View real-time listing of classes and sections offered.
NOTE: Individual course fees may not be up to date. Thanks for your patience while the University continues the review and approval process for fees charged in the 23-24 year. See your account summary in myUVU for accurate charges.
Introduces the fundamentals of script design and implementation with an emphasis on the automation of administrative tasks. Covers modular script design and the use of file input and output. Emphasizes interaction of a script with other scripts, utilities, and the operating system to form more complex systems. Manipulates values of variables (both numbers and strings). Introduces simple GUI interfaces. Lab access fee of $45 applies.
Introduces administering Linux/UNIX Operating Systems including managing of software and services, configuration of kernel modules, network parameters, storage, cloud and virtualization technologies. Explores OS/software installation, managing daemons, user creation, file management, permissions, authentication, troubleshooting, system properties and processes, automation, scripting, orchestration, and security/server best practices. Lab access fee of $45 for computers applies.
Provides a thorough grounding in computer hardware, system software, and contemporary information system architecture. Examines hardware structure, operating systems theory, and systems software as part of a technical foundation for enterprise systems development and IT infrastructure procurement and management. Lab access fee of $45 for computers applies. Canvas Course Mats $153/TstOut applies.
For non-Information Technology and non-Information Systems majors. Introduces cybersecurity and its role in society in a nontechnical way. Explores cybersecurity topics, including protecting accounts, securing data, and avoiding phishing scams. Discusses current hacking and cybersecurity events. Identifies best practices for personal cybersecurity. Provides basic introduction to cybersecurity tools. Lab access fee of $45 applies.
For students interested in the physical aspects of voice and data network cabling and installation. Focuses on cabling issues related to data and voice connections and provides an understanding of the industry and its worldwide standards. Covers types of media and cabling, physical and logical networks, as well as signal transmission. Focuses on best practices and safety using copper and fiber-optic cabling. Requires students to install a complete cable infrastructure for a simulated telecommunications room. Enforces industry and worldwide standards. Requires a community project and portfolio based on voice/data cabling skills. Lab access fee of $45 for computers applies.
Introduces operation management of operating systems using Microsoft Windows. Introduces installation methods and troubleshooting, hardware device installation and management, storage management, disaster recovery planning and management. Aids the student in the development, understanding, and working knowledge of the Windows networking framework including peer-to-peer, workgroups, user profiles, domains, NTFS, and share-level permissions. Lab access fee of $45 for computers applies.
Provides an in-depth knowledge of data communications and enterprise networking including networking and telecommunications technologies, hardware, and software. Emphasizes underlying technologies and protocols. Design topics include wired and wireless architectures; topologies, models, standards and protocols; and operation of bridges, routers, switches, and gateways. Includes lab assignments covering TCP/IP implementations. May be delivered hybrid. Lab access fee of $45 for computers applies.
Explores introductory information and cybersecurity concepts: security technologies, methodologies, and tools. Topics include security models, risk assessment, threat analysis, attack types, encryption technologies, security implementation, access controls, business continuity, and security policies. Discusses current topics, trends, and career opportunities in information security. Includes lab assignments covering information security principles. Software fee of $18 applies. Lab access fee of $45 for computers applies. Canvas Course Mats $35/Cengage applies.
Explores procedures for identification, preservation, and extraction of electronic evidence. Emphasizes auditing and investigation of network and host system intrusions, analysis and documentation of information gathered, and preparation of expert testimonial evidence. Examines forensic tools and resources for system administrators and information system security officers. Includes ethics, law, policy, and standards concerning digital evidence. Requires lab experience and a research paper or project. Lab access fee of $45 for computers applies. Canvas Course Mats $35/Cengage applies.
Provides opportunities to apply classroom theory on the job. Requires work as paid employees in a job that relates to their careers while enrolled at the university. Requires students to meet at least monthly with the Departmental Internship Coordinator. Requires completers to meet individually set goals. May be repeated for a maximum of three credits toward graduation. May be graded credit/no credit.
Provides exposure to current and emerging information technologies. May be used to provide content to prepare students to take industry-recognized IT certification exams, such as CompTIA Linux+, CompTIA A+, Apple Certificated Professional, Certified Fiber Optic Technician, IC3, CompTIA Network+, CompTIA CTP+, Access Data Certified Examiner, MCSA, Cisco CompTIA Security+, Certified Ethical Hacker, etc. Varies each semester. May be repeated for a maximum of 6 credits toward graduation. Lab access fee of $45 for computers applies.
Explores the legal and policy issues associated with the Internet and cyberspace. Studies case law, statutes, regulations, and constitutional provisions that affect people and businesses interacting through computers and the Internet. Covers intellectual property (trademarks, copyrights, patents, trade secrets, and unfair competition) and examines legal requirements to create, register and protect intellectual property rights. Focuses on e-commerce, online contracts, cybercrimes, torts, and privacy issues pertaining to technology. Lab access fee of $45 for computers applies.
