| Description: | This course is designed to provide a comprehensive survey of the Information Technology field. The enterprise relies heavily on information technology to generate value, efficiency, and effectiveness. As such, organizational leaders must ensure that the enterprise transforms to keep pace in the competitive environment. Globalization, mergers and acquisitions, and proliferation of new business and operating models require management to continuously reconsider technology infrastructures, organizational structures, process re-engineering, outsourcing, innovation, technology effectiveness, and the creation and management of data and knowledge. Given these challenges and opportunities, the IT professional has never been more crucial to organizational success. In this context, students will become familiar with core IT concepts, processes, and technology and gain an increased understanding of the crucial role of IT in the modern enterprise. |
|
| | 01 | M------ | 6:00P-9:00P | TBA | TBA | No final | 25 | 7 | 0 | Desc: | This is a hybrid course. In-person meetings will be shared on Canvas. |
| | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
| 02 | ---R--- | 2:30P-5:20P | TBA | Mudra | No final | 25 | 4 | 0 | Desc: | This is a hybrid course. In-person meetings will be shared on Canvas. |
| | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
|
| Description: | This course examines needed management skills and processes for the efficient and effective functioning of IT infrastructure and operational environments to deliver the right set of services, at the right quality, and at the right costs for internal and external users and customers. Specific emphasis is placed on understanding the roles of IT operations including system administration, network administration, help desk services, asset management, DevOps, and reporting. Students will study the application of industry best practice frameworks for the management of information technology infrastructure, operations, and development. Frameworks covered include the Information Technology Infrastructure Library (ITIL) and Control Objectives for Information and related Technology (COBIT). Through the application of continuous service improvement, students will understand the IT service lifecycle and will be able to assess the effectiveness of processes and services. |
|
| | 01 | M------ | 6:00P-9:00P | TBA | Herman | See instructor | 30 | 6 | 0 | | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
| 02 | ---R--- | 6:00P-9:00P | TBA | Mudra | See instructor | 30 | 3 | 0 | | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
|
| | 01 | -T----- | 6:00P-9:00P | TBA | TBA | See instructor | 20 | 5 | 0 | | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
| 02 | --W---- | 2:30P-5:20P | TBA | Akbani | See instructor | 20 | 9 | 0 | | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
|
| Description: | Software applications harness the power of IT infrastructure to deliver powerful capabilities to users enabling them to transact with accuracy and efficiency. Software applications take on many forms such as web applications, mobile apps, and eCommerce sites, which are taken for granted by the users, business and consumers. However, developing, deploying, and maintaining secure and scalable commercial software applications is a complicated task, which if not managed correctly, can result in significant financial losses and waste of time. In this class students learn how to architect and design software taking into account business drivers and important attributes such as availability, performance, scalability, reliability, and security, and trade-offs between different design objectives. We discuss various topics from software lifecycle management to integration of applications. Contemporary topics like CI/CD pipelines, application containerization, serverless architecture are also discussed in detail.
Through class lectures, discussions, assignments, case studies, and group projects, students will build a solid understanding of application architectures and frameworks. Given the depth of topics covered, some level of prior programming experience is helpful but is not a requirement for this course.
|
|
| | 01 | -T----- | 6:00P-9:00P | TBA | [TBA] | Paper/Project/TakeHome | 20 | 3 | 0 | | |
|
| | 01 | -T----- | 2:30P-5:20P | TBA | Heaton | Paper/Project/TakeHome | 25 | 12 | 0 | Desc: | This course will be delivered in a hybrid format - both classroom and online instruction. In-person meeting dates are August 27th, September 24th, October 22th, and November 26th. |
| | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
|
| Description: | This course covers the dynamic world of Generative Artificial Intelligence providing hands-on practical applications of Large Language Models (LLMs) and advanced text-to-image networks. Using Python as the primary tool, students will interact with OpenAI's models for both text and images. The course begins with a solid foundation in generative AI principles, moving swiftly into the utilization of LangChain for model-agnostic access and the management of prompts, indexes, chains, and agents. A significant focus is placed on the integration of the Retrieval-Augmented Generation (RAG) model with graph databases, unlocking new possibilities in AI applications.
As the course progresses, students will delve into sophisticated image generation and augmentation techniques, including LoRA (Low-Rank Adaptation), and learn the art of fine-tuning generative neural networks for specific needs. The final part of the course is dedicated to mastering prompt engineering, a critical skill for optimizing the efficiency and creativity of AI outputs. Ideal for students, researchers, and professionals in computer science or related fields, this course offers a transformative learning experience where technology meets creativity, paving the way for innovative applications in the realm of Generative AI.
