Skip to main content

Apply now! Spring priority deadline is October 1.

Secure
A group of people around a computer monitor

Intelligence and Security Analysis UCERT

About The Program

A group of people in a lab setting having a discussion

The Intelligence and Security Analysis Certificate prepares students to excel in the high-stakes, fast-evolving field of national security. Through a rigorous 26-credit interdisciplinary curriculum, students gain a comprehensive understanding of the U.S. Intelligence Community, the intelligence cycle, and the policies and operational frameworks that drive modern defense and security strategies.

Designed for students pursuing degrees in cybersecurity, criminal justice, computer science, data science, biochemistry, and related STEM or policy disciplines, the program emphasizes both critical thinking and practical application. Students develop advanced analytical and communication skills to evaluate complex data, generate actionable intelligence, and effectively present findings to diverse stakeholders. A strong focus on ethics, legal standards, and collaborative leadership ensures graduates are equipped to make sound decisions and thrive in high-pressure environments central to national and global security.

Whether entering the intelligence workforce or advancing within it, this certificate equips students to excel in dynamic environments where timely and accurate information can shape the future of security and diplomacy.

Intelligence Community Centers for Academic Excellence 20th anniversary logo

Metro State University is proudly designated by the Office of the Director of National Intelligence (ODNI) as an Intelligence Community Center for Academic Excellence (ICCAE)—a prestigious distinction that recognizes institutions that prepare a diverse, skilled, and mission-driven workforce for the U.S. Intelligence Community (IC).

Metro State also leads the North Star Intelligence Community Center for Academic Excellence (NICCAE), a regional ODNI-funded initiative that supports:

  • Career-connected learning and internship opportunities with IC partners
  • Applied faculty and student research in cybersecurity, data analytics, and AI
  • Annual speaker series, workshops, and colloquia with national security experts
  • Outreach to underserved communities to diversify the intelligence workforce

Through NICCAE, students benefit from unique experiential learning opportunities, real-world partnerships, and access to IC career resources. Learn more at the North Star ICCAE Portal.

  • Interdisciplinary curriculum focused on intelligence, national security, and analysis
  • Core courses in intelligence operations, AI applications, and strategic communication
  • Elective pathways in cybersecurity, criminal justice, forensic science, and STEM
  • Real-world experience through internships and mentorships supported by NICCAE
  • Emphasis on ethics, leadership, and civil liberties in national security work

Program highlights

  • Interdisciplinary curriculum focused on intelligence, national security, and analysis
  • Core courses in intelligence operations, AI applications, and strategic communication
  • Elective pathways in cybersecurity, criminal justice, forensic science, and STEM
  • Real-world experience through internships and mentorships supported by NICCAE
  • Emphasis on ethics, leadership, and civil liberties in national security work

Student learning outcomes

Upon completing the certificate, students will be able to:

  • Demonstrate a thorough understanding and application of core intelligence and national security concepts, including the history and structure of the U.S. Intelligence Community and the intelligence cycle
  • Interpret and analyze intelligence data from multiple sources to generate actionable insights that impact national security decisions
  • Apply ethical standards and legal frameworks that govern intelligence work, including the protection of civil liberties and privacy
  • Communicate findings clearly and strategically, using both written reports and presentations tailored to diverse audiences
  • Lead and collaborate in high-pressure team environments, demonstrating strong coordination, problem-solving, and decision-making skills

Career outlook

The Intelligence and Security Analysis Certificate prepares students for a wide variety of careers in federal agencies, law enforcement, homeland security, defense contracting, and private intelligence firms. Graduates are prepared for roles such as:

  • Intelligence Analyst
  • Counterterrorism Specialist
  • Cyber Threat Analyst
  • Forensic Intelligence Examiner
  • Homeland Security Professional
  • National Security Policy Advisor

Job market insights:

  • The U.S. job market for intelligence analysts is projected to grow by 1.5% between 2022 and 2032, creating approximately 1,700 new positions, in addition to 4,100 replacement openings from retirements and attrition.
  • The median annual salary for intelligence analysts is approximately $70,500, with top earners making over $105,000, depending on specialization, experience, and employer.
  • Intelligence professionals are in demand across sectors, including government agencies (CIA, FBI, DHS, NSA), military intelligence, and private-sector security consultancies.

