Study the core technical concepts of information systems security as well as their legal and social implications. Learn to analyze security and privacy issues in real-world cases, and select appropriate techniques to minimize risks and respond to security breaches.
Students may be eligible to transfer up to 135 credits. At least 45 credits must be completed at Walden.
This sequence represents the minimum time to completion. Time to completion will vary by student, depending on individual progress and credits transferred, if applicable. For a personalized estimate of your time to completion, call an enrollment advisor at 1-866-492-5336.
|Course Code||HMNT 1001||Course||Living and Learning in a Technological World||Credits||6|
Imagine life without cell phones, television, or the Internet. Recent technological developments have significantly altered all aspects of human life: at work; in play; and in personal, family, and social interactions. In this course, students examine the advantages, disadvantages, and controversies of living and learning in an ever-changing technological environment. By exploring multiple perspectives, students discover how technology is changing media, culture, business, health, human behavior, and overall access to information. In a dynamic, reflective, and engaging classroom environment, students use a variety of audio, visual, literary, and artistic resources, to engage in open dialogue. Students are also introduced to the tools essential to success at Walden. Students complete the course with a personalized success plan that provides a customized roadmap and tools that they can use.
|Course Code||BUSI 1002||Course||Introduction to Management and Leadership||Credits||5|
|Course Code||ACCT 1004S||Course||Fundamentals of Accounting||Credits||5|
|Course Code||BUSI 2003||Course||Operations||Credits||5|
|Course Code||ISYS 3001||Course||Information Systems in Enterprise||Credits||5|
|Course Code||STAT 3001||Course||Statistical Methods and Applications||Credits||5|
Students learn how information systems enable organizations to systematically identify, acquire, store, analyze, distribute, and reuse information and knowledge from all sources (e.g., internal and external, explicit and tacit) to enhance organizational productivity and competitiveness. The course extends the theory of Knowledge Management and Intellectual Capital to the development of learning organizations and evaluates the definition of learning organizations and the creation of environments that facilitate knowledge growth and distribution.
An introduction to accounting, students in this course take a top-down approach to understanding introductory accounting documents and procedures by exploring a business's financial statements, including the balance sheet, income statement, and cash flow statement. Students explore the practical uses for information that can be gleaned from these statements, individually and as a whole, through a detailed examination of the properties and characteristics of each statement. Students engage in application assignments and discussions on a variety of topics, such as regulations that should be followed when preparing financial statements as promulgated by generally accepted accounting principles (GAAP). Students examine the U.S. use of GAAP in comparison to the use of International Financial Reporting Standards.
An overview of the concepts, methodologies, and applications of business operations management is provided to students in this course. Students can learn about operations as related to the process of transforming resources into products and services. They explore the responsibility of operations managers to make sound, cost-effective decisions that increase the productivity and competitiveness of manufacturing and service organizations. Students also have the opportunity to learn the process of planning, implementing, and monitoring operations to ensure the continuous improvement of goods and services.
All businesses rely on systems to process, collect, share, and store important information. The most effective way to help an organization achieve their goals is to understand how to leverage information systems and emerging technology. This course provides students the opportunity to gain skills needed to employ such leverage in the professional arena. Students examine the characteristics of information systems and their role in organizations. They also assess and discuss the impact that information systems have on the enterprise as a whole, in addition to their current architectures, enabling tools, and project cycles. (Prerequisites: BUSI 1002.)
Students in this course gain a foundation in statistical methodology as well as ways to use critical judgment in analyzing data sets. Through technology applications and hands-on lab work, students learn concepts of descriptive statistics, hypothesis testing, confidence intervals, t-test, one-way analysis of variance, correlation, and non-parametric methods (e.g., chi-square tests). Students gain the knowledge and skill to be able to analyze and apply statistics to research problems and everyday life situations. (Prerequisites: COMM 1001.)
