This course serves as an introductory to Information Technology and what the future courses of IT will teach students. This class taught the basics of computer numbering services, web resources, Microsoft and Window’s tools, and an introduction to computer programming. This class displayed a pathway of careers one could pursue while pursuing a degree in Information Technology. This class also taught how to use HTML to modify web pages and make web pages of our own. This class was useful for incoming students to get a grasp of what Information Technology feels like, while displaying technical information in an understanding way.
This class teaches internet application environments and what they are made of. Teaching basics in WWW environments, defining servers, difference in browsers, and web searching techniques that would benefit students on how to efficiently search for information for their future in the IT degree. This class also explained differences in web-based programming languages like CCS, HTML, and Java Script. While also giving a detailed explanation of different services such as Active-X controls, DHTML, CGI web-based graphics, and XML programming. This class is useful for IT students to get a better understanding of the internet and what it is made of.
This class is a great way for students to get a better understanding of how websites work. This includes personal and enterprise sites, involving the design, development, and management of these sites. This class allows students to have a more detailed understanding of services such as: Lightweight web publishing, semantic web technologies, XML-tagged data, Web-based data and their interrelationships, architecture of a portal based on Semantic Web Services, information presentation and exchange over the internet, and semantic blogging.
This class teaches students a more in-depth study of the Windows operating system and the various services that are included with Windows. This includes Windows client/server operating systems installation, configuration, and customization. Operating systems services, service packs, APIs, third-party utilities, OS security, migration strategies, virtualization, and server consolidation.
This programming class teaches students the importance of learning programming and explains the various languages and their specializations. These languages include C++, Java, Visual Basic, and Python. Which language is best for different cases and how they differ. This class taught Python and the different mechanisms that are included with Python, such as: windows, forms, buttons, list and combo boxes, trees, etc. This class is important to students as a introduction to programming language’s specialties and differences.
This second programming class continuation of the prior programming class. This class is a more in-depth analysis of different languages and use cases. While also teaching more about the function of programming and how to perform and organize a programming language efficiently. Teaching about different data types, data structure, control structure, built-in and user-defined libraries, graphics programming, text files, data connectivity, web applications development, and server components. We studied Java and the differences from Python, and how to implement user libraries to take advantage of useful resources to cut down the time of manual labor. This class is important for students to grasp a better understanding of programming and the necessity of it in the IT field.
This class teaches the importance of security in IT and why it is a priority. This class explains many phrases and subjects that are important to IT security, these include: trusted systems, information security models, disaster recovery, business continuity planning, risk analysis, intrusion detection systems, and intrusion prevention. While also detailing the countermeasures for client servers and network levels.
This class teaches students about the methodology of identifying, analyzing, and classifying threats. While also demonstrating the different management processes and strategies for corporate assets. This class emphasizes discovering and reporting cyber threats to ensure a more secure environment is created.
This class teaches about the analysis, design, and development of information systems. Students will be taught concepts about the SDLC approach to system design and development. While also teaching students about the analysis, implementation and evaluation of different computer systems. This class is taught with CASE software and how it works and can be used for design and development for projects. ITS- 351 is a good class for students to learn how to properly design and develop projects in their IT future career.
This is a class that teaches the importance of proper structure, design, and development of databases. During this class, databases or analyzed with emphasis to teach about the proper creation and maintenance of a database. It also details the need for databases in organizational infrastructures and how databases are integral components in an information system. This class also details the different types of databases, such as relational databases, object-oriented databases, and client-server databases. Also teaching about different data modeling methods and data environments in which data bases are deployed. ITS- 345 is an important class for IT students, as it gives them important knowledge surrounding databases and how they are properly deployed, readying them for their future career in IT.
This class teaches students the concept of web mining and how it can be used to help gather information that pertains to a specific topic. During this class, students are also required to create projects that demonstrate web mining is done and what information can be gathered from web mining. Showing how important web mining can be for organizations to increase their productivity and efficiency.
This class teaches the students about the importance of computer forensics and data recovery, and how they can be used to gain evidence in legal issues or the court of law. Emphasizing the importance of chain of custody and the importance of proper authorization. This class gives a detailed study of how forensics specialists operate and the different methodologies they use to successfully gather evidence. These different methods include: applying steganography techniques, manipulating alternate data streams, discovering information in mangled files, conducting e-mail investigations, establishing covert surveillance with key stroke loggers, and remote access.
This class teaches the importance of telecommunications and networking, and how they are implemented in business models. This class goes into detail about communication methods and what they are made of, such as analog vs digital, data, images, and video communication. It teaches how these systems operate and work with each other to make up the communications infrastructure we use daily. ITS- 410 also analyzes networking and the inner workings of a network. Explaining details such as the following: Internet/Intranet, TCP/IP, MANs, VPN, VLAN, SANs, PANs, VOIP, remote access, Wireless networks, Directory Services, network security, and network management; evolving Internet Protocol (IP) technologies such as Internet2, OSI models, and Lan and Wan fundamentals. ITS- 410 is a useful class for students to better understand the communication methods we use daily, and to get a better grasp on networking and how it operates in the IT industry.
This class teaches students the importance of Knowledge Management systems in organizations to increase efficiency and the impact these systems have on productivity. While also demonstrating the importance of a healthy workplace that encourages its employees to collaborate with one another and the Knowledge Management system.
This class teaches students the importance of ethical hacking and how it improves the security of infrastructures. While also teaching the students the ethical code of ethical hacking, and what it means to be an ethical hacker. Ethical hackers are not to use their hacking knowledge in malicious ways, but only for finding vulnerabilities and threats. This class teaches the various methodologies and tools that ethical hackers use to discover and patch the vulnerabilities that exist on different systems and infrastructures.
This class is the capstone project for IT students. It is necessary as a way for IT students to demonstrate the knowledge they have gained from their past classes. They show their knowledge by creating a project of their own creation to demonstrate their skills and education in information technologies.