Intelligence Community opportunities:

According to IntelligenceCareers.gov, the Intelligence Community offers a variety of roles in fields such as:

  • Cybersecurity – Safeguarding national infrastructure from cyber threats
  • Data Science – Analyzing and modeling intelligence data to uncover patterns
  • Foreign Languages – Translating and interpreting foreign communications
  • Policy and Strategy – Supporting decision-makers with actionable insights
  • STEM and Technology – Advancing tools and systems to support intelligence operations

A career in the IC offers meaningful public service, career mobility, and intellectually engaging work critical to the safety and security of the United States.

How to enroll

Program eligibility requirements

Students interested in pursuing the Intelligence and Security Analysis Certificate should consult with their assigned academic advisor to confirm eligibility and plan their academic path accordingly. To be considered for admission to the certificate program, students must submit an Undergraduate Program Declaration Form once one of the following conditions has been met:

  • Current Students: Formal declaration of a major in one of the following approved disciplines at Metro State University, with a cumulative GPA of 2.5 or higher:
    Cybersecurity, Computer Science, Computer Information Technology, Computer Forensics, Biochemistry, Data Science, Criminal Justice, Mathematics, Information Assurance, or Management Information Systems (MIS).

OR

  • Post-Baccalaureate Students: Completion of a bachelor’s degree in any discipline from a regionally accredited college or university with a cumulative GPA of 2.5 or higher.

Formal acceptance into the certificate program and the review of student qualifications are conducted by the Department of Computer Science and Cybersecurity (CSC).
Evaluation of any transfer coursework is conducted by the academic department responsible for the corresponding major or course subject area.

Apply to Metropolitan State now

Start the journey toward your Intelligence and Security Analysis UCERT now. Learn about the steps to enroll or, if you have questions about what Metropolitan State can offer you, request information, visit campus or chat with an admissions counselor.

Get started on your Intelligence and Security Analysis UCERT

Courses and Requirements

SKIP TO COURSE REQUIREMENTS

Guidelines for completing the Intelligence and Security Analysis (INSA) undergraduate certificate

The Intelligence and Security Analysis Certificate is designed for individuals seeking to enhance their expertise in intelligence operations, analysis, and related security practices. The certificate is open to:

  • Current undergraduate students who have formally declared a major in one of the following approved disciplines at Metropolitan State University:
    Cybersecurity, Computer Science, Computer Information Technology, Computer Forensics, Biochemistry, Data Science, Criminal Justice, Mathematics, Information Assurance, or Management Information Systems (MIS), and have a cumulative GPA of 2.5 or higher.
  • Post-baccalaureate students who have completed a bachelor’s degree in any discipline from a regionally accredited college or university with a cumulative GPA of 2.5 or higher.

Students should consult with their assigned academic advisor to determine their eligibility and ensure they meet the program requirements. To declare the Intelligence and Security Analysis Certificate, students must submit an Undergraduate Program Declaration Form and meet the eligibility criteria as outlined above.

Formal acceptance into the certificate program and qualification review are conducted by the Department of Computer Science and Cybersecurity (CSC). Evaluation of transfer coursework is conducted by the academic department responsible for the relevant major or course subject.

To successfully complete the certificate, the following requirements must be met:

  • All courses must be completed with a minimum grade of C- or higher.
  • At least 12 upper-division credits applicable to the certificate must be earned at Metropolitan State University.
  • Students are expected to review and understand the transfer credit and prerequisite policies detailed in the General Guidelines section of the catalog.

Certificate Requrements (26 credits)

+ Core courses (10 credits)

This course provides an overview of the U.S. Intelligence Community and examines how the community supports foreign policy and homeland security. Students examine the intelligence cycle and the structure, constraints, and oversight of the agencies that comprise the intelligence community. Specific attention is given to collection operations, analysis, and dissemination of finished intelligence products to consumers, with emphasis on how global intelligence is used to protect and police local communities. Also explored is how intelligence products build a common operational picture for national security management at top levels of government and how intelligence analysis supports Homeland Security by assisting federal, state, and local political leaders and law enforcement officials. Students also discuss human intelligence operations, counterintelligence, UAV (drone) operations, interrogation, and detention, and the moral, ethical, and legal framework inside which those disciplines…

Full course description for The U.S. Intelligence Community

This course develops and enhances critical analytical skills necessary for practical intelligence work, focusing on cultivating students' abilities in critical thinking, structured analytic techniques, and unbiased information assessment. Students will learn to identify and challenge biases and logical fallacies in information sources while mastering the application of analytical frameworks to solve complex intelligence problems. The course emphasizes the importance of clear and concise writing, effective oral communication, and delivering persuasive briefings. Through practical exercises and real-world simulations, students will develop the skills needed to analyze intelligence data critically, communicate findings effectively, and navigate the ethical and legal dimensions of intelligence analysis.

