Course Descriptions

 

Information on current graduate courses, including course prerequisites and corequisites, can be found in the most recent version of the University Graduate Catalog.

 


ITIS 5156. Computer-Aided Instruction. (3)

Prerequisite:  Permission of department.  History of CAI; study of current CAI systems; development of man-machine dialogue; programming tools for CAI; information structures for computer-oriented learning. Advantages/disadvantages/costs of CAI. (On demand)

Go To Top


 

ITIS 6120. Applied Databases. (3)  

Cross-listed as HCIP 6120.  Prerequisite: Full graduate standing or permission of department.  Identification of business database needs; requirements specification; relational database model; SQL; E-R modeling; database design, implementation, and verification; distributed databases; databases replication; object-oriented databases; data warehouses; OLAP; data mining; security of databases; vendor selection; DBMS product comparison; database project management; tools for database development, integration, and transaction control. (Fall) (Evening)

Go To Top


 

ITIS 5166. Network-Based Application Development. (3)  

Cross-listed as HCIP 5166.  Prerequisite: Full graduate standing or permission of department.  Examines the issues related to network based application development.  Topics include:  introduction to computer networks, web technologies and standards, network based programming methodologies, languages, tools and standards (Spring) (Evening)

Go To Top


 

ITIS 5180. Mobile Application Development. (3)  

Cross-listed as ITCS 5180.  Prerequisite: Graduate standing or permission of instructor.  Mobile platforms are at the center of attention of users and organizations nowadays.  Most organizations and businesses are rapidly migrating toward the cloud and need to provide a fast and easy mechanism for users to stay connected to their services.  Mobile applications are the top trend nowadays given the high variety of new mobile devices and platforms such as Apple’s iOS and Google’s Android.  In this course, students are introduced to the foundations of mobile development and its unique requirements and constraints.  Students design and build a variety of mobile applications with a hands-on and project-based approach. (On demand)

Go To Top


 

ITIS 5220. Vulnerability Assessment and System Assurance. (3)  

Cross-listed as HCIP 5220.  Prerequisite:  permission of department.  Discusses methodologies, tools, and technologies that are important for vulnerability assessment and systems assurance.  Topics covered include: ethical hacking techniques, vulnerability assessment, risk assessment/management, finding new exploits, discovering vulnerabilities, penetrating network perimeters, bypassing auditing systems, and assured administration of systems as well as evaluating systems assurance levels.  Focus will be placed on 1) understanding current penetration techniques for networks, operating systems, services and applications; 2) investigating mitigation and defense strategies; and 3) studying legal and ethical considerations.  The course is based on case studies with a strong lab component.  (On demand)

Go To Top


 

ITIS 5221. Secure Programming and Penetration Testing. (3)  

Prerequisite:  ITIS 4166 or ITIS 5166, or permission of department.   Techniques for web application penetration testing, secure software development techniques for network based applications.  Automated approaches such as static code analysis and application scanning will also be discussed.  (Fall, Spring)

Go To Top


 

ITIS 5250. Computer Forensics. (3)  

Cross-listed as HCIP 5250.  Prerequisite: Enrollment in the MS in Information Technology program or permission of department.  The identification, extraction, documentation, interpretation, and preservation of computer media for evidentiary purposes and/or root cause analysis.  Topics include:  techniques for discovering digital evidence; responding to electronic incidents; tracking communications through networks; understanding electronic media, crypto-literacy, data hiding, hostile code, and Windows™ and UNIX™ system forensics; and the role of forensics in the digital environment. (On demand)

Go To Top


 

ITIS 5510. Web Mining. (3)

Pre- or corequisites: ITIS 6120 and full graduate standing, or permission of department.  Topics include: measuring and modeling the Web; crawling, Web search and information retrieval; unsupervised learning, supervised learning, semi-supervised learning in Web context; social network analysis and hyperlink analysis; text parsing and knowledge representation. (Spring)

Go To Top


 

ITIS 6010. Topics in Software and Information Systems. (3)  

Prerequisite:  Permission of department.  Topics in software and information systems selected to supplement the regular course offerings.  May be repeated for credit with change of topic.  (On demand)

Go To Top


 

ITIS6011. Interaction Design Studio. (4)

Prerequisites:  graduate standing, or permission of department; This course is a studio approach to teaching topics in interaction design. Aspects of interaction design taught in the studio include: gesture-based interaction, tangible interaction, large public display interaction, tabletop interaction, multi-touch tablet interaction, and human-robot interaction. In this course students will learn how to apply a theoretical understanding of some aspect of interaction design to the study of existing designs and the development of a new design. Outcomes include writing a literature review about interaction design, executing users studies and critiques of existing designs, and developing and implementing a new interaction design for a specific purpose. This course is repeatable for credit. (Spring)

