UAT-Online: Master of Science in Technology

Size: px
Start display at page:

Download "UAT-Online: Master of Science in Technology"

Transcription

1 UAT-Online: Master of Science in Technology Program Description The University provides within its graduate program an intellectual atmosphere in which a wide range of multidisciplinary technology, research and innovation creations can thrive. The program is designed to allow graduate students to pursue advanced coursework in applied advancing technology disciplines. Students entering the program without undergraduate and/or professional experience within the discipline being studied will be evaluated for proficiencies in the discipline as part of the admissions process and may be required to complete additional coursework considered foundational to advanced study in the area. Within their disciplines, students incorporate and utilize specialized knowledge leading to the completion of a sophisticated example of their discipline, be it Artificial Life Programming, Information Security, Software Engineering Technology Studies. The program focuses on principles, methods and tools that can be used for creating high-quality applications that serve the needs of end users. Examples of completed works include the utilization of web services, analysis of computer forensic tools and the development of an e-book interface, to name a few. Graduates of the program not only understand advanced concepts and apply best practices to their field, but are leaders within the technology environment. The unique features of this graduate program appeal to candidates already engaged in knowledge creation within their fields and those seeking advancement in their industry where additional educational credentials may be required. The program is accelerated; it offers the flexibility to adapt quickly to the changes endemic to high technology. How UAT-Online Works UAT-Online s Master of Science in Technology degree program has been developed to give students the ability to focus their attention on each individual course needed to become successful in these rapidly growing fields. All curriculum is predetermined, giving students the ability to be objective and goal-focused. In addition to core and elective courses, students are also required to successfully present and defend a Thesis (applied or analytical) displaying their understanding and expertise in their selected areas of study. Master of Science in Technology Tracks Artificial Life Programming Information Security Software Engineering Technology Studies Master of Science Core Course Descriptions MSC525 Organizational Leadership and Group Dynamics The theoretical study of small-group behavior and the role of the individual personality functioning in organizational settings will be explored. Topics covered include situational, physical and personality factors as they relate to group formation, as well as group leadership and effectiveness. MSC530 Research Methods in Technology This course emphasizes developing research methodology used in specific industrial segments. Skills required for conducting alternative approaches to qualitative and quantitative data collection and analysis, hypotheses, models and theories will be developed. The student will develop competence in the use of statistical packages for various analytical approaches. MSC535 Project Management This course covers all phases of project management. This course focuses on successful completion of the project through each phase, from opportunity recognition and strategic integration to team building, tracking and budget management. Included is a survey of tools and best practices. Applications include projects of differing scope. Small entrepreneurial projects are compared to division-level and enterprise-wide projects. Learning activities include exploration of case studies, problemsolving exercises and role-playing. MSC545 Forecasting Emergent Technologies This course explores methods used in industry practice to identify and capture emerging technologies. Learning activities include exploration of case studies and trending within the current market. There will be a project for this course in a technology area of interest to the student. MSC550 Colloquium in Technology Weekly presentations on topics by faculty and leaders from industry, informally describing their views of the state of the art of technology as a field, their experience in the field and informal research talks.

