Information Systems/Information Technology
Need more info? Visit the Information Systems and Technology website
This course presents a wide variety of strategies to build a person's problem solving skills towards situations in IT. Students practice creative/lateral thinking techniques and communication skills to approach technical and non-technical problems. Prerequisite: ENG 092 or 093 with a C- or better, and Math 098 with a C- or better.
This course covers the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate those threats. Emphasizes core security technologies, installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices. Includes attack and defense case study. Either ISIT 305 or NSCOM 205 may be taken for credit, not both. Prerequisite: Admission into the program or permission of instructor.
Students learn to develop efficient web applications across multiple browsers. Students will use applicable design principles and protocols, and best practices in creating extensible web applications. Students will use both open source and proprietary technologies to create web sites that incorporate code elements and services from across the Internet. Prerequisite: Admission to the program or permission of the instructor.
This course prepares students to do mobile application development. Students will learn to design, develop, test, and deploy mobile applications for multiple types of mobile devices in multiple software environments. Prerequisite: ISIT 320.
This class will present to students practical techniques and strategies to use in overall software testing and quality assurance methodologies. Students will be exposed to testing concepts and how to design, develop and document different kinds of tests. Prerequisite: ISIT 320.
Introduces concepts and issues related to securing information systems and the development of policies to implement information security controls. Topics include security vulnerabilities, threats and defense measures and legal and ethical issues associated with information security. Students will learn how to recognize and apply secure software development best practices. Prerequisite: Admission to the program or permission of the instructor.
Students learn about Business Intelligence (BI) applications and appropriate application architectures for a variety of scenarios. The benefits of BI and the possibilities for organizational change are discussed. Students use current BI tools to develop realistic solutions. Current trends are discussed as is the growing role of "big data." Prerequisite: Admission to the program or permission of the instructor.
Students learn concepts and techniques associated with development of a data warehouse. They learn how to prepare data for consolidation and exchange. Students learn to apply Extract, Transform and Load (ETL) principles and they use current ETL tools. Students practice coding techniques for extracting, cleaning and conforming data. Prerequisite: ISIT 330.
This course introduces the theory and concepts related to effective display of data with a focus on quantitative data. Students learn the principles of preparing effective visualizations and the tools to create such visualizations. Students use analytic tools to create visualizations. Prerequisite: ISIT 330.
Dimensional modeling has been broadly accepted as one of the principle techniques for data warehouse design. Students use a sequenced series of case studies and hands-on exercises to learn effective design principles for data warehouse development. Prerequisite: ISIT 330.
In this course students learn to go beyond simply querying data to do predictive data mining analysis. Students learn to apply data mining algorithms to realistic organizational data to find previously undiscovered patterns and draw conclusions. Students use current software tools and hands-on exercises to learn theoretical concepts. Prerequisite: ISIT 330.
Students learn a variety strategies and techniques for analyzing data and making decisions based upon that data. Students use case studies to integrate their analysis and problem solving skills. Students use current software systems to do analysis and they are required to present the results of their analyses. Prerequisite: ISIT 330, and either MATH 130 or BA 240.
This course introduces and applies the concepts of design, implementation and troubleshooting of Voice Over Internet Protocol (VoIP) and wireless systems. Technologies include VoIP Managers, Voicemail, System Reporting, Wireless Controllers, Access Points, Relay Systems, Wireless Topologies, Wireless Security and the associated protocols for both VoIP and wireless technologies. Prerequisite: Acceptance to the program or permission of instructor.
This course introduces and applies the concepts of design, implementation, management and troubleshooting of server virtualization, network virtualization and large storage systems. Technologies include VMware and Storage Area Networks (SAN) solutions. Prerequisite: Acceptance to the program or permission of instructor.
Introduces students to computer forensics, both its fundamentals and best practices for incident response. Includes the legal aspects of computer forensics, as well as its relationship to the Information Technology field. Hands-on projects will give students the tools and techniques to perform a full computer forensic investigation. Prerequisite: Acceptance to the program or permission of the instructor.
Students learn to develop data driven applications using both proprietary and open source environments. Students will develop applications using data from a variety of data repositories including relational databases, multi-dimensional databases and ?big data? repositories. Students also learn to work with data in a variety of formats. Prerequisite: ISIT 322.
Students learn best practices for developing enterprise software solutions with appropriate structure for maintainability and efficiency. This course expands student knowledge of software application structure and design principles focusing on advanced object oriented techniques, service oriented architectures and cloud services. Prerequisite: ISIT 420 Advanced Data Access with a C+ or better.
Students learn to create and query analytic databases including multi-dimensional databases (cubes) and ?big data? repositories. Students create business-oriented solutions for analytics. Prerequisite: ISIT 330.
Students learn techniques for analyzing data generated by web traffic and social media sites. Students learn the importance of such data to an organization and they learn what analytic measures are available and applicable. Students also learn how to implement web data collection and analytic tools for web-sites. Prerequisite: ISIT 330.
Students learn how to implement performance management in support of organizational change. Students learn how organizations define objectives, establish goals and measure progress using metrics and key performance indicators. Students learn how to implement software systems to provide appropriate information to users at all levels within an organization. Prerequisite: ISIT 330.
Introduces the concepts and application of basic scripting to monitor and collect logs in relation to servers and the associated services. Topics include scripting, logging, automation and system management. Prerequisite: Acceptance to the program or permission of instructor.
Description starting Spring 2014
This course covers the concepts of network vulnerabilities from a hacker's perspective. Its focus is professional penetration testing and the securing of information assets. The course provides students with the knowledge to prevent, detect, and respond to network security incidents. Prerequisite: Admission to the program or permission of instructor.
Description starting Spring 2014
This course focuses on the qualities that go into a sound Network Security Monitoring (NSM) system. Hands-on exercises use various network protocol analyzers and other tools to detect, investigate, and respond to network and system attacks. Students will learn how identify authorized and unauthorized malicious activity on an information systems network. Prerequisite: Admission to the program or permission of instructor.
Description starting Summer 2014
Hardening a computer reduces the attack surface by disabling functionality that is not required while maintaining the minimum functionality that is required. Students will learn to apply the key system hardening principles of segregation of duties, dual control, principle of least privilege, and economy of mechanism. This course covers system hardening techniques for physical devices & connections, network devices, Windows and Unix/Linux server operating systems, and cross-platform applications.
Description starting Spring 2014
This course provides practical experience in information systems and technology. Students apply knowledge and skills learned in classes as they work in settings relevant to their future employment plans. This is part 1 of a 2 quarter series. Prerequisite: Permission of the instructor.