Go To Top


 

ITIS 6112. Software System Design and Implementation. (3)

Cross-listed as HCIP 6112 and ITCS 6112.  Prerequisite:  Graduate standing or permission of instructor.  Introduction to the techniques involved in the planning and implementation of large software systems.  Emphasis on human interface aspects of systems.  Planning software projects; software design process; top-down design; modular and structured design; management of software projects; testing of software; software documentation; choosing a language for software system. (Fall) (Spring) (Evenings) 

Go To Top


 

ITIS 6130. Software Requirements Engineering for Information Systems. (3)

Prerequisite: Full graduate standing, or permission of department. Introduction to requirement engineering methodologies.  Topics include: requirements elicitation, specification, and validation; structural, informational, behavioral, security, privacy, and computer user interface requirements; scenario analysis; application of object-oriented methodologies in requirements gathering; spiral development models; risk management models; software engineering maturity model. (On demand)

Go To Top


 

ITIS 6140. Software Testing and Quality Assurance. (3)  

Prerequisite: ITIS 6112 or permission of department.  Methods for evaluating software for correctness and reliability including code inspections, program proofs and testing methodologies.  Formal and informal proofs of correctness.  Code inspections and their role in software verification. Unit and system testing techniques, testing tools and limitations of testing. Statistical testing, reliability models.  Software engineering maturity model. (On demand)

Go To Top


 

ITIS 6148. Advanced OO Design and Implementation. (3)  

Cross-listed as ITCS 6148.  Prerequisites: ITIS 6112, or equivalent courses.  Focuses on issues related to the design, implementation, integration, and management of large object-oriented systems.  Topics include: object models, object modeling, frameworks, persistent and distributed objects, and object-oriented databases. (Spring) (Alternate years)

Go To Top


 

ITIS 6150.  Software Assurance.  (3)  

Cross-listed as ITIS 8150.  Prerequisite:  ITIS/ITCS 6112, ITIS/ITCS 8112, ITIS 5221, or permission of department.  An introduction to software assurance education and research.  Topics include:  the security of software across the development life cycle that addresses trustworthiness, predictable execution and conformance.  Various aspects of secure software requirements, design, construction, verification, and validation, process and engineering management focused on as they relate to secure software development.  Students gain hands-on experience in various techniques and tools as part of a semester-long project in addition to other assignments.  (On demand)

Go To Top


 

ITIS 6162. Knowledge Discovery in Databases. (3)

Cross-listed as HCIP 6162 and ITCS 6162.  Prerequisite: ITCS 6160 or permission of instructor.  The entire knowledge discovery process is covered in this course.  Topics include: setting up a problem, data preprocessing and warehousing, data mining in search for knowledge, knowledge evaluation, visualization and application in decision making. A broad range of systems, such as OLAP, LERS, DatalogicR+, C4.5, AQ15, Forty-Niner, CN2, QRAS, and discretization algorithms will be covered. (Summer) (Evenings) 

Go To Top


 

ITIS 6163. Data Warehousing. (3)  

Cross-listed as HCIP 6163 and ITCS 6163.  Prerequisite: ITCS 6160 or permission of instructor.  Topics include:  use of data in discovery of knowledge and decision making; the limitations of relational databases and SQL queries; the warehouse data models: multidimensional, star, snowflake; architecture of data warehouse and the process of warehouse construction; data consolidation from various sources; optimization; techniques for data transformation and knowledge extraction; relations with enterprise modeling. (On demand) 

Go To Top


 

ITIS 6164. Online-Info Systems. (3)

Prerequisites: ITCS 6114 or permission of department.  The fundamental concepts and philosophy of planning and implementing an online computer system. Characteristics of online systems; hardware requirements; modeling of online systems; performance measurement; language choice for online systems; organization techniques, security requirements; resource allocation. (On demand)

Go To Top


 

ITIS 6167. Network Security. (3)  

Cross-listed as HCIP 6167.  Prerequisite: ITIS 6200 or equivalent.  Examines the issues related to network security. Topics include:  network security background and motivation, network centric threats, network authentication and identification, network security protocols, firewall, IDS, security in wireless environments, email security, instant message security, network application security, and network based storage security. There are heavy lab based components in this course. (Fall) (Evening) 

Go To Top


 

ITIS 6177. System Integration. (3)

Pre/co-requisites: ITIS5166 or equivalent, or permission of the department.  Examines the issues related to system integration.  Topics include: data integration, business process integration, integration architecture, middleware, system security, and system management. (Fall) (Evening) 

Go To Top


 

ITIS 6198. IT Internship Project. (3)  

Cross-listed as HCIP 6198.  Prerequisite: permission of department. Complete a team-based project that is originated from an IT organization and approved by the department. 

