Business Information Systems (BIS)
BIS 371, BUSINESS DATA MANAGEMENT, 4 Credits
Exploration of business data management technologies including but not limited to relational database modeling, data retrieval, database triggers and stored procedures, NoSQL databases, programmatic database querying.
Equivalent to: BA 371
BIS 372, BUSINESS INFORMATION SYSTEMS DESIGN AND DEVELOPMENT, 4 Credits
Explores how information systems are developed, deployed, and adapted considering architectures, value propositions, infrastructure, and organizational factors. Explores both classic and agile application design and development approaches and tasks, tools and methods of system developers and automation tool users.
Equivalent to: BA 372
BIS 471, BUSINESS TELECOMMUNICATIONS AND NETWORKING, 4 Credits
Provide a fundamental understanding of the five-layer Internet model and its effects on the business environment and enterprise-wide computing. Assignments relate to network administration in a virtualized cloud environment.
Equivalent to: BA 479
BIS 472, INFORMATION SYSTEMS SECURITY, 4 Credits
Covers security risk mitigation methods and procedures such as access control, identity management, intrusion prevention and detection, network and physical security, etc. These and other topics will be placed in both the operational and strategic context of the business. Addresses several IS governance and IS security frameworks within which the various security concepts, aspects, policies and procedures can be viewed and discussed.
Equivalent to: BA 480
BIS 482, INFORMATION SECURITY GOVERNANCE, 4 Credits
As a discipline cybersecurity covers software, hardware, networking, systems, individuals, organizations and applicable policies, laws and standards, among others. Given societies’ dependence on the security of global infrastructure and the increasing complexity of maintaining the security of those systems, there is a growing need for an interdisciplinary approach to study this topic. Introduces well-regarded and well-used IT and IT security governance frameworks which can be used to apply and govern security policies and protocols in organizations, and delves into SOC IT auditing.
Equivalent to: BA 482