BUAN500
|
Applied Regression with Research Methods
|
This seminar is designed to be a practical introduction to regression application and analysis, one of the most powerful and useful tools in the field of statistics. Although regression is commonly used among statisticians, social scientists, and dat...
|
BUAN501
|
Problem Solving in Applied Data Science
|
This course introduces several important modeling approaches for decision-making. The course focuses on deterministic optimization problems, including linear, integer and possibly dynamic programming. Additionally, the course addresses decision-makin...
|
BUAN510
|
Databases and Data Warehouse
|
This course is designed to give students a foundation in practical database design and implementation. The course provides in-depth coverage of database design, demonstrating that the key to successful database implementation is the design of databas...
|
BUAN511
|
Prescriptive Analytics
|
This course focuses on how optimization modeling techniques can be used to make decisions for different business analytics applications. The emphasis is on the formulation of different optimization problems and the use of the correct quantitative tec...
|
BUAN512
|
Data Mining for Predictive Decision Making
|
Machine Learning is at the heart of big data mining and predictive analytics. Students learn and apply the fundamental methods at the core of modern machine learning to data mining and predictive analytics. Topics covered include: the use of the sci-...
|
BUAN513
|
Big Data, Business Process and Enterprise Analytics
|
A hands-on overview of data anyalsis and mining techniques for managing large datasets. Students learn how to clean and analyze realistic datesets using tools such as R Studio. The course offers an introduction to data mining theory and statistics wh...
|
BUAN514
|
Information Visualization and Communication
|
This course teaches the skills necessary to communicate information about data clearly and effectively through written, oral and visual means. Students will master advanced graphical tools to communicate effectively. The course will build from the un...
|
BUAN515
|
Data Governance in Business Analytics
|
As organizations deploy business analytic systems to harness information and value from their data assets, the proper governance of data is crucial. Organizational issues critical to successful data management require the implementation of enterprise...
|
BUAN570
|
Data, Models and Effective Organizational Decisions
|
Data models help in making effective organizational decisions because of the way they enable the exploration and investigation of multiple business scenarios. Data-driven models can generate informative outcomes that help stakeholders and decision-ma...
|
BUAN571
|
Business Analytics Capstone
|
The Capstone is an application of data analytics in the planning and execution of a real-life development project for an industry partner. Students work individually or in small project teams to define and carry out an analytics project from beginnin...
|
BUAN588
|
No Norwich Equivalent
|
This course is used for transfer when no equivalent Norwich course exists.
|
CSIS370
|
Computer Architecture and Reverse Engineering
|
An in-depth introduction to the fundamentals of contemporary computer architectures, reverse engineering and computer networking. The students become familiar with different types of data presentation and manipulation. Then, they explore different ty...
|
CSIS400
|
Computer Science and Information Systems Capstone
|
This is the final course in the Bachelor of Science in Computer Science and Information Systems program. As the culmination of the BSCO program, students will incorporate the knowledge learned from the previously taken courses in the degree plan. Top...
|
CYBR110
|
Introduction to Computer Programming
|
This is a hand-on introductory course to computer programming using high-level coding language. Topics covered include program design, variables, data types, control structures, functions, classes, abstraction, and object-oriented concepts. Debugging...
|
CYBR188
|
No Norwich Equivalent
|
This course is used for transfer when no equivalent Norwich course exists.
|
CYBR201
|
Fundamentals of Computer Networking
|
This course is the study of the core theories and protocols that are the foundation of computer networking. The Open Systems Interconnection (OSI) model and the Transmission Control Protocol/Internet Protocol (TCP/IP), protocol suite are discussed in...
|
CYBR210
|
Computer Programming with a High Level Language
|
This course covers the fundamental concepts of computer programming, using a high level scripted programming language. The course emphasizes design and implementation standards. This course is designed to provide the skills necessary to become an eff...
|
CYBR215
|
Computer Programming with a Low Level Language
|
This course covers the fundamental concepts of computer programming, using a low-level scripted programming language. This course is designed to provide the skills necessary to understand basic computer architecture, allowing the cyber security speci...
