Remember that Walden’s Title IV Code is 025042.
Time to completion may vary by student, depending on individual progress and credits transferred, if applicable. For a personalized estimate of your time to completion, call an enrollment advisor at 1-866-492-5336.
Through a review of modern computer systems and the social and economic issues related to their use, this course introduces the conceptual foundations for designing, developing, and deploying large-scale management information systems. It investigates the role of information technology in an organization—particularly the collection, storage, and distribution of information for operations, planning, and decision making.
Within this course, students can learn the concepts of computer operating systems, including the main functions, similarities, and differences. Students can explore a variety of topics, including configuration, file systems, security, administration, interfacing, multitasking, and performance analysis. In addition, they can further their understanding of computers through the study of computer networks by learning key networking concepts, components, and the design of information and communication infrastructure solutions.
Data is the lifeblood of nearly every business enterprise. Through careful planning and management, the organization can ensure that its critical data remains consistent, correct, secure, and available. This theoretical and practical introduction to relational database systems presents students with accepted practices for data modeling, database design, and implementation in a range of application contexts.
The discipline of software development demands a variety of skills. Students in this course assess the fundamental practices and principles of designing and constructing object-oriented programs. They engage in substantial hands-on practice, reinforcing algorithmic thinking, logical design, precise coding, and careful attention to quality.
Through this course, students learn key technologies and design principles for interactive Web applications as well the professional, individual, organizational, societal, and regulatory implications thereof. Students learn how pages are designed and how they interact with external servers to deliver information––important concepts underlying how computers enable communication among Internet users and allow enterprises to conduct business online. They develop and manage Web-based applications using a selection of fundamental tools and techniques, such as XHTML and cascading style sheets.
Like building a skyscraper, developing a large-scale software system may require the work of thousands of people over a period of several years. Analysts and designers coordinate technical plans so that individual efforts combine into a complete and effective system. This course surveys structured and object-oriented approaches to defining a system’s functional and quality requirements. It also examines how to convert these requirements into the structural and functional design elements of an effective organizational information system.
The principles of software engineering and software design allow for the methodical construction and controlled development of complex software systems. This course surveys the evolution and current practices of software engineering through the entire software life cycle, with emphasis on the elements that significantly influence software system quality.
Large-scale enterprise systems often rely on architectural frameworks that define their main components as well as the interactions among these components. This course surveys the principal design strategies and tools for constructing the modern information system. It identifies common vendor and open-source components, illustrating how they can create and integrate robust Web- and cloud-based services and applications.
The principles of confidentiality, integrity, and availability of data while it is being stored, processed, or communicated guide the policies and practices of information assurance. In this course, students investigate the theory of information security and data protection, study common system risks and vulnerabilities, and follow best practices to protect computer and data assets. These practices address organizational policies, access controls, software and network design, and logging and auditing.
Apply Now | Live Chat | Call Us
© 2014 Walden University