Online computer information system program


















This course provides students with an understanding of the many different devices and technologies, from historical to emerging, that are required to design and build networks. In a broad survey of concepts and terminology, students will learn about topology, communications, protocols, and security, and to diagram basic networks to specification.

From day one, students in this course are problem solving, first in terms of algorithmic design and then as early as week two via programming in the latest version of Python, using PyCharm. Students begin by writing a program to have a conversation, having strings and numbers as input, and advance, by week seven, to building a working password saver program, capable of looking up, adding and encrypting , and storing passwords.

Students are presented with the opportunity to expand and showcase their knowledge and abilities in this week course where they are expected to work independently and develop a project related to their major. In this course, students must use previously acquired and new, advanced skills in SQL Structured Query Language to modify an existing database to the needs of a client. Students write stored procedures and common table expressions, and learn to debug, rollback and use system stored procedures.

Individual and team assignments reinforce learning of key concepts related to strategic initiatives and global trends, supply chain management, and innovative organizations and e-business initiatives. In the second of two capstone courses for the Management Information Systems MIS degree, students design, plan, and develop a project that addresses a contemporary computer information system industry challenge and management problem.

Students must consider people, processes and technology, including ethics and security, and present their proposals and solutions to the class and instructor. This course, through guided research and hands-on learning experiences, provides students with an understanding of operating systems, including their core fundamental principles and how they work.

Examines the basic principles and methodologies used in the design of both local and wide area networks. Topics include network options, analysis, component and protocol selection, performance considerations and RFP development. This course will introduce foundation subject matter and technologies that are critical to the multidisciplinary landscape of cybersecurity.

This course covers the fundamentals of systems analysis while emphasizing the role of communication and other soft skills needed in IT and in business overall to be successful. The topics are useful for anyone who is involved in developing software system requirements and architectures e. This course is an introduction to programming using the Java programming language. Topics include programming logic, selection and repetition, array processing, classes, methods, and loops.

The course introduces the student to the basic concepts of object oriented programming and exception handling. The focus is on developing high quality, working software that solves real problems. Students propose a final project in the first module and then work, week-by-week, to design, create, and populate the database.

Then, students learn to create queries and stored procedures. From storyboard to form creation, students walk through the steps to create a basic four to five-page website to specification in this course that introduces HTML5 and CSS.

Hands-on assignments reinforce skills development and best practices in design: navigation, column layout, image editing and usage, fonts and tables. Students who want to build database-driven or interactive web sites benefit from this course which covers PHP and MySQL along with how to build sites that incorporate authentication and security.

Each week hands-on assignments are used to reinforce concepts. Students advance from an introduction to PHP and basic syntax, to handling user input and manipulating arrays in web forms to queries. Websites have three functions - to facilitate, enable and persuade - and are only useful if they can connect people and achieve definite goals.

In this course, students learn to understand the concept of usability, and the roles of interaction, users, communication and collaboration as well as how to evaluate usability, and observe and test users. Understanding financial statements and how to interpret them is important to all those working in businesses. In this course students learn the relationship among financial statements; study how to interpret this information and to apply this understanding in real-world contexts; and learn how to use financial information to help make sound management decisions.

Project Management is the formal application of knowledge, skills, tools, and techniques to project-based activities to meet organizational requirements. Project management is accomplished through the use of processes such as Initiating, Planning, Executing, Monitoring and Controlling, and Closing.

Project managers can divide projects into these phases to provide better management control with appropriate links to the ongoing operations of the organization. Collectively, these phases, known as the project life cycle, form the foundation for the practice of project management and are guided by the Body of Knowledge from the Project Management Institute PMI.

Project schedules allow managers, team members, and stakeholders to track progress, set and manage expectations, communicate, control costs, and collaborate. Tasks and deliverables can be monitored and controlled to ensure timely delivery-and if any delays do occur, project managers can easily gauge their impact and make the necessary adjustments.

Central to the schedule is a detailed understanding of the project budget, and working to control costs and manage stakeholder expectations. This hands-on course will cover the fundamentals of current Windows server systems and network administration. Topics will include the basics of installing the operating system, adding and managing users and groups, installing and managing services, Windows security objects and permissions, disaster recovery, and migration from previous versions of the operating system.

A hands-on course covering key components of the Linux operating system. Through hands-on activities students will gain a working knowledge of the Linux operating system.

Topics include installation and configuration of Linux, using common commands and graphical interfaces, installing common server applications, User and group account management, as well as performance monitoring and security systems. This course draws on fundamental concepts of contemporary communication research to help students identify and develop strategies to become effective and versatile communicators across media and settings.

Students will examine and respond to a range of interpersonal situations through the critical evaluation of the three essential components of all communication: its purpose, audience, and context. Students will leave the course with the ability to reflect on and adapt their strategies to successfully and consistently communicate for a range of purposes across diverse settings. This course draws on fundamental concepts of contemporary group communication research to help students identify and develop strategies to communicate effectively in small groups and teams for the cooperative purpose of advancing common goals.

Students will draw on listening and responding strategies learned in COMM Interpersonal Communication and apply them to communicating as a leader or member of a small group.

They will also learn how to recognize and manage the types of conflicts that can arise in small groups. Students will learn to navigate the rapidly changing nature of communication in the digital age, exploring electronically-mediated communication platforms, social networks, and online social media, while applying specific communication theories in order to determine best practices. Through reading, discussion, and assignments, students will work to overcome online communication barriers and gain a critical understanding of which tools are effective in which situations.

This course introduces students to the foundational concepts needed to communicate effectively in writing for academic study and professional development. Students will learn how to use the four stages of the writing process--prewriting, drafting, revising, and editing--to create written communication that meets its intended purpose for its intended audience.

Students will also be introduced to rhetorical modes and their role in the development of written communication. A minimum grade of C is required for this course to meet a general education requirement.

This course builds on students' proficiency in the writing process and rhetorical modes to introduce the use of evidence from sources in written communication.

Students will learn to determine the need for evidence from sources, identify types of information resources, develop effective search strategies, and incorporate evidence from sources in written communication legally and ethically. This course will introduce students to major streams of social justice thought, including historical social justice movements, theoretical problems having to do with social equality, personal freedom, marginalization, and stigmatization, and the ways in which civic and professional communities respond to these issues.

Mathematical reasoning, when applied to everyday and professional lives, has two dimensions: logic for deterministic situations and probabilities for non-deterministic situations. This course aims to help students develop these mathematical reasoning skills. Accurate and appropriate visual data representation is increasingly critical in today's work environments. Students will develop skills in data organization, manipulation and interpretation in a way that supports data-driven decision-making and effective communication of numerical data.

This course builds on students' proficiency in using evidence from sources to support their own prior knowledge to using evidence from sources to develop persuasive communication for a range of purposes, including solving problems and pursuing opportunities in the workplace, in addition to academic study.

Students will learn to articulate effective inquiry questions, recognize errors in logic, interpret the validity of persuasive communication created by others, and develop effective persuasive communication of their own using evidence from sources. The role of accurate citation of sources in persuasive communication will also be addressed.

In this course, adult students demonstrate skills and knowledge from work and other life experiences in order to request credit for a specified degree requirement. Provides a comprehensive understanding of digital forensics and investigation tools and techniques. Learn what computer forensics and investigation is as a profession and gain an understanding of the overall investigative process.

Operating system architectures and disk structures are discussed. Studies how to set up an investigator's office and laboratory, as well as what computer forensic hardware and software tools are available.

Other topics covered include importance of digital evidence controls and how to process crime and incident scenes, details of data acquisition, computer forensic analysis, e-mail investigations, image file recovery, investigative report writing, and expert witness requirements. Provides a range of laboratory and hands-on assignments either in solo or in teams.

With rapid growth of computer systems and digital data this area has grown in importance. Prereq: Working knowledge of windows computers, including installing and removing software. Access to a PC meeting the minimum system requirements defined in the course syllabus.

Overview of mobile forensics investigation techniques and tools. Topics include mobile forensics procedures and principles, related legal issues, mobile platform internals, bypassing passcode, rooting or jailbreaking process, logical and physical acquisition, data recovery and analysis, and reporting. Provides in-depth coverage of both iOS and Android platforms. Laboratory and hands-on exercises using current tools are provided and required.

This course introduces fundamental concepts, principles of cybersecurity and their use in the development of security mechanisms and policies. Topics include basic risk assessment and management; basic legal and ethics issues, various cyber attacks, defense methods and tools; security principles, models and components; different crypto protocols, techniques and tools, including symmetric and asymmetric encryption algorithms, hashing, public key infrastructure, and how they can be used; security threats and defense to hardware, operating systems, networks and applications in modern computing environments.

Hands-on labs using current tools are provided and required. The goal of this course is to study basic concepts and techniques of data mining. The topics include data preparation, classification, performance evaluation, association rule mining, and clustering. We will discuss basic data mining algorithms in the class and students will practice data mining techniques using data mining software.

