Bradley Logo

Schedule of Classes

 

Spring Semester 2024

 

Computer Information Systems
Yun Wang • Bradley Hall 185 • 309-677-3284
CIS300Computers and SocietyGenEd: TS   Core: GS(3 hours)
Prerequisite: Not eligible for CS or CIS majors; Reserved for non-CS/CIS majors/non-minors; Junior standing; or consent of instructor.
 01 MW6:00 PM -7:15 PM BR050 Qin Yang  
CIS330Advanced Computer Forensics (3 hours)
Prerequisite: CIS 230 or CRM 230.
 01 TT9:00 AM -10:15 AM BR180 Lavanya Mandava  
 Cross-listed with CRM 330
CIS393Web Technologies & Systems (3 hours)
Prerequisite: CIS 210 or CS 210 or equivalent; or consent of instructor. CS 220 is strongly recommended.
 01 MW3:00 PM -4:15 PM BR180 Nawaz Ali  
CIS415Applied Cryptography (3 hours)
Prerequisite: CS 210 or CIS 210 or equivalent; or consent of instructor.
 01 MW9:00 AM -10:15 AM BR160 Jonathan Scott Williams  
 02 MW10:30 AM -11:45 AM BR290 Jonathan Scott Williams  
 Cross-listed with CIS 515
CIS430Information Technology Infrastructure (3 hours)
Prerequisite: CS 220 or equivalent; or consent of instructor. CIS 393 is strongly recommended.
 01 TT1:30 PM -2:45 PM BR290 Yun Wang Hybrid Course
 Cross-listed with CIS 530
CIS435Computer Networks and System Security (3 hours)
Prerequisite: CS 220 or equivalent; or consent of instructor.
 01 MW9:00 AM -10:15 AM BR180 Lavanya Mandava  
 Cross-listed with CIS 535
CIS450Game Programming Design Patterns (3 hours)
Prerequisite: CIS 350 or I M 289 or consent of instructor
 01 MW1:30 PM -2:45 PM BR290 Qin Yang  
CIS456Game Engine Programming (3 hours)
Prerequisite: junior standing, CIS 452, CIS 455; or consent of instructor.
Course Fee: $40 per credit hour
 01 MW1:30 PM -2:45 PM BR180 Adam Byerly  
 Cross-listed with CIS 556 and I M 456
CIS491Computer Information System Project Management (3 hours)
Prerequisite: CIS 475 or CS 390; or consent of instructor.
 03 MW12:00 PM -1:15 PM BR156 Tony DuCore: WI,EL 
 Cross listed with CIS 591 and CS 591
CIS495Software and Web Applications Security (3 hours)
Prerequisite: CS 390 or equivalent; or consent of instructor.
 01 MW3:00 PM -4:15 PM BR150 Mohammad Nazmus Sadat  
 Cross-listed with CIS 595
CIS515Applied Cryptography (3 hours)
Prerequisite: Graduate standing in CS or CIS, or senior standing in CS or CIS, or CS 210 or equivalent, or consent of instructor.
 01 MW9:00 AM -10:15 AM BR160 Jonathan Scott Williams  
 02 MW10:30 AM -11:45 AM BR290 Jonathan Scott Williams  
 Cross-listed with CIS 415
CIS530Information Technology Infrastructure (3 hours)
Prerequisite: Graduate standing in CS or CIS, or senior standing in CS or CIS, or CS 220 or equivalent, or consent of instructor. CIS 393 is strongly recommended.
 01 TT1:30 PM -2:45 PM BR290 Yun Wang Hybrid Course
 Cross-listed with CIS 430
CIS535Computer Networks and System Security (3 hours)
Prerequisite: Graduate standing in CS or CIS, or senior standing in CS or CIS, or CS 220 or equivalent, or consent of instructor.
 01 MW9:00 AM -10:15 AM BR180 Lavanya Mandava  
 Cross-listed with CIS 435
CIS556Game Engine Programming (3 hours)
Prerequisite: Graduate standing in CS or CIS, or senior standing in CS or CIS, or CIS 452 and CIS 455 or equivalents, or consent of instructor.
Course Fee: $40 per credit hour
 01 MW1:30 PM -2:45 PM BR180 Adam Byerly  
 Cross-listed CIS 456 and I M 456
CIS591CIS and IT Project Management (3 hours)
Prerequisite: Graduate standing in CS or CIS, or senior standing in CS or CIS, or CS 390 or equivalent; or consent of instructor.
 03 MW12:00 PM -1:15 PM BR156 Tony Du  
 Cross-listed with CIS 491 and CS 591
CIS595Software and Web Applications Security (3 hours)
Prerequisite: Graduate standing in CS or CIS, or senior standing in CS or CIS, or CS 390 or equivalent, or consent of instructor.
 01 MW3:00 PM -4:15 PM BR150 Mohammad Nazmus Sadat  
 Cross-listed with CIS 495
CIS699Thesis in Computer Information Systems (3 hours)
Prerequisite: consent of department chair.
 01 *R* Arr     Anthony Grichnik  
 
