CISW 298 Comprehensive IT Project*

Students will complete an advanced project under the direction of IT faculty. The activity will be negotiated and graded by contract. The nature of the project will include elements from each facet of the student’s program curriculum and will be evaluated by a committee of IT faculty. This project involves research and appropriate documentation.

Credits

3 Credits

Prerequisite

Instructor Permission

CISW 298Comprehensive IT Project*

Please note: This is not a course syllabus. A course syllabus is unique to a particular section of a course by instructor. This curriculum guide provides general information about a course.

I. General Information

Department

Information Technology

II. Course Specification

Course Type

Program Requirement

Credit Hours Narrative

3 Credits

Prerequisite Narrative

Instructor Permission

Grading Method

Letter grade

Repeatable

N

III. Catalog Course Description

Students will complete an advanced project under the direction of IT faculty. The activity will be negotiated and graded by contract. The nature of the project will include elements from each facet of the student’s program curriculum and will be evaluated by a committee of IT faculty. This project involves research and appropriate documentation.

IV. Student Learning Outcomes

Upon completion of this course, a student will be able to:

  • Understand and demonstrate programming best practices in areas including but not limited to: 1. Client Presentation (e.g. HTML5, CSS); 2. Client Code (e.g. Javascript); 3. Server Code (e.g. PHP, Python, node.js); 4.Database management (e.g. MySQL, MS SQL); 5. Code modularization; 6. Internal documentation: Self-documenting and commenting; 7. External documentation: Usage guides, tutorials, etc.; 8. Problem decomposition; 9. Data normalization and database design
  • Demonstrate professionalism in the timeliness and accuracy of their meetings, and construction/demonstration of their final project.
  • Understand and demonstrate information security best practices in areas including but not limited to: 1. Network security; 2. Web application security; 3. Desktop and server OS security; 4. Service security (e.g. Apache, IIS, SMB file sharing); 5. Usage of information security tools (e.g. Metasploit, nmap, OpenVAS); 6. Vulnerability exploitation; 7. Documentation of the discovery and mitigation of security issues

V. Topical Outline (Course Content)

TBA

VI. Delivery Methodologies