Full course description for Intelligence Analytics

This course explores the transformative role of artificial intelligence (AI), focusing on generative AI, in modern intelligence operations. Students will examine how AI technologies synthesize data, automate reporting, and assist in predictive analysis to enhance intelligence assessments and operations. Topics include advanced applications of machine learning, natural language processing (NLP), and deep learning, alongside their use in creating realistic simulations for training, translating languages, decrypting communications, and generating unbiased analytical products. The course emphasizes AI's technological and ethical dimensions, preparing students to apply these tools in national security and intelligence agencies. Through hands-on projects and real-world case studies, students will learn to produce actionable intelligence insights, address ethical and operational challenges, and understand the strategic implications of AI in shaping global intelligence landscapes. This course…

Full course description for Advanced AI Applications in Intelligence Operations

+ Elective courses (16 credits)

Fulfill 16 elective credits from the selection provided below. Students are advised to work with their academic advisor to determine which combination of courses will best suit their academic background, career goals, and certificate requirements. CYBR 490: Special Topics in Cybersecurity offers rotating content that changes each semester. Students may take this course multiple times for elective credit, provided each enrollment covers a distinct topic and prior approval is obtained from either the Cybersecurity Director or the Chair of the Computer Science and Cybersecurity (CSC) Department.

This course provides a thorough major's level introduction to genetics and heredity. It will cover the fundamentals of genetic information, its transmission from parents to offspring [heredity], its phenotypic and molecular expression in cells and organisms, replication and repair of genetic material within a cell, and its population impacts. Also included are the modern techniques of genetics including: gene mapping, cloning, genome manipulation and mutation. Knowledge of species' genomes, their genes, their inheritance, and how genes impact individuals and/or populations has rapidly become an integral part of almost every aspect of biology. From public health to ecology - genetics touches all.

Full course description for Principles of Genetics

This course covers the taxonomy, structure, function and ecology of microbes including bacteria, viruses, fungi and protista. Additional topics include microbial pathogenesis, the response of the mammalian immune system to microbial infection, microbial metabolic diversity and microbial biotechnology. Labs include use of microscope, survey of types of microbes, isolation of microbes from the environment, identification of microbes, staining of bacteria, action of antibiotics and disinfectants, counting of bacteria in food and water and use of microbes in food and beverage production. Intended for Biology, Biochemistry, Environmental Science or Life Science Teaching majors.

Full course description for Advanced Microbiology

In this course, students continue not only to learn how to identify and collect digital evidence through forensics search tools, but also to study the emerging data mining techniques. The topics include how to design a plan for a computer crime investigation; how to select a computer software tool to perform the investigation; how to articulate the laws applying to the appropriation of computers for forensics analysis; how to verify the integrity of the evidence being obtained; how to prepare the evidence collected for the use in the court; and how to present the evidence as an expert eyewitness in court. Some hypothetical and real cases are also discussed in class.

Full course description for Digital Evidence Analysis

This course provides a comprehensive, hands-on exploration of mobile device security and forensic investigation techniques, equipping students with both foundational principles and advanced practical skills. Through the use of modern forensic tools and methodologies, students will learn to conduct structured investigations that adhere to forensically sound procedures, ensuring the integrity and admissibility of digital evidence in legal proceedings. The course covers the entire mobile forensic process for Android and iOS devices, including data acquisition, extraction (including recovery of deleted data), analysis, and forensic reporting. Students will gain proficiency in identifying and examining digital artifacts, utilizing command-line and graphical open-source forensic tools, and assessing mobile application security to uncover vulnerabilities. Additionally, the course emphasizes the ethical and legal considerations essential for forensic investigators and teaches students how to…

Full course description for Mobile Device Security and Forensics

Medicinal chemistry allows the advanced chemistry student to explore the considerations of drug design and development as well as case studies on how different classes of therapeutic agents act in the human body. Topics include drug targets, drug sources, structure-activity relationships, pharmacokinetics, pharmacodynamics, and the modern drug discovery pipeline. This class is suggested for those students intending to continue in health sciences.

