Course Name | Instructor | Course | Student Outcomes |
Data Management and Analysis with Spreadsheets | Carter | ITEC 281 | 1 |
Database from the Manager's Perspective | Wang | ITEC 304 | 2, IS6 |
Procedural Analysis and Design | Lahn | ITEC 320 | CS6 |
Principles of Computer Science III | Ward | ITEC 324 | CS6 |
Web Programming II | Lo | ITEC 325 | 1 |
Web Programming II | Lo | ITEC 325 | IS6 |
Systems Analysis and Design | Bradberry | ITEC 369 | 1, 2, 3, 5 |
Software Engineering I | Lewis-Williams | ITEC 370 | 1, 2, 4 |
Data Science | Bradberry | ITEC 375 | 1, 2 |
Societal Security in Computing | Chase | ITEC 411 | 3 |
Computability Theory and Formal Languages | Barland | ITEC 420 | 1, 2 |
Computer System and Database Security | Joyce | ITEC 445 | 1, 4, CY6 |
Security of Cyber-Physical Systems | Chase | ITEC 475 | 3, 4, 5 |
IT Professionalism | Pittges | ITEC 490 | 4 |
Course Name | Instructor | Course | Student Outcomes |
Healthcare Information Systems | Bradberry | ITEC 200 | 6-IS |
Web Programming I | Lo | ITEC 225 | 1, 2 |
Database from the Manager's Perspective | Wang | ITEC 304 | 1 |
Principles of Computer Science III | Patra | ITEC 324 | 6-CS |
Database I | Lahn | ITEC 340 | 1, 2 |
Software Engineering I | Lewis-Williams | ITEC 370 | 6-CS, 6-IS |
Operating Systems | Ray | ITEC 371 | 1, 2 |
Applied Cryptography and Network Security | Uppuluri | ITEC 455 | 5, 6-CY |
Computer System Security Analysis and Investigation Techniques | Joyce | ITEC 465 | 1, 6-CY |
Information Assurance Management | Carter | ITEC 466 | 6-IS |
Decision Support Systems | Bradberry | ITEC 485 | 6-IS |
IT Professionalism | Chase | ITEC 490 | 3 |
Information Systems Capstone | Wang | ITEC 495 | 5 |
ERP Systems | Wang | ITEC 497 | 6-IS |