Course Descriptions
Foundation Courses
Foundation courses are assigned based on the student’s individual technical and academic background.
This course provides the student with knowledge, skills and abilities to academic and professional practices that are needed in order to succeed in the CLU School of Management’s graduate programs. The course focuses on the development of written and oral communication skills, computer skills, and creative and critical thinking. Students will learn how to plan, research, organize, prepare and professionally present major academic reports using current presentation technologies for team projects and individual assignments.
Java is one of the most popular programming languages used by software developers today. This course introduces students to the fundamental programming concepts and techniques in object oriented programming. This course has both theoretical and practical components. It provides students with a solid foundation needed to understand how computer programs work. Students will also learn how to write, execute and debug various Java programs. This is a foundation course for all students interested in a career in the Information Technology field whether they manage the technology or actively develop it.
This course is designed to help the entering MBA students to acquire a good intuitive grasp of statistics - what it is, how and when to apply statistical techniques to managerial situations, and how to interpret results. Various statistical and mathematical techniques will be presented to assist in solving problems encountered by corporate managers. Students need to demonstrate knowledge of the course concepts by knowing which decisions, comparisons, and inferences to make in the presence of uncertainty.
Managers are called upon to make important choices that require a well-informed understanding of how organizations are designed and operate. Toward that end, they must be knowledgeable of all of and organization’s functions (including accounting, finance, human resources, marketing, operations, etc.) and how these activities must be coordinated. Further, to achieve firm goals, managers are required to have a profound understanding of the industry and professional environment. This course introduces the functional areas of an organization, seeks to develop external environmental analytical skills, and proposes theoretical and practical paradigms to effectively manage in an increasingly competitive global environment.
Core Courses
In today's dynamic and competitive economy, the ability of an organization to effectively leverage their existing and emerging information technologies is a critical success factor in gaining and sustaining a strategic advantage. This course introduces students to important concepts and techniques needed to understand and leverage information technology within an organizational context. Students will learn the fundamentals of design and implementation of information systems in the modern organization, business process improvement thorough the use of information technology, organizational data modeling, project management concepts, data governance mechanisms, technology-enabled change management among other.
Data is a valuable organizational resource. As organizations collect more and more data, it becomes increasingly important to understand basic principles of how to store and manipulate organizational data in order to successfully run business operations. This course provides students with an introduction to the fundamental concepts, techniques and tools used in design, development and application of relational database technology in organizations. Topics include data modelling based on organizational requirements and data manipulation via structured query language tools.
This course uses structured software development methodologies to develop an understanding of the overall process of developing an information system starting with planning, analysis, design and implementation of the system. It focuses on the core set of skills that all system analysts must possess, from gathering requirements and modeling business needs, to creating blueprints for how the system should be built and assessing usability. The course also exposes students to various graphic modeling processes such as data flow diagrams used in business process reengineering, design of user interfaces and system behaviors.
This course introduces the elements and architecture of computer and data communication networks, demonstrates the fundamental principles of computer networking, and provides experience in the practical use of current networking technology. Topics in this course include: network standards, protocols (TCP/IP), network architectures, network routing and switching, local area networks, wide area networks, wireless networks and network performance and management. Students will also learn to make knowledgeable decisions pertaining to strategies and architectures for the deployment of telecommunication technologies in organizations.
This course is an introduction to the basic fundamentals of project management based on the Project Management Institute (PMI) body of knowledge. All phases of the project management cycle are covered including project initiating, planning, executing, monitoring and controlling project status and post project lessons learned analysis. In addition, the course introduces the 10 project management knowledge areas as defined by PMI namely, project integration, scope, time, cost, quality, human resources, communications, stakeholder, risk, and procurement management. Project management best practices, tools and techniques along with constraints and trade-offs in managing projects are discussed. The course has a practical component with students executing projects as part of teams.
Security of informational assets has become a keenly debated issue for organizations. Effective information security management demands a clear understanding of technical as well as socio-organizational aspects. The purpose of this course is to prepare students to recognize the threats and vulnerabilities present in current information systems and how to plan for such risks. The course covers a broad range of topics including data classification, cryptography, network and application security, risk management, threat and vulnerability analysis, computer forensics, and policies and architecture designs. Students will have the opportunity to try real security and attack tools to understand how they work and how they might be used and counteracted.
From mobile phones to the Internet, our lives depend increasingly on distributed systems linking computers and other devices together in a seamless and transparent way. This course provides students an understanding of the principles on which the Internet and other distributed systems are based, their architecture, algorithms and design and how they meet the demands of contemporary distributed applications. The course addresses the skills needed to design and maintain software for distributed applications through topics such as client/server software and N-tier architectures, middleware, Internet technologies, application development, system management, mobile and ubiquitous computing and distributed multimedia systems. Students will also learn the distributed systems infrastructure that supports Google both in terms of core search functionality and the increasing range of additional services offered by Google.