Full course description for Medicinal Chemistry

This course focuses on theories, concepts, narratives, and myths of crime and delinquent behavior. Contemporary issues and controversies within the criminal justice field are explored in social, political, and economic contexts. Special emphasis is placed on the roles of race, class, gender, and culture in relation to the etiology, prevention, control, and treatment of crime and delinquency. This course is committed to general theoretical debate, examination of the interrelation between criminological theory and research, and empirical analyses of policy and practice.

Full course description for Criminology and Public Policy

This course provides students with international perspectives on criminal justice. Through a comprehensive review of cross-national research data, students examine the features, successes and failures of various distinct criminal justice systems around the globe and use that information to evaluate the American criminal justice system. By exploring justice institutions in other parts of the world, students learn that criminal justice systems are shaped by the values, norms, customs or standards of behavior characteristic of the society in which they are found.

Full course description for Comparative Criminal Justice

This course presents an overview of white collar crime. Students explore theories of white collar crime and corporate criminal liability. The investigation, prosecution and sentencing of white-collar offenders are examined. "Crime in the suites" is compared to "crime in the streets." Issues related to diversity are explored.

Full course description for White Collar Crime

This course examines the fundamental principles and practices of emergency management including how it functions within the homeland security enterprise. Mass shootings, acts of terror, infrastructure collapse, and natural disasters all are examples of emergencies examined in this course. This course also explores the human and economic costs of emergencies and the intended and unintended consequences of intervention.

Full course description for Emergency Management for Criminal Justice

This course provides an in-depth exploration of fundamental concepts in Artificial Intelligence (AI) and Machine Learning (ML), with a focus on their applications in cybersecurity. Students will analyze AI principles, classical algorithms, and modern ML techniques, evaluating their role in enhancing security protocols and predicting cyber threats. The course emphasizes ethical considerations, governance frameworks, and the responsible use of AI technologies. Through case studies and hands-on applications, students will apply AI and ML tools to solve complex cybersecurity challenges, developing critical skills for securing digital environments.

Full course description for Fundamentals of AI and ML in Cybersecurity

This course provides students with the practical skills and theoretical knowledge required to proactively hunt for cyber threats and conduct advanced intelligence analysis. Students will explore methods to synthesize complex data into actionable intelligence, leveraging tools for data mining, information gathering, and threat management. Emphasis is placed on understanding and applying Indicators of Compromises (IOCs), adversary Tactics, Techniques, and Procedures (TTPs), and integrating cyber threat intelligence into security operations. Through hands-on exercises, case studies, and projects, participants will gain proficiency in detecting, investigating, and mitigating advanced threats. The course also addresses the ethical and legal dimensions of cyber intelligence, equipping students with the expertise to conduct thorough and effective intelligence operations. This curriculum prepares students to utilize advanced methodologies and technologies to enhance the accuracy and…

Full course description for Cyber Threat Hunting and Intelligence Analysis

As medical devices become increasingly interconnected and reliant on digital technologies, they introduce new cybersecurity risks that can impact patient safety and healthcare operations. This course provides an in-depth examination of the security challenges, regulatory requirements, and risk management strategies associated with medical device cybersecurity. Students will explore the evolving landscape of medical device threats and vulnerabilities while analyzing relevant cybersecurity regulations, standards, and best practices. Through case studies, technical labs, and real-world scenarios, students will develop the foundational knowledge necessary to secure medical devices throughout their lifecycle. Topics include threat modeling, security controls, patching strategies, incident response, and emerging technologies such as artificial intelligence (AI), mobile health applications, and wearables. By the end of the course, students will be equipped with practical skills to assess,…

Full course description for Cybersecurity for Medical Devices

The medical device industry faces unique cybersecurity challenges due to the direct impact of security threats on patient health and safety. To address these risks, cybersecurity professionals leverage established control frameworks and risk management methodologies to assess and mitigate potential threats.This course provides an in-depth exploration of cybersecurity risk management in the medical device sector, emphasizing the application of industry-recognized control frameworks such as those developed by the National Institute of Standards and Technology (NIST) and the International Organization for Standardization (ISO). Students will gain hands-on experience in identifying, evaluating, and mitigating cybersecurity risks through threat modeling, security assessments, and the implementation of appropriate security controls. Key topics include cybersecurity risk assessment methodologies, security-by-design principles, technical solutions for securing connected medical devices, and…