|Course Code||CMIS 1004||Course||Object-Oriented Programming Concepts||Credits||5|
|Course Code||ITEC 1010||Course||IT Infrastructure||Credits||5|
|Course Code||CMIS 2001||Course||Internet Computing||Credits||5|
|Course Code||ITEC 2040||Course||Systems Analysis||Credits||5|
|Course Code||ITEC 2050||Course||Systems Design||Credits||5|
|Course Code||ITEC 2060||Course||Database Management Systems||Credits||5|
|Course Code||ITEC 3040||Course||IT Project Management||Credits||5|
Information systems rely on underlying programs that respond to users and process information. An information systems specialist must understand the structure and purpose of programs and be able to work with programmers to ensure designs that meet system requirements. Object-oriented programming (OOP) and design facilitates this by presenting information systems as classes and objects that represent complex system contexts in a manner directly transferrable to programming specifications. This course introduces students to fundamental aspects of computer programming in an object-oriented language. Students learn about key concepts, including real-world objects and methods in an information systems context. They engage in hands-on practice in designing, creating, and running programs and discuss programming and design topics to share ideas and obtain different perspectives. This concept focus enables students to relate programming to information systems and provides a foundation for learning specific programming languages and skills in the future. (Prerequisites: MATH 1040.)
Information technology (IT) is essential to the function and success of nearly all businesses. Businesses whose systems are lacking or experience failure are at risk of significant loss; therefore, there will always be a need for IT support and innovation. This course introduces fundamental concepts of the IT infrastructure to prepare students for a role in the field of IT. Students learn about the structure and purpose of hardware components (computers, networks, and interface devices) and software components (operating systems, middleware, applications, and system software). They examine key issues of capacity, performance, reliability, scale, and obsolescence through the evaluation of IT’s role in supporting business and individuals. Students take a practical approach to understanding how IT infrastructure can relate to personal goals as they examine the various career options within the field. (Prerequisites: COMM 1001.)
The Internet stitches together many disparate devices and software components into a flexible fabric that supports an enormous variety of uses. Students in this course learn about the functions of these components through a comprehensive evaluation of internet computing. They examine the design of the Internet protocol stack, the structure and function of some of the most important Internet services and applications, and Internet governance. Students have the opportunity to gain practical experience through the application of concepts, such as performance, scale, and reliability, in the design of information systems. (Prerequisites: CMIS 1002.)
There are many roles involved in creating and managing an organization’s information system, including the systems analyst. The analyst helps to ensure that the software development process is successful by understanding its purpose, scope, and resource requirements. This course provides students with the prospect of understanding the field from the perspective of a systems analyst. Students focus on the definition and examination of system requirements, both functional and nonfunctional, for an information system (IS) project. Through the review of videos, case, studies, and supplemental websites, they learn about the identification of stakeholders and techniques for requirement elicitation, representation, and life cycles. Students sharpen their communication and practical skills through group projects during which they apply concepts learned in the course to an actual information system. (Prerequisites: ITEC 1010.)
This course is an introduction to the approaches used to specify details during the design phase of a systems development life cycle (SDLC). Students explore the discipline of reducing requirements to the structural and functional design of organizational information technology solutions. They examine conceptual modeling, design patterns, and application frameworks. Students learn the basics of modeling, design representations, and the use of design tools. Through discussion with their peers, students confer and debate over the different approaches to systems design, security aspects of interfaces, and documentation. Students work toward gaining collaborative and critical-thinking skills through group projects focusing on the specifics of system design, including planning and implementation. (Prerequisites: ITEC 2040.)
All types of businesses rely on systems to manage their data and to keep that data secure, accurate, and reliable. A database is a system designed to do just this as well as to simplify the processes of data entry, search, and retrieval. In this course, students learn about database management through the examination of the life cycle of a database. Students focus on the representation and manipulation of information in relational database management systems. They learn how to map real-world concepts onto relational representations and how to manipulate them through relational queries to implement data-intensive applications. They also discuss related issues, such as database storage, data validation, sorting, grouping, and nesting data. Students learn to use a core subset of the Structured Query Language (SQL) as well as the fundamentals of database administration. (Prerequisites: ITEC 2050.)