Go To Top


 

ITIS 6200. Principles of Information Security and Privacy. (3)  

Cross-listed as ITIS 8200.  Prerequisite: Permission of department.  Topics include:  security concepts and mechanisms; security technologies; authentication mechanisms; mandatory and discretionary controls; basic cryptography and its applications; database security, intrusion detection and prevention; assurance requirement, assurance class, evaluation methods and assurance maintenance; anonymity and privacy issues for information systems. (Fall, Spring) (Evening)

Go To Top


 

ITIS 6201. Computer Security and Privacy. (3)  

Prerequisite:  full graduate standing or permission of department.  Topics include:  threats to computer and communication systems and privacy concepts; basic security defense techniques; web and network security issues; portable device security;  operating systems security issues; email security; and security issues in major business applications.  (Fall, Evenings)

Go To Top


 

ITIS 6210. Access Control and Security Architecture. (3)  
Cross-listed as HCIP 6210.  Prerequisite: ITIS 6200.  Discusses objectives, formal models, and mechanisms for access control; and access control on commercial off-the-shelf (COTS) systems.  Examines the issues related to security architectures and technologies for authorization.  Topics include:  cryptographic infrastructure, distributed systems security architectures, database systems security architectures, Internet security architectures, network security architectures and e-commerce security architectures. (Spring) (Evening)

Go To Top


 

ITIS 6216. Introduction to Cognitive Science. (3)  

Cross-listed as PSYC 6216 and ITCS 6216.  Multiple perspectives on the study of intelligent systems.  Broad coverage of such topics as philosophy of mind; human memory processes; reasoning and problem solving; artificial intelligence; language processing (human and machine); neural structures and processes; and vision.  Also included is participation in the cognitive science seminar. (On demand)

Go To Top


 

ITIS 6230. Information Infrastructure Protection. (3)  

Cross-listed as HCIP 6230.  Prerequisite: ITIS 6200.  Methodologies, tools, and technologies that are important for protecting information systems and information infrastructures.  Topics include:  techniques, processes and methodologies for information security risk assessment and management, systems modeling and analysis using logic programming and formal methods, tools and technologies for critical infrastructure protection, methodologies for continuous operation and recovery from disasters. (On demand)

Go To Top


 

ITIS 6240. Applied Cryptography. (3)  

Cross-listed as HCIP 6240.  Prerequisite: Full graduate standing or permission of department.  Provides students with an understanding of modern cryptographic techniques, algorithms and protocols that are of fundamental importance to the design and implementation of security critical applications.  Covers not only standard cryptographic techniques, but also exposes students to the latest advances in applied cryptography.  Topics include: secret and public key ciphers, stream ciphers, one-way hashing algorithms, authentication and identification, digital signatures, key establishment and management, secret sharing and data recovery, public key infrastructures, and efficient implementation. (On demand)

Go To Top


 

ITIS 6220. Data Privacy. (3)  

Pre- or corequisite: ITIS 6200, full graduate standing, or permission of department.  Topics include:  privacy concepts, policies, and mechanisms; identity, anonymity, and confidentiality; private data analysis and database sanitization; privacy-preserving data mining techniques including k-anonymity, randomization, and secure function evaluation; privacy issues in social networks, RFID, and healthcare applications. (Fall) (Evenings)

Go To Top


 

ITIS 6320 Cloud Data Storage. (3)  

Prerequisite:  Full graduate standing, or permission of department. This course will cover the design and implementation of cloud storage and big data systems and the architecture and characteristics of components on which cloud storage systems are built. Topics to be covered include storage device hardware, file systems, mirroring and RAID, array coding techniques, storage area networks (SAN), network-attached storage (NAS), cloud storage and big data, DB in clouds, relational storage models, key value stores and other No-SQL mechanisms, data consistency and availability in the cloud, cloud data privacy and security. (On demand)

Go To Top


 

ITIS 6342. Information Technology Project Management. (3)  

Cross-listed as HCIP 6342.  Prerequisite:  Permission of department.  Introduction to problems associated with managing information technology projects involving, particularly, integration of systems, development of client-specific solutions, and project justification.  Moves beyond the classic techniques of project management and integrate communication software/systems, multi-site, multi-client facilities projects, cultural issues involved with managing interdisciplinary teams, and the effect of rapid technological obsolescence on project justification, funding and continuance. (Spring)

Go To Top


 

ITIS 6362. Information Technology Ethics, Policy, and Security. (3)  

