Call us Now: 1-866-827-8467
ADVANCE > INQUIRE NOW

Computer Information Systems

Master of Science Degree

The Master of Science in Computer Information Systems is designed for the computer professional who desires an advanced Information Systems degree as a key component of professional growth. The program provides the tools you need to go forward into technical and management positions in Information Systems. The curriculum covers a variety of important aspects of the IT profession: system analysis and design, programming, web development, networking, telecommunications, database management, project management, and IT accounting.

Interested in this degree?  Start Here

Courses in the major include:

This course offers an in-depth exploration of all the major topics in the field of data and information management from an applied perspective with an emphasis on data warehouses. The course is designed to provide not only a strong theoretical foundation, but also the technical skills required in analyzing, designing, implementing, managing, and utilizing information repositories. Topics covered include relational database model, data modeling, logical and physical database design, structured query language (SQL) implementation, procedures and triggers, data integration and quality, data warehouses and other relevant techniques for addressing big data issues in organizations today. The strategic roles that data and information play in business operations, customer relationship management, business decision-making, and strategy development are also discussed.
This course focuses on the fundamentals of telecommunications including data, voice, image, and video formats. Coverage includes the concepts, models, architectures, protocols, standards, and security for the design, implementation, and management of digital networks. Emphasis is on the IT infrastructure to serve organizational needs in a rapidly changing competitive and technological environment.
This course provides an introduction to the strategic use of information technology from a business perspective at the enterprise level. Emphasis is placed on the internal management of information systems services from the point of view of the Chief Information Officer. Alternative strategies and tactics available to management to achieve business goals are examined.
This course introduces the concepts for information systems analysis and design with an emphasis on structured development combined with an introduction to object-oriented analysis and design principles.
The major focus of this course is the relational model with a brief discussion of the hierarchical and network models. Database design using E-R Diagrams will be presented. Relational terminology and the theoretical concepts of the model, such as normalization, will be discussed. The Structured Query Language (SQL) will be used to manipulate the model. Students will prepare a small application using a Commercial Relational Database Management Systems (RDBMS).
The subject of database management will be approached in its role as the back end of client/server technology. The focus will be relational database management with specific emphasis given to the use of relational database as an enabling technology in the area of Online Transaction Processing and Online Analytical processing. The use of SQL query language will be a second significant subject. Issues of databases including concurrency will also be covered.
This course focuses on the architecture and security associated with cloud computing. Emphasis in placed on key drivers which lead to cloud computing adoption and issues associated with cloud computing governance. Additional topics will include infrastructure security, identity and access management, cloud services, data security and storage, and auditing and compliance. Prerequisites: Graduate Standing
This course is designed to provide and in-depth exploration of an information technology application development and administration perspectives of operating systems, networks, and distributed computing systems. The course is designed to familiarize and provide a strong technical background to students with the issues involved with the design and implementation of modern day operating systems and to explain the systems principals that are used in the design of all computing systems. Operating system concepts of hardware components, operating system structures, process management, memory management, file systems, protection and security are presented. The concepts in this course are not limited to any particular operating system or hardware platform.
This course examines the software development process, including the design and analysis of algorithms, programming concepts, and software development methods and tools. Current software development methodologies are introduced, with emphasis on foundational principles of software development. Topics are covered with consideration to platform-independence.
Information storage plays a critical role in the IT Infrastructure. This course examines storage technologies utilized across traditional, virtualized, and cloud environments. Significant focus is placed on technical aspects of the types of devices, file systems, and technologies used in storage and storage network systems. Topics include storage systems architecture, storage networking, resource management, replication, backup and recovery, and security.
Developing mobile applications with standards-based web technologies such as JavaScript, HTML 5, and CSS 3 is the focus of this course. Developing mobile applications that can be extended across multiple mobile platforms is emphasized. Workflow techniques for creating, debugging, and deploying application to mobile devices that ensure a consistent user experience are examined.
This course covers the theory and practice of software testing. Emphasis is placed on the software testing design process, planning, criteria, evaluation and testing methods. Hands-on practice developing and using test plans based on various testing techniques is included.
This course addresses the complex and unique issues related to effectively managing projects in an Information Technology context. Emphasis is placed on the knowledge areas specified by the Project Management Institute (PMI) in A Guide to the Project Management Body of Knowledge (PMBOK® Guide). Team-based and discovery-based learning methods are stressed. Development projects reflect actual problems provided by industry. A formal software project management plan detailing the process groups of initiating, planning, executing, controlling, and closing will be developed.
This capstone course encompasses and consolidates the concepts covered in the Computer Information Systems curriculum, with a significant project focused on the technical and professionals skills developed throughout the CIS Core and Database concentration courses. Capstone course projects will provide students with the opportunity to identify, research, develop, implement, and evaluate solutions to targeted, real-world problems.
This capstone course encompasses and consolidates the concepts covered in the Computer Information Systems curriculum, with a significant project focused on the technical and professionals skills developed throughout the CIS Core and Software Development concentration courses. Capstone course projects will provide students with the opportunity to identify, research, develop, implement, and evaluate solutions to targeted, real-world problems.
This capstone course encompasses and consolidates the concepts covered in the Computer Information Systems curriculum, with a significant project focused on the technical and professionals skills developed throughout the CIS Core and IT Security concentration courses. Capstone course projects will provide students with the opportunity to identify, research, develop, implement, and evaluate solutions to targeted, real-world problems.
This course provides an introduction to the fundamental components of security architecture. Topics include computer organization; hardware, software and firmware components; open and distributed systems; and protection mechanisms. Discussion also includes certification and accreditation; formal security models; and evaluation criteria. Assigned projects include designing a model secure system.
This course provides a technical study of offensive and defensive techniques for protecting cyber assets. Topics include security testing, risk mitigation techniques, and threat response. Discussion also includes penetration testing theory, techniques, and tools; network, systems, and application vulnerability scanning; risk analysis and response; and intrusion detection and response. Emphasis is placed on identification of system vulnerabilities and threats and techniques for preventing attacks.

Bellevue University Ranked Top 20 Master's Degrees

  • Business Analytics
  • Cybersecurity
  • Project Management

– Online Course Report 2017-2018

Inquire Now »

Looking for a Bachelor's degree?

Click Here

© Bellevue University. All rights reserved. | Privacy | Terms of Use | Accreditation | Consumer Information