CISW 298 Comprehensive IT Project*
Students will complete an advanced project under the direction of IT faculty. The activity will be negotiated and graded by contract. The nature of the project will include elements from each facet of the student’s program curriculum and will be evaluated by a committee of IT faculty. This project involves research and appropriate documentation.
Prerequisite
Instructor Permission
CISW 298Comprehensive IT Project*
Please note: This is not a course syllabus. A course syllabus is unique to a particular section of a course by instructor. This curriculum guide provides general information about a course.
I. General Information
Department
Information Technology
II. Course Specification
Course Type
Program Requirement
Credit Hours Narrative
3 Credits
Prerequisite Narrative
Instructor Permission
Grading Method
Letter grade
III. Catalog Course Description
Students will complete an advanced project under the direction of IT faculty. The activity will be negotiated and graded by contract. The nature of the project will include elements from each facet of the student’s program curriculum and will be evaluated by a committee of IT faculty. This project involves research and appropriate documentation.
IV. Student Learning Outcomes
Upon completion of this course, a student will be able to:
- Understand and demonstrate programming best practices in areas including but not limited to: 1. Client Presentation (e.g. HTML5, CSS); 2. Client Code (e.g. Javascript); 3. Server Code (e.g. PHP, Python, node.js); 4.Database management (e.g. MySQL, MS SQL); 5. Code modularization; 6. Internal documentation: Self-documenting and commenting; 7. External documentation: Usage guides, tutorials, etc.; 8. Problem decomposition; 9. Data normalization and database design
- Demonstrate professionalism in the timeliness and accuracy of their meetings, and construction/demonstration of their final project.
- Understand and demonstrate information security best practices in areas including but not limited to: 1. Network security; 2. Web application security; 3. Desktop and server OS security; 4. Service security (e.g. Apache, IIS, SMB file sharing); 5. Usage of information security tools (e.g. Metasploit, nmap, OpenVAS); 6. Vulnerability exploitation; 7. Documentation of the discovery and mitigation of security issues
V. Topical Outline (Course Content)
VI. Delivery Methodologies