For EART/Mechatronics majors or students interested in the physical aspects of data network signal characteristics, cabling and installation for those signals. Focuses on cabling issues related to data and voice connections and provides an understanding of the industry and its worldwide standards. Covers types of media and cabling, physical and logical networks, as well as signal transmission. Focuses on best practices and safety using copper and fiber-optic cabling. Requires students to install a complete cable infrastructure for a simulated telecommunications room. Enforces industry and worldwide standards. Requires a community project and portfolio based on voice/data cabling skills. Requires a research paper.
Explores enterprise systems administration using the UNIX/Linux operating system. Students learn advanced administrative tasks including server installation, network configuration and user management, file management, network services deployment, server security, back up and recovery, Shell scripting, source compilation, performance monitoring and tuning, troubleshooting, and managing hardware and component changes. Requires a community project and portfolio based on advanced server management skills. Lab access fee of $45 for computers applies.
Explores enterprise systems administration using the Microsoft Windows Server operating system. Students learn advanced administrative tasks including server installation; hardware change management; software application management; network configuration and user management; file management; printing; network services deployment; server security; back up and recovery; scripting; performance monitoring, tuning, and troubleshooting. Lab access fee of $45 for computers applies.
Provides an in-depth exploration of the Mac OS X, and provides the skills to troubleshoot and correct problems that may arise by users. Teaches installation and configuration of a Mac OS X Server. Involves implementing and maintaining a Mac server in a network, including file sharing, mail, web, and wikis. Software fee of $14 applies. Lab access fee of $45 for computers applies.
Teaches the theory and implementation skills and techniques needed to configure, troubleshoot and support reliable TCP/IP internetworks. Discusses security and management issues. Offers the opportunity to build an internetwork with cables, network cards, and routers. Emphasizes the analysis and design of networks in organizations. Includes lab assignments covering TCP/IP implementations and router configurations. Lab access fee of $45 for computers applies.
Presents concepts, principles, and deployment considerations across all technologies that are used for storing and managing information. Describes challenges and solutions for data storage and data management, intelligent storage systems, and storage networking. Studies backup, recovery, and archive processes. Discusses business continuity, disaster recovery, storage security and virtualization, and managing and monitoring the storage infrastructure. Software fee of $192 applies. Lab access fee of $45 for computers applies.
Examines advanced information security concepts through an applied viewpoint. Extends the student's understanding of security issues through hands-on application of real-world techniques and use of current security software. Topics include legal/ethical issues, use of security tools, network reconnaissance, password/brute-force attacks, firewall configuration, Honeypot deployment, intrusion analysis/detection, server hardening, and penetration testing. Guest lecturers provide insight into current trends in advanced security issues. Software fee of $18 applies. Lab access fee of $45 for computers applies.
Examines advanced techniques used in malware analysis. Focuses on static and dynamic analysis of unknown binaries utilizing reverse engineering tools and procedures. Explores advanced anti-malware analysis processes and anti-reverse engineering methods. Covers advanced obfuscation practices, such as employing packers, and anti-debugging processes.
Provides exposure to emerging technologies and topics of current interest in information technology. Varies each semester depending upon the changes in the information technology discipline or to address a focused area within the information technology discipline. May be repeated for a maximum of 9 credits toward graduation. Lab access fee of $45 for computers applies.
Examines management of resources used in enterprise computing environments from a practical, applied viewpoint. Extends the student's understanding of these concepts through hands-on application of real-world network, server, and software management techniques and addresses the problems associated with providing a secure, stable, reliable enterprise computing infrastructure. Includes principles of IT enterprise infrastructure management; configuration, analysis, and troubleshooting of virtual servers; redundancy and failover; directory service integration, access control and security; uptime monitoring and notification; backup and recovery; Storage Area Networking; Cloud computing platform choices, functionality, cost, deployment, flexibility, and adaptability. Lab access fee of $45 for computers applies. Software fee of $118 applies.
Provides perspective of key issues involved in IT activities across the organizational and technical security landscape. Examines management methodologies, staffing, and operational issues. Teaches use of financial analysis and decision-making methodologies to aid investment decisions at the operational, functional, and strategic levels. Illustrates use of risk assessment and contingency planning as applied to business continuity and disaster recovery strategies. Includes the use of Service Level Agreement for managing both internal and external relationships. Lab access fee of $45 for computers applies.
Senior-level, capstone experience course. Enhances student cyber security knowledge with operational and business applications. Focuses on integrating cyber security principles as an organic part of an organization's processes. Covers barriers to implementing security policy, building a business case for cyber security, and incorporating cyber security into project management and software life cycles. Requires student project presentations. Lab access fee of $45 for computers applies.
Discusses current trends and issues in cyber security. Updated regularly to reflect global events related to cyber security. Topics include data breaches, cyber warfare, emerging threats. Emphasis on the changing and transformative nature of cyber security threats, including geographical, institutional, and cultural evolution. Guest lecturers from industry will provide students with perspectives on the state of cyber security. Examines real-world examples of the application of cyber security principles and requires critical analysis of each case. Lab access fee of $45 for computers applies.
