Pre-service teachers will learn to use software programs that will increase their future productivity as teachers. Students will learn how to create presentations and instructional materials using Microsoft PowerPoint. Students will learn how to simplify their recordkeeping tasks, perform data analysis, and create graphs using Microsoft Excel. Students will learn how to create classroom and/or instructional webpages and knowledge inquiry learning units, called web quests, via a webpage editor. Students will reinforce techniques learned in class via several projects. In addition to learning practical computer skills, students will learn about various issues concerning the effective use of computers in the classroom. Students will prepare oral presentations to share their research on topics such as digital divide, gender considerations, technology available to assist students with disabilities, quality web resources for homework help, cyber safety for children, and use of www resources in lesson planning and enrichment. Prerequisite: some word-processing skills. (C7)
Completely ONLINE. ASYNCHRONOUS ONLINE.
Undergraduate Courses
Course Delivery DEFINITIONS:
- Online Courses: In online teaching, 100% of instruction takes place online via Canvas and with supplemental platforms like Zoom. There are two types of online courses: asynchronous and synchronous.
- Asynchronous online: Course is fully online, with lessons, assignments, and activities posted in Canvas with due dates. Students complete coursework, engage in discussions, etc., based upon their own schedules, but are required to meet posted deadlines.
- Synchronous online: Online course that includes real-time class meetings using technology (e.g. Zoom). The number of required meetings varies based upon the particular class, but meetings take place during the scheduled class times. Faculty will inform students of the schedule for real-time meetings in their courses.
- Hybrid Courses: Hybrid courses combine both in-person, on-campus meetings with online instruction. All face-to-face activities take place during the regularly-scheduled meeting times in the rooms assigned on the course listing. The number of in-person meetings varies by course. Faculty will notify students of the exact meeting schedule for their courses.
If your class is not listed as online or hybrid, it will meet fully face-to-face following the noted class schedule.
“The Threat Within” - A new operating reality is confronting public and private sector organizations and institutions of all shapes and sizes everywhere: the threat from within that is able to exploit and expose an organization’s greatest competitive edge – the “secret sauce.” Initially many experts thought of the insider threat challenge as a technical problem to solve. However, if there is anything that one of the largest and most damaging data breaches in U.S. Government history – Edward Snowden – has taught us, it is that this challenge is simply not one dimensional. Insider threats can surface at the strategic, operational and tactical layers of an organization, and therefore, the solution needs to be comprehensive, logical, and balanced.
In this course, students from a variety of disciplines will become “cyberinterns” and work in teams with faculty and industry experts as mentors using an online/cloud communication platform known as iQ4. The goal of the course is to enable students to analyze realistic case scenarios and identify the depth and breadth of the cybersecurity challenge from multiple perspectives. Students will focus on the interrelated dimensions of the threat (which may include but are not limited to technical, procedural, legal, behavioral, skills/proficiencies) and the spectrum of constituent cyber domains/functional areas in which to identify solutions.
Completely ONLINE. ASYNCHRONOUS ONLINE. Cross-listed with CSC 504 OL1.
This course will provide an in-depth overview of virtualization technologies which is the primary technology used in cloud computing. Virtualization allows multiple machine instances called Virtual Machines (VMs) to be run on a single server simultaneously. Each VM instance can be used to isolate contained applications from other VM instances providing a mechanism to partition servers into multiple logical machines. Key areas of study will include review of virtualization concepts, portability, VM migration, and hands-on VM creation and management. Various virtualization software will be used including one or more of the following: VMWare, ESXi, VirtualBox, and Docker. Prerequisite: CSC 202.
Cross-listed with CSC 568 OL1. Completely ONLINE. ASYNCHRONOUS ONLINE.
The era of big data has brought new challenges for programmers to tackle. This course begins with a survey of techniques used by data scientists to handle the volume, speed, variety and uncertain nature of data to be processed in a big data environment. Then, using the language python, students will have the opportunity of building a project to summarize real data streams. No prior experience in programming in Python is required because Python will be covered during the course. Prerequisite: CSC 202.
Completely ONLINE. ASYNCHRONOUS ONLINE. Cross-listed with CSC 571 OL1.
A supervised internship at an organization in the private or public sector. This course provides students with the opportunity to apply their knowledge in the workplace. This course is graded on a pass/fail basis and is required for all IT majors. Prerequisite: permission of instructor / internship coordinator