Computer Information Systems
Bachelor of Science Degree
Be prepared to take an information systems leadership role in non-technical companies with this degree. Courses cover important business technology fields like e-Commerce and web design. You'll create, post, and maintain internet web pages; design, code, and debug programs; and understand how programs and programming languages work. Also, this program is a solid basis for graduate studies in information systems or business.
Interested in this degree? Start Here
Courses in the major include:
This course is designed to introduce the concepts of structured programming using Java. This course will cover the basics of the Java programming language syntax, to include designing, coding, documenting, and debugging programs. Additional topics covered will be elementary data structures, input/output statements, selection, iteration, methods, and one-dimensional arrays. Students will write programs using all of the before mentioned topics.
This course is designed to introduce the concepts of structured programming. How programs and programming languages work, and the purposes and practices of structured programming are discussed. Designing, coding, documenting, and debugging programs using elementary data structures, input/output statements, selection and iteration, functions, and one-dimensional arrays are covered in detail.
This course provides an introduction to the concepts associated with mobile technologies. Current mobile technologies are compared and contrasted. Topics include architecture, design, development, and deployment of mobile applications in order to introduce students to the fundamentals of mobile technologies and applications. Prerequisites: GAME 207 or CIS 242 or CIS 243 or instructor permission.
This course provides an introduction to the Android Software Development Kit (SDK) Application Programming Interface (API) associated with mobile technology libraries for the Android operating system. Mobile applications are developed and tested using an Android emulator. Prerequisites: CIS 302
The major focus of the course will be the relational model with a brief discussion of the hierarchical and network models. Database design using E-R Diagrams will be presented. Relational terminology and the theoretical concepts of the model, such as normalization, will be discussed. The Structured Query Language (SQL) will be used to manipulate the model. Students will prepare a small application using a Commercial Relational Database Management Systems.
This course provides a foundation for the managerial considerations of acquiring and operating information systems. Students are introduced to existing and emerging information systems and their impact on competitive advantage, reengineering business processes, and decision-making.
This course introduces the goals, functional processes, tools, and techniques associated with network security. Services such as firewalls, intrusion detection mechanisms and Virtual Private Networks (VPNs) will be studied. Students will develop an understanding of telecommunications and networks security protocols used to prevent, detect, and correct potential vulnerabilities associated with both the outsider and insider threat.
This course provides the student with the basic topics associated with controlling how resources are accessed in an information system. Topics include organizational access control models, security models, and hardware and software controls that can be used to support those models. Additional topics include access models, and securing system access with passwords, smart cards and biometric devices to assist in securing system access and ensure confidentiality, integrity, and availability of data. Technologies such as remote authentication and Public Key Infrastructure (PKI) are also explored.
This course focuses on the skills required to operate a security program within an organization. Coverage includes the practical application of security practices in an operational environment. Topics that comprise this course include security structure, leading security projects, policy management, human factors of security, and physical security methods.
A project-based course which focuses on the use of tools and methodologies applied to structured system analysis and design. Emphasis is placed on traditional approaches including enterprise analysis, workflow analysis, data flow analysis, affinity diagram construction and use, system flowcharting and entity relationship diagramming. Students will complete a feasibility analysis, risk analysis, design specifications and a project implementation plan for a simulated business system.
This course provides a broad coverage of Web tools needed to create well designed web sites. Students will learn the fundamentals of server-side scripting creating dynamic web pages that interface with a database while emphasizing vendor-neutral Web standards.
This course will explore the fundamental technical principles of telecommunications and computer networks with an examination of the business challenges of managing communications resources.
This course introduces Internetworking through the study of Cisco routing and switching. Students will learn how to install, configure, operate, and optimize networks that use Ethernet, TCP/IP, Wide Area Network protocols, and Cisco network hardware. This course follows the Cisco curriculum leading to testing for the Cisco Certified Network Associate certification. Prerequisite: CIS 340A
This course covers Microsoft Windows networking from the perspective of a system or network administrator. The topics covered include network configuration, IP address assignment, name resolution, routing, Internet Protocol Security (IPSec) and certificates, remote access, and managing and monitoring network access of local and wide area networks.
In this course students will plan, implement, and troubleshoot a Microsoft Windows Server Active Directory® services infrastructure. Students will work with a Windows Server directory service environment, including forest and domain structure, Domain Name System (DNS), site topology and replication, organizational unit structure and delegation of administration, Group Policy, and user, group, and computer account strategies. Students will learn how to manage computer services structures within an organization and become familiar with human to computer interaction.
