

Core Courses
Code
|
Name
|
CH
|
Pre-requisite
|
Advanced Systems Analysis and Design
|
3
|
|
|
Description
|
|||
Emphasis on development of business application systems using object-oriented and structured analysis tools and techniques for describing processes, use cases, data structures, system objects, file designs, input and output designs, and program specifications. Includes a service-learning project with requirements gathering, planning, and development of a prototype for an internal/external client.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
Advanced Database Management Systems
|
3
|
|
|
Description
|
|||
The course starts with introductory topics of databases and database management systems and builds upon them to provide in depth theoretical and practical knowledge of the related concepts. The important course topics include data modelling, relational algebra and calculus, SQL, Database security and management, concurrency control, transaction management, query optimization, data indexing, distributed databases, XML, NoSQL and Big Data.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
Advanced Data Communication and Networks
|
3
|
|
|
Description
|
|||
This course covers the basic principles, evolution trend of computer networks and operations of Data Communication and Networks. It also helps students in understanding the procedure of transmitting data over the network and how to resolve the conflicting issues arising in the course of transmission.
Topics to be covered includes: Lan fundamentals; the OSI model ; Applications of Layered network Architecture; basic data communications ; multiplexing; Aloha, CSMA, CSMA-CD, token passing, wireless LANs and simple performance analysis; errors, coding and redundancy; communication protocols; network topologies; network access control; network architecture; Network Interconnections; Message Security and security.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
Advanced Business Process Management
|
3
|
|
|
Description
|
|||
Students will be introduced to main concepts and approaches to business process management and optimization. The course will focus on understanding, designing, and improving business processes. This will include teaching students how to analyze, document, visualize, evaluate and improve business processes. Students will be introduced to methods in which IT can be used to manage, transform, automate and improve business processes. In addition, students will learn the basics of some business process improvement methods such as Six Sigma and TQM.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
Advanced Strategic Management of IS
|
3
|
|
|
Description
|
|||
It is becoming increasingly difficult to manage information systems and information technology successfully given the dynamic nature of business in one hand and the evolving capabilities of digital technologies in the other hand. Therefore, the aim is to utilize digital technologies in order to achieve current enterprise strategies as well as creating new business strategies and capabilities. In this course, we aim to answer where, when and why an Information System Strategy is required for an organization. Via this course, a structured framework with tools and techniques of thinking in order to build a digital strategy for organizations will be presented to students.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
Research Methodology
|
3
|
|
|
Description
|
|||
This course will span from experiment design, hypothesis development, statistical techniques, writing research proposals and papers. Students will be provided with assignments to master the research skills and methodologies discussed in the lectures. There will also be a term long project in which students will be conducting research in the selected area of Information Systems. And at the term end students will be submitting research project’s outcome structured in the standard journal/conference publishing format.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
Thesis Proposal
|
3
|
|
|
Description
|
|||
This course is the continuation of 697-CIS-3 Thesis proposal where students will build upon their initial work and further the study. Students are expected to complete the study in light of the observations and recommendations from the presentation of 697-CIS-3 and as guided by the supervisor. Students are required to document the research work in form of a thesis of publishable quality and defend the work in front of the program’s thesis committee.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
Thesis
|
6
|
|
|
Description
|
|||
Students enrolled in MSIS with Thesis are required to complete 6 credit hours research based study under the guidance of a senior faculty member. This module, 697-CIS-3 Thesis Proposal, is the first 3 credit hours part of this study. In this module, students are expected to work through the stages of defining a topic and formulating a problem statement, selecting and reviewing relevant literature, designing and performing an empirical study, including data collection and analysis, analyzing the empirical data, and make theoretical conclusions. The students are required to document (initial draft) the work and present if to the program’s thesis committee.
|
Elective Courses
Code
|
Name
|
CH
|
Pre-requisite
|
Introduction to Data Science
|
3
|
|
|
Description
|
|||
This is an introductory course on data science that provides theoretical as well as practical knowledge of data preparation, data analysis and visualization techniques. The practical part of the course will be done using R.The course covers various phases of CRISP-DM methodology, including data collection, exploratory data analysis, data preparation, model building, and model evaluation. It also includes discussion on important applications of data science such as NLP and computer vision.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
Data Analytics and Visualizations
|
3
|
|
|
Description
|
|||
This course provides good understanding of process of data analytics, data exploration, analysis, and visualization techniques and trains the students in industry standard tools for data analytics and visualization. This course covers visual approaches to big data analytics with a focus on graphical techniques for finding patterns in high dimensional datasets. This course aims to develop students with practical skills in applying data analysis and visualization techniques for real world data analytical problems.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
Big Data Analytics
|
3
|
|
|
Description
|
|||
It is an interdisciplinary program that interrelates systems for big data analytics, statistical data analysis, data mining, data privacy and security, data visualization and exploration.