The process of creation, from conception through completion, is complicated and requires a diverse set of management skills. This course introduces students to the knowledge, tools, and techniques needed to successfully manage information technology (IT) projects throughout a project life cycle. Students in this course focus on the IT project management process and development of the project team as key to the successful achievement of IT projects. Students analyze the role of the project manager as an integral administrator overseeing the execution, progress, and interaction of all parties involved. Students learn the intricacies of managing projects and programs that may span multiple organizations. They engage in coursework through which they examine the project management cycle, sourcing strategy, third-party provider selection, and management of third-party providers. (Prerequisites: ITEC 2050.)
|Course Code||ITEC 3020||Course||Computer Security Fundamentals||Credits||5|
|Course Code||ITEC 3101||Course||Systems Software Security||Credits||5|
|Course Code||ITEC 4101||Course||Network Security||Credits||5|
|Course Code||ITEC 2030||Course||Operating Systems Fundamentals and Administration||Credits||5|
Insecure security systems can cause major risks and vulnerabilities for companies. Breaches in personal employee information, financial information, or company secrets can elicit the downfall of an organization. In this course, students learn the importance of such concerns as well as key concepts of computer and information security, including technical, privacy, organizational, social, and policy issues. They examine fundamental notions of authentication, authorization, and encryption. Students learn about economic and human impact issues through the analysis of case studies of security and privacy breaches. Through discussions, applications, and group projects, students also examine risk management, informal system security methods, and corporate governance. (Prerequisites: ITEC 2030.)
The job of an information security specialist is to oversee enterprise operations that follow industry best practices for security and data integrity to ensure that systems are free from external threats and risks that may jeopardize or harm the organization. Students in this course investigate the responsibilities of the security specialist, including the security of operating systems and other system software, such as database management systems. Through a variety of assignments, including hands-on lab work, students explore components of a networked operating system, architectural designs for secure usage, system administration tasks, and tools for security. Students examine the real effects that security threats have on systems. They address such threats through exercises in administrative tasks using tools vital for implementing security policies on Linux and Windows systems. (Prerequisites: ITEC 3020.)
Technological innovation has led us to store all types of information on the Web, such as medical records, financial data, and personal communications. We rely on this information to be safe from external attacks. Preventing such threats is a vital role in the field of information technology. This course provides an overview of network security defense techniques and countermeasures. Students sharpen their communication and analytical skills through the discussion and debate of a variety of topics, such as cryptanalysis and attacks, safety of wireless connections, intrusion detection methods, and access control. They engage in assignments designed to provide them with practical applications of content, such as the design and configuration of firewalls, traffic analysis and filtering, intrusion detection, statistical anomaly detection, and wireless security. (Prerequisites: ITEC 2020 and ITEC 3020.)
There are many important benefits from studying the different types operating systems, such as administering computers efficiently and structuring code more effectively, which lend to best practices in writing code. This course provides students with an overview of the concepts of computer operating systems, including the main functions, similarities, and differences. They explore a variety of topics, including configuration, file systems, security, administration, interfacing, multitasking, and performance analysis. Students contextualize their learning experience through hands-on activities, such as performing basic administrative tasks on Windows and Linux servers, including configuring networking parameters, administering user accounts and groups, setting access and application permissions, and locating and analyzing log files. (Prerequisites: ITEC 1010.)
|Course Code||CMIS 4999||Course||IS Capstone Project||Credits||5|
In this capstone project course, students complete an integrative information systems project that combines multiple aspects of their information systems program. The project requires collaboration with a team of students to manage, analyze, design, implement, and evaluate a computer-based information system. The system development process is initiated with a case study included within the course structure. Students will develop a project charter that will guide them through the discovery of system requirements, the creation of a system design, and the development and testing of a functional computer application. Students will develop a management presentation to describe the project design and justify the continuation of the project. Students will also examine their professional goals in the context of their education and develop plans for continued learning and career development based on their personal objectives and priorities.
Choose 10 courses from general education, BS in Computer Information Systems, or other Walden bachelor’s degree programs. Elective credits should total 50 to meet program requirements (at least 20 credits must be upper level). Students may also be eligible to transfer previous credit to meet elective requirements.