Full course description for Risk and Security Controls for Medical Devices

The integration of Internet of Things (IoT) technologies with critical infrastructure has revolutionized essential services such as energy, water, transportation, and healthcare, including medical devices. However, this growing connectivity also introduces significant cybersecurity risks. This course examines the security challenges unique to IoT systems in critical infrastructure and explores effective strategies for protecting these environments from cyber threats. Students will analyze IoT-specific vulnerabilities, assess security risks, and evaluate potential attack vectors targeting critical infrastructure systems. The course covers essential cybersecurity principles, risk assessment methodologies, threat modeling techniques, security protocols, and incident response strategies tailored for IoT environments. Through hands-on labs, case studies, and applied projects, students will develop the technical expertise necessary to design, implement, and manage security measures that…

Full course description for IoT and Critical Infrastructure Security

To properly secure an organization¿s information infrastructure and assets, periodic assessments of security posture at multiple levels are critical. This course provides a comprehensive approach to penetration testing and vulnerability assessment, covering key phases from reconnaissance to exploitation and post-exploitation techniques. Students will apply industry-standard penetration testing methodologies, use advanced tools such as Nmap, Wireshark, Metasploit, and Snort, and conduct controlled cybersecurity testing to simulate real-world attacks. Emphasis is placed on reporting and remediation, ensuring students can document findings and recommend actionable security improvements. This course aligns with CompTIA PenTest+ certification objectives, equipping students with essential offensive security skills needed for penetration testing, ethical hacking, and vulnerability analysis.

Full course description for Vulnerability Assessment and Penetration Testing

This course focuses on applying Artificial Intelligence (AI) in defensive cybersecurity operations and security assessments. Students will explore AI-driven tools and techniques to enhance threat detection, strengthen defenses, and conduct comprehensive security assessments in a secure and ethical manner. Emphasis is placed on practical applications, critical evaluation of AI methods, and the ethical implications of utilizing AI to protect systems. Through hands-on exercises and case studies, students will develop expertise in employing AI technologies to address modern defensive cybersecurity challenges.

Full course description for Applied AI in Cyber Defense Operations

In today's rapidly evolving digital landscape, cryptography is fundamental to securing sensitive information, protecting communications, and maintaining data integrity. This course provides a comprehensive foundation in applied cryptography, covering the historical evolution, mathematical principles, encryption techniques, and real-world implementations of cryptographic security. Students will explore symmetric and asymmetric encryption methods, including Feistel networks, S-Box design, RSA, Diffie-Hellman, and Elliptic Curve Cryptography, while also applying cryptographic principles to security technologies such as SSL/TLS, Virtual Private Networks (VPNs), and military-grade encryption. The course delves into cryptanalysis techniques to assess cryptographic vulnerabilities and adversarial attack methods used to bypass encryption defenses. Additionally, students will evaluate the future of cryptography, including quantum-resistant encryption, cloud-based cryptographic applications,…

Full course description for Cryptography for Cybersecurity Practitioners

In today's digital landscape, safeguarding information as a vital asset is paramount. This course delves into the operational aspects of managing and securing corporate network infrastructures and business information systems. Students will develop situational awareness of organizational networks and learn to manage and maintain a defensive infrastructure comprising log servers, network firewalls, and intrusion detection systems. Key topics include information security operations, access control, risk management, business continuity planning, disaster recovery, and ethics. Additionally, the course addresses the challenges of securing cloud assets, aligning with select objectives from the CompTIA Cloud+ certification, to equip students with strategies to enhance cloud security and address threats such as misconfigurations, unauthorized access, and data breaches. Overlap: ICS 484.

Full course description for Cyber Operations

In the face of escalating cyber breaches and intrusions, organizations seek professionals adept at identifying and responding to security incidents proactively. This course offers an in-depth exploration of Digital Forensics and Incident Response (DFIR) methodologies, emphasizing frameworks such as NIST and US-CERT. Students will learn to effectively detect, analyze, contain, eradicate, and recover from cyber attacks within enterprise networks. Throughout the course, students will develop expertise in identifying threat actors and security breaches, analyzing artifacts and logs, conducting post-mortem analyses, and implementing and refining mitigation strategies. The curriculum aligns with the CompTIA CySA+ objectives, ensuring students are equipped with the competencies required for effective cybersecurity analysis and incident response. By the end of the course, students will be proficient in using industry-standard forensic tools, assessing cyber attack stages, and developing…

Full course description for Cyber Incident Response and Handling

This course explores specialized and emerging topics in cybersecurity, addressing cutting-edge threats, technological advancements, and evolving best practices not covered elsewhere in the Cybersecurity program. Designed to keep pace with the rapidly changing cybersecurity landscape, this course provides students with opportunities to analyze and evaluate recent developments, apply advanced tools and methodologies, and synthesize scholarly and professional literature to solve real-world cybersecurity challenges. Emphasis is placed on ethical decision-making, professional responsibility, and adherence to legal and industry standards in addressing contemporary cybersecurity issues. The specific topic of study varies by semester, ensuring alignment with current industry trends and demands.