|
CYBR220
|
Windows Server Administration
|
This course provides students with the skills necessary to design, implement, manage and protect a Microsoft Windows Server Active Directory Domain. Students apply the lessons learned in this course by implementing an Active Directory Domain in a vir...
|
CYBR225
|
Linux Administration
|
This course provides students with the necessary knowledge and skills to install, configure, upgrade and manage a Linux operating system in an enterprise network. Additionally, students learn to perform normal business operations using the Linux Oper...
|
CYBR230
|
Relational Databases with SQL
|
This course covers the fundamental concepts of relational databases and the scripted Structure Query Language (SQL) language used to manage them. Students learn how to design functional relational databases that conform to industry standards.
|
CYBR288
|
No Norwich Equivalent
|
This course is used for transfer when no equivalent Norwich course exists.
|
CYBR320
|
Vulnerability Testing I
|
This course is the first of a two-part introduction to Penetration Testing and Vulnerability Assessment. This course presents the concepts, tools, and techniques used for penetration testing, vulnerability exploitation, assessment, reporting, and for...
|
CYBR330
|
Forensic Accounting and Fraud Investigations
|
This course explores how Forensic accounting methodologies are used to uncover evidence of criminal activity. Students will develop an understanding of white-collar crime schemes, fraud in businesses, the circumstances in which it arises, techniques...
|
CYBR341
|
Foundations in Cyber Law and Cybercrime
|
The computer has become a common toll in crime. This course examines the nature and scope of cybercrime and the legal response to high-tech crime including the challenges presented to legal frameworks. The lectures and readings identify and discuss c...
|
CYBR370
|
Introduction to Information Warfare
|
This course introduces students to the overall concept of Information Warfare (IW) and Information Operations (IO), particularly with regard to the US Federal government and the Department of Defense. Introduction to IW / IO surveys the development o...
|
CYBR380
|
Offensive Information Warfare
|
Students learn how Offensive Information Warfare is executed at the technical level and the defensive measures cybersecurity professionals use to prevent them. The following principles from the National Security Agency and Department of Homeland Secu...
|
CYBR382
|
Defensive Information Warfare
|
This course introduces students to the overall concept of Defensive Information Operations (D-IO), which are conducted across the range of military operations at every level of war to achieve mission objectives. Combatant commanders and mission owner...
|
CYBR388
|
No Norwich Equivalent
|
This course is used for transfer when no equivalent Norwich course exists.
|
CYBR400
|
Cyber Capstone
|
This is the final course of the program in which students analyze and synthesize program learning by examining a chosen organization's network infrastructure and security posture. Students present an in-depth analysis paper as their final deliverable...
|
CYBR410
|
Systems Assurance
|
This course focuses on the design considerations involved with the security of site design. The course will also provide and understanding of the Levels of Trust and system accreditation/certificate processes. Life cycle management of software, hardw...
|
CYBR420
|
Vulnerability Testing II
|
This course is the second of a two-part introduction to Penetration Testing and Vulnerability Assessment. This course presents the concepts, tools, and techniques used for penetration testing, vulnerability exploitation, assessment, reporting, and fo...
|
CYBR442
|
Foundations in Computer Forensics
|
This course provides the student with an ability to perform basic forensic techniques and use appropriate media analysis software. Knowledge of the security, structure and protocols of network operating systems and devices will be covered as students...
|
CYBR488
|
No Norwich Equivalent
|
This course is used for transfer when no equivalent Norwich course exists.
|
DTAN150
|
Programming Languages for Business Analytics and Data Science
|
This course covers data mining, data wrangling and related concepts by providing a practical hands-on approach to equip beginners and novices alike with the most highly sought-after languages in the industry. Topics include the manipulation of data s...
|
DTAN188
|
No Norwich Equivalent
|
This course is used for transfer credit when no equivalent Norwich course exists.
|
DTAN288
|
No Norwich Equivalent
|
This course is used for transfer credit when no equivalent Norwich course exists.
|
DTAN301
|
Introduction to Data & Business Analytics
|
This course introduces students to the discipline and techniques of data analytics and their application in business. Students develop a theoretical and practical approach to business problem solving utilizing end-to-end business analytics processes...
