Bioinformatics may be interested in this contract area. Students may also be interested in this contract area if they are interested in understanding modern biological science from a computational point of view, or if they simply are interested in a novel application area where they can apply techniques from almost every area of Computer Science. To ensure a solid grounding in the fundamentals of Bioinformatics, the two required courses for the Bioinformatics contract area will generally be: Bioinformatics (may be taken as CSCI 580G or BIOS 545). Pattern Recognition (CSCI 580R). These courses may be taken in either order. The Comprehensive Exam for the Bioinformatics contract area as defined here will be based on these two courses. For students planning continued study, research, or possible employment in Bioinformatics, the following elective is highly recommended: Programming for Bioinformatics (BIOS 546). Students who have completed the Bioinformatics course and are ready for a research experience may be eligible for the following research workshop: Genome Annotation (CSCI 580N).

6 Students interested in the Bioinformatics contract area should contact Dr. Freedman. Information specifically regarding CSCI 580R Pattern Recognition may be obtained from Dr. Zhou. Further study in biology is valuable for advanced work in Bioinformatics but requires an undergraduate background in biology. Students who believe that their background may be suitable should contact Dr. Johns in the Department of Biological Sciences.

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Ph.D. in Bioinformatics and Computational Biology Degree Requirements

Ph.D. in Bioinformatics and Computational Biology Degree Requirements Ph.D. in Bioinformatics and Computational Biology Degree Requirements Credits Students pursuing the doctoral degree in BCB must complete a minimum of 90 credits of relevant work beyond the bachelor s degree;

More information

REGULATIONS FOR THE DEGREE OF BACHELOR OF SCIENCE IN BIOINFORMATICS (BSc[BioInf])

REGULATIONS FOR THE DEGREE OF BACHELOR OF SCIENCE IN BIOINFORMATICS (BSc[BioInf]) 820 REGULATIONS FOR THE DEGREE OF BACHELOR OF SCIENCE IN BIOINFORMATICS (BSc[BioInf]) (See also General Regulations) BMS1 Admission to the Degree To be eligible for admission to the degree of Bachelor

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 244 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

Bachelor of Science Degree in Biology

Bachelor of Science Degree in Biology B.S. Degree in Biology / 1 Bachelor of Science Degree in Biology The Bachelor of Science degree in Biology is designed to prepare students for professional careers in the biological sciences, medical and

More information

Russ College of Engineering and Technology. Revised 9/06. 2. Undergraduate GPA of 3.0/4.0 or equivalent.

Russ College of Engineering and Technology. Revised 9/06. 2. Undergraduate GPA of 3.0/4.0 or equivalent. Requirements and Guidelines for the Master of Science Degree in Biomedical Engineering Revised 9/06 I. Minimum Entrance Requirements Admission is subject to final approval by the BME Graduate Committee.

More information

Doctor of Philosophy in Informatics

Doctor of Philosophy in Informatics Doctor of Philosophy in Informatics 2014 Handbook Indiana University established the School of Informatics and Computing as a place where innovative multidisciplinary programs could thrive, a program where

More information

M.S. AND PH.D. IN BIOMEDICAL ENGINEERING

M.S. AND PH.D. IN BIOMEDICAL ENGINEERING M.S. AND PH.D. IN BIOMEDICAL ENGINEERING WHEREAS, the Board of Visitors recently approved the Virginia Tech-Wake Forest University School of Biomedical Engineering and Sciences (SBES) to form a joint research

More information

UF EDGE brings the classroom to you with online, worldwide course delivery!

UF EDGE brings the classroom to you with online, worldwide course delivery! What is the University of Florida EDGE Program? EDGE enables engineering professional, military members, and students worldwide to participate in courses, certificates, and degree programs from the UF

More information

K 066/875. Master Curriculum. Bioinformatics. (in English)

K 066/875. Master Curriculum. Bioinformatics. (in English) K 066/875 Master Curriculum Bioinformatics (in English) 29. Sitzung der CPK, 17.6.2013 Mitteilungsblatt vom 26.06.2013 25. Stk. Pkt. 168 Version IV.5 5_MS_Bioinformatics_Curriculum Seite 1 von 10 Inkrafttreten:

More information

M.S. in Computer Science

M.S. in Computer Science 1 M.S. in Computer Science Degree Requirements Students will meet with the graduate advisor to assist them in formulating a program of study and selecting a possible specialization. The 30 credit requirement