2 Artificial Life Programming Artificial Life (A-Life) involves breaking old programming paradigms in the software engineering field and moving forward with paradigms that mirror life systems. A-Life programming is revising the traditional scientific approach by simulating biological phenomena in digital environments to model biology and to extend the concepts of computing power into distributed computing networks that operate using biological theory. The graduate studies in A-Life track is appropriate for students with undergraduate degrees in biology, biotechnology, computer science, cognitive science, database, game programming, mathematics or similar majors. Explore and create examples of how A-Life programming is used in game and system security application. Understand and develop programs modeling real life organisms and situations. Research and discuss ways in which creating biological processes through programming can change our environment. Perform data analysis, algorithm and model development, and computational design and implementation. Identify, solve and deliver solutions to problems in areas of prediction algorithms and outcomes analysis. Develop algorithms, strategies and methodologies using the latest technologies in neural networks, machine learning, statistical modeling, pattern recognition and artificial intelligence to support model generation for computationally intelligent software components. Prototype and optimize algorithms in a software language. Develop test cases and strategies to demonstrate correct algorithm performance. Develop computational performance measures and testing strategies to demonstrate satisfactory execution times when solving problems. MSE555 Computer Programming Applications This course is designed to introduce the graduate student to programming complete computer applications for a variety of uses. Students will be given a foundation in programming concepts and applied skills to enable them to serve on applied development teams and complete fundamental programming tasks. MSE557 Life Systems This course is designed to introduce the programmer interested in advanced applications to the concepts and systems associated with natural life. Overviews of systems in biology, chemistry, genetics and evolutionary development are covered as well as modern systems theory overall. MSE590 Introduction to Artificial Life This course addresses issues of modeling and synthesizing life-like agents. Students will learn the theoretical and mathematical modeling of life-as-it-couldbe to applications of artificial life techniques in agent and software systems. Topics can include simulation of real and imaginary life forms and their evolution, selforganization, emergent behaviors, swarm intelligence, evolutionary robotics, agent-based simulations, adaptive, complex and biologically inspired ecosystems. MSE575 Robotics and Autonomous Agents The course gives students a general introduction to the design and programming of artificial autonomous systems. The question "What is an autonomous system?" will be explored. Students will discuss the technical and social aspects of robots in society and cover computer science topics as related to robotics. This course is designed to give students an introduction to the field, historical background and developments, and current research topics, as well as a practical introduction to how to actually make a robot move, learn and adapt to novel situations. MSE576 Evolutionary and Adaptive Systems This course presents an overview of the field of evolutionary and adaptive systems. The historical and philosophical foundations of evolutionary thought are explored within the context of computer simulations that model these behaviors. Topics can include self-organizing systems, natural selection, dynamic systems, Boolean networks, cellular automata, genetic algorithms, evolutionary robotics and others. Students are expected to develop artificial life models. MSE592 Introduction to Artificial Intelligence This course introduces the state-of-the-art in artificial intelligence (AI). Students will learn knowledge representation, inference, expert systems, natural language processing, machine learning, neural networks and robots. Topics can include the following aspects of AI: representation and search (including the predicate calculus, and heuristic and stochastic search methods), representation and intelligence (including knowledgeintensive and strong methods), machine learning (symbolbased, connectionist, social and emergent), problem solving (automated reasoning and natural language), language and programming techniques.