Discusses devices that can store digital information such as cell phones, tablets, digital camera/camcorders, thumb drives and memory cards. Focuses on lab investigations of one or more digital media through image acquisition, data analysis, and assembly of a final written report of findings. Provides opportunities to use multiple software tools in device acquisition and analysis. Covers processes and procedures through mock investigations. Lab access fee of $45 for computers applies.
For Information Technology bachelor's degree students. Provides opportunities to apply upper-division classroom theory while students work as employees in a job that relates to their careers. Meet periodically with a Departmental Internship Coordinator. Credit is determined by the number of hours a student works during the semester and completion of individually set goals that relate to the student's selected emphasis. Prior written department chair approval is required to apply more than three credits toward a Bachelor of Science Degree in Information Technology. May be graded credit/no credit.
Is a senior capstone course for students in the Computer Forensics emphasis. Covers one or more investigations from start to finish. Integrates knowledge and skills from previous CJ, FSCI, and IT courses in this culminating experience. Lab access fee of $45 for computers applies.
Provides the opportunity to conduct research under the mentorship of a faculty member. Practices the theoretical knowledge gained in prior major courses. Creates a significant intellectual or creative product that is characteristic of the Information Technology discipline and worthy of communication to a broader audience. May be repeated for a maximum of 6 credits toward graduation.
For bachelor degree students and other interested persons. Offers independent study as directed in reading, in individual projects, at the discretion and approval of the department chairperson. May be repeated for a maximum of 9 credits toward graduation.
Provides foundational knowledge of cybersecurity for graduate-level studies. Covers information security theories, terminology, and implementation. Includes networking and system fundamentals, cryptography, malware, authentication, authorization, access control, physical security, attacker profiles, appropriate threat responses, and the human elements of cybersecurity. Introduces multiple aspects of cybersecurity and various career paths within the field.
Focuses on operational aspects of cybersecurity. Includes incident response, network monitoring, change management, configuration management, and resource protection. Emphasizes the role of cybersecurity in the enterprise. Integrates sound cybersecurity principles into various aspects of IT operations. Includes information on secure server administration and open source security software. Teaches cybersecurity standards for government and industry sources and the application of those standards.
Explores legal, ethical, and privacy issues as they apply to cybersecurity. Includes the legalities and ethics of hacking, corporate information security and use policies, and the government's role in cybersecurity. Emphasizes the roles and responsibilities of individual cybersecurity practitioners as well as corporate entities, including vulnerability disclosure and correcting software defects. Teaches privacy policies and regulations as they relate to cybersecurity and information systems.
Explores advanced topics in ethical hacking, penetration testing, vulnerability assessment, and other offensive network and system techniques. Teaches network scanning, target identification, application exploitation, antivirus evasion, physical security, social engineering, phishing, and privilege escalation. Contains hands-on labs providing experience from the perspective of an attacker.
Provides a standard methodology for conducting digital forensic analysis in a network environment. Teaches the importance of network forensic principles and development of an understanding of the technologies, protocols, laws, regulations, ethics, and procedures for network forensics. Incorporates demonstrations and laboratory exercises covering the identification, acquisition, authentication, preservation, analysis, and reporting of evidence for prosecution purposes.
Explores advanced topics in network defense, server hardening, vulnerability assessment, and mitigation scanning. Teaches students about network scanning, asset identification, Linux and Windows server hardening, anti-malware tools, intrusion detection, physical security, perimeter security, and cybersecurity awareness training. Contains hands-on labs providing experience from the perspective of a defender.
Explores the analysis tools and techniques for identifying malicious programs and recovering compromised operating systems. Provides a standard methodology for reverse engineering and eradicating malware. Includes setting up isolated malware labs and utilizing a selected set of forensic tools, such as system and network monitoring utilities, disassemblers, and debuggers for analyzing malware characteristics and the impact that malware may have on compromised systems.
Discusses current trends and issues in cybersecurity. Reflects current global events related to cybersecurity. Includes data breaches, cyber warfare, and emerging threats. Emphasizes the changing and transformative nature of cybersecurity threats, including geographical, institutional, and cultural evolution. Provides guest lecturers from industry with perspectives on the state of cybersecurity. Examines real-world examples of the application of cybersecurity principles and requires critical analysis of each case.
Teaches management skills applicable to cybersecurity. Includes governance models, business continuity, disaster recovery, risk management, organizational security, cybersecurity life cycle management, and interactions between information technology and business units. Focuses on policies, procedures, and guidelines based on industry and government standards to fulfill legal, regulatory, and operational requirements.
Focuses on fundamentals of secure coding and current topics in application security. Includes the implementation of secure development lifecycle principles, identifying and mitigating issues in existing applications, and common security issues. Covers the most frequently encountered application security risks and how to address each of them. Includes web applications, mobile applications, and traditional desktop applications.
Provides culmination of cybersecurity in a self-directed research or practical project that showcases student's mastery of cybersecurity topics. Provides an opportunity to conduct research and/or implement systems that incorporate topics from previous courses. Requires students to present their work at the end of the semester.