Data structures are ways to organize, store and retrieve data while algorithms are strategies for processing the data to solve computational problems. Efficient computer applications require good use of data structures and algorithms. This course introduces students to analysis and design of fundamental data structures and algorithms that are the basis of modern applications today. Students will learn how to write algorithms, evaluate tradeoffs between different algorithms and assess the efficiency of the best possible algorithm for solving complex computational problems.
Track: Cybersecurity
Data mining is the process of discovering patterns and associations in large data sets. It supports decision making by detecting patterns, devising rules, identifying new decision alternatives and making predictions. This course provides an overview of leading data mining methods and their applications to real-world problems. It is designed to provide students with the skills to conduct data mining and statistical analysis for dealing with analytical tasks such as prediction, classification, decision trees and clustering. Students will use available software to conduct various data mining analyses and understand the application of a wide range of modern techniques to specific managerial and analytical situations, and on model interpretation.
More and more organizations are collecting large amounts of data, much of it unstructured. Big data technologies can be used to store, process and analyze large amounts of data using a distributed environment. This course introduces students to the world of big data and associated technologies. The focus of the course is Apache Hadoop, which is an open source software project that enables, distributed processing of large data sets across clusters of commodity servers. The objective of this course is to provide students a foundation for understanding big data technologies and Hadoop in particular. Topics include Hadoop system architecture, Hadoop Distributed File System (HDFS), MapReduce programming model and design patterns and technologies surrounding Hadoop ecosystem such as Pig, Hive and Oozie. The course will also introduce big data science concepts and NoSQL database technologies.
Modern technologies have created a myriad of ways that data can be stored and communicated – and hidden. Digital forensics is the science of finding those data after the fact. This course presents an overview of the principles and practices of digital investigation and prepares students to conduct a cyber forensics investigation in an organized and systematic way. The course allows students to develop skills in collecting, seizing and analyzing suspect devices, creating forensics images, recover deleted data from various file systems and damaged media, apply digital forensics techniques to e-mail and other electronic communications and describe incident and intrusion response approaches among other topics.
Ethical hacking or penetration testing is the act of breaking into a system with the permission and legal consent of the organization or individual who owns and operates the system, with the purpose of identifying vulnerabilities to strengthening the organization's security. This course introduces students to the principles and techniques of the cybersecurity practice known as penetration testing and covers various tools and methods commonly used to compromise and control access to information systems. As part of this course, students will conduct hands-on penetration tests in a controlled lab environment, discover how system vulnerabilities can be exploited and learn how to avoid such problems in order to better secure organizational data and systems.
Cloud computing services (whereby distributed resources are rented, rather than owned) are being adopted across a variety of organizations yet many security challenges exist. This course introduces students to various cloud computing architectures and delivery models followed by a review of the security and privacy issues related to various types of cloud computing environments. The course covers aspects related to cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks for both cloud platforms & infrastructure security and cloud application security.
Protecting organizational assets against increased numbers of cybersecurity threats is of critical importance in all modern organizations. Having a cybersecurity plan and a governance structure in place for dealing with cybersecurity risks is a more successful strategy than recovering organizational systems after a cyberattack has occurred. This courses introduces students to risk management approaches for identifying, analyzing and responding to cybersecurity risks, governance mechanisms, human resource security and business continuity. This course provides students with necessary skills required to formulate and implement a cybersecurity plan.
Special topics courses vary and are used to introduce students to new topics in the Information Technology field.
Internships are a valuable experiential learning tool where students engage in work with an organization on an approved topic. Students will write a comprehensive report based on their learning experience along with weekly logs and a managerial evaluation. The report will be evaluated and graded by the instructor.
Students will work on proposing, developing and implementing a comprehensive project based on concepts learned during their program. A project is a form of research aimed at creating or contributing new knowledge in a discipline or, an applied study that combines a specific topic with actual problems or issues within a setting.
Track: Data Analytics
This course provides an introduction to the field of business analytics, which is defined as the extensive use of data, statistical and quantitative analysis, exploratory and predictive models, and fact-based management to drive decisions and actions. Topics include implementation of successful analytics platforms, big and little data, predictive analytics, social media analytics, mobile analytics and data visualization. Students use industry standard tools in practical projects.
Data mining is the process of discovering patterns and associations in large data sets. It supports decision making by detecting patterns, devising rules, identifying new decision alternatives and making predictions. This course provides an overview of leading data mining methods and their applications to real-world problems. It is designed to provide students with the skills to conduct data mining and statistical analysis for dealing with analytical tasks such as prediction, classification, decision trees and clustering. Students will use available software to conduct various data mining analyses and understand the application of a wide range of modern techniques to specific managerial and analytical situations, and on model interpretation.
This course introduces the principles and procedures related to the design and management of data warehouse (DW) and business intelligence (BI) systems. The DW is the central data repository that is used for decision-support. BI refers to the analytical applications that users can interact with in making sense of the data. The course focuses on the data warehousing process including requirement collection, data warehouse architectures, dimensional modeling, extracting, transforming, and loading strategies, and creation of data marts. The course also uses data warehousing as a platform for BI applications, such as reporting, dashboards and online analytical processing (OLAP). By completing this course, students should understand the technologies used for decision-support and possess valuable analytical skills.