Prerequisite: Permission of department Management of Information technology involves understanding the broader issues of ethics, policy and security. The growth in Internet usage and E-commerce require IT professionals to consider issues pertaining to data protection, regulation, and appropriate use and dissemination of information. The course is designed to be team-taught by professionals in the field. (Fall)

Go To Top


 

ITIS 6400. Principles of Human-Computer Interaction. (3)  

Cross-listed as HCIP 6350.  Prerequisite:  Full graduate standing, or permission of department.  An introduction to Human-Computer Interaction practice and research.   Topics include:  the perceptual, cognitive, and social characteristics of people, as well as methods for learning more about people and their use of computing systems.  The process of interface design, methods of design, and ways to evaluate and improve a design.  Also highlights a number of current and cutting-edge research topics in Human-Computer Interaction.  A balance of design, sociological/psychological, and information systems elements.  (Spring)

Go To Top


 

ITIS 6410. Personalization and Recommender Systems.  (3)  

Cross-listed as HCIP 6410 and ITIS 8410.  Prerequisite:  Full graduate standing, or permission of department.  An introduction to the application of personalization and recommender systems techniques in information systems.  Topics include:  historical, individual and commercial perspectives; underlying approaches to content-based and collaborative recommendation techniques for building user models; acceptance issues; and case-studies drawn from research prototypes and commercially deployed systems.  (On demand)

Go To Top


 

ITIS 6420. Usable Security and Privacy. (3)  

Cross-listed as ITIS 8420.  Prerequisite: ITIS 6200.  Much of the work into security and privacy solutions ignore a critical element:  the human who must interact with those solutions. In this course, we investigate privacy and security from a user-centered point of view.  How do people think about privacy and security?  How do they interact with current applications and solutions?  What should be considered in designing user-friendly security systems?  This course introduces students to a variety of usability and user interface issues related to privacy and security as well as examine potential designs and solutions. (On demand)

Go To Top


 

ITIS 6500. Complex Adaptive Systems. (3)  

Cross-listed as ITIS 8500 and ITCS 6500/8500.  Prerequisite:  Permission of instructor.  Complex adaptive systems (CAS) are networked (agents/part interact with their neighbors and, occasionally, distant agents), nonlinear (the whole is greater than the sum of its parts), adaptive (the system learns to change with its environment), open (new resources are being introduced into the environment), dynamic (the change is a norm), emergent (new, unplanned features of the system get introduced through the interaction of its parts/agents), and self-organizing (the parts organize themselves into a hierarchy of subsystems of various complexity).  Ant colonies, networks of neurons, the immune system, the Internet, social institutions, organization of cities, and the global economy are a few examples where the behavior of the whole is much more complex than the behavior of the parts.  This course will cover those and similar topics in an interactive manner.  Examples of our current research effort will be provided.  Topics include:  Self-organization; emergent properties; learning; agents; localization affect; adaptive systems; nonlinear behavior; chaos; complexity.  (On demand)

Go To Top


 

ITIS 6510. Software Agent Systems. (3)  

Cross-listed as ITIS 8510.  Prerequisite:  Full graduate standing, or permission of department.  An introduction to centralized and distributed software agent systems.  Topics include:  agent cooperation in cooperative and competitive environments, agent architectures, game theoretical models, market mechanisms, multi-agent learning, mixed-initiative computing and single and multi-agent applications.  Students gain hands-on experience by building a multi-agent system as part of a semester-long project in addition to shorter assignments.  (On demand)

Go To Top


 

ITIS 6520. Network Science. (3)  

Cross-listed as ITIS 8520.  Prerequisite: Full graduate standing or permission of department.  Network Science helps students design faster, more resilient communication networks; revise infrastructure systems such as electrical power grids, telecommunications networks, and airline routes; model market dynamics; understand synchronization in biological systems; and analyze social interactions among people.  It examines the various kinds of networks (regular, random, small-world, influence, scale-free, and social) and applies network processes and behaviors to emergence, epidemics, synchrony, and risk.  This course integrates concepts across computer science, biology, physics, social network analysis, economics, and marketing.  (On demand)

Go To Top


 

ITIS 6880. Individual Study. (1-3)

Prerequisites: At least 9 graduate ITCS/ITCS hours and permission of department. With the direction of a faculty member, students plan and implement appropriate objectives and learning activities to develop specific areas of expertise through research, reading, and individual projects. May be repeated for credit. (On demand)

Go To Top


 

ITIS 6991. Information Technology Thesis. (1-6)

Prerequisite:  Full standing in the M.S. in Information Technology program and permission of department.  Graduate thesis research.  A detailed exploration of an area of information technology chosen for thesis research.  May be repeated for credit; no more than six hours may be applied to the M.S. degree requirements.  (Fall, Spring, Summer)

Go To Top