History of computers; their use, limitations, and impact on society; Internet and the World Wide Web; creation of Web content.
Provides students an extensive look at computer forensics and formal techniques used in computer forensics in a lab environment. Formal techniques for conducting a computer forensics investigation including record-keeping are covered. Students will conduct computer forensic exams and participate in practical computer forensic examination exercises. Cross listed as CRM 330.
Introduction to Web technologies and systems. Emphasis on design, development, testing, implementation, and applications of Web-based systems and technologies including related software, data exchange protocols, interfaces, and tools.
Various concepts, algorithms, and systems in the area of applied cryptography. Topics include but are not limited to overview of classical cryptography, various types of cryptographic algorithms and systems, block ciphers, advanced encryption standards, key management, digital certificates, design and development of cryptographic applications. Cross-listed with CIS 515.
Enterprise information technology infrastructure including networking and telecommunications fundamentals, concepts, models, architectures, protocols, standards, communications, configuration, implementation, management, deployment software, firmware, hardware, distributed systems, file services, and software/hardware/network security issues. Cross-listed with CIS 530.
Principles, concepts, and fundamentals of computer networks and systems; and information technology infrastructure security, computer network authentication, authorization, access control, confidentiality, and data integrity. Topics of computer network security policy and management, data encryptions, protection against internal and external attacks, security evaluation and management will also be covered. Cross listed with CIS 535.
Software design patterns and principles for game programming. Software design patterns are tried-and-true solutions to common object-oriented design problems. The goal of this course is to develop the skills to use design patterns effectively for game programming, guided by software design principles. Students will learn when and how to apply software design patterns through practice by designing and implementing game prototypes using Unified Modeling Language (UML) class diagrams and a game engine. Covered design patterns include Strategy, Observer, Decorator, Factory, Command, Template Method, State, Fa ade, Singleton, and Object Pooling. Cross-listed with CIS 550.
Advanced techniques and technologies for programming computer game engines, multi-user games, virtual environments, and virtual reality simulations. Cross listed with CIS 556, IM 456.
Methods of PMBOK-based management of computer information software systems design and development projects, including systems view, main project management process groups and knowledge areas, management plans, project metrics and estimates, tools for project management, project reports and documentation. Cross listed with CS 591 and CIS 591 courses.
Concepts, models, methods, technologies, and tools used to design, develop, test, implement, and maintain secure software and Web applications. Threats posed to software and Web applications, software security concepts and protection mechanisms, trust and threat model, authentication and authorization, software risks assessment and management models, security management models for software and Web applications, secure programming and software development styles, tools to develop secure software and Web applications. Cross listed with CIS 595.
Various concepts, algorithms, and systems in the area of applied cryptography. Topics include but are not limited to overview of classical cryptography, various types of cryptographic algorithms and systems, block ciphers, advanced encryption standards, key management, digital certificates, design and development of cryptographic computer and software applications. Cross listed with CIS 415. For cross listed undergraduate/graduate courses, the graduate level course will have additional academic requirements beyond those of the undergraduate course.
Enterprise information technology infrastructure including networking and telecommunications fundamentals, concepts, models, architectures, protocols, standards, communications, configuration, implementation, management, deployment software, firmware, hardware, distributed systems, file services, and software/hardware/network security issues. Cross listed with CIS 430. For cross-listed undergraduate/graduate courses, the graduate-level course will have additional academic requirements beyond those of the undergraduate course.
Principles, concepts, and fundamentals of computer networks and systems; and information technology infrastructure security, computer network authentication, authorization, access control, confidentiality, and data integrity. Topics of computer network security policy and management, data encryptions, protection against internal and external attacks, security evaluation and management will also be covered. Cross listed with CIS 435. For cross listed undergraduate/graduate courses, the graduate level course will have additional academic requirements beyond those of the undergraduate course.
Advanced techniques and technologies for programming computer game engines, multi-user games, virtual environments, and virtual reality simulations. Cross listed with CIS 456, IM 456. For cross-listed undergraduate/graduate courses, the graduate-level course will have additional academic requirements beyond those of the undergraduate course.
Methods of PMBOK-based management of computer information systems and/or information technology design and development projects, including systems view, main project management process groups and knowledge areas, management plans, project metrics and esti
Various security concepts, models, methods, technologies, and tools used to design, develop, test, implement, and maintain secure software and Web applications. Topics include but are not limited to threats posed to software and Web applications, software security concepts and protection mechanisms, trust and threat model, authentication and authorization, software risks assessment and management models, secure programming and software development styles and tools. Cross listed with CIS 495. For cross listed undergraduate/graduate courses, the graduate level course will have additional academic requirements beyond those of the undergraduate course.
Computer information systems research and thesis preparation. Required of candidates choosing the thesis option. Repeatable to a maximum of 6 semester hours.
This course meets a General Education requirement.
C1 - English Composition
C2 - English Composition
SP - Speech
MA - Mathematics
WC - Western Civilization
NW - Non-Western Civilization
FA - Fine Arts
HL - Human Values - Literary
HP - Human Values - Philosophical
CD - Cultural Diversity
SF - Social Forces
FS - Fundamental Concepts in Science
TS - Science & Technology in the Contemporary World
This course meets a Core Curriculum requirement.
OC - Communication - Oral Communication
W1 - Communication - Writing 1
W2 - Communication - Writing 2
FA - Fine Arts
GS - Global Perspective - Global Systems
WC - Global Perspective - World Cultures
HU - Humanities
NS - Knowledge and Reasoning in the Natural Sciences
SB - Knowledge and Reasoning in the Social and Behavioral Sciences
MI - Multidisciplinary Integration
QR - Quantitative Reasoning
This section meets a Core Curriculum requirement.
EL - Experiential Learning
IL - Integrative Learning
WI - Writing Intensive
Picture of Instructor


Choose a different department

Choose a different semester

Search Class Database

Course Delivery Method Definitions