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 299 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION 1 Awarding Institution: University of Exeter 2 School(s)/Teaching Institution: School of Biosciences 3 Programme accredited/validated by: 4 Final Award(s): MSc Medical Informatics

More information

BIO 3350: ELEMENTS OF BIOINFORMATICS PARTIALLY ONLINE SYLLABUS

BIO 3350: ELEMENTS OF BIOINFORMATICS PARTIALLY ONLINE SYLLABUS BIO 3350: ELEMENTS OF BIOINFORMATICS PARTIALLY ONLINE SYLLABUS NEW YORK CITY COLLEGE OF TECHNOLOGY The City University Of New York School of Arts and Sciences Biological Sciences Department Course title:

More information

CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS

CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS PROGRAM MODIFICATION DATE: 12.06.06 PROGRAM AREA: BIOLOGY AND BUSINESS AND ECONOMICS SEMESTER /YEAR FIRST EFFECTED: FALL 2007 Please use the following format

More information

2006 07 PETITION/PROGRAM SHEET Degree: Bachelor of Science Major: Computer Science www.mesastate.edu/schools/snsm/csms

2006 07 PETITION/PROGRAM SHEET Degree: Bachelor of Science Major: Computer Science www.mesastate.edu/schools/snsm/csms 06 07 PETITION/PROGRAM SHEET Degree: Bachelor of Science Major: Computer Science www.mesastate.edu/schools/snsm/csms About This Major... Computer science is the study of algorithms and the issues involved

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

2015-2016 Academic Catalog

2015-2016 Academic Catalog 2015-2016 Academic Catalog Master of Science or Arts in Biology Graduate Arts and Sciences Director: Dr. Karen Snetselaar (on sabbatical 2016) Science Center 225, 610-660-1826, ksnetsel@sju.edu Mission

More information

American Academy of Forensic Sciences

American Academy of Forensic Sciences American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors

More information

BIOINFORMATICS METHODS AND APPLICATIONS

BIOINFORMATICS METHODS AND APPLICATIONS FACULTY of ENGINEERING SCHOOL OF COMPUTER SCIENCE AND ENGINEERING BINF3010/9010 BIOINFORMATICS METHODS AND APPLICATIONS SESSION 1, 2015 Course staff Course Convener: Bruno Gaëta bgaeta@unsw.edu.au School

More information

Master of Science in Forensics

Master of Science in Forensics Master of Science in Forensics The Master of Science in Forensics provides students with an intensive and holistic criminalistics experience through a combination of didactic and practical educational

More information

Advice for Students completing the B.S. degree in Computer Science based on Quarters How to Satisfy Computer Science Related Electives

Advice for Students completing the B.S. degree in Computer Science based on Quarters How to Satisfy Computer Science Related Electives Advice for Students completing the B.S. degree in Computer Science based on Quarters How to Satisfy Computer Science Related Electives Students completing their B.S. degree under quarters had a requirement

More information

Course Specification

Course Specification 1 Course Specification Program on which the course is given: Department offering the program: Department offering the course: Academic year /level: Date of specification approval: 2008/2009 Masters Degree

More information

MD/Ph.D. Degree Requirements

MD/Ph.D. Degree Requirements COMBINED MD/Ph.D. DEGREE REQUIREMENTS MD/Ph.D. Program Eligibility Application to the Program General Requirements of the Program T he combined MD/Ph.D. degree program at the University of Toledo offers

More information

Genomics and Bioinformatics

Genomics and Bioinformatics North Dakota State University 1 Genomics and Bioinformatics Program and Application Information Program Director: Email: Department Location: Dr. Phillip McClean Phillip.McClean@ndsu.edu Plant Sciences,

More information

Bachelor of Science in Chemistry

Bachelor of Science in Chemistry Bachelor of Science in Chemistry Chemistry Courses Chemistry Course Credit Course Chosen Semester Grade 1000, 2000 2 1017 and 1007 4 1018 and 1008 4 2117 3 2025 3 2217 and 2017 4 2218 and 2018 4 3027 3

More information

Computer Security & Information Assurance MS Program

Computer Security & Information Assurance MS Program Computer Security & Information Assurance MS Program in a Nutshell 2005-2006 Graduate Security and Information Assurance Program in a Nutshell Department of Computer Science Rochester Institute of Technology

More information

Illinois Mathematics and Science Academy

Illinois Mathematics and Science Academy Illinois Mathematics and Science Academy A Pioneering Educational Community Name Ms. O Leary-Driscoll Phone 5363 e-mail soleary@imsa.edu Comprehensive Course Syllabus for Bioinformatics Fall 2015 Instructors

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

k. p.142-146 MIS program section is replaced with following content.

k. p.142-146 MIS program section is replaced with following content. j. p.12: Following seven new specializations in MIS are added to the programs list. Knowledge Management Data Management Business Intelligence and Data Analytics Cybersecurity Enterprise Project Management

More information

MRKT 601 Legal and Ethical Issues in Global Communications (3) MRKT 602 Consumer Behavior (3)

MRKT 601 Legal and Ethical Issues in Global Communications (3) MRKT 602 Consumer Behavior (3) International Marketing Management required courses: Master of International Management specializations Course Sequencing MGMT 650 must be completed before MRKT 604. Specialization Courses IMAN 615 Strategic

More information

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD) NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS COURSE IDENTIFICATION Course Code/Number: ETEC 275 Course Title: Computer and Network Security Division: Applied Science (AS) Liberal Arts (LA) Workforce

More information

2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce

2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce 2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge

More information

Computer Science, B.S.

Computer Science, B.S. Computer Science, B.S. Computer Science, B.S. Dr. Jie Wu, Chair Science Education and Research Center, Room 304 5-04-8450 Sally Kyvernitis, Faculty Advisor Science Education and Research Center, Room 330

More information

Information and Network Security Certificate Program

Information and Network Security Certificate Program Information and Network Security Certificate Program University of California, Irvine, P.O. Box 6050, Irvine, CA 92612-6050 www.extension.uci.edu PROGRAM DESCRIPTION Data security is critical and increasingly

More information

ASSESSMENT PLAN Computer Science, MS Updated May 25, 2007

ASSESSMENT PLAN Computer Science, MS Updated May 25, 2007 ASSESSMENT PLAN Computer Science, MS Updated May 25, 2007 Prologue: Form of this report The Department has an unusual mission, that stands significantly in contrast to that of most University Computer

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

PhD Program An Overview. Department of Health Informatics SHRP

PhD Program An Overview. Department of Health Informatics SHRP PhD Program An Overview Department of Health Informatics SHRP PhD Degree in Biomedical Informatics Core Track Electives Colloquium Four Courses = 12 credits 2 Courses at 7000 level = 6 credits 2 Courses

More information

THE M.SC. PROGRAMS OF THE FACULTY OF SCIENCE GENERAL INFORMATION THE SCHOOL OF M.SC. STUDIES

THE M.SC. PROGRAMS OF THE FACULTY OF SCIENCE GENERAL INFORMATION THE SCHOOL OF M.SC. STUDIES THE M.SC. PROGRAMS OF THE FACULTY OF SCIENCE GENERAL INFORMATION THE SCHOOL OF M.SC. STUDIES The Faculty of Science at the Hebrew University of Jerusalem invites outstanding Bachelor s-degree-level graduates

More information

UF EDGE brings the classroom to you with online, worldwide course delivery!

UF EDGE brings the classroom to you with online, worldwide course delivery! What is the University of Florida EDGE Program? EDGE enables engineering professional, military members, and students worldwide to participate in courses, certificates, and degree programs from the UF

More information

Department of Mathematics and Computer Sciences

Department of Mathematics and Computer Sciences Department of Mathematics and Computer Sciences MAJORS Applied Mathematics (BS) Mathematics for Secondary Education (BS) Bioinformatics (BS) Computer Science (BS) Cyber Security (BS) Management Information

More information

2. What are your learning objectives or outcomes associated with each student learning goal?

2. What are your learning objectives or outcomes associated with each student learning goal? Graduate Degree Program Assessment Plan Cover Sheet (rev. 07): UNIVERSITY OF ARKANSAS AT LITTLE ROCK Plan No. Degree Program: Master of Science In Computer Science (CPSM) Department College:Department

More information

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces

More information

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS COURSE PROFILE Course Name Code Semester Term Theory+PS+Lab (hour/week) Local Credits ECTS Network Security IT527 Fall 3 + 0 + 0 3 8 Prerequisites None Course Language Course Type Course Lecturer Course

More information

CIS 253. Network Security

CIS 253. Network Security CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum

More information

GRADUATE CATALOG LISTING

GRADUATE CATALOG LISTING GRADUATE CATALOG LISTING 1 BIOINFORMATICS & COMPUTATIONAL BIOLOGY Telephone: (302) 831-0161 http://bioinformatics.udel.edu/education Faculty Listing: http://bioinformatics.udel.edu/education/faculty A.

More information

University Graduate School 2009-2010 Academic Bulletin. Informatics

University Graduate School 2009-2010 Academic Bulletin. Informatics University Graduate School 2009-2010 Academic Bulletin Informatics School of Informatics and Computing Bloomington Dean Robert Schnabel* University Graduate School Kirkwood Hall 111 Indiana University

More information

Other Required Courses (14-18 hours)

Other Required Courses (14-18 hours) 1) IT Business Track Required Info Technology Courses (19 hours) 1,2&3 ITEC 2110 Digital Media 1,2&3 ITEC 3100 Intro to Networks 1,2&3 ITEC 3200 Intro to Databases 1 ITEC 3350 ECommerce 1,2&3 ITEC 3900

More information

Computer Science Electives and Clusters

Computer Science Electives and Clusters Course Number CSCI- Computer Science Electives and Clusters Computer Science electives belong to one or more groupings called clusters. Undergraduate students with the proper prerequisites are permitted

More information

Department of Computer Science

Department of Computer Science 82 Advanced Biochemistry Lab II. (2-8) The second of two laboratory courses providing instruction in the modern techniques of biochemistry. Experiments are performed on the isolation, manipulation and

More information

Department of Computer Science and Engineering

Department of Computer Science and Engineering Mississippi State University 1 Department of Computer Science and Engineering Department Head: Professor Donna Reese Office: 300 Butler Hall The Department of Computer Science and Engineering is dedicated

More information

GUIDELINES FOR HUMAN GENETICS

GUIDELINES FOR HUMAN GENETICS 1111 111 1 1 GUIDELINES FOR HUMAN GENETICS GRADUATE STUDENTS Carl Thummel, Director of Graduate Studies (EIHG 5200) Natalie Johnson, Human Genetics Program Manager for Grad. Student Affairs (EIHG 2100)

More information

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge of Computer Science

More information

M.S. DEGREE REQUIREMENTS

M.S. DEGREE REQUIREMENTS Graduate Group in Biochemistry, Molecular, Cellular & Developmental Biology Ph.D. and M.S. DEGREE REQUIREMENTS Graduate Council Approval: April 15, 2009 MASTER'S PROGRAM 1) Admissions Requirements Applicants

More information

GUIDELINES FOR HUMAN GENETICS

GUIDELINES FOR HUMAN GENETICS 1111 111 1 1 GUIDELINES FOR HUMAN GENETICS GRADUATE STUDENTS Carl Thummel, Director of Graduate Studies (EIHG 5200) Natalie Johnson, Human Genetics Program Manager for Grad. Student Affairs (EIHG 2100)

More information

National Cyber League (NCL) Syllabus

National Cyber League (NCL) Syllabus Note to Faculty The NCL Syllabus is intended as a supplement to a CompTIA Security+ class, or related Network Security course. A primary goal of the NCL is to integrate exercises and competitions into

More information

Accelerated Bachelor of Science/Master of Science in Computer Science. Dual Degree Program

Accelerated Bachelor of Science/Master of Science in Computer Science. Dual Degree Program Accelerated Bachelor of Science/Master of Science in Computer Science 1 Dual Degree Program Definitions The discussion below uses the following definitions: o BS/MS program: The complete accelerated Bachelor

More information

American Academy of Forensic Sciences

American Academy of Forensic Sciences American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors

More information

http://www.indiana.edu/~bulletin/iu/inform_ug/2008-2010/index.shtml Appendix I

http://www.indiana.edu/~bulletin/iu/inform_ug/2008-2010/index.shtml Appendix I Informatics Degree Cognate Areas Students must receive at least a C- in each cognate area course and a cumulative GPA of 2.0 or higher in the cognate area. Students pursuing 2 nd degrees in other schools

More information

Web-Based Genomic Information Integration with Gene Ontology

Web-Based Genomic Information Integration with Gene Ontology Web-Based Genomic Information Integration with Gene Ontology Kai Xu 1 IMAGEN group, National ICT Australia, Sydney, Australia, kai.xu@nicta.com.au Abstract. Despite the dramatic growth of online genomic

More information

(Instructor-led; 3 Days)

(Instructor-led; 3 Days) Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of

More information

Computer Information Systems

Computer Information Systems Computer Information System Courses Description 0309331 0306331 0309332 0306332 0309334 0306334 0309341 0306341 0309353 0306353 Database Systems Introduction to database systems, entity-relationship data

More information

CAN I USE THIS COURSE AS A HUMANITIES ELECTIVE?

CAN I USE THIS COURSE AS A HUMANITIES ELECTIVE? CAN I USE THIS COURSE AS A HUMANITIES ELECTIVE? Contents UT General Education WC versus Writing Emphasis... 1 UT Guide to General Education and Petitions... 2 Transfer Students with Courses Completed Prior

More information

UPBM CURRICULAR BROCHURE

UPBM CURRICULAR BROCHURE UPBM CURRICULAR BROCHURE Undergraduate Program in Biology and Medicine Contents Academic Year 2015-16 About the Undergraduate Program in Biology and Medicine...pg. 1 Undergraduate Majors...pg. 2-3 Getting

More information

The College of Liberal Arts and Sciences

The College of Liberal Arts and Sciences The College of Liberal Arts and Sciences Proposal for a Biomedical Sciences Major (BS) Professor Bernd Fritzsch, DEO, Department of Biology Associate Professor Bryant McAllister, DUS, Department of Biology

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

SYLLABUS STAT 843: Next- Generation Sequencing and Systems Biology October 23, 2015

SYLLABUS STAT 843: Next- Generation Sequencing and Systems Biology October 23, 2015 SYLLABUS STAT 843: Next- Generation Sequencing and Systems Biology October 23, 2015 Undergraduates are encouraged to take this course with permission! Instructor: Istvan (Steve) Ladunga, Ph.D. Professor

More information

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization

More information

American Academy of Forensic Sciences

American Academy of Forensic Sciences American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors

More information

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Please consult the Department of Engineering about the Computer Engineering Emphasis. COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals

More information

American Academy of Forensic Sciences

American Academy of Forensic Sciences American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors

More information

BIOLOGICAL SCIENCES REQUIREMENTS [63 75 UNITS]

BIOLOGICAL SCIENCES REQUIREMENTS [63 75 UNITS] Biological Sciences Major The Biological Sciences address many of the most important and fundamental questions about our world: What is life? How does our brain produce our ideas and emotions? What are

More information

Master of Philosophy (MPhil) and Doctor of Philosophy (PhD) Programs in Life Science

Master of Philosophy (MPhil) and Doctor of Philosophy (PhD) Programs in Life Science CURRICULUM FOR RESEARCH POSTGRADUATE PROGRAMS Master of Philosophy (MPhil) and Doctor of Philosophy (PhD) Programs in Life Science Curriculum for Master of Philosophy (MPhil) Program in Life Science The

More information

Bioinformatics Graduate Program Requirements Guidelines for Students and Mentors/Supervisors

Bioinformatics Graduate Program Requirements Guidelines for Students and Mentors/Supervisors Bioinformatics Graduate Program Requirements Guidelines for Students and Mentors/Supervisors 1. Admissions Acceptance into the Program is dependent on: (a) meeting the Bioinformatics Program requirements

More information

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

Student Orientation. Department of Health Informatics SHRP-UMDNJ

Student Orientation. Department of Health Informatics SHRP-UMDNJ Student Orientation Department of Health Informatics SHRP-UMDNJ OUR DEGREES Healthcare Informatics Certificate: designed to quickly build up competencies in the field of biomedical informatics useful for

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students

More information

Network Security Course Specifications2011-2012

Network Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and

More information

Ph.D. Degree in Public Health Sciences Concentration in Environmental Health

Ph.D. Degree in Public Health Sciences Concentration in Environmental Health Ph.D. Degree in Public Health Sciences Concentration in Environmental Health Introduction The concentration in Environmental Health for the PhD in Public Health Sciences is designed to provide scholars

More information

Syllabus. No: CIS 200. Title: Fundamentals of Network Security. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer

Syllabus. No: CIS 200. Title: Fundamentals of Network Security. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer Syllabus No: CIS 200 Title: Fundamentals of Network Security Credits: 4 Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer Instructor: Dr. B. Dike-Anyiam, Computer Science & Networking

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Information Security Course Specifications2011-2012

Information Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Information Systems Department Quality Assurance Unit Information Security Course Specifications2011-2012 Relevant program Department offers the program

More information

M110.726 The Nucleus M110.727 The Cytoskeleton M340.703 Cell Structure and Dynamics

M110.726 The Nucleus M110.727 The Cytoskeleton M340.703 Cell Structure and Dynamics of Biochemistry and Molecular Biology 1. Master the knowledge base of current biochemistry, molecular biology, and cellular physiology Describe current knowledge in metabolic transformations conducted

More information

Course Requirements for the Ph.D., M.S. and Certificate Programs

Course Requirements for the Ph.D., M.S. and Certificate Programs Health Informatics Course Requirements for the Ph.D., M.S. and Certificate Programs Health Informatics Core (6 s.h.) All students must take the following two courses. 173:120 Principles of Public Health

More information

A WEB SECURITY SYSTEM MODEL TO ASSIST CIS/MIS COURSES DESIGN

A WEB SECURITY SYSTEM MODEL TO ASSIST CIS/MIS COURSES DESIGN A WEB SECURITY SYSTEM MODEL TO ASSIST CIS/MIS COURSES DESIGN Kuan C. Chen, Ph.D. School of Management Purdue University Calumet E-mail: kchen@calumet.purdue.edu ABSTRACT This paper demonstrates a model

More information

Certified Identity and Security Technologist (CIST) Overview & Curriculum

Certified Identity and Security Technologist (CIST) Overview & Curriculum Overview Identity management and security technologies are increasingly needed to address the growing needs of businesses to counter threats, meet requirements, and mitigate risks. According to recent

More information

The Volgenau School of Engineering

The Volgenau School of Engineering COMPUTER SCIENCE, B.S. 2014-2015 The objectives of the B.S. program in Computer Science relate to the abilities of the graduates several years after graduation. The objectives include Foundation for successful

More information

UNIVERSITY OF MARIBOR FACULTY OF ECONOMICS AND BUSINESS Razlagova ulica 14, 2000 Maribor http://www.epf.uni-mb.si

UNIVERSITY OF MARIBOR FACULTY OF ECONOMICS AND BUSINESS Razlagova ulica 14, 2000 Maribor http://www.epf.uni-mb.si Faculty of Economics and Business Faculty of Electrical Engineering and Computer Science Faculty of Civil Engineering Faculty of Mechanical Engineering UNIVERSITY OF MARIBOR FACULTY OF ECONOMICS AND BUSINESS

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

COMPUTATIONAL LIFE SCIENCE (MSc) GRADUATE PROGRAM

COMPUTATIONAL LIFE SCIENCE (MSc) GRADUATE PROGRAM COMPUTATIONAL LIFE SCIENCE (MSc) GRADUATE PROGRAM THE PROGRAM COMPUTATIONAL LIFE SCIENCE (COMPLIFE) Over the last decades, biomedical research has become increasingly interdisciplinary in nature, focusing

More information

CHEMICAL SCIENCES REQUIREMENTS [61-71 UNITS]

CHEMICAL SCIENCES REQUIREMENTS [61-71 UNITS] Chemical Sciences Major Chemistry is often known as the central science because of the key position it occupies in modern science and engineering. Most phenomena in the biological and Earth sciences can

More information

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course Effective Term: 2147 (Fall 2014) University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course Subject Area - Course Number: COMPSCI 462 (See Note #1 below) Cross-listing: N/A Course Title:(Limited

More information

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

MSc in Computer and Information Security

MSc in Computer and Information Security MSc in Computer and Information Security Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.

More information

MED 2400 MEDICAL INFORMATICS FUNDAMENTALS

MED 2400 MEDICAL INFORMATICS FUNDAMENTALS MED 2400 MEDICAL INFORMATICS FUNDAMENTALS NEW YORK CITY COLLEGE OF TECHNOLOGY The City University Of New York School of Arts and Sciences Biological Sciences Department Course title: Course code: MED 2400

More information

Integration of Mathematical Concepts in the Computer Science, Information Technology and Management Information Science Curriculum

Integration of Mathematical Concepts in the Computer Science, Information Technology and Management Information Science Curriculum Integration of Mathematical Concepts in the Computer Science, Information Technology and Management Information Science Curriculum Donald Heier, Kathryn Lemm, Mary Reed, Erik Sand Department of Computer

More information

Bioinformatics & Computational Biology Handbook

Bioinformatics & Computational Biology Handbook Bioinformatics & Computational Biology Handbook For more information regarding IGPI, please visit informatics.uiowa.edu or refer to the Interdisciplinary Graduate Program in Informatics Handbook. Contents

More information