Note: This course will require the purchase of up to $100 in OpenAI API credits to complete the course. |
|
| | 01 | -T----- | 6:00P-9:00P | TBA | Heaton | Paper/Project/TakeHome | 25 | 15 | 0 | Desc: | This course will be delivered in a hybrid format - both classroom and online instruction. In-person meeting dates are August 27th, September 24th, October 22th, and November 26th. |
| | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
|
| Description: | Firms with superior IT governance designed to support the organization's strategy achieve better performance-and higher profits-than firm with poor (or no) governance. Just as corporate governance aims to ensure quality decisions about all corporate assets, IT governance links IT decisions with company objectives and monitors performance and accountability. This course shows how the design and implementation of an IT governance system can transform IT from an expense to a profitable investment. Essential to IT governance is risk management. In this regard, students will learn key aspects of managing risk including risk identification, risk quantification, risk monitoring, risk control, and risk mitigation. Particular focus is placed on project risk management and understanding the process of risk identification, assessment, prevention, mitigation, and recovery; the roles of IT governance, auditing, and control of the confidentiality, integrity, and availability of data. |
|
| | 01 | M------ | 6:00P-9:00P | TBA | Taqi | Paper/Project/TakeHome | 30 | 3 | 0 | Desc: | This course will be delivered in a hybrid format - both classroom and online instruction. In-person meeting dates are TBD. |
| | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
| 02 | --W---- | 6:00P-9:00P | TBA | Hampton | Paper/Project/TakeHome | 30 | 10 | 0 | | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
|
| Description: | This seminar is designed to develop the leadership capacity of professionals working in the information technology and cybersecurity fields. Although domain expertise plays an important role in the success of a technology professional, it's when this expertise is integrated with the ability to lead people that transforms the merely competent into multi-dimensional force multipliers for the organization. In this course, students will participate in an immersive, seminar-based learning experience targeted toward professional and personal development on a range of essential leadership skills. Students will benefit from interaction with industry experts in the IT and cybersecurity fields and receive coaching support to achieve professional and personal goals. Each student will complete a series of self- and multi-rater assessments as well as a personal leadership development plan to gain insight and build competencies critical to effective leadership. Topics include creating a shared vision, strategy development, building and sustaining a healthy culture, essentials of finance and budgeting, driving results, energizing people for performance, innovation, emotional intelligence, navigating organizational politics, managing up, negotiations, stress resilience, talent coaching and development, effective communication, and time management. |
|
| | 01 | -----S- | 9:00A-12:00P | Urbauer / 210 | Jaffe | See instructor | 0 | 0 | 0 | Desc: | This course requires professional work experience in technology; full-time MISM students may not take this course. This course will be fully remote. There is a $110 course fee placed on students' accounts for the required DISC Assessment (Non-Refundable once registered online). Students are responsible for purchasing the Harvard Business Course Packet for $88.14; see syllabus and instructors for more information. |
| | |
|
| | 01 | --W---- | 6:00P-9:00P | TBA | Greene | Paper/Project/TakeHome | 25 | 12 | 0 | | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
| 02 | ---R--- | 6:00P-9:00P | Whitaker / 216 | Zeringue | Paper/Project/TakeHome | 25 | 2 | 0 | | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
|
| Description: | Organizations have begun generating, collecting and accumulating more data at a faster pace than ever before. The advent of "Big Data" has proven to be both opportunity and challenge for contemporary organizations who are awash-even drowning-in data but starved for knowledge. Unfortunately, organizations have not developed comprehensive enterprise data strategy and management (EDM) practices that treat data as a strategic imperative. EDM is a comprehensive approach to defining, governing, securing, and maintaining the quality of all data involved in the business processes of an organization. EDM enables data-driven applications and decision-making by establishing policies and ownership of key data types and sources. The ultimate goal is to create a strategic context for the technology underpinnings of data life cycle management and ensure good stewardship of an organization's data. This course will cover the critical components of building an enterprise data strategy including, but not limited to, data strategy, data governance, data security, data architecture, data quality, data ownership, and metadata management. |
|
| | 01 | --W---- | 2:30P-5:20P | TBA | McLean | See instructor | 25 | 7 | 0 | | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
| 02 | ---R--- | 2:30P-5:20P | TBA | McLean | See instructor | 25 | 3 | 0 | Desc: | This is a hybrid course with 7 in-person sessions; Aug 31, Sept 14, Sept 28, Oct 12, Oct 26, Nov 9, and Nov 30. |
| | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
|
| Description: | This course builds on the content taught in Enterprise Data Management and Foundations of Data Analytics. It focuses on the strategic, operational, tactical, and practical use of data analytics to inform decisions within an organization across a range of industry and government sectors as well as within organizational functions. Students will be introduced to specific analytics techniques that are used currently by practitioners in areas of diagnostic, descriptive, predictive, and prescriptive analytics. Students will learn the critical phases of analytics including data preparation, model development, evaluation, validation, selection, and deployment. In so doing, students will learn to apply data analytics in order to optimize organizational processes, improve performance, and inform decision-making. Recommended completion of T81 INFO 574. |
|
| | 01 | ---R--- | 6:00P-9:00P | TBA | Lehmuth | Paper/Project/TakeHome | 20 | 3 | 0 | | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
|
| | 01 | --W---- | 6:00P-9:00P | TBA | Britt | Paper/Project/TakeHome | 23 | 12 | 0 | | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
| 02 | M------ | 2:30P-5:20P | TBA | Akbani | Paper/Project/TakeHome | 23 | 23 | 1 | | | Actions: | | Books | | Syllabus | | Syllabi are provided to students to support their course planning; refer to the syllabus for constraints on use. |
| |
|
|
|