Bradley Logo

Schedule of Classes

 

Spring Semester 2025

 

Computer Information Systems
Yun Wang • Bradley Hall 185 • 309-677-3284
CIS300Computers and SocietyGenEd: TS   Core: GS(3 hours)Seats
Avail
Prerequisite: Not eligible for CS or CIS majors; Reserved for non-CS/CIS majors/non-minors; Junior standing; or consent of instructor.
 01 TT10:30 AM -11:45 AM BR156 Qin Yang  15
CIS330Advanced Computer Forensics (3 hours)Seats
Avail
Prerequisite: CIS 230 or CRM 230.
 01 TT9:00 AM -10:15 AM BR156 Lavanya Mandava  15
 Cross-listed as CRM 330
CIS393Web Technologies & Systems (3 hours)Seats
Avail
Prerequisite: CIS 210 or CS 210 or equivalent; or consent of instructor. CS 220 is strongly recommended.
 01 TT12:00 PM -1:15 PM BR290 Nawaz Ali  15
CIS415Applied Cryptography (3 hours)Seats
Avail
Prerequisite: CS 210 or CIS 210 or equivalent; or consent of instructor.
Cross-listed as CIS 515
 01 TT9:00 AM -10:15 AM BR290 Jonathan Scott Williams  10
 02 MW10:30 AM -11:45 AM BR290 Jonathan Scott Williams  10
CIS430Information Technology Infrastructure (3 hours)Seats
Avail
Prerequisite: CS 220 or equivalent; or consent of instructor. CIS 393 is strongly recommended.
 01 MW12:00 PM -1:15 PM BR180 Yun Wang  10
 Cross-listed as CIS 530
CIS435Computer Networks and System Security (3 hours)Seats
Avail
Prerequisite: CS 220 or equivalent; or consent of instructor.
 01 MW1:30 PM -2:45 PM BR180 Lavanya Mandava  10
 Cross-listed as CIS 535
CIS450Game Programming Design Patterns (3 hours)Seats
Avail
Prerequisite: CIS 350 or I M 289 or consent of instructor
 01 TT1:30 PM -2:45 PM BR180 Qin Yang  15
 Cross-listed as CIS 550
CIS456Game Engine Programming (3 hours)Seats
Avail
Prerequisite: junior standing, CIS 452, CIS 455; or consent of instructor.
Course Fee: $40 per credit hour
 01 TT12:00 PM -1:15 PM BR180 Adam Byerly  10
 Cross-listed as CIS 556 and I M 456
CIS458Sound Design (3 hours)Seats
Avail
Prerequisite: junior standing, IM 113, IM 285; or consent of instructor.
Course Fee: $40 per credit hour
 01 Th3:00 PM -5:50 PM GCC104 Benjamin James Aberle  6
 Cross-listed as CIS 558 and I M 458
CIS491Computer Information System Project Management (3 hours)Seats
Avail
Prerequisite: CIS 475 or CS 390; or consent of instructor.
 02 MW12:00 PM -1:15 PM BR150 Tony Du  5
CIS495Software and Web Applications Security (3 hours)Seats
Avail
Prerequisite: CS 390 or equivalent; or consent of instructor.
 01 TT10:30 AM -11:45 AM BR180 Jonathan Scott Williams  10
 Cross-listed as CIS 595
CIS515Applied Cryptography (3 hours)Seats
Avail
Prerequisite: Graduate standing in CS or CIS, or senior standing in CS or CIS, or CS 210 or equivalent, or consent of instructor.
Cross-listed as CIS 415
 01 TT9:00 AM -10:15 AM BR290 Jonathan Scott Williams  5
 02 MW10:30 AM -11:45 AM BR290 Jonathan Scott Williams  5
CIS530Information Technology Infrastructure (3 hours)Seats
Avail
Prerequisite: Graduate standing in CS or CIS, or senior standing in CS or CIS, or CS 220 or equivalent, or consent of instructor. CIS 393 is strongly recommended.
 01 MW12:00 PM -1:15 PM BR180 Yun Wang  5
 Cross-listed as CIS 430
CIS535Computer Networks and System Security (3 hours)Seats
Avail
Prerequisite: Graduate standing in CS or CIS, or senior standing in CS or CIS, or CS 220 or equivalent, or consent of instructor.
 01 MW1:30 PM -2:45 PM BR180 Lavanya Mandava  5
 Cross-listed as CIS 435
CIS550Game Programming Design Patterns (3 hours)Seats
Avail
Prerequisite: CIS 350 and graduate standing in CS or CIS. Consent of instructor for all other students with graduate standing
 01 TT1:30 PM -2:45 PM BR180 Qin Yang  5
 Cross-listed as CIS 450
CIS556Game Engine Programming (3 hours)Seats
Avail
Prerequisite: Graduate standing in CS or CIS, or senior standing in CS or CIS, or CIS 452 and CIS 455 or equivalents, or consent of instructor.
Course Fee: $40 per credit hour
 01 TT12:00 PM -1:15 PM BR180 Adam Byerly  5
 Cross-listed as CIS 456 and I M 456
CIS558Sounds Design (3 hours)Seats
Avail
Prerequisite: Graduate standing in CS or CIS, or senior standing in CS or CIS, or IM 113 and IM 285, or consent of instructor.
Course Fee: $40 per credit hour
 01 Th3:00 PM -5:50 PM GCC104 Benjamin James Aberle  6
 Cross-listed as CIS 458 and I M 458
CIS591CIS and IT Project Management (3 hours)Seats
Avail
Prerequisite: Graduate standing in CS or CIS, or senior standing in CS or CIS, or CS 390 or equivalent; or consent of instructor.
 02 MW12:00 PM -1:15 PM BR150 Tony Du  1
CIS595Software and Web Applications Security (3 hours)Seats
Avail
Prerequisite: Graduate standing in CS or CIS, or senior standing in CS or CIS, or CS 390 or equivalent, or consent of instructor.
 01 TT10:30 AM -11:45 AM BR180 Jonathan Scott Williams  5
 Cross-listed as CIS 495
 