3 Information Security This curriculum track is designed to provide the student with graduate-level experience in applying security to networks and electronic data. Students entering this program without documented and appropriate background in information technology and essentials of security will complete 9 additional credits in applied development curriculum. Analyze network traffic for possible signs of intrusions or attacks. Review information to respond to malicious or covert code and security incidents. Reconstruct portions of a corporate network to recover from security issues. Re-architect a corporate network to address perimeter security and deployment of a firewall. Perform vulnerability assessment and evaluation of an infrastructure. Address layered security and computer network defense needs and challenges. MSE512 Network and Hardware Technology students with the necessary applied hardware knowledge and background to effectively continue with their network security program. Implementing information technology components in enterprise requires specialized knowledge in the design and deployment of networking technologies. This course will provide the applied skills and knowledge to build a network infrastructure and successfully deploy necessary hardware components. A team-based approach will be used to develop a network design, select and implement technologies, perform testing, troubleshooting and problem resolution. MSE513 Applied Systems Administration students with the necessary applied operating systems knowledge and background to effectively continue with their network security program. This course provides the knowledge and skills necessary to install, configure and manage client and server operating systems in standalone and networked environments. Hands-on and theoretical topics include how to install, configure and manage network services and directory services. Current industry standards will be reviewed. MSE514 Applied Security Essentials students with the necessary applied security knowledge and background to effectively continue with their network security program. This course will help you to design and implement an effective security strategy in a corporate network environment. This course will cover anti-virus tools, security policies, password management, risk analysis, security policies, network communication vulnerabilities, enhancing security with cabling and network hardware, understanding different types of firewalls, packet filtering and NAT, setting up and securing a virtual private network and understanding hacker exploits. Current industry trends will be reviewed. MSE520 Federal INFOSEC Standards and Regulations This course is a guide through the world of Federal and International information security standards that guide the way organizations are doing business today. Research and analysis are conducted on how US security regulations vary from industry to industry, including those in healthcare, education, military, federal matters, utilities and financial matters. International security standards will also be reviewed in order to understand the impact of implementing appropriate information security mechanisms in a global organization. MSE535 Security Assessment Methodology This course will examine the NSA's recommendation methods for conducting an organizational security assessment, including coordination with the customer, defining critical information within the organization, and compiling findings based on regulations, legislation, and policies for which the organization is liable to comply. Students will be required to attend the course and then participate in an actual IAM-based assessment. The documentation created during this course can be added to the student's portfolio. MSE539 Network Defense and Countermeasures This course presents the advanced topics in the art of defense for network protection including designing a network defense and security policies. Research and implement firewalls, VPNs and Intrusion Detection Systems, honey pots and other behavior-blocking software for effective setup, design and configuration. This course will provide solutions for identifying, assessing and preventing external and internal threats to your network in a multi-vendor environment. MSE633 Applied Red Team Tactics This course will focus on the application of red teaming concepts to accomplish security reviews through penetration testing, social engineering and other adversarial roles. The foundation of the mindset of the network security adversary is presented to obtain a better understanding of what has to be accomplished to protect systems and networks. MSE634 Covert Channels This course delves into the technical realm of Covert Channels and how to communicate outside the design of many systems. The applied tools and applications of the trade are utilized to create various types of hidden communication in order to better understanding how those mechanisms operate. The tools include steganography, network-based channels, text-based channels and operating system channels.

4 Software Engineering This track furthers advanced application production in the field of software engineering. Students without application development backgrounds receive foundations in the principles of software engineering, while elective courses allow significant applied research. Within the process, students will produce applied research projects and theses representative of the synthesis and analysis that occurs at the graduate level. Architecture of enterprise business applications. Guiding technology migrations. Implementation of cost and quality programs. Understanding all phases of the software development process, from design through final delivery. Requirements, definition, analysis, design, development and testing of enterprise data and services. Collection and creation of interface systems requirements, support, integration, testing and installation. MSE505 Computer Programming MSE515 Database Foundations This course will cover database systems. Students will learn how to develop a useful database, how to express operations on the database and how database programming is combined with conventional programming. Students will learn how to build a DBMS, including such matters as query processing, transaction processing and organizing storage for efficient access. MSE555 Computer Programming Applications This course is designed to introduce the graduate student to programming complete computer applications for a variety of uses. Students will be given a foundation in programming concepts and applied skills to enable them to serve on applied development teams and complete fundamental programming tasks. MSE561.NET Framework Foundation This course discusses.net framework specific issues that are language independent. Students will learn concepts related to the architecture of the.net framework, assemblies, interops, advance exception handling, XML regular expressions, serialization and primitives. MSE571 Application Testing and Metrics A key aspect of software production is reliability and robustness of the application. Application Testing and Metrics explores the most important testing procedures used in Industry. Topics may include Project Life Cycle, test scripts, test scenarios, test items, Static Testing, Dynamic Testing, Black Box Testing, White Box Testing, Function Testing and Non-Function Testing. MSE574 Deployment and Maintenance Issues This course will discuss issues related to techniques to deploy and update software such as patches and version control. MSE665 Advanced Topics in Software Engineering This course is an in-depth study of advanced software engineering tools or techniques. Topics may include C++, Java, JavaScript, and Visual Basic. MSE668 Software Architecture Students will delve into software architecture, its documentation, its design and its analysis. Issues associated with evaluating and facilitating software architectures will be explored.