This course builds upon an introductory programming class. Students will be immersed in language syntax and the interactive PC environment. Emphasis will be on solving problems by deriving and implementing appropriate algorithms using Object Oriented concepts. Students will accomplish a programming project that will apply the concepts covered in the course. Prerequisite: CIS 242 or CIS 243
This course is designed to teach principles of Object-Oriented (OO) programming using Java. This course will cover the language syntax, OO concepts, and advanced features of the Java programming language. Prerequisite: CIS 242 or CIS 243
This course is designed to provide an introduction to current trends in information security. Students will be introduced to sources of threats and vulnerabilities as well as methods for optimizing system security. Legal issues associated with information security will be examined, as well as how those issues are addressed within the context of an organization. Prerequisite: CIS 340A
This course is intended to introduce students to the principles of risk assessment, vulnerability analysis, and auditing and how they are used to evaluate the effectiveness of information security controls. Students will develop an understanding of threat and asset identification, countermeasures and safeguards, acceptable risks, and vulnerabilities. The auditing concepts of technical, physical, and administrative controls will also be introduced along with how these controls are measured for effectiveness.
This course provides an introduction to the field of enterprise information intelligence at the tactical, operational, and strategic levels. Topics include the functional areas of enterprise intelligence, the value, regulation and protection of data as an organizational asset, data requirements, research, integrity, analysis and reporting, and other topics relevant to the field of business intelligence.
This course provides a broad range of skills necessary for successful collection, development, and management of Business Intelligence (BI) at the enterprise level. Topics include: business analytics, organization memory, information integration, insight creation, and presentation capability as well as additional issues germane to the current and future BI environment.
This course explores fundamental data mining strategies. Topics include recognizing patterns, making predictions, and methods for visual presentation of complex data sets. Emphasis is placed on identification of patterns associated with the progression of a data set through categories, time, and space. Coverage includes hands-on experimentation with data mining and visualization algorithms. Prerequisite: CIS 422
This course introduces key concepts, techniques and practices on Web analytics. Data analysis methodologies and Web analytics tools are explored with emphasis on strengthening a Web site's marketing presence and productivity, improving the customer experience, and promoting data-driven decision making. Coverage includes hands-on experimentation with Web analytics tools. Prerequisite: CIS 422
This course provides students with an introduction to project management as it relates to Information Technology. Students develop formal project plans based on actual problems. Emphasis is placed on the knowledge areas of project management. Team-based and discovery-based learning methods are stressed. Where applicable, course topics align with the CompTIA Project+ certification.
This course focuses on developing, debugging, and deploying data-driven server-side Web applications using the Microsoft Visual Studio® .NET environment and the Microsoft .NET platform to create an ASP.NET Web application that delivers dynamic content to a Web site. Prerequisite: Strongly Recommended: CIS 353 or knowledge of C# or VB programming, and familiarity with HTML.
This course focuses on the strategic role of information technology and information systems in today's business environment. Topics will include challenges faced by managers of business firms, understanding the technologies that will help managers meet these challenges, designing business processes to take advantage of the technologies, and creating management procedures and policies to protect the firm's assets. This course provides the IT professional with an understanding of the dynamic, increasingly globalized and technology intensive business environment.
This course examines basic methods of investigation, information acquisition, and management of Internet and computer forensic cases. Topics include record-searching, note taking and report writing, and using scientific methodology in Cyber investigations. Coverage also includes basic tools and techniques for forensic analysis of computers, networks systems, and mobile devices.
This course provides the theoretical basis and problem-solving experience needed to apply the techniques of descriptive and inferential statistics, to analyze quantitative data, and to improve decision making over a wide range of areas. Topics covered include descriptive statistics, linear regression, data gathering methodologies and probability, as well as confidence intervals and hypothesis testing for one and two samples. Use of technology in solving and interpreting statistical problems is emphasized. Prerequisite: MA 101 or placement via ALEKS Placement Assessment
* Not offered in the cohort model, which means you enroll class by class in this degree program.
Consult with your Next Degree Navigator to determine your eligible credits as well as to verify minimum requirements for your degree. Transfer credits must be from a regional accredited college or university. Bellevue University makes no promises to prospective students regarding the acceptance of credit awarded by examination, credit for prior learning, or credit for transfer until an evaluation has been conducted.