History of computers; their use, limitations, and impact on society; Internet and the World Wide Web; creation of Web content.
Provides students an extensive look at computer forensics and formal techniques used in computer forensics in a lab environment. Formal techniques for conducting a computer forensics investigation including record-keeping are covered. Students will conduct computer forensic exams and participate in practical computer forensic examination exercises. Cross listed as CRM 330.
Introduction to Web technologies and systems. Emphasis on design, development, testing, implementation, and applications of Web-based systems and technologies including related software, data exchange protocols, interfaces, and tools.
Various concepts, algorithms, and systems in the area of applied cryptography. Topics include but are not limited to overview of classical cryptography, various types of cryptographic algorithms and systems, block ciphers, advanced encryption standards, key management, digital certificates, design and development of cryptographic applications. Cross-listed with CIS 515.
Enterprise information technology infrastructure including networking and telecommunications fundamentals, concepts, models, architectures, protocols, standards, communications, configuration, implementation, management, deployment software, firmware, hardware, distributed systems, file services, and software/hardware/network security issues. Cross-listed with CIS 530.
Principles, concepts, and fundamentals of computer networks and systems; and information technology infrastructure security, computer network authentication, authorization, access control, confidentiality, and data integrity. Topics of computer network security policy and management, data encryptions, protection against internal and external attacks, security evaluation and management will also be covered. Cross listed with CIS 535.
Software design patterns and principles for game programming. Software design patterns are tried-and-true solutions to common object-oriented design problems. The goal of this course is to develop the skills to use design patterns effectively for game programming, guided by software design principles. Students will learn when and how to apply software design patterns through practice by designing and implementing game prototypes using Unified Modeling Language (UML) class diagrams and a game engine. Covered design patterns include Strategy, Observer, Decorator, Factory, Command, Template Method, State, Fa ade, Singleton, and Object Pooling. Cross-listed with CIS 550.
Advanced techniques and technologies for programming computer game engines, multi-user games, virtual environments, and virtual reality simulations. Cross listed with CIS 556, IM 456.
Theoretical and practical sound design. Music composition, field sound recording, studio tracking, aesthetic analysis of music, electronic sound generation. Digital game technologies, 3D sound processing and generative audio structures. Mixing in non-linear environments and final mastering. Cross listed with CIS 558, IM 458.
Methods of PMBOK-based management of computer information software systems design and development projects, including systems view, main project management process groups and knowledge areas, management plans, project metrics and estimates, tools for project management, project reports and documentation. Cross listed with CS 591 and CIS 591 courses.
Concepts, models, methods, technologies, and tools used to design, develop, test, implement, and maintain secure software and Web applications. Threats posed to software and Web applications, software security concepts and protection mechanisms, trust and threat model, authentication and authorization, software risks assessment and management models, security management models for software and Web applications, secure programming and software development styles, tools to develop secure software and Web applications. Cross listed with CIS 595.
Various concepts, algorithms, and systems in the area of applied cryptography. Topics include but are not limited to overview of classical cryptography, various types of cryptographic algorithms and systems, block ciphers, advanced encryption standards, key management, digital certificates, design and development of cryptographic computer and software applications. Cross listed with CIS 415. For cross listed undergraduate/graduate courses, the graduate level course will have additional academic requirements beyond those of the undergraduate course.