Full course description for Special Topics in Cybersecurity

Statistical machine learning (often referred to simply as statistical learning) has arisen as a recent subfield of statistics. It emphasizes the interpretability, precision, and uncertainty of machine learning models. This course assesses the accuracy of several supervised and unsupervised machine learning models for both regression and classification. Topics include the bias-variance trade-off, training and test datasets, resampling methods, shrinkage and dimension reduction methods, non-linear modeling techniques such as regression splines and generalized additive models, and decision tree-based methods. Applications include examples from medicine, biology, marketing, finance, insurance, and sports.

Full course description for Applied Machine Learning

The course focuses on how to design and build process, object and event models that are translatable into project specifications and design. Topics include an overview of systems analysis and design; a framework for systems architecture; design and development using data modeling; object modeling, entities, relationships, attributes, scope rules and influences; and event models, messaging and application activation.

Full course description for Software Design Models

Interaction design is an interdisciplinary field integrating theories and methodologies across several disciplines such as computer science, cognitive psychology, technical communication, user experience, human factors, information technology and engineering design. In this course, students are introduced to the theoretical knowledge of and practical experience with concepts of interaction design, design theory and techniques, and implementation and evaluation of interfaces. Topics covered include: interaction design, human-computer interaction, prototyping, usability evaluation, universal design, multimodal interfaces, and virtual reality. In addition to lectures, students will work on individual assignments and team projects to design, implement, and evaluate various interactive systems and user interfaces.

Full course description for Interaction Design for User Experience

This course teaches students full stack Web application development using the Model View Controller (MVC) design pattern. Students will learn using a template engine for rendering front end, using a Web Framework that supports MVC and Web security, and database persistence using Object Relational Mapping (ORM) and SQL statements. Students will build a medium size database-driven web application that supports user management. Students should have some experience with object-oriented programming concepts including inheritance, and data structures such as lists and maps.

Full course description for Model View Controller Architecture-based Web Application

Covers design and development of parallel and distributed algorithms and their implementation. Topics include multiprocessor and multicore architectures, parallel algorithm design patterns and performance issues, threads, shared objects and shared memory, forms of synchronization, concurrency on data structures, parallel sorting, distributed system models, fundamental distributed problems and algorithms such as mutual exclusion, consensus, and elections, and distributed programming paradigms. Programming intensive.

Full course description for Parallel and Distributed Algorithms

Computer networking is the core of our today's lives and is rapidly advancing. Hence, computer scientists must be familiar with the fundamentals of computer networking. This course introduces computer networking, including network topologies, network protocols, algorithms, layering concepts (for example, ISO/OSI, TCP/IP reference models). After covering the principles of computer networking, the course introduces network security fundamentals, including the weaknesses of networks and networked systems and their countermeasures.

Full course description for Networks and Security

Principles, techniques, and algorithms for the design and implementation of modern operating systems. Topics include operating system structures, process and thread scheduling, memory management including virtual memory, file system implementation, input output systems, mass storage structures, protection, and security. Students will implement process, memory, and file management algorithms.

Full course description for Operating Systems

This is a calculus-based probability course. It covers the following topics. (1) General Probability: set notation and basic elements of probability, combinatorial probability, conditional probability and independent events, and Bayes Theorem. (2) Single-Variable Probability: binomial, geometric, hypergeometric, Poisson, uniform, exponential, gamma and normal distributions, cumulative distribution functions, mean, variance and standard deviation, moments and moment-generating functions, and Chebysheff Theorem. (3) Multi-Variable Probability: joint probability functions and joint density functions, joint cumulative distribution functions, central limit theorem, conditional and marginal probability, moments and moment-generating functions, variance, covariance and correlation, and transformations. (4) Application to problems in medical testing, insurance, political survey, social inequity, gaming, and other fields of interest.

Full course description for Probability

This course addresses the theory and practice of using algorithms and computer programming to solve mathematical problems. Possible topics include roundoff and truncation errors, solution of nonlinear equations, systems of linear and nonlinear equations, interpolation and approximation, numerical differentiation and integration, