Quick Search
- African American Studies
- Accounting
- Anthropology
- Applied Technology
- Arabic
- Art History
- Art
- Asian Studies
- Astronomy
- Behavioral and Social Science
- Biology
- Business and Management
- Career Planning
- Criminology/Criminal Justice
- Chemistry
- Chinese
- Computer Information Technolo
- Computer Science
- Computer Studies
- Communication Studies
- Cyber Security-Info Assurance
- Data Analytics
- Economics
- Education Teacher Preparation
- Emergency Management
- English
- Environmental Hlth and Safety
- Environmental Management
- Experiential Learning
- Finance
- French
- Geography
- Geology
- German
- Gerontology
- Graphic Communication
- Government and Politics
- History
- Health Services Management
- Homeland Security
- Human Resource Management
- Humanities
- Information Systems Managemen
- Japanese
- Journalism
- Korean
- Legal Studies
- Library Skills & Info Literac
- Mathematics
- Marketing
- Music
- Natural Science
- Nursing
- Nutrition
- Professional Exploration
- Philosophy
- Physics
- Public Safety Administration
- Psychology
- Software Development&Security
- Sociology
- Spanish
- Speech
- Statistics and Probability
- Women's Studies
- Writing
2024 Spring: January 10 - May 7
Course | Class No. | Section | Start & End Date | Day | Time | Status | Location |
---|
2024 Spring: January 10 - May 7
Course | Class No. | Section | Start & End Date | Day | Time | Status | Location |
---|---|---|---|---|---|---|---|
COMM 480 | Research Methods in Communication Studies (3) | ||||||
Prerequisites: COMM 300 and COMM 302. A review of qualitative and quantitative research methods in communication studies. The objective is to define and explain research methods, concepts, and tools; apply research design, data collection, analysis, and reporting skills; and critically evaluate research in terms of rigor, relevance, and explanatory value. Practice is provided in finding, consuming, and analyzing research studies. Discussion covers the steps of the research process: articulating a question, developing a methodology, conducting a study, and reporting on findings. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20830 | 6380 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Fox, Caterina G | Syllabus | Course Materials | |||||
COMM 492 | Grant and Proposal Writing (3) | ||||||
¿(Fulfills the general education requirement in communications.) Prerequisite: WRTG 112. An advanced study of technical writing, focusing on composing competitive proposals in response to Requests for Proposal (RFPs) and other funding solicitations from the federal government and community and private sources. The aim is to apply skills needed in the proposal development process; assess an RFP to determine evaluation and competitive criteria; and synthesize the required elements into a successful proposal. Discussion covers stages of the proposal-development process, including researching the funding agency for its mission, target populations, and problems of interest; assessing the RFP to determine evaluation criteria; and assembling the required elements of a successful proposal. Assignments include writing a grant request and working in teams to prepare a competitive business proposal. Students may receive credit for only one of the following courses: COMM 492, ENGL 489C, or WRTG 494. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23769 | 7380 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Callihan, Lisa B | Syllabus | Course Materials | |||||
COMM 492 | Grant and Proposal Writing (3) | ||||||
¿(Fulfills the general education requirement in communications.) Prerequisite: WRTG 112. An advanced study of technical writing, focusing on composing competitive proposals in response to Requests for Proposal (RFPs) and other funding solicitations from the federal government and community and private sources. The aim is to apply skills needed in the proposal development process; assess an RFP to determine evaluation and competitive criteria; and synthesize the required elements into a successful proposal. Discussion covers stages of the proposal-development process, including researching the funding agency for its mission, target populations, and problems of interest; assessing the RFP to determine evaluation criteria; and assembling the required elements of a successful proposal. Assignments include writing a grant request and working in teams to prepare a competitive business proposal. Students may receive credit for only one of the following courses: COMM 492, ENGL 489C, or WRTG 494. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24534 | 7381 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Pincus, Adam K | Syllabus | Course Materials | |||||
COMM 495 | Communications Studies Capstone (3) | ||||||
Prerequisites: COMM 300, COMM 302, and at least 9 additional credits of upper-level COMM, SPCH and/or JOUR courses. A project-based capstone study of communication. The aim is to reflect on the knowledge and skills gained through previous coursework and experiences in the discipline. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23768 | 7380 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: DiDesidero, Linda B | Syllabus | Course Materials | |||||
COMM 495 | Communications Studies Capstone (3) | ||||||
Prerequisites: COMM 300, COMM 302, and at least 9 additional credits of upper-level COMM, SPCH and/or JOUR courses. A project-based capstone study of communication. The aim is to reflect on the knowledge and skills gained through previous coursework and experiences in the discipline. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24129 | 7381 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Denyer, Jocelyn M | Syllabus | Course Materials | |||||
COMM 495 | Communications Studies Capstone (3) | ||||||
Prerequisites: COMM 300, COMM 302, and at least 9 additional credits of upper-level COMM, SPCH and/or JOUR courses. A project-based capstone study of communication. The aim is to reflect on the knowledge and skills gained through previous coursework and experiences in the discipline. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
25833 | 6380 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: DiDesidero, Linda B | Syllabus | Course Materials | |||||
COMM 495 | Communications Studies Capstone (3) | ||||||
Prerequisites: COMM 300, COMM 302, and at least 9 additional credits of upper-level COMM, SPCH and/or JOUR courses. A project-based capstone study of communication. The aim is to reflect on the knowledge and skills gained through previous coursework and experiences in the discipline. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
27419 | 7382 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Sherrod, Jarmese K | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
21436 | 6380 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: McFaul, Janet L | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
21437 | 6381 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Wynn, Sarah E | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
21467 | 6382 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Leung, Wilson K | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
21536 | 6383 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Edeh, George O | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
21736 | 6384 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Wallace, Amanda J | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
21978 | 6385 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Cole, Susan B. | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22179 | 6386 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Colon, Lilian M | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22717 | 6980 | 14 Feb 2024-09 Apr 2024 | Open | Online | |||
Faculty: Shah, Farhat I | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22769 | 6981 | 14 Feb 2024-09 Apr 2024 | Open | Online | |||
Faculty: Carrington, Lisa L | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23765 | 7380 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Harding, Amy L | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23766 | 7381 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Wynn, Sarah E | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23767 | 7382 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: McFaul, Janet L | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24146 | 7383 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Leung, Wilson K | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24397 | 7384 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Desforges, Kenneth Leigh | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24397 | 7384 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Nelson, Gary C | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
25681 | 7110 | 10 Jan 2024-05 Mar 2024 | M | 6:00P-9:00P | Open | Myer-Henderson Hall (Hybrid) | |
Faculty: Hanna, Michael M | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
25682 | 7710 | 10 Jan 2024-05 Mar 2024 | M | 6:30P-9:30P | Open | Arundel Mills (Hybrid) | |
Faculty: Onyegbula, Festus C | Bldg/Room: Arundel Mills 212 | Syllabus | Course Materials | ||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
25682 | 7710 | 10 Jan 2024-05 Mar 2024 | M | 6:30P-9:30P | Open | Arundel Mills (Hybrid) | |
Faculty: Holmes, Aisha E | Bldg/Room: Arundel Mills 212 | Syllabus | Course Materials | ||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
25684 | 5120 | 10 Jan 2024-05 Mar 2024 | W | 6:30P-9:30P | Open | Shady Grove (Hybrid) | |
Faculty: Camilien, Mario | Bldg/Room: Shady Grove Center, Bldg II 3052 | Syllabus | Course Materials | ||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
25736 | 5155 | 13 Mar 2024-07 May 2024 | T | 6:30P-9:30P | Open | Shady Grove (Hybrid) | |
Faculty: Barker, Helen G | Bldg/Room: Shady Grove Center, Bldg II 3012 | Syllabus | Course Materials | ||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
27493 | 7385 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Markham, Ray E | Syllabus | Course Materials | |||||
CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.) Prerequisite: Any CMIS, CMIT, CMSC, CMST, CSIA, DATA, IFSM, or SDEV course. A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the "soft skills" necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
27641 | 7386 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Stewart, Thomas M | Syllabus | Course Materials | |||||
CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) Prerequisites: IFSM 201 and WRTG 112 or equivalent. A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government- and industry-recognized intermediate level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
21061 | 6380 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Salmans, Brian R | Syllabus | Course Materials | |||||
CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) Prerequisites: IFSM 201 and WRTG 112 or equivalent. A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government- and industry-recognized intermediate level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
21062 | 6381 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Brobbey-Mensah, Kwame | Syllabus | Course Materials | |||||
CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) Prerequisites: IFSM 201 and WRTG 112 or equivalent. A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government- and industry-recognized intermediate level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
21063 | 6382 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: McCord, Gregory L | Syllabus | Course Materials | |||||
CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) Prerequisites: IFSM 201 and WRTG 112 or equivalent. A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government- and industry-recognized intermediate level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22441 | 6980 | 14 Feb 2024-09 Apr 2024 | Open | Online | |||
Faculty: DeLeon, Joseph Z | Syllabus | Course Materials | |||||
CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) Prerequisites: IFSM 201 and WRTG 112 or equivalent. A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government- and industry-recognized intermediate level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23064 | 7380 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Salmans, Brian R | Syllabus | Course Materials | |||||
CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) Prerequisites: IFSM 201 and WRTG 112 or equivalent. A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government- and industry-recognized intermediate level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23763 | 7381 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Hutchins, Deborah A | Syllabus | Course Materials | |||||
CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) Prerequisites: IFSM 201 and WRTG 112 or equivalent. A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government- and industry-recognized intermediate level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23764 | 7382 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Uribe, Felix A | Syllabus | Course Materials | |||||
CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) Prerequisites: IFSM 201 and WRTG 112 or equivalent. A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government- and industry-recognized intermediate level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
25737 | 7765 | 13 Mar 2024-07 May 2024 | Th | 6:30P-9:30P | Open | Arundel Mills (Hybrid) | |
Faculty: Onyegbula, Festus C | Bldg/Room: Arundel Mills 212 | Syllabus | Course Materials | ||||
CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) Prerequisites: IFSM 201 and WRTG 112 or equivalent. A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government- and industry-recognized intermediate level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
25740 | 4060 | 13 Mar 2024-07 May 2024 | W | 6:30P-9:30P | Open | College Park (Hybrid) | |
Faculty: Camilien, Mario | Bldg/Room: Tydings Hall 2106 | Syllabus | Course Materials | ||||
CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) Prerequisites: IFSM 201 and WRTG 112 or equivalent. A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government- and industry-recognized intermediate level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
27206 | 6383 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Simpson, Andrea E | Syllabus | Course Materials | |||||
CSIA 350 | Cybersecurity in Business and Industry (3) | ||||||
(Designed to help prepare for the Program Management Institute ¿ Professional Business Analyst (PMI-PBA) certification exam.) Prerequisite: CSIA 310. A study of the application and integration of cybersecurity principles, frameworks, standards, and best practices to the management, governance, and policy development processes for businesses. The aim is to apply business analysis principles and methods to cybersecurity problems in business and industry. Discussion covers the organization, management, and governance of cybersecurity for enterprise IT in business settings; risk and risk management practices; and development and implementation of industry-wide cybersecurity initiatives and programs. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
21070 | 6380 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Goren, Nedim S | Syllabus | Course Materials | |||||
CSIA 350 | Cybersecurity in Business and Industry (3) | ||||||
(Designed to help prepare for the Program Management Institute ¿ Professional Business Analyst (PMI-PBA) certification exam.) Prerequisite: CSIA 310. A study of the application and integration of cybersecurity principles, frameworks, standards, and best practices to the management, governance, and policy development processes for businesses. The aim is to apply business analysis principles and methods to cybersecurity problems in business and industry. Discussion covers the organization, management, and governance of cybersecurity for enterprise IT in business settings; risk and risk management practices; and development and implementation of industry-wide cybersecurity initiatives and programs. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
21071 | 6381 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Heben, Heather L. | Syllabus | Course Materials | |||||
CSIA 350 | Cybersecurity in Business and Industry (3) | ||||||
(Designed to help prepare for the Program Management Institute ¿ Professional Business Analyst (PMI-PBA) certification exam.) Prerequisite: CSIA 310. A study of the application and integration of cybersecurity principles, frameworks, standards, and best practices to the management, governance, and policy development processes for businesses. The aim is to apply business analysis principles and methods to cybersecurity problems in business and industry. Discussion covers the organization, management, and governance of cybersecurity for enterprise IT in business settings; risk and risk management practices; and development and implementation of industry-wide cybersecurity initiatives and programs. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
21649 | 6382 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: McBorrough, William J | Syllabus | Course Materials | |||||
CSIA 350 | Cybersecurity in Business and Industry (3) | ||||||
(Designed to help prepare for the Program Management Institute ¿ Professional Business Analyst (PMI-PBA) certification exam.) Prerequisite: CSIA 310. A study of the application and integration of cybersecurity principles, frameworks, standards, and best practices to the management, governance, and policy development processes for businesses. The aim is to apply business analysis principles and methods to cybersecurity problems in business and industry. Discussion covers the organization, management, and governance of cybersecurity for enterprise IT in business settings; risk and risk management practices; and development and implementation of industry-wide cybersecurity initiatives and programs. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22442 | 6980 | 14 Feb 2024-09 Apr 2024 | Open | Online | |||
Faculty: Jumper, Sharon D | Syllabus | Course Materials | |||||
CSIA 350 | Cybersecurity in Business and Industry (3) | ||||||
(Designed to help prepare for the Program Management Institute ¿ Professional Business Analyst (PMI-PBA) certification exam.) Prerequisite: CSIA 310. A study of the application and integration of cybersecurity principles, frameworks, standards, and best practices to the management, governance, and policy development processes for businesses. The aim is to apply business analysis principles and methods to cybersecurity problems in business and industry. Discussion covers the organization, management, and governance of cybersecurity for enterprise IT in business settings; risk and risk management practices; and development and implementation of industry-wide cybersecurity initiatives and programs. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23067 | 7380 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Goren, Nedim S | Syllabus | Course Materials | |||||
CSIA 350 | Cybersecurity in Business and Industry (3) | ||||||
(Designed to help prepare for the Program Management Institute ¿ Professional Business Analyst (PMI-PBA) certification exam.) Prerequisite: CSIA 310. A study of the application and integration of cybersecurity principles, frameworks, standards, and best practices to the management, governance, and policy development processes for businesses. The aim is to apply business analysis principles and methods to cybersecurity problems in business and industry. Discussion covers the organization, management, and governance of cybersecurity for enterprise IT in business settings; risk and risk management practices; and development and implementation of industry-wide cybersecurity initiatives and programs. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23762 | 7381 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: McCord, Gregory L | Syllabus | Course Materials | |||||
CSIA 360 | Cybersecurity in Government Organizations (3) | ||||||
Prerequisite: CSIA 350. A study of cybersecurity management and governance in the context of the missions, functions, and operations of federal, state, and municipal government agencies, departments, and programs. Discussion covers the policy life cycle and the mechanisms used by governments to formulate and implement laws, policies, regulations, and treaties to protect and defend government operations and society as a whole against cyber attacks and crimes, both foreign and domestic. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
21072 | 6380 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Wagner, Lily Yeung | Syllabus | Course Materials | |||||
CSIA 360 | Cybersecurity in Government Organizations (3) | ||||||
Prerequisite: CSIA 350. A study of cybersecurity management and governance in the context of the missions, functions, and operations of federal, state, and municipal government agencies, departments, and programs. Discussion covers the policy life cycle and the mechanisms used by governments to formulate and implement laws, policies, regulations, and treaties to protect and defend government operations and society as a whole against cyber attacks and crimes, both foreign and domestic. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
21073 | 6381 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Ringgold, Ronald S | Syllabus | Course Materials | |||||
CSIA 360 | Cybersecurity in Government Organizations (3) | ||||||
Prerequisite: CSIA 350. A study of cybersecurity management and governance in the context of the missions, functions, and operations of federal, state, and municipal government agencies, departments, and programs. Discussion covers the policy life cycle and the mechanisms used by governments to formulate and implement laws, policies, regulations, and treaties to protect and defend government operations and society as a whole against cyber attacks and crimes, both foreign and domestic. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22805 | 6980 | 14 Feb 2024-09 Apr 2024 | Open | Online | |||
Faculty: Shirazee, Mohammad F | Syllabus | Course Materials | |||||
CSIA 360 | Cybersecurity in Government Organizations (3) | ||||||
Prerequisite: CSIA 350. A study of cybersecurity management and governance in the context of the missions, functions, and operations of federal, state, and municipal government agencies, departments, and programs. Discussion covers the policy life cycle and the mechanisms used by governments to formulate and implement laws, policies, regulations, and treaties to protect and defend government operations and society as a whole against cyber attacks and crimes, both foreign and domestic. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23068 | 7380 | 13 Mar 2024-07 May 2024 | Closed | Online | |||
Faculty: Wagner, Lily Yeung | Syllabus | Course Materials | |||||
CSIA 360 | Cybersecurity in Government Organizations (3) | ||||||
Prerequisite: CSIA 350. A study of cybersecurity management and governance in the context of the missions, functions, and operations of federal, state, and municipal government agencies, departments, and programs. Discussion covers the policy life cycle and the mechanisms used by governments to formulate and implement laws, policies, regulations, and treaties to protect and defend government operations and society as a whole against cyber attacks and crimes, both foreign and domestic. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23761 | 7381 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Cooper, David C | Syllabus | Course Materials | |||||
CSIA 360 | Cybersecurity in Government Organizations (3) | ||||||
Prerequisite: CSIA 350. A study of cybersecurity management and governance in the context of the missions, functions, and operations of federal, state, and municipal government agencies, departments, and programs. Discussion covers the policy life cycle and the mechanisms used by governments to formulate and implement laws, policies, regulations, and treaties to protect and defend government operations and society as a whole against cyber attacks and crimes, both foreign and domestic. |
|||||||
25686 | 7725 | 10 Jan 2024-05 Mar 2024 | Th | 6:30P-9:30P | Open | Arundel Mills (Hybrid) | |
Faculty: Kostic, Linda C | Bldg/Room: Arundel Mills 212 | Syllabus | Course Materials | ||||
CSIA 360 | Cybersecurity in Government Organizations (3) | ||||||
Prerequisite: CSIA 350. A study of cybersecurity management and governance in the context of the missions, functions, and operations of federal, state, and municipal government agencies, departments, and programs. Discussion covers the policy life cycle and the mechanisms used by governments to formulate and implement laws, policies, regulations, and treaties to protect and defend government operations and society as a whole against cyber attacks and crimes, both foreign and domestic. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
27207 | 6382 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Holmes, Aisha E | Syllabus | Course Materials | |||||
CSIA 413 | Cybersecurity Policy, Plans, and Programs (3) | ||||||
(Includes content designed to help in preparing for IAPP Certified Information Privacy Professional/US certification.) Prerequisite: CSIA 360. A study of the application of cybersecurity principles, frameworks, standards, and best practices to organization-level strategies, policies, programs, plans, procedures, and processes. The aim is to assist students in preparing to take an internationally recognized information privacy certification. Projects include writing security policies and plans, developing metrics and measures for information security programs, planning audits of compliance practices and processes, and developing organization-level security policies for enterprise IT governance. Discussion covers principles and best practices for protecting privacy and ensuring compliance with laws and regulations. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20804 | 6380 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Butler, Laurence A | Syllabus | Course Materials | |||||
CSIA 413 | Cybersecurity Policy, Plans, and Programs (3) | ||||||
(Includes content designed to help in preparing for IAPP Certified Information Privacy Professional/US certification.) Prerequisite: CSIA 360. A study of the application of cybersecurity principles, frameworks, standards, and best practices to organization-level strategies, policies, programs, plans, procedures, and processes. The aim is to assist students in preparing to take an internationally recognized information privacy certification. Projects include writing security policies and plans, developing metrics and measures for information security programs, planning audits of compliance practices and processes, and developing organization-level security policies for enterprise IT governance. Discussion covers principles and best practices for protecting privacy and ensuring compliance with laws and regulations. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20805 | 6381 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Manley, Rupert S | Syllabus | Course Materials | |||||
CSIA 413 | Cybersecurity Policy, Plans, and Programs (3) | ||||||
(Includes content designed to help in preparing for IAPP Certified Information Privacy Professional/US certification.) Prerequisite: CSIA 360. A study of the application of cybersecurity principles, frameworks, standards, and best practices to organization-level strategies, policies, programs, plans, procedures, and processes. The aim is to assist students in preparing to take an internationally recognized information privacy certification. Projects include writing security policies and plans, developing metrics and measures for information security programs, planning audits of compliance practices and processes, and developing organization-level security policies for enterprise IT governance. Discussion covers principles and best practices for protecting privacy and ensuring compliance with laws and regulations. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23746 | 7380 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Manley, Rupert S | Syllabus | Course Materials | |||||
CSIA 413 | Cybersecurity Policy, Plans, and Programs (3) | ||||||
(Includes content designed to help in preparing for IAPP Certified Information Privacy Professional/US certification.) Prerequisite: CSIA 360. A study of the application of cybersecurity principles, frameworks, standards, and best practices to organization-level strategies, policies, programs, plans, procedures, and processes. The aim is to assist students in preparing to take an internationally recognized information privacy certification. Projects include writing security policies and plans, developing metrics and measures for information security programs, planning audits of compliance practices and processes, and developing organization-level security policies for enterprise IT governance. Discussion covers principles and best practices for protecting privacy and ensuring compliance with laws and regulations. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23754 | 7381 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Middleton, Kenice E | Syllabus | Course Materials | |||||
CSIA 413 | Cybersecurity Policy, Plans, and Programs (3) | ||||||
(Includes content designed to help in preparing for IAPP Certified Information Privacy Professional/US certification.) Prerequisite: CSIA 360. A study of the application of cybersecurity principles, frameworks, standards, and best practices to organization-level strategies, policies, programs, plans, procedures, and processes. The aim is to assist students in preparing to take an internationally recognized information privacy certification. Projects include writing security policies and plans, developing metrics and measures for information security programs, planning audits of compliance practices and processes, and developing organization-level security policies for enterprise IT governance. Discussion covers principles and best practices for protecting privacy and ensuring compliance with laws and regulations. |
|||||||
25688 | 5115 | 10 Jan 2024-05 Mar 2024 | T | 6:30P-9:30P | Open | Shady Grove (Hybrid) | |
Faculty: Uribe, Felix A | Bldg/Room: Shady Grove Center, Bldg II 3012 | Syllabus | Course Materials | ||||
CSIA 413 | Cybersecurity Policy, Plans, and Programs (3) | ||||||
(Includes content designed to help in preparing for IAPP Certified Information Privacy Professional/US certification.) Prerequisite: CSIA 360. A study of the application of cybersecurity principles, frameworks, standards, and best practices to organization-level strategies, policies, programs, plans, procedures, and processes. The aim is to assist students in preparing to take an internationally recognized information privacy certification. Projects include writing security policies and plans, developing metrics and measures for information security programs, planning audits of compliance practices and processes, and developing organization-level security policies for enterprise IT governance. Discussion covers principles and best practices for protecting privacy and ensuring compliance with laws and regulations. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
27733 | 7382 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: DeBlase, Joseph V | Syllabus | Course Materials | |||||
CSIA 459 | Evaluating Emerging Technologies (3) | ||||||
Prerequisites: CMIT 320 and CSIA 350. A survey of emerging and leading technologies in the cybersecurity field. The aim is to research, evaluate, and recommend emerging technologies and determine secure implementation strategies for best-fit business solutions. Topics include evolutionary technology development and adoption in organizations. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20700 | 6380 | 10 Jan 2024-05 Mar 2024 | Closed | Online | |||
Faculty: Lassetter, George C | Syllabus | Course Materials | |||||
CSIA 459 | Evaluating Emerging Technologies (3) | ||||||
Prerequisites: CMIT 320 and CSIA 350. A survey of emerging and leading technologies in the cybersecurity field. The aim is to research, evaluate, and recommend emerging technologies and determine secure implementation strategies for best-fit business solutions. Topics include evolutionary technology development and adoption in organizations. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20937 | 6381 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Chun, Samuel W | Syllabus | Course Materials | |||||
CSIA 459 | Evaluating Emerging Technologies (3) | ||||||
Prerequisites: CMIT 320 and CSIA 350. A survey of emerging and leading technologies in the cybersecurity field. The aim is to research, evaluate, and recommend emerging technologies and determine secure implementation strategies for best-fit business solutions. Topics include evolutionary technology development and adoption in organizations. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24121 | 7380 | 13 Mar 2024-07 May 2024 | Closed | Online | |||
Faculty: Lassetter, George C | Syllabus | Course Materials | |||||
CSIA 459 | Evaluating Emerging Technologies (3) | ||||||
Prerequisites: CMIT 320 and CSIA 350. A survey of emerging and leading technologies in the cybersecurity field. The aim is to research, evaluate, and recommend emerging technologies and determine secure implementation strategies for best-fit business solutions. Topics include evolutionary technology development and adoption in organizations. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24122 | 7381 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Chun, Samuel W | Syllabus | Course Materials | |||||
CSIA 459 | Evaluating Emerging Technologies (3) | ||||||
Prerequisites: CMIT 320 and CSIA 350. A survey of emerging and leading technologies in the cybersecurity field. The aim is to research, evaluate, and recommend emerging technologies and determine secure implementation strategies for best-fit business solutions. Topics include evolutionary technology development and adoption in organizations. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24555 | 7382 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Pefoubou Mofo, Severin B | Syllabus | Course Materials | |||||
CSIA 485 | Cyber Management and Policy Capstone (3) | ||||||
(Intended as a final, capstone course to be taken in a student's last 6 credits; includes content designed to help in preparing students for the EC-Council Certified Chief Information Security Officer [CCISO] and Information Security Manager [EISM] certifications.) Prerequisites: CMIT 320 and CSIA 413. A study of cybersecurity management and policy that integrates knowledge gained from previous coursework and experience. Focus is on developing security strategies, plans, policies, and processes for the protection of an organization's critical information and assets. The goal is to enhance professional skills in cybersecurity management and leadership. Topics also include the ethical integration of cybersecurity best practices and risk management throughout an enterprise. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20720 | 6380 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Ridgeway, Holly E | Syllabus | Course Materials | |||||
CSIA 485 | Cyber Management and Policy Capstone (3) | ||||||
(Intended as a final, capstone course to be taken in a student's last 6 credits; includes content designed to help in preparing students for the EC-Council Certified Chief Information Security Officer [CCISO] and Information Security Manager [EISM] certifications.) Prerequisites: CMIT 320 and CSIA 413. A study of cybersecurity management and policy that integrates knowledge gained from previous coursework and experience. Focus is on developing security strategies, plans, policies, and processes for the protection of an organization's critical information and assets. The goal is to enhance professional skills in cybersecurity management and leadership. Topics also include the ethical integration of cybersecurity best practices and risk management throughout an enterprise. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20843 | 6381 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: White, Richard A | Syllabus | Course Materials | |||||
CSIA 485 | Cyber Management and Policy Capstone (3) | ||||||
(Intended as a final, capstone course to be taken in a student's last 6 credits; includes content designed to help in preparing students for the EC-Council Certified Chief Information Security Officer [CCISO] and Information Security Manager [EISM] certifications.) Prerequisites: CMIT 320 and CSIA 413. A study of cybersecurity management and policy that integrates knowledge gained from previous coursework and experience. Focus is on developing security strategies, plans, policies, and processes for the protection of an organization's critical information and assets. The goal is to enhance professional skills in cybersecurity management and leadership. Topics also include the ethical integration of cybersecurity best practices and risk management throughout an enterprise. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23742 | 7380 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Bennett, Donna S | Syllabus | Course Materials | |||||
CSIA 485 | Cyber Management and Policy Capstone (3) | ||||||
(Intended as a final, capstone course to be taken in a student's last 6 credits; includes content designed to help in preparing students for the EC-Council Certified Chief Information Security Officer [CCISO] and Information Security Manager [EISM] certifications.) Prerequisites: CMIT 320 and CSIA 413. A study of cybersecurity management and policy that integrates knowledge gained from previous coursework and experience. Focus is on developing security strategies, plans, policies, and processes for the protection of an organization's critical information and assets. The goal is to enhance professional skills in cybersecurity management and leadership. Topics also include the ethical integration of cybersecurity best practices and risk management throughout an enterprise. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23743 | 7381 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Ridgeway, Holly E | Syllabus | Course Materials | |||||
CSIA 485 | Cyber Management and Policy Capstone (3) | ||||||
(Intended as a final, capstone course to be taken in a student's last 6 credits; includes content designed to help in preparing students for the EC-Council Certified Chief Information Security Officer [CCISO] and Information Security Manager [EISM] certifications.) Prerequisites: CMIT 320 and CSIA 413. A study of cybersecurity management and policy that integrates knowledge gained from previous coursework and experience. Focus is on developing security strategies, plans, policies, and processes for the protection of an organization's critical information and assets. The goal is to enhance professional skills in cybersecurity management and leadership. Topics also include the ethical integration of cybersecurity best practices and risk management throughout an enterprise. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
23744 | 7382 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Colon, Lilian M | Syllabus | Course Materials | |||||
CSIA 485 | Cyber Management and Policy Capstone (3) | ||||||
(Intended as a final, capstone course to be taken in a student's last 6 credits; includes content designed to help in preparing students for the EC-Council Certified Chief Information Security Officer [CCISO] and Information Security Manager [EISM] certifications.) Prerequisites: CMIT 320 and CSIA 413. A study of cybersecurity management and policy that integrates knowledge gained from previous coursework and experience. Focus is on developing security strategies, plans, policies, and processes for the protection of an organization's critical information and assets. The goal is to enhance professional skills in cybersecurity management and leadership. Topics also include the ethical integration of cybersecurity best practices and risk management throughout an enterprise. |
|||||||
25744 | 5150 | 13 Mar 2024-07 May 2024 | M | 6:30P-9:30P | Open | Shady Grove (Hybrid) | |
Faculty: Camilien, Mario | Bldg/Room: Shady Grove Center, Bldg II 3052 | Syllabus | Course Materials | ||||
CSIA 485 | Cyber Management and Policy Capstone (3) | ||||||
(Intended as a final, capstone course to be taken in a student's last 6 credits; includes content designed to help in preparing students for the EC-Council Certified Chief Information Security Officer [CCISO] and Information Security Manager [EISM] certifications.) Prerequisites: CMIT 320 and CSIA 413. A study of cybersecurity management and policy that integrates knowledge gained from previous coursework and experience. Focus is on developing security strategies, plans, policies, and processes for the protection of an organization's critical information and assets. The goal is to enhance professional skills in cybersecurity management and leadership. Topics also include the ethical integration of cybersecurity best practices and risk management throughout an enterprise. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
27239 | 6382 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Bell, Megan R | Syllabus | Course Materials | |||||
CSIA 486A | Workplace Learning in Cybersecurity (3) | ||||||
Prerequisites: 9 credits in the discipline and prior program approval (requirements detailed online at www.umgc.edu/wkpl). The integration of discipline-specific knowledge with new experiences in the work environment. Tasks include completing a series of academic assignments that parallel work experiences. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
26785 | 6980 | 10 Jan 2024-07 May 2024 | Open | Online | |||
Faculty: Thakur, Kutub U | Syllabus | Course Materials | |||||
CSIA 486A | Workplace Learning in Cybersecurity (3) | ||||||
Prerequisites: 9 credits in the discipline and prior program approval (requirements detailed online at www.umgc.edu/wkpl). The integration of discipline-specific knowledge with new experiences in the work environment. Tasks include completing a series of academic assignments that parallel work experiences. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
26785 | 6980 | 10 Jan 2024-07 May 2024 | Open | Online | |||
Faculty: DeGrazia, Bruce C | Syllabus | Course Materials | |||||
DATA 200 | Data Literacy Foundations (3) | ||||||
An introduction to data and data literacy for students of all majors to enhance their ability to understand and work in today's data-driven world. The aim is to collect, manage, evaluate and apply data in a critical manner and examine the role, significance, and implications of data, including ethical issues within a society, in organizations, or for individuals. Developing skills in data manipulation, analysis, and visualization, students will generate insights from data, build knowledge, and make decisions. Topics include the effective use of cloud-based data storage, collaboration and communication techniques. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
21940 | 6380 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Kinzel, Beate | Syllabus | Course Materials | |||||
DATA 200 | Data Literacy Foundations (3) | ||||||
An introduction to data and data literacy for students of all majors to enhance their ability to understand and work in today's data-driven world. The aim is to collect, manage, evaluate and apply data in a critical manner and examine the role, significance, and implications of data, including ethical issues within a society, in organizations, or for individuals. Developing skills in data manipulation, analysis, and visualization, students will generate insights from data, build knowledge, and make decisions. Topics include the effective use of cloud-based data storage, collaboration and communication techniques. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22064 | 6381 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Gathoni, Priscilla | Syllabus | Course Materials | |||||
DATA 200 | Data Literacy Foundations (3) | ||||||
An introduction to data and data literacy for students of all majors to enhance their ability to understand and work in today's data-driven world. The aim is to collect, manage, evaluate and apply data in a critical manner and examine the role, significance, and implications of data, including ethical issues within a society, in organizations, or for individuals. Developing skills in data manipulation, analysis, and visualization, students will generate insights from data, build knowledge, and make decisions. Topics include the effective use of cloud-based data storage, collaboration and communication techniques. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22080 | 6382 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Trajkovski, Goran | Syllabus | Course Materials | |||||
DATA 200 | Data Literacy Foundations (3) | ||||||
An introduction to data and data literacy for students of all majors to enhance their ability to understand and work in today's data-driven world. The aim is to collect, manage, evaluate and apply data in a critical manner and examine the role, significance, and implications of data, including ethical issues within a society, in organizations, or for individuals. Developing skills in data manipulation, analysis, and visualization, students will generate insights from data, build knowledge, and make decisions. Topics include the effective use of cloud-based data storage, collaboration and communication techniques. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22105 | 6383 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Mintz, Renae S | Syllabus | Course Materials | |||||
DATA 200 | Data Literacy Foundations (3) | ||||||
An introduction to data and data literacy for students of all majors to enhance their ability to understand and work in today's data-driven world. The aim is to collect, manage, evaluate and apply data in a critical manner and examine the role, significance, and implications of data, including ethical issues within a society, in organizations, or for individuals. Developing skills in data manipulation, analysis, and visualization, students will generate insights from data, build knowledge, and make decisions. Topics include the effective use of cloud-based data storage, collaboration and communication techniques. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22210 | 6384 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Moustafa, Rida E | Syllabus | Course Materials | |||||
DATA 200 | Data Literacy Foundations (3) | ||||||
An introduction to data and data literacy for students of all majors to enhance their ability to understand and work in today's data-driven world. The aim is to collect, manage, evaluate and apply data in a critical manner and examine the role, significance, and implications of data, including ethical issues within a society, in organizations, or for individuals. Developing skills in data manipulation, analysis, and visualization, students will generate insights from data, build knowledge, and make decisions. Topics include the effective use of cloud-based data storage, collaboration and communication techniques. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22782 | 6980 | 14 Feb 2024-09 Apr 2024 | Open | Online | |||
Faculty: Kulkarni, Shankar A | Syllabus | Course Materials | |||||
DATA 200 | Data Literacy Foundations (3) | ||||||
An introduction to data and data literacy for students of all majors to enhance their ability to understand and work in today's data-driven world. The aim is to collect, manage, evaluate and apply data in a critical manner and examine the role, significance, and implications of data, including ethical issues within a society, in organizations, or for individuals. Developing skills in data manipulation, analysis, and visualization, students will generate insights from data, build knowledge, and make decisions. Topics include the effective use of cloud-based data storage, collaboration and communication techniques. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22814 | 6981 | 14 Feb 2024-09 Apr 2024 | Open | Online | |||
Faculty: Ezzati, Parinaz | Syllabus | Course Materials | |||||
DATA 200 | Data Literacy Foundations (3) | ||||||
An introduction to data and data literacy for students of all majors to enhance their ability to understand and work in today's data-driven world. The aim is to collect, manage, evaluate and apply data in a critical manner and examine the role, significance, and implications of data, including ethical issues within a society, in organizations, or for individuals. Developing skills in data manipulation, analysis, and visualization, students will generate insights from data, build knowledge, and make decisions. Topics include the effective use of cloud-based data storage, collaboration and communication techniques. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24343 | 7380 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Chulis, Kimberly | Syllabus | Course Materials | |||||
DATA 200 | Data Literacy Foundations (3) | ||||||
An introduction to data and data literacy for students of all majors to enhance their ability to understand and work in today's data-driven world. The aim is to collect, manage, evaluate and apply data in a critical manner and examine the role, significance, and implications of data, including ethical issues within a society, in organizations, or for individuals. Developing skills in data manipulation, analysis, and visualization, students will generate insights from data, build knowledge, and make decisions. Topics include the effective use of cloud-based data storage, collaboration and communication techniques. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24499 | 7381 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Crombie, George W | Syllabus | Course Materials | |||||
DATA 200 | Data Literacy Foundations (3) | ||||||
An introduction to data and data literacy for students of all majors to enhance their ability to understand and work in today's data-driven world. The aim is to collect, manage, evaluate and apply data in a critical manner and examine the role, significance, and implications of data, including ethical issues within a society, in organizations, or for individuals. Developing skills in data manipulation, analysis, and visualization, students will generate insights from data, build knowledge, and make decisions. Topics include the effective use of cloud-based data storage, collaboration and communication techniques. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24546 | 7382 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Menta, Prasanna K | Syllabus | Course Materials | |||||
DATA 200 | Data Literacy Foundations (3) | ||||||
An introduction to data and data literacy for students of all majors to enhance their ability to understand and work in today's data-driven world. The aim is to collect, manage, evaluate and apply data in a critical manner and examine the role, significance, and implications of data, including ethical issues within a society, in organizations, or for individuals. Developing skills in data manipulation, analysis, and visualization, students will generate insights from data, build knowledge, and make decisions. Topics include the effective use of cloud-based data storage, collaboration and communication techniques. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24609 | 7383 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Kinzel, Beate | Syllabus | Course Materials | |||||
DATA 200 | Data Literacy Foundations (3) | ||||||
An introduction to data and data literacy for students of all majors to enhance their ability to understand and work in today's data-driven world. The aim is to collect, manage, evaluate and apply data in a critical manner and examine the role, significance, and implications of data, including ethical issues within a society, in organizations, or for individuals. Developing skills in data manipulation, analysis, and visualization, students will generate insights from data, build knowledge, and make decisions. Topics include the effective use of cloud-based data storage, collaboration and communication techniques. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
27141 | 6385 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Zimmer, Janet M | Syllabus | Course Materials | |||||
DATA 200 | Data Literacy Foundations (3) | ||||||
An introduction to data and data literacy for students of all majors to enhance their ability to understand and work in today's data-driven world. The aim is to collect, manage, evaluate and apply data in a critical manner and examine the role, significance, and implications of data, including ethical issues within a society, in organizations, or for individuals. Developing skills in data manipulation, analysis, and visualization, students will generate insights from data, build knowledge, and make decisions. Topics include the effective use of cloud-based data storage, collaboration and communication techniques. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
27312 | 6386 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Dogan, Tuncay | Syllabus | Course Materials | |||||
DATA 200 | Data Literacy Foundations (3) | ||||||
An introduction to data and data literacy for students of all majors to enhance their ability to understand and work in today's data-driven world. The aim is to collect, manage, evaluate and apply data in a critical manner and examine the role, significance, and implications of data, including ethical issues within a society, in organizations, or for individuals. Developing skills in data manipulation, analysis, and visualization, students will generate insights from data, build knowledge, and make decisions. Topics include the effective use of cloud-based data storage, collaboration and communication techniques. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
27513 | 6982 | 14 Feb 2024-09 Apr 2024 | Open | Online | |||
Faculty: Chulis, Kimberly | Syllabus | Course Materials | |||||
DATA 230 | Mathematics for Data Science (3) | ||||||
Prerequisites: STAT 200 and MATH 115 (or MATH 107 and MATH 108) or higher. A practical introduction to the mathematical principles applied within the context of data science. The aim is to understand the mathematical basis of data science and increase awareness of machine learning algorithm assumptions and limitations. Machine learning topics include linear regression, dimensionality reduction, and classification. Projects involve application of linear algebra, probability, vector calculus, and optimization to build data science solutions. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
25849 | 6380 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Goldberg, Katherine Leaming | Syllabus | Course Materials | |||||
DATA 230 | Mathematics for Data Science (3) | ||||||
Prerequisites: STAT 200 and MATH 115 (or MATH 107 and MATH 108) or higher. A practical introduction to the mathematical principles applied within the context of data science. The aim is to understand the mathematical basis of data science and increase awareness of machine learning algorithm assumptions and limitations. Machine learning topics include linear regression, dimensionality reduction, and classification. Projects involve application of linear algebra, probability, vector calculus, and optimization to build data science solutions. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
25850 | 7380 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Huang, Steward H | Syllabus | Course Materials | |||||
DATA 230 | Mathematics for Data Science (3) | ||||||
Prerequisites: STAT 200 and MATH 115 (or MATH 107 and MATH 108) or higher. A practical introduction to the mathematical principles applied within the context of data science. The aim is to understand the mathematical basis of data science and increase awareness of machine learning algorithm assumptions and limitations. Machine learning topics include linear regression, dimensionality reduction, and classification. Projects involve application of linear algebra, probability, vector calculus, and optimization to build data science solutions. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
27019 | 6381 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Martin, Ulyana P | Syllabus | Course Materials | |||||
DATA 230 | Mathematics for Data Science (3) | ||||||
Prerequisites: STAT 200 and MATH 115 (or MATH 107 and MATH 108) or higher. A practical introduction to the mathematical principles applied within the context of data science. The aim is to understand the mathematical basis of data science and increase awareness of machine learning algorithm assumptions and limitations. Machine learning topics include linear regression, dimensionality reduction, and classification. Projects involve application of linear algebra, probability, vector calculus, and optimization to build data science solutions. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
27422 | 7381 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Martin, Ulyana P | Syllabus | Course Materials | |||||
DATA 300 | Foundations of Data Science (3) | ||||||
