Undergraduate Catalog 2022-2023 | Page 219

Course Name
Long Title
Min Credits
Description
Requisites
This course provides students with a hands-on practical approach to the Relational Database Model and SQL ( Structured Query Language ). Topics include normalization , design methodology , DBMS functions , and basic database administration . Database management approaches such as client / server databases , data warehouses , and cloud computing platforms will be covered . Security strategies and
CIS-215
Relational Databases
3.00
Database backup and recovery best practices will be discussed .
Students will learn how to design and code a Relational Database using Microsoft ' s SQL Server Management Studio and Azure Managed Cloud Database . By the completion of this course , students should be able to understand an organization ' s database requirements and translate those requirements into a functional relational database .
None
CIS-230 Networking 3.00
This course provides the student with the foundation necessary to be successful in any field of computing . Students will be introduced to the Open Systems Interconnection ( OSI ) model and Transmission Control Protocol / Internet Protocol ( TCP / IP ) suite . Structured cabling , network topologies , routing and switching , network connectivity and troubleshooting will be covered . Students will learn about virtualization , cloud computing , and wireless technologies . With a focus on networking operating systems , the latest Microsoft Windows Operating System and Server will be used to explore DHCP , DNS , and wired and wireless network communications . This course is aligned with the CompTIA + guidelines for networking .
Any 100-level course or instructor permissions
CIS-240 Cybercrime 3.00
This course provides students with the knowledge and skills necessary to identify , track and prosecute cybercriminals . Students will learn the processes involved in detecting attacks and collecting evidence in a forensically sound manner . Advanced techniques used in computer investigations and analyses will be discussed . Learn where potential legal evidence can be found , how to prepare evidence for computer related crime and abuse cases , as well as how to track the intrusive hacker ' s path through a client ' s system or network . Students are introduced to tools used in investigations , investigating network traffic , web attacks , Denial-of-Service ( DoS ) attacks and corporate espionage . Other topics covered include cyberbullying , organized cybercrime , cyberwarfare , cyberterrorism , and hacktivism .