5 Technology Studies Students in the Technology Studies track come from a wide range of backgrounds including history, anthropology/sociology, philosophy, the natural and physical sciences, engineering and numerous professional disciplines. The research and scholarly pursuits of students and faculty cross a wide range of disciplinary boundaries. Graduates emerge with an ability to identify and examine the conceptual and social dimensions of science and technology simultaneously and in historical perspective. Ability to articulate the cultural, social and economic influence of the Internet. Demonstrate a capacity to analyze and critique the development and deployment of military technologies within a given historical or socio-political framework. Articulate and explore the potential impacts of emerging technologies on the accepted social ethical contexts. Demonstrate a deep understanding of the philosophical underpinnings and relationships between technology and society and the cycle of change. MSE543 Philosophy of Technology This course is an introductory graduate course designed to help students become familiar with several major topics prominent in philosophy of technology and to develop skills in making and evaluating arguments about these and related topics. MSE553 Information Technology: Historical and Cultural Perspectives This is an introductory graduate course designed to provide students with an overview of the prominent developments in Information Technology from both a historical and cultural perspective. Students will develop an understanding of the development path of technologies through this exploration. MSE554 Contemporary Issues in Technology This introductory graduate course will explore contemporary issues within technology from a sociopolitical, economic and ethical perspective. Students will evaluate and discuss the relationship between technological innovation and social change from a value conflict and decision-making perspective. MSE605 Military Technology This graduate-level course is designed to provide the student with an overview of the development of military technologies with a focus on the changing needs of the military from World War II to the present. MSE606 Technology, Science and Labor This course provides the graduate student with an overview of the methods and processes through which technology and science have changed the shape of labor. Additional discussion will incorporate a near-futures perspective to the discussion. MSE607 Influence of the Internet This graduate-level course is designed to help students become familiar with the broad-reaching impact of the Internet from historical, cultural and political perspectives.

The Masters of Science in Information Systems & Technology

The Masters of Science in Information Systems & Technology The Masters of Science in Information Systems & Technology College of Engineering and Computer Science University of Michigan-Dearborn A Rackham School of Graduate Studies Program PH: 1-59-561; FAX: 1-59-692;

More information

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

Doctor of Philosophy in Informatics

Doctor of Philosophy in Informatics Doctor of Philosophy in Informatics 2014 Handbook Indiana University established the School of Informatics and Computing as a place where innovative multidisciplinary programs could thrive, a program where

More information

Masters in Information Technology

Masters in Information Technology Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

KMU International School

KMU International School KMU International School General Education 1. Writing & Critical Reasoning As a modern global intellectual, the student fosters his or her writing ability and capability of expression so that he or she

More information

College of Communication and Information. Library and Information Science

College of Communication and Information. Library and Information Science 510 CHILDREN S LITERATURE AND RELATED MATERIALS. (3) A survey of children s literature, traditional and modern. Reading and evaluation of books with multimedia materials with emphasis on the needs and

More information

The Masters of Science in Information Systems & Technology

The Masters of Science in Information Systems & Technology The Masters of Science in Information Systems & Technology College of Engineering and Computer Science University of Michigan-Dearborn A Rackham School of Graduate Studies Program PH: 313-593-5361; FAX:

More information

Business Management and Leadership (MS)

Business Management and Leadership (MS) Business Management and Leadership (MS) ACADEMIC DIRECTOR: B. Loerinc Helft CUNY School of Professional Studies 101 West 31 st Street, 7 th Floor New York, NY 10001 Email Contact: B. Loerinc Helft, b.loerinc.helft@cuny.edu

More information

Description of the program

Description of the program Study program Faculty Cycle Software Engineering Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program The Masters programme in Software Engineering

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) Computer Science (COSC) courses are offered by the School of Information Arts and Technologies within the Yale Gordon College of Liberal Arts.

More information

College of Communication and Information. Library and Information Science

College of Communication and Information. Library and Information Science 510 CHILDREN S LITERATURE AND RELATED MATERIALS. (3) A survey of children s literature, traditional and modern. Reading and evaluation of books with multimedia materials with emphasis on the needs and

More information

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT Page 1 of 5 A. Advanced Mathematics for CS A1. Line and surface integrals 2 2 A2. Scalar and vector potentials 2 2 A3. Orthogonal curvilinear coordinates 2 2 A4. Partial differential equations 2 2 4 A5.

More information

Masters in Computing and Information Technology

Masters in Computing and Information Technology Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits

More information

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT UNDERGRADUATE Bachelor's programs Bachelor of Business Administration with a concentration in information systems and technology management (http:// bulletin.gwu.edu/business/undergraduate-programs/

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

Curriculum for postgraduate studies in Micro-data Analysis

Curriculum for postgraduate studies in Micro-data Analysis Curriculum for postgraduate studies in Micro-data Analysis Beslut: FuN 2012-10-01 Revidering: FuN 2012-12-04 Dnr: DUC 2012/1533/90 Gäller fr.o.m.: 2012-10-01 Ansvarig för uppdatering: Studierektor för

More information

The College of Science Graduate Programs integrate the highest level of scholarship across disciplinary boundaries with significant state-of-the-art

The College of Science Graduate Programs integrate the highest level of scholarship across disciplinary boundaries with significant state-of-the-art GRADUATE PROGRAMS The College of Science Graduate Programs integrate the highest level of scholarship across disciplinary boundaries with significant state-of-the-art research centers and experiential

More information

UF EDGE brings the classroom to you with online, worldwide course delivery!

UF EDGE brings the classroom to you with online, worldwide course delivery! What is the University of Florida EDGE Program? EDGE enables engineering professional, military members, and students worldwide to participate in courses, certificates, and degree programs from the UF

More information

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey

More information

Interdisciplinary Master s study program in Computer Science and Mathematics

Interdisciplinary Master s study program in Computer Science and Mathematics Interdisciplinary Master s study program in Computer Science and Mathematics Study program cycle: Second cycle study program. Anticipated academic title: Master Engineer in Computer Science and Mathematics.

More information

INFORMATION SYSTEMS (INFO)

INFORMATION SYSTEMS (INFO) VCU 1 INFORMATION SYSTEMS (INFO) INFO 160. Digital Literacy: Computer Concepts, Internet, Digital Devices. 1 Hour. Semester course; 1 credit. Overview of basic computer concepts, the Internet, new technologies

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Development (60 ЕCTS)

Development (60 ЕCTS) Study program Faculty Cycle Software and Application Development (60 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 60 Offered in Tetovo Description of the program The objectives of the

More information

OVERVIEW DEGREES & CERTIFICATES

OVERVIEW DEGREES & CERTIFICATES OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Doctor of Philosophy (Ph.D.), Major in. Geographic Information Science. Ph.D. Program. Educational Goal. Admission Policy. Advancement to Candidacy

Doctor of Philosophy (Ph.D.), Major in. Geographic Information Science. Ph.D. Program. Educational Goal. Admission Policy. Advancement to Candidacy Texas State University 1 Doctor of Philosophy (Ph.D.), Major in Geographic Information Science Ph.D. Program The course curriculum for the doctoral degree is designed to provide depth and breadth of knowledge

More information

DEPARTMENT OF CHEMISTRY

DEPARTMENT OF CHEMISTRY DEPARTMENT OF CHEMISTRY Brandon University Department of Chemistry Faculty of Science Phone (204) 727-9677 Fax (204) 728-7346 This document is meant as a planning guide only. Students are advised to consult

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Master of Science in Software Engineering Student Guide

Master of Science in Software Engineering Student Guide King Fahd University of Petroleum & Minerals College of Computer Sciences and Engineering Information and Computer Science Department Master of Science in Software Engineering Student Guide http://www.ccse.kfupm.edu.sa/swe/

More information

Telecommunication (120 ЕCTS)

Telecommunication (120 ЕCTS) Study program Faculty Cycle Software Engineering and Telecommunication (120 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program This master study

More information

BA Psychology (2014 2015)

BA Psychology (2014 2015) BA Psychology (2014 2015) Program Information Point of Contact Marianna Linz (linz@marshall.edu) Support for University and College Missions Marshall University is a multi campus public university providing