|
DTAN302
|
Advanced Data and Business Analytics
|
In this course students learn to gather, describe, analyze data and use advanced statistical tools to make decisions on operations, risk management, finance, marketing, etc. Analysis is done targeting economic and financial decisions in complex syste...
|
DTAN310
|
Algorithm Design and Implementation
|
No Description Set
|
DTAN320
|
Introduction to Machine Learning & Artificial Intelligence
|
DTAN 320 lays the foundation for the most important principles, techniques, and applications of Machine Learning and Artificial Intelligence. This course focuses on exploratory data analysis, data engineering and data preparation, and model selection...
|
DTAN330
|
Introduction to Network Science
|
In this course, students learn how to analyze social media feeds, news, and full-text publications to derive insightful findings. They explore the foundations of network constructions, network types, communities, and the common network phenomena and...
|
DTAN344
|
Data Visualization
|
Students learn and apply the techniques and tools for creating effective visualizations of complex information. The focus is on principles from graphic design, perceptual psychology, and cognitive science, as well as story and structure. Topics inclu...
|
DTAN388
|
No Norwich Equivalent
|
This course is used for transfer credit when no equivalent Norwich course exists.
|
DTAN488
|
No Norwich Equivalent
|
This course is used for transfer credit when no equivalent Norwich course exists.
|
GI188
|
No Norwich Equivalent
|
This course is used for transfer when no equivalent Norwich course exists.
|
GI288
|
No Norwich Equivalent
|
This course is used for transfer when no equivalent Norwich course exists.
|
GI388
|
No Norwich Equivalent
|
This course is used for transfer when no equivalent Norwich course exists.
|
GI488
|
No Norwich Equivalent
|
This course is used for transfer when no equivalent Norwich course exists.
|
GI510
|
Introduction to Information Assurance
|
This course introduces the foundations of information assurance with a focus on concepts and terminology used in describing, analyzing and implementing information security. Topics include the history and mission of information assurance, history of...
|
GI511
|
Management of Information Assurance
|
This course focuses on management of the information assurance process. Topics include human factors in reducing security breaches, security incident detection and response, remediation, management's role in information assurance and other considerat...
|
GI512
|
Foundations and Historical Underpinnings of Information Assurance
|
Historical foundations of information assurance from the early days of mainframes to the foundations of sophisticated networks today and distributed computing systems. It examines the earliest thinking about data structures and domains, interoperabil...
|
GI522
|
Information Assurance Technology
|
This seminar focuses on the use of technological defenses against threats and exploitations of vulnerabilities in information systems. Topics include physical security measures, access controls, security elements of operating systems, network securit...
|
GI532
|
Human Factors and Managing Risk
|
Focuses on business objectives, user attitudes and user activities significantly influence both the development of an information assurance program and its successful implementation. The first week focuses on Operations Security and why it is the fou...
|
GI542
|
Information Assurance Management and Analytics
|
This seminar is arranged in four general areas beginning with examining and exploring the strategic and gradually narrowing down to the tactical level, Compliance, Management, Leadership, & Policy Development, Relationships & Adding Value, Project Ma...
|
GI551
|
Computer Forensic Investigations
|
This course focuses on the spectrum of tools and techniques used to investigate digital incidents whether in a civil or criminal environment. Information assurance professionals are expected to have a broad understanding of digital incidents, their m...
|
GI554
|
Computer Security Incident Response Team Management
|
Students will analyze and apply the key points in creating and managing a computer security incident response team (CSIRT), also sometimes known as a computer incident response team (CIRT) or a computer emergency response team (CERT). Major topics in...
|
GI556
|
Cyber Crime
|
This course explores the nature of conflict in cyber space focusing on two major internet-based threats to the U.S. national security: cyber terrorism and cyber crime. The course addresses questions like: who is undertaking these cyber activities, wh...
|
GI557
|
Cyber Law
|
Explores a broad variety of federal statutory, common, and international laws that may impact the information technology professional.Because the overwhelming majority of cyber infrastructure is owned and operated by the private sector, the course fo...
|
GI562
|
Vulnerability Management and Penetration Testing I
|
Basics in penetration testing of computer networks. This is the first of two courses addressing Vulnerability Management. A virtual lab is used to gain experience through hands-on lab exercises. Students learn to use the well-known open-source Metasp...
|
GI563
|
Vulnerability Management II
|
Advanced open-source tools used to conduct penetration testing of computer networks. This is the second of two courses that address Vulnerability Management. Students learn the rules of engagement, and how to conduct legal and ethical security tests...
|
GI566
|
Critical Infra. Protection
|
This course examines the security of information in computer and communications networks within infrastructure sectors critical to national security. These include the sectors of banking, securities and commodities markets, industrial supply chain, e...
|
GI567
|
International Perspectives on Cyberspace
|
This course explores the concept of cyber and cyberspace from an international perspective. It starts with a look at the technical nature of the internet from its very beginning. It then moves on to explore the various threats facing all nations, inc...
|
GI588
|
No Norwich Equivalent
|
This course is used for transfer when no equivalent Norwich course exists.
|
IS500
|
Collaboration, Teamwork, and Ethics
|
This seminar examines the frameworks of ethics, from an individual to an organizational perspective. All coursework is designed to create opportunities for ethical outcomes in all personal, professional, and organizational endeavors. Building effecti...
|
IS501
|
Statistical Concepts
|
Examines the basic statistical techniques needed for business decision making in areas such as operations management, quality improvement, marketing research, finance, and general management. The course examines collection and presentation of data, f...
|
IS502
|
Data Analytics Metho
|
Collect, describe, and analyze data, using advanced statistical tools to make and support decisions on operations, risk management, finance, marketing, etc. An analysis is done targeting economic and financial decisions in complex systems that involv...
|
IS503
|
Information System Analysis and Design
|
This course focuses on systems analysis with an emphasis on developing a range of modeling techniques. The System Development Life Cycle Model, including system implementation and post implementation activities, is examined. Specific topics include o...
|
IS504
|
Executive Leadership for Information Systems
|
This course examines leadership principles and strategies to lead the digital transformation of organizations, manage information technology projects, implement process improvements, and execute enterprise system and integration across an organizatio...
|
IS505
|
Governance, Risks, and Controls
|
This course addresses aspects of information security. Topics include implications of databases, telecommunication systems, risk assessment, security policies, remote connections, authentication and prevention systems, foundations of cryptography, ph...
|
IS510
|
Introduction to Business Intelligence
|
This course provides an introduction to the concepts of business intelligence (BI) as components and functionality of information systems. It explores how business problems can be solved effectively by using operational data to create data warehouses...
|
IS511
|
Enterprise Data Management
|
This course introduces the foundations of database systems, focusing on data modeling, query design and applications. It provides an understanding of the issues in designing and managing database systems as an essential organizational resource. The c...
|
IS512
|
Data Visualization
|
A course on the fundamentals of effective data visualization, which is the art oand science of turning data into readable graphics for the purpose of storytelling and enabling stakeholder to make data driven decisions. Students learn how to detect an...
|
IS520
|
Predictive Analytical Models
|
Students examine predictive analytics that help decision makers evaluate possible various scenarios based upon historical data predictors such as revenues, profits, market share, the probability of making a sale, and the probability of losing a clien...
|
IS521
|
Big Data Processing and Cloud Services
|
Students examine two important, and sometimes interrelated, emerging data management technologies: cloud computing and big data. Students analyze cloud computing and why it provides an attractive alternative to an on-site data center as well as the t...
|
IS522
|
Business Decision Models
|
This course covers the development, implementation and utilization of business models for managerial decision making. Discovered patterns, relationships and statistical findings from Data Mining efforts are often used as input in these mathematical m...
|
IS570
|
Information Systems Capstone
|
This course is designed to equip students with the strategic thinking, ethical leadership and team management skills necessary for success in managerial roles within the field of information systems. In this capstone course, students will engage in a...
|
IS588
|
No Norwich Equivalent
|
This course is used for transfer when no equivalent Norwich course exists.
|