AZSecure Curriculum

 

The Eller College’s MIS Department is an elite program ranked in the top five MIS programs in the country (U.S. News & World Report) since the rankings began in 1989—an achievement matched only by MIT and Carnegie-Mellon.

Eller College is fully accredited by the AACSB. In addition to completing coursework in MIS, Electrical and Computer Engineering or Computer Science and receiving a Master’s or Ph.D. degree, students in the AZSecure SFS Fellowship program are required to take a rigorous set of core and elective cybersecurity courses. The UA is designated by the National Security Agency and the Department of Homeland Security as a CAE-IAE (first designated in 2009 and renewed in 2014).

Completion of MIS 515, MIS 516 and MIS 517 entitles students to receive an Enterprise Security Certificate from the UA. Students take these and several additional cybersecurity courses which, combined with their research, uniquely positions them to tackle the cutting edge cybersecurity challenges of today and tomorrow. The 33-credit core curriculum for the MIS program is shown in below. Students take an additional 12-15 credits on average, including cybersecurity electives, research or analytics.


AZSecure Master's in MIS Core Curriculum

3 units

The course will begin with a discussion of techniques and notations for object-oriented modeling. Building on these modeling techniques, we will then discuss strategies for implementing reusable and extensible systems and in particular design patterns--templates for software design that have been proved to deliver great practical value. The course will also cover a selected set of software engineering and project management issues and the current thinking on what constitutes the best practice to deal with these issues. 

3 units

This course is an overview of the methods, processes and functions necessary for effective communication in today's high tech, global marketplace. The goals for this course are to develop an understanding of the need for and the requisite skills of competent communication in both the physical and electronic environments. 

Not open to non-degree seeking students.

3 units

Prerequisites: Java programming

This course introduces data structures and algorithms that are suited for developing Internet-based information systems in business intelligence, search engines, digital libraries, knowledge management systems, web/data/text mining, national security and biomedical informatics. The course contains lectures, readings, programming assignments, lab sessions and a large-scale hands-on system development project. The course will begin with select fundamental yet useful data structures (e.g., stacks, queues, lists, trees and graphs) and sorting and searching algorithms. Newer and more robust web/data/text mining algorithms (e.g., neural networks, decision trees, genetic algorithms, spreading activation, information retrieval, natural language processing) are then introduced in the context of modern and emerging information systems in business, engineering and bioinformatics. 

3 units

This course will integrate many business foundations in support of MIS students in the MS program. In today's environment, IT solutions have to support the competitive needs of organizations and recognize the inter-organizational nature of business processes. In addition, the IT solutions have to support the financial well-being of a firm as well as its responsibility to various stakeholders. This course uses five modules: business strategy in a global environment, process analysis and re-design in an ever expanding value chain; IT in support of these business processes, economic justification and social implications. 

Not open to non-degree seeking students.

3 units

This course exposes the student to a broad range of computer systems and information security topics. It is designed to provide a general knowledge of measures to insure confidentiality, availability and integrity of information systems. Topics range from hardware, software and network security to INFOSEC, OPSEC and NSTISS overviews. Components include national policy, threats, countermeasures and risk management among others. Graduate-level requirements include an oral case study report as their final. 

3 units

The objective of our MIS 516 course is to provide our University of Arizona students with a thorough and operational knowledge of information security so that this critical area is recognized as a management issue and not an I.T. issue. This course is also offered online.

3 units

The information security arena contains a broad array of multi-level models for assessing, planning, implementing and monitoring the mitigation of security risks. At the very core of this information security spectrum are the actual system and network devices which store, manage, transmit and secure information. This course is designed to provide a working knowledge of issues and techniques surrounding the proper safeguarding of operating systems and related components. Filled with Information Assurance topics, this course offers a solid base for system administrators and technical managers.

3 units

Enterprise Resource Planning (ERP) systems represents integrated strategy for management of information among organizations, suppliers and customers. Graduate-level requirements include completion of a group project on an advanced complementary or enabling technology using ERP. Students' projects include implementation or demonstration and presentation to class.

3 units

This course introduces the student to fundamentals of database analysis, design and implementation. Emphasis is on practical aspects of business process analysis and the accompanying database design and development. Topics covered include: conceptual design of databases using the entity relationship model, relational design and normalization, SQL and PL/SQL, web based database design and implementation using Oracle or some other modern Database Management Systems. Students are required to work with a local client organization in understanding their business requirements, developing a detailed set of requirements to support business processes, and designing and implementing a web based database application to support their day-to-day business operations and decision making. Students will acquire hands-on-experience with a state-of-the-art database management system such as Oracle or Microsoft SQLServer, and web-based development tools. 

3 units

This course provides an understanding and application of system analysis and design processes centered on the systems development life cycle. Core topics include: project management and cost-benefit analysis; information systems planning and project identification and selection; requirements collection and structuring; process modeling; conceptual and logical data modeling; database design and implementation; design of the human-computer interface (HCI); system implementation; system maintenance and change management. Students will also be introduced to comparative development methodologies and modeling tools. The course involves a substantial project where students will learn the importance of effective communication and integration with users and user systems. The course emphasizes interpersonal skill development with clients, users, team members and others associated with development, operation and maintenance of systems.

3 units

This course provides an in-depth knowledge of data communications and networking requirements, including networking technologies, hardware and software. This course has two objectives. First, it focuses on basic networking standards and protocols. Second, students will learn to evaluate, select and implement different data network options and prepare a cost-benefit analysis for a proposed solution. 


Cybersecurity Electives

The UA has a rich and growing base of cybersecurity courses students can take across multiple departments.