Prerequisite: STAT 200. An examination of the role of data science within business and society. The goal is to identify a problem, collect and analyze data, select the most appropriate analytical methodology based on the context of the business problem, build a model, and understand the feedback after model deployment. Emphasis is on the process of acquiring, cleaning, exploring, analyzing, and communicating data obtained from variety of sources. Assignments require working with data in programming languages such as Python, wrangling data programmatically and preparing data for analysis, using libraries like NumPy and Pandas. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22041 | 6380 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Zeleke, Abebaw | Syllabus | Course Materials | |||||
DATA 300 | Foundations of Data Science (3) | ||||||
Prerequisite: STAT 200. An examination of the role of data science within business and society. The goal is to identify a problem, collect and analyze data, select the most appropriate analytical methodology based on the context of the business problem, build a model, and understand the feedback after model deployment. Emphasis is on the process of acquiring, cleaning, exploring, analyzing, and communicating data obtained from variety of sources. Assignments require working with data in programming languages such as Python, wrangling data programmatically and preparing data for analysis, using libraries like NumPy and Pandas. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22073 | 6381 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Genao, Domingo | Syllabus | Course Materials | |||||
DATA 300 | Foundations of Data Science (3) | ||||||
Prerequisite: STAT 200. An examination of the role of data science within business and society. The goal is to identify a problem, collect and analyze data, select the most appropriate analytical methodology based on the context of the business problem, build a model, and understand the feedback after model deployment. Emphasis is on the process of acquiring, cleaning, exploring, analyzing, and communicating data obtained from variety of sources. Assignments require working with data in programming languages such as Python, wrangling data programmatically and preparing data for analysis, using libraries like NumPy and Pandas. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24344 | 7380 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Zimmer, Janet M | Syllabus | Course Materials | |||||
DATA 300 | Foundations of Data Science (3) | ||||||
Prerequisite: STAT 200. An examination of the role of data science within business and society. The goal is to identify a problem, collect and analyze data, select the most appropriate analytical methodology based on the context of the business problem, build a model, and understand the feedback after model deployment. Emphasis is on the process of acquiring, cleaning, exploring, analyzing, and communicating data obtained from variety of sources. Assignments require working with data in programming languages such as Python, wrangling data programmatically and preparing data for analysis, using libraries like NumPy and Pandas. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24495 | 7381 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Wardeh, Mohammed A | Syllabus | Course Materials | |||||
DATA 300 | Foundations of Data Science (3) | ||||||
Prerequisite: STAT 200. An examination of the role of data science within business and society. The goal is to identify a problem, collect and analyze data, select the most appropriate analytical methodology based on the context of the business problem, build a model, and understand the feedback after model deployment. Emphasis is on the process of acquiring, cleaning, exploring, analyzing, and communicating data obtained from variety of sources. Assignments require working with data in programming languages such as Python, wrangling data programmatically and preparing data for analysis, using libraries like NumPy and Pandas. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24532 | 7382 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Shpaner, Leonid | Syllabus | Course Materials | |||||
DATA 300 | Foundations of Data Science (3) | ||||||
Prerequisite: STAT 200. An examination of the role of data science within business and society. The goal is to identify a problem, collect and analyze data, select the most appropriate analytical methodology based on the context of the business problem, build a model, and understand the feedback after model deployment. Emphasis is on the process of acquiring, cleaning, exploring, analyzing, and communicating data obtained from variety of sources. Assignments require working with data in programming languages such as Python, wrangling data programmatically and preparing data for analysis, using libraries like NumPy and Pandas. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
27099 | 6382 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Cook, John A | Syllabus | Course Materials | |||||
DATA 320 | Introduction to Data Analytics (3) | ||||||
Formerly DATA 220. Prerequisite: STAT 200. A practical introduction to the methodology, practices, and requirements of data science to ensure that data is relevant and properly manipulated to solve problems and address a variety of real-world projects and business scenarios. Focus is on the application of foundational statistical concepts to describing datasets with summary statistics, simple data visualizations, statistical inference, and predictive analytics. The objective is to use data to draw conclusions about the underlying patterns that drive everyday problems through probability, hypothesis testing, and linear model building. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22031 | 6380 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Dean, Michael | Syllabus | Course Materials | |||||
DATA 320 | Introduction to Data Analytics (3) | ||||||
Formerly DATA 220. Prerequisite: STAT 200. A practical introduction to the methodology, practices, and requirements of data science to ensure that data is relevant and properly manipulated to solve problems and address a variety of real-world projects and business scenarios. Focus is on the application of foundational statistical concepts to describing datasets with summary statistics, simple data visualizations, statistical inference, and predictive analytics. The objective is to use data to draw conclusions about the underlying patterns that drive everyday problems through probability, hypothesis testing, and linear model building. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22032 | 6381 | 10 Jan 2024-05 Mar 2024 | Open | Online | |||
Faculty: Britto, Joseph Solomon | Syllabus | Course Materials | |||||
DATA 320 | Introduction to Data Analytics (3) | ||||||
Formerly DATA 220. Prerequisite: STAT 200. A practical introduction to the methodology, practices, and requirements of data science to ensure that data is relevant and properly manipulated to solve problems and address a variety of real-world projects and business scenarios. Focus is on the application of foundational statistical concepts to describing datasets with summary statistics, simple data visualizations, statistical inference, and predictive analytics. The objective is to use data to draw conclusions about the underlying patterns that drive everyday problems through probability, hypothesis testing, and linear model building. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
22806 | 6980 | 14 Feb 2024-09 Apr 2024 | Open | Online | |||
Faculty: Trajkovski, Goran | Syllabus | Course Materials | |||||
DATA 320 | Introduction to Data Analytics (3) | ||||||
Formerly DATA 220. Prerequisite: STAT 200. A practical introduction to the methodology, practices, and requirements of data science to ensure that data is relevant and properly manipulated to solve problems and address a variety of real-world projects and business scenarios. Focus is on the application of foundational statistical concepts to describing datasets with summary statistics, simple data visualizations, statistical inference, and predictive analytics. The objective is to use data to draw conclusions about the underlying patterns that drive everyday problems through probability, hypothesis testing, and linear model building. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
24464 | 7380 | 13 Mar 2024-07 May 2024 | Open | Online | |||
Faculty: Heuermann, Lewis Edward | Syllabus | Course Materials |
Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 (18) 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 |