The Rich Internet Application RIA Development course concentrates primarily on building rich client web applications in the browser for desktop and mobile devices. At the end of this course, students would have mastered the latest and widely used RIA methodologies. This course covers advanced aspects of database management including normalization and denormalization, query optimization, distributed databases, data warehousing, and big data.

There is extensive coverage and hands on work with SQL, and database instance tuning. Course covers various modern database architectures including relational, key value, object relational and document store models as well as various approaches to scale out, integrate and implement database systems through replication and cloud based instances.

Students learn about unstructured "big data" architectures and databases, and gain hands-on experience with Spark and MongoDB. Students complete a term project exploring an advanced database technology of their choice. This course presents the details of information processing in hospitals, hospital information systems HIS , and more broadly health information systems. It presents the architecture, design, and user requirements of information systems in health care environment.

It focuses on Information Technology aspects of Health Informatics specifically addressing the design, development, operation, and management of HIS.

The first part of this course covers the introductory concepts including information processing needs, and information management in health care environment. The second part covers detailed description of HIS including hospital process modeling, architecture, quality assessment, and applicable tools.

The final part of the course covers management of HIS and related issues and extension of this topic to other health care organizations. The course will have a term project providing students a hands-on experience in design and research of HIS. This course builds upon the strong technical foundation of our MSCIS and MSCS curricula, by providing students with the CIO-level management perspective and skills of an enterprise architect, in the context of the technologies that implement those architectures.

We cover both the migration of legacy enterprise systems and de novo enterprise architecture development, vendor selection and management, cybersecurity in the enterprise, and complex system integration. Enterprise architecture decisions are presented in the context of the business goals and alignment that are critical for success, given globalization and the reality that "all companies are now technology companies.

The course also includes a number of realistic enterprise architecture assignments and an incremental term project with components spanning the course, to provide students with hands on enterprise architecture experience. Students develop the understanding and skills needed to define and implement successful enterprise architectures that provide real strategic and concrete value to organizations, such as substantially reducing IT costs while improving performance, agility and alignment of information technology to business goals.

On-campus classrooms follow a "flipped classroom" format, where significant class time is devoted to in-class group workshops. Or strategic IT experience. MET prioritizes the review and admission of applications submitted earlier in the rolling admission process.

You are encouraged to submit your application as soon as possible and no later than the priority application deadlines for each term.

The following materials are required for a complete application:. Applicants are not required to have a degree in computer science for entry to a program within the Department of Computer Science.

Upon review of your application, the department will determine if the completion of prerequisite coursework will be required, based on your academic and professional background. The following prerequisite courses may be required:. This course is a technically-oriented introductory survey of information technology. Students learn about basic computer information, different types of business systems and basic systems analysis, design and development.

Students also study basic mathematics, software development and create simple Java programs. A maximum of two graduate-level courses 8 credits taken at Metropolitan College before acceptance into the program may be applied towards the degree.

To learn more or to contact an enrollment advisor before you get started, request information using the button below and tell us a little about yourself. Someone will be in touch to answer any questions you may have about the program and detail the next steps in earning your degree. You can also start your application or register for a course at Metropolitan College. Ready to Apply.

Certificate in Cybersecurity. With certificates in Cybersecurity, Healthcare Cybersecurity, and Information Technology, the certificates can help build a solid foundation in Computer Information Systems, or build upon previous knowledge.

The online program provides a blend of theory and applications, preparing students for a variety of positions in scientific and business fields, and lays the foundation for graduate studies as well as employment in a wide range of industrial and technological environments. Real-world problems and opportunities with software-intensive systems are explored, and methods to evaluate, adopt, and take advantage of emerging technologies are addressed. Skip Navigation.

Choosing the Right Online University is an Important Investment in Your Future Convenient, online sessions for working adults Personalized attention and accomplished faculty with real world experience Career-focused programs that provide specialized skills for growing industries Accessible and affordable with financial aid options Apply Now Request Info.

Network Design Track Organizations today depend on complex multi-vendor technology infrastructures and highly skilled technical staff to support day-to-day operations. Software Design Track Software applications are developed for commercial off-the-shelf use or to solve specific internal organizational problems. Official college transcripts from all previous academic work. If the transcripts are from an institution located outside of the United States, students must submit an official course-by-course transcript evaluation from an organization that is a current member of the National Association of Credential Evaluation Services NACES.



0コメント

  • 1000 / 1000