The course will focus on knowledge discovery from structured and unstructured data stores, programing for distributed architectures, relational and NoSQL database management systems, enabling students to gain advanced knowledge and developed their skills on big data, concerning the architectures of big data systems, the management of big data, and computational approaches for big data analytics.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
Information and Networks Security
|
3
|
641-CIS-3
|
|
Description
|
|||
The course introduces the key aspects of cryptography and network security principles. It focuses on common attacks, main security protocols for protecting network communication across different layers of networks. A variety of generic security technologies relevant to information security are studied, such as confidentiality, integrity, availability and non-repudiation, and authentication. The main algorithms used for security such as hashing, symmetric & asymmetric cryptography, digital certificates & PKI are provided in this course.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
Security Testing and Assessment
|
3
|
643-CIS-3
|
|
Description
|
|||
This course focuses on the practical side of penetration testing without neglecting the theory behind each attack. Methodologies and tools for performing ethical hacking and vulnerability assessment will be presented through a systematic approach, by which the different five stages of a successful hack will be explained thoroughly. Before penetration testing, students will learn setting up a lab and install needed software to practice penetration testing. All the attacks explained will be launched against real devices in a local controlled lab environment. Also the course provides a review of ethical concerns and legal issues associated with security testing activities.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
IT Audit and Control
|
3
|
641-CIS-3
|
|
Description
|
|||
To meet the increasing needs of Information Technology (IT) audit, effective management of IT assets, and security and risk management; this course is introduced to discuss the main principles of IT audit and control. The main focus of this course is to introduce importance of audit and control, risk assessment and management, audit planning and implementation, and types of audit. By the end of this course, students should know how to create a control system and audit IT infrastructure against it.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
Enterprise Architecture
|
3
|
|
|
Description
|
|||
This course describes the drivers and stakeholder of Enterprise Architecture. It discusses enterprise architecture in the context of other governance instrument such as strategic management, quality management etc. It also discusses different EA frameworks such as IEEE 1471-2000/ISO/IEC 42010 Standard, The Open Group Architecture Framework etc. It illustrates upon the architectural Complexity and methods of description and representation. Thereafter this course mentions different techniques to communicate the EA with different stake holders. Then this course delves into details of EA modeling language ArchiMate and gives the guidelines for modeling. Thereafter different viewpoints and visualization techniques are presented. Finally this course will ask the students to demonstrates the concepts learnt to apply on cases. This course will also train students to use Archi 4.0 software to develop EA.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
Business Intelligence
|
3
|
|
|
Description
|
|||
This course will provide background in the techniques in data analytics, in ‘learning from data’ and visualization tool that are unique to analysis of large data sets. Some of the topics will include the collection of, storing, accessing, and manipulating standard-size and large datasets; data visualization; predictive analytics and clustering. We plan on using some actual data sets for case studies and to motivate the methods.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
IT Leadership and Innovations
|
3
|
|
|
Description
|
|||
The course describes the Information technology leadership and innovation trends in organization. This course explores the role of IT leadership, especially that provided by the CIO. What are the issues, activities, and responsibilities facing IT leaders in delivering value to organizations through information technology.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
eHealth
|
3
|
|
|
Description
|
|||
In this course an introduction of eHealth Informatics will be given. The course will cover e-health records, e-public information systems, e-network and surveys, general and specific applications of e-health such as e-medicine, e-homecare, e-diagnosis support systems, and e-health intelligence. It also covers strategies in e-health care technology management, e-security issues, and the impacts of e-technologies.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
Public Health Informatics
|
3
|
|
|
Description
|
|||
This course introduces the main concepts of public health and relates them to the field of information systems and data analytics. The discussion on current applications and opportunities for applying informatics on public health data is the major part of this course.
|
|||
Code
|
Name
|
CH
|
Pre-requisite
|
Clinical Decision Support Systems
|
3
|
|
|
Description
|
|||
In this course an introduction of CDS and CDS systems will be given. The course will cover the design principles behind clinical decision support systems, CDSS usability and cognitive support, mathematical foundations of the knowledge-based systems and pattern recognition systems, clinical vocabularies, legal and ethical issues, patient centered clinical decision support systems, and applications of clinical decision support systems in clinical practice.
|