More and more organizations are collecting large amounts of data, much of it unstructured. Big data technologies can be used to store, process and analyze large amounts of data using a distributed environment. This course introduces students to the world of big data and associated technologies. The focus of the course is Apache Hadoop, which is an open source software project that enables, distributed processing of large data sets across clusters of commodity servers. The objective of this course is to provide students a foundation for understanding big data technologies and Hadoop in particular. Topics include Hadoop system architecture, Hadoop Distributed File System (HDFS), MapReduce programming model and design patterns and technologies surrounding Hadoop ecosystem such as Pig, Hive and Oozie. The course will also introduce big data science concepts and NoSQL database technologies.
Special topics courses vary and are used to introduce students to new topics in the Information Technology field.
Internships are a valuable experiential learning tool where students engage in work with an organization on an approved topic. Students will write a comprehensive report based on their learning experience along with weekly logs and a managerial evaluation. The report will be evaluated and graded by the instructor.
Students will work on proposing, developing and implementing a comprehensive project based on concepts learned during their program. A project is a form of research aimed at creating or contributing new knowledge in a discipline or, an applied study that combines a specific topic with actual problems or issues within a setting.
Track: Information Technology Management
This course explores strategic information technology management issues associated with doing business in digital times. It provides a framework to understand how information technology strategy aligns with business strategy and focuses on developing an understanding of the key information requirements for developing an information technology strategy and systems architecture. Students are encouraged to think and behave strategically with respect to exploiting leading-edge technologies, and deliver the right business value with information technology. The course will focus on digital technology trends transforming how business is done, information management and architecture, e-business models and strategies, mobile commerce, social networking, engagement and social metrics and business process innovation.
The current trend towards computerizing the healthcare industry through interoperable electronic health records (EHR) is creating very exciting opportunities for IT and business professionals in a diverse range of organizations including hospitals, IT firms (EHR vendors), government departments and health funds. This course is designed to introduce students to the various aspects of information management in healthcare organizations. Students will also gain a solid understating of the healthcare field and how advanced information technologies can be used to reduce costs and improve the healthcare system overall. At the same time, the course focuses on unintended consequences resulting from deployment of advanced technologies in the healthcare filed including user responses and usability considerations. Privacy and security laws in HIPAA will also be discussed.
Integration of information and processes is one of the biggest challenges faced by organizations today. Enterprise systems attempt to integrate all departments and functions across an organization onto a single computer system that can serve every department’s particular needs for up-to-date and accurate data. These systems dictate a standard data format across the entire organization, they are modular and multifunctional. This course examines various types of enterprise systems such as enterprise resource planning (ERP) systems, supply chain management systems (SCM), customer relationship management systems (CRM) and knowledge management systems (KM) that support and enhance business activities. It provides an overview of the managerial and technical issues in selection and implementation of enterprise systems and technologies.
Organizations entrust a large portion of their budget to people who lead and manage IT infrastructure and operations. The ability to respond dynamically to changing business requirements is paramount for IT infrastructure and operations (I&O) organizations. Virtualization, IT modernization, and real-time infrastructure architecture are increasingly essential to this agility. This class will balance hands on interaction with infrastructure technologies and equipment as well as applications of technologies and services. Other topics include enterprise architecture and governance, cloud computing, enterprise-wide efficiency, green computing.
Organizations must structure themselves to deal with emerging technologies and making the right decisions, at the right time, can be critical to determining whether the organization succeeds or fails. This course provides students with a basic understanding of emerging technologies as they relate to innovation and information systems in organizations, and the management strategies required to understand, leverage, and benefit from these technologies. Students will identify current, real technologies that are emerging or about to emerge into the mainstream, investigate those technologies, and ones from recent history, from a number of perspectives, to look at the impact of technologies on systems, business operations, and corporate and technology strategy. They will study the impact, benefits, and downsides of standards as they relate to information technology and delve into how those standards, and other factors, might affect the timing for implementation of emerging technologies in organizations.
Special topics courses vary and are used to introduce students to new topics in the Information Technology field.
Internships are a valuable experiential learning tool where students engage in work with an organization on an approved topic. Students will write a comprehensive report based on their learning experience along with weekly logs and a managerial evaluation. The report will be evaluated and graded by the instructor.
Other Electives
As machines are getting more sophisticated, the field of Artificial Intelligence (AI) takes prominent center stage. AI focuses on building and managing intelligent machines that can learn from experience, solve problems, perform human-like tasks and mimic cognitive human functions. This course focuses on important concepts, principles and techniques applied in the in the AI domain. Students will gain expertise in topics such as computer problem-solving, knowledge representation, cognitive computing, speech/face recognition, natural language processing and robotics among others.