MYIRSC    •    APPLY TO IRSC    •    PROGRAM EXPENSES    •    SCHOLARSHIPS    •    FINANCIAL AID    •    REGISTER & PAY    •    REQUEST INFORMATION
 << Back to IRSC Home
welcome to the Computer Science department
Course Description

CNT 4406 Network Security and Cryptography (U)* 3 Credits

This course addresses the use of various cryptographic techniques for securing data from unauthorized access. The algorithms used for symmetric ciphers, asymmetric ciphers, and cryptographic data integrity are discussed. The students learn the practical use of algorithms for the encryption of data including a public key infrastructure for issuing certificates; transport level security implementation for securing both web and remote access; and virtual private networks implementation for securing data in transit across unsecured networks.

CTS 4425Web Application Development (U) 3 Credits

This course shows how to use asp.net to process data from web pages. Students create n-tier asp.net web applications. Standard query language (SQL) server databases are accessed and manipulated using ado.net. Students implement code that provides persistence of data between user requests.

ISM 3113System Analysis and Design (U) 3 Credits

This course introduces the student to the analysis, design, implementation, and operation of information systems. Addressed are various approaches to analyzing information systems, and the steps necessary to gather information on the system requirements and to model business needs. System design blueprints are created, and real world projects are utilized.

ISM 3212Database Design and Administration (U) 3 Credits

This course introduces data structures, data modeling and data dictionaries. Main features of linked-list, hierarchical, network, and relational database models are covered as well as extensive business application problem solving.

ISM 3323Security Essentials (U) 3 credits

The management of information security problems is covered including attack methods; detection and prevention techniques, cryptography, firewalls and intrusion detection systems; security policies and risk management; and incident response.

ISM 4117 Data Mining and Data Warehousing (U) 3 credits


This course examines techniques of data mining and the implementation and benefits of data mining for industries such as retail, target marketing, fraud protection, health care, web, and e-commerce are examined. Detailed case studies are analyzed using current mining tools on real data.

ISM 4220 Network Technologies for Information Professionals (U) 3 credits


This course examines the basic features and technologies used in computer networks including those necessary to implement voice, data, and information networks. Practical applications of networks in the management of a business are investigated.

ISM 4320 Applications In Information Security (U) 3 credits

This course examines applications necessary to secure a network from intrusion including firewalls, bastion hosts, proxy servers, and honeypots. Applications to perform vulnerability testing to determine network weaknesses are also employed.

ISM 4323 Information Security Policy Administrations and Management (U) 3 credits


This course examines managerial aspects of information security including security management planning, policies, risk assessment and risk management, disaster recovery and personnel issues. Examples of information security management issues, practices, and applications are presented.

ISM 4324 Computer Forensics (U) 3 credits


The course addresses the importance of computer forensics and the procedures and responsibilities of investigators. Digital evidence is obtained through the forensic analysis of computers and networks. Network surveillance and the analysis of intrusion signatures are performed. The methodology of how intrusion incidents should be handled is examined.

ISM 4406 Network Security and Cryptography (U) 3 credits


This course addresses the use of various cryptographic techniques for securing data from unauthorized access. The algorithms used for symmetric ciphers, asymmetric ciphers, and cryptographic data integrity are discussed. The students learn the practical use of algorithms for the encryption of data including a public key infrastructure for issuing certificates; transport level security implementation for securing both web and remote access; and virtual private networks implementation for securing data in transit across unsecured networks.

ISM 4480 Electronic Commerce Systems and Strategies (U) 3 credits


This course examines management approach to defining and implementing e-commerce (ec) systems. The digital economy, ec strategy and marketing, ec models (business to business, business to consumer, etc.), and ec architectures are addressed. Explored are management and regulatory issues in ec such as internationalization, electronic payment methods, internet fraud, mobile e-commerce, and current implementation technologies. Architectures and inter-dependence (i.e. integration) of systems are covered.

© 2011 Indian River State College
Email Us    3209 Virginia Avenue, Fort Pierce, FL 34981     (866) 792-IRSC (4772)
  Questions or problems with this site? Contact Webmaster