Enterprise information technology infrastructure including networking and telecommunications fundamentals, concepts, models, architectures, protocols, standards, communications, configuration, implementation, management, deployment software, firmware, hardware, distributed systems, file services, and software/hardware/network security issues. Cross listed with CIS 430. For cross-listed undergraduate/graduate courses, the graduate-level course will have additional academic requirements beyond those of the undergraduate course.
Principles, concepts, and fundamentals of computer networks and systems; and information technology infrastructure security, computer network authentication, authorization, access control, confidentiality, and data integrity. Topics of computer network security policy and management, data encryptions, protection against internal and external attacks, security evaluation and management will also be covered. Cross listed with CIS 435. For cross listed undergraduate/graduate courses, the graduate level course will have additional academic requirements beyond those of the undergraduate course.
Using design patterns effectively for game programming, guided by software design principles. Software design patterns are tried-and-true solutions to common object-oriented design problems. Students will learn when and how to apply software design patterns through practice by designing and implementing game prototypes using Unified Modeling Language (UML) class diagrams and a game engine. Covered design patterns include Strategy, Observer, Decorator, Factory, Command, Template Method, State, Facade, Singleton, and Object Pooling. Cross-listed with CIS 450. For cross-listed undergraduate/graduate courses, the graduate-level course will have additional academic requirements beyond those of the undergraduate course.
Advanced techniques and technologies for programming computer game engines, multi-user games, virtual environments, and virtual reality simulations. Cross listed with CIS 456, IM 456. For cross-listed undergraduate/graduate courses, the graduate-level course will have additional academic requirements beyond those of the undergraduate course.
Theoretical and practical sound design. Music composition, field sound recording, studio tracking, aesthetic analysis of music, electronic sound generation. Digital game technologies, 3D sound processing and generative audio structures. Mixing in non-linear environments and final mastering. Cross listed with CIS 458, I M 458. For cross-listed undergraduate/graduate courses, the graduate-level course will have additional academic requirements beyond those of the undergraduate course.
Methods of PMBOK-based management of computer information systems and/or information technology design and development projects, including systems view, main project management process groups and knowledge areas, management plans, project metrics and esti
Various security concepts, models, methods, technologies, and tools used to design, develop, test, implement, and maintain secure software and Web applications. Topics include but are not limited to threats posed to software and Web applications, software security concepts and protection mechanisms, trust and threat model, authentication and authorization, software risks assessment and management models, secure programming and software development styles and tools. Cross listed with CIS 495. For cross listed undergraduate/graduate courses, the graduate level course will have additional academic requirements beyond those of the undergraduate course.
This course meets a General Education requirement.
C1 - English Composition
C2 - English Composition
SP - Speech
MA - Mathematics
WC - Western Civilization
NW - Non-Western Civilization
FA - Fine Arts
HL - Human Values - Literary
HP - Human Values - Philosophical
CD - Cultural Diversity
SF - Social Forces
FS - Fundamental Concepts in Science
TS - Science & Technology in the Contemporary World
This course meets a Core Curriculum requirement.
OC - Communication - Oral Communication
W1 - Communication - Writing 1
W2 - Communication - Writing 2
FA - Fine Arts
GS - Global Perspective - Global Systems
WC - Global Perspective - World Cultures
HU - Humanities
NS - Knowledge and Reasoning in the Natural Sciences
SB - Knowledge and Reasoning in the Social and Behavioral Sciences
MI - Multidisciplinary Integration
QR - Quantitative Reasoning
This section meets a Core Curriculum requirement.
EL - Experiential Learning
IL - Integrative Learning
WI - Writing Intensive
Picture of Instructor


Choose a different department

Choose a different semester

Search Class Database

Course Delivery Method Definitions