More information

Graduate Student Handbook University of Texas Pan American Department of Computer Science

Graduate Student Handbook University of Texas Pan American Department of Computer Science Graduate Student Handbook University of Texas Pan American Department of Computer Science Revised 11/1/2011 Topics: 1. About the Handbook for Graduate Students 2. The University of Texas - Pan American

More information

Information Technology Career Field Pathways and Course Structure

Information Technology Career Field Pathways and Course Structure Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating

More information

General syllabus for third-cycle courses and study programmes in

General syllabus for third-cycle courses and study programmes in ÖREBRO UNIVERSITY This is a translation of a Swedish document. In the event of a discrepancy, the Swedishlanguage version shall prevail. General syllabus for third-cycle courses and study programmes in

More information

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

BS Environmental Science (2013-2014)

BS Environmental Science (2013-2014) BS Environmental Science (2013-2014) Program Information Point of Contact Brian M. Morgan (brian.morgan@marshall.edu) Support for University and College Missions Marshall University is a multi-campus public

More information

Curriculum for Doctoral Studies in Business Administration at Karlstad University

Curriculum for Doctoral Studies in Business Administration at Karlstad University HS 2014/499 Faculty of Arts and Social Sciences Curriculum for Doctoral Studies in Business Administration at Karlstad University 1. Curriculum Approval The curriculum was approved by the Faculty Board

More information

GRADUATE CATALOG LISTING

GRADUATE CATALOG LISTING GRADUATE CATALOG LISTING 1 BIOINFORMATICS & COMPUTATIONAL BIOLOGY Telephone: (302) 831-0161 http://bioinformatics.udel.edu/education Faculty Listing: http://bioinformatics.udel.edu/education/faculty A.

More information

ACCOUNTING (ACCTG) FINANCE (FINAN)

ACCOUNTING (ACCTG) FINANCE (FINAN) ACCOUNTING (ACCTG) 6002 Cost Accounting, A Managerial Perspective (1.5) This course focuses on firms' internal accounting systems. In this course, we focus on two broad topicscost analysis and performance

More information

k. p.142-146 MIS program section is replaced with following content.

k. p.142-146 MIS program section is replaced with following content. j. p.12: Following seven new specializations in MIS are added to the programs list. Knowledge Management Data Management Business Intelligence and Data Analytics Cybersecurity Enterprise Project Management

More information

Vanderbilt University Biomedical Informatics Graduate Program (VU-BMIP) Proposal Executive Summary

Vanderbilt University Biomedical Informatics Graduate Program (VU-BMIP) Proposal Executive Summary Vanderbilt University Biomedical Informatics Graduate Program (VU-BMIP) Proposal Executive Summary Unique among academic health centers, Vanderbilt University Medical Center entrusts its Informatics Center

More information

SCHOOL OF MANAGEMENT AND ENTREPRENEURSHIP. Undergraduate Prospectus Bachelor of Management Studies

SCHOOL OF MANAGEMENT AND ENTREPRENEURSHIP. Undergraduate Prospectus Bachelor of Management Studies SCHOOL OF MANAGEMENT AND ENTREPRENEURSHIP Undergraduate Prospectus Bachelor of Management Studies 1 CONTACT INFORMATION: Vivek Ahuja Manager Undergraduate Programs School of Management and Entrepreneurship

More information

Science, Technology, Engineering & Mathematics Career Cluster

Science, Technology, Engineering & Mathematics Career Cluster Science, Technology, Engineering & Mathematics Career Cluster 1. Apply engineering skills in a project that requires project management, process control and quality assurance. ST 1.1: Apply the skills

More information

Industrial Engineering and Management Systems

Industrial Engineering and Management Systems Industrial Engineering and Management Systems CIP Code Description 14.0101 Engineering, General 14.3501 Industrial Engineering ACTIVE TEACHING DISCIPLINES NCES Definition For more information on the NCES

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

Microsoft Technologies

Microsoft Technologies NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use

More information

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

defending against advanced persistent threats: strategies for a new era of attacks agility made possible defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been

More information

Technical Testing. Network Testing DATA SHEET

Technical Testing. Network Testing DATA SHEET DATA SHEET Technical Testing Network Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance your security posture, reduce

More information

Educational Technology Department Updated Course Descriptions. July 1, 2015

Educational Technology Department Updated Course Descriptions. July 1, 2015 Educational Technology Department Updated Course Descriptions July 1, 2015 EDTC 612 Technology in the Math/ Science Curriculum (3) This course focuses on the use of math/ science technology to find new

More information

College of Communications and Information Studies

College of Communications and Information Studies 510 CHILDREN S LITERATURE AND RELATED MATERIALS. (3) A survey of children s literature, traditional and modern. Reading and evaluation of books with multimedia materials with emphasis on the needs and

More information

Department of Computer Science

Department of Computer Science 82 Advanced Biochemistry Lab II. (2-8) The second of two laboratory courses providing instruction in the modern techniques of biochemistry. Experiments are performed on the isolation, manipulation and

More information

National Qualifications Framework for Higher Education in Thailand IMPLEMENTATION HANDBOOK

National Qualifications Framework for Higher Education in Thailand IMPLEMENTATION HANDBOOK National Qualifications Framework for Higher Education in Thailand IMPLEMENTATION HANDBOOK November 2006 National Qualifications Framework for Higher Education in Thailand Implementation Handbook Table

More information

Course Descriptions November 2014

Course Descriptions November 2014 Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)

More information

Master of Science in Artificial Intelligence

Master of Science in Artificial Intelligence Master of Science in Artificial Intelligence Options: Engineering and Computer Science (ECS) Speech and Language Technology (SLT) Big Data Analytics (BDA) Faculty of Engineering Science Faculty of Science

More information

Fighting Advanced Threats

Fighting Advanced Threats Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

Guidelines for Establishment of Contract Areas Computer Science Department

Guidelines for Establishment of Contract Areas Computer Science Department Guidelines for Establishment of Contract Areas Computer Science Department Current 07/01/07 Statement: The Contract Area is designed to allow a student, in cooperation with a member of the Computer Science

More information

The Open Cyber Challenge Platform *

The Open Cyber Challenge Platform * The Open Cyber Challenge Platform * Jacob Fonseca, Kevin Bryan, Lisa DiPippo, Victor Fay-Wolfe * Supported By The U.S. National Science Foundation grants: Federal Cyber Service Scholarship For Service

More information

Game Programming. Bachelor of Software Engineering. www.mediadesign.com. Course Components

Game Programming. Bachelor of Software Engineering. www.mediadesign.com. Course Components Course Components Game Programming Bachelor of Software Engineering www.mediadesign.com Year One 01 GD1P01: Introduction To Software Engineering for Games Year one begins with an introduction to the C++

More information

Master of Science in Computer Science Information Systems

Master of Science in Computer Science Information Systems Master of Science in Computer Science Information Systems 1. General Admission Requirements. Admission to Graduate Studies (see graduate admission requirements). 2. Program Admission. In addition to meeting

More information

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments. Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?

More information

Master of Science in Health Information Technology Degree Curriculum

Master of Science in Health Information Technology Degree Curriculum Master of Science in Health Information Technology Degree Curriculum Core courses: 8 courses Total Credit from Core Courses = 24 Core Courses Course Name HRS Pre-Req Choose MIS 525 or CIS 564: 1 MIS 525

More information

MASTER OF ARTS WITH A MAJOR IN COMMUNICATION

MASTER OF ARTS WITH A MAJOR IN COMMUNICATION MASTER OF ARTS WITH A MAJOR IN COMMUNICATION The Master of Arts with a major in Communication requires 32 semester hours of graduate credit. What You Can Do with this Degree The Master of Arts degree with

More information

Computer Science Electives and Clusters

Computer Science Electives and Clusters Course Number CSCI- Computer Science Electives and Clusters Computer Science electives belong to one or more groupings called clusters. Undergraduate students with the proper prerequisites are permitted

More information

The Department of Education. in Science and Technology

The Department of Education. in Science and Technology The Department of Education in Science and Technology Graduate Studies M.Sc. and Ph.D. Programs January 2013 Table of Contents 1. Overview: M.Sc. and Ph.D. Graduate Studies programs in Science and Technology

More information

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS OVERVIEW MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS 2016 Coursework to Meet Real World Demands The best. Made better. SANS graduate programs are the ultimate expression

More information

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

Performance Evaluation of Intrusion Detection Systems

Performance Evaluation of Intrusion Detection Systems Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

MASTER OF EDUCATION 1. MASTER OF EDUCATION DEGREE (M.ED.) (845) 575-3028 teacher.education@marist.edu

MASTER OF EDUCATION 1. MASTER OF EDUCATION DEGREE (M.ED.) (845) 575-3028 teacher.education@marist.edu MASTER OF EDUCATION 1 MASTER OF EDUCATION DEGREE (M.ED.) (845) 575-3028 teacher.education@marist.edu MISSION AND OBJECTIVES The Teacher Education programs offered by Marist College are integrally linked

More information

Master s Programme in International Administration and Global Governance

Master s Programme in International Administration and Global Governance Programme syllabus for the Master s Programme in International Administration and Global Governance 120 higher education credits Second Cycle Confirmed by the Faculty Board of Social Sciences 2015-05-11

More information

Prescriptions and Schedule of Papers for 2008

Prescriptions and Schedule of Papers for 2008 Prescriptions and Schedule of Papers for 2008 Mode of Delivery * = Not available in 2008 B1, B2, B3 = Available as a block course E, E1, E2 = Available extramurally F1 = Face to face teaching I, I1, I2,

More information

CORE CLASSES: IS 6410 Information Systems Analysis and Design IS 6420 Database Theory and Design IS 6440 Networking & Servers (3)

CORE CLASSES: IS 6410 Information Systems Analysis and Design IS 6420 Database Theory and Design IS 6440 Networking & Servers (3) COURSE DESCRIPTIONS CORE CLASSES: Required IS 6410 Information Systems Analysis and Design (3) Modern organizations operate on computer-based information systems, from day-to-day operations to corporate

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information

How To Get A Computer Science Degree

How To Get A Computer Science Degree MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

COME JOIN US ON THE FRONTIER

COME JOIN US ON THE FRONTIER COME JOIN US ON THE FRONTIER YOUR PASSION IS TECHNOLOGY Whether it s designing video games, writing programs or developing network security, you love it and you spend many of your waking hours intensely

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

CAST Center for Advanced Security Training

CAST Center for Advanced Security Training CAST Center for Advanced Security Training Advanced Security Training (CAST) EC-Council s Center for Advanced Security Training (CAST) was created to address the need for highly technical and Advanced

More information

Clayton State University Master of Health Administration Program Fall 2009 Assessment

Clayton State University Master of Health Administration Program Fall 2009 Assessment Clayton State University Master of Health Administration Program Fall 2009 Assessment MHA Program Mission: The mission of the Health Care Management program is to prepare ethical and socially responsible

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

School of Social Work

School of Social Work Social Work 282 School of Social Work St. Patrick s Building 469 Telephone: 788-5601 Fax: 788-7496 The School Director of the School: Gillian Walker Supervisor of Graduate Studies: Allan Moscovitch The

More information

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's: Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services

More information

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff

More information

UNIVERSITY OF BELGRADE FACULTY OF PHILOSOPHY. Part two: INFORMATION ON DEGREE PROGRAMS

UNIVERSITY OF BELGRADE FACULTY OF PHILOSOPHY. Part two: INFORMATION ON DEGREE PROGRAMS Part two: INFORMATION ON DEGREE PROGRAMS Part two: Information on Degree Programs Philosophy Bachelor s Degree Philosophy Master s Degree Philosophy Doctoral Degree Sociology Bachelor s Degree Sociology

More information

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with

More information