*Part of MS MIS core curriculum

3 units

This course covers using controls to protect information assets. Topics include internal and external IT auditing, the role of auditing role in information security, the IT audit process, system independent IT audit processes, system dependent IT audit processes, auditing outsourced IT systems and resources. Controls covered will include desktop computer controls, systems development controls, computer center operation controls, assurance of information related to on-line, client-server, web-based, internet, cloud computing, virtualization and other advanced computer topics. Students will learn approaches to evaluating and addressing technology risk throughout the organization from the perspective of internal and external audit in addition to the view of end users. Topics included in the class will include coverage of all areas to prepare students to take the Certified Information Systems Auditor (CISA) exam.

3 units

This course is designed to provide students with a hands-on introduction to the fundamental concepts and tools of modern cyber threat intelligence. Students will become familiar with the cyber threat intelligence lifecycle, identifying, collecting, and integrating intelligence feeds, common intelligence formats, and standard cyber threat intelligence technologies (e.g., CIF servers, TAXII servers, SIEM's etc.).

Prerequisites: MIS 545 Data Mining for Business Intelligence, Python

3 units

This course introduces students to the principles and techniques of the cybersecurity practice known as penetration testing (pen testing), or ethical hacking, and covers the full pen test life cycle. Students discover how system vulnerabilities can be exploited and learn how to avoid such problems. Students will review various tools and methods commonly used to compromise information and control systems. Ethical hacking, also known as penetration testing, is the act of breaking into a system with the permission and legal consent of the organization or individual who owns and operates the system, with the purpose of identifying vulnerabilities to strengthening the organization's security. Students will conduct hands-on penetration tests in a lab environment to practice the concepts presented and tools reviewed in the course. This course is an ethical hacking course and students will learn hacking techniques within a controlled environment for the goal of better securing the IT resources of their rightful owners.

Prerequisite knowledge: Python

3 units

The focus of this course is the usage of common tools used during penetration assessments and hardening system defenses. Students will draw from previous classes to combine skills in online defense and penetration exercises of systems in a virtual environment. Along with course labs, this course will apply theory and techniques to provide the following learning base - knowledge, comprehension and application.

Prerequisites: MIS 545, MIS 515, ECE 578, SIE 571, MIS 562, MIS 566, MIS 516, MIS 517 and Python

3 units

This course provides an introduction to technical aspects of cyber security. It describes threats and types of attacks against computers and networks to enable students to understand and analyze security requirements and define security policies. Security mechanisms and enforcement issues will be introduced. Students will be immersed in the cyber security discipline through a combination of intense coursework, open-ended and real-world problems and hands-on experiments.

Prerequisite: ECE 578

3 units

This course covers Shannon's approach to cryptography, symmetric key cryptography, cryptographic hash functions, public key cryptosystems, authentication, key management and distribution, as well as wireless and network security.

3 units

Cloud computing is the model for ubiquitous, convenient, on-demand access to a shared pool of configurable computing resources. With the interest in cloud computing, the security challenges are raising concerns. This class discusses the cloud computing architecture and components along with the threat modeling and discusses physical, database, network, virtualization, services and users level security concerns and their solutions.

Prerequisite: ECE 509 suggested but not required

3 units

This is an introductory course covering the fundamentals of computer security. In particular, the course will cover basic concepts of computer security such as threat models and security policies, and will show how these concepts apply to specific areas such as communication security, software security, operating systems security, network security, web security and hardware-based security.

Prerequisite: CSC 352 or similar course in systems programming


Sample Plan of Study

The following table lists an example plan of study. Each student will consult regularly with the SFS AZSecure Program Administrator Mark Patton, Ph.D., to determine their specific plan of study. Additional information about the entire MIS curriculum can be found on the MIS Courses. 

Please note that other than the courses in the Enterprise Security Certificate (MIS 515, 516 and 517), and one or two other classes, all course work and research is conducted on campus. The AZSecure program is currently not available online or through satellite campuses.

All courses are three units unless otherwise indicated.

Year One

Semester One Semester Two
MIS 531 Enterprise Data Management MIS 510 Web Computing and Mining
MIS 541 Information Systems Analysis and Design MIS 515 Information Security in Public and Private Sectors*
MIS 543 Business Data Communications and Networking MIS 517 Systems Security Management* 
MIS 599 Independent Study (research) (2 credits) MIS 599 Independent Study (research) (2 credits)

Business requirements (if needed): 

  • Introduction to Financial and Managerial Accounting 
  • Introductory Statistics for Managers (if selecting the BIA concentration)

Summer One:
Service through qualified government Internship

Year Two

Semester Three Semester Four
MIS 507 Software Design and Integration MIS 545 Data Mining for Business Intelligence
MIS 516 Information Security, Risk Mgmt., Disaster Recovery*  6 credits of Electives** to be approved by SFS Program Administrator
3 credits of Electives** to be approved by SFS Program Administrator Master's Project and Report - MIS696H
MIS 599 Independent Study (research) (2 credits)  

Business requirements (if needed):

  • MIS 509 Business Communications
 

Summer Two and beyond: Post-graduation service through qualified government position

* Part of the Enterprise Security Certificate.

** Electives may selected from within the MIS program or outside of it, depending on the student's interests, career plan, etc. Other schools and departments that may offer relevant electives may include, for example, the Department of Computer Science, the Department of Electrical and Computer Engineering, the College of Social and Behavioral Sciences (e.g., Department of Sociology) and the School of Information/ISTA. Check the Schedule of Classes, UA Course Catalog for information, or departments' websites for information. Course availability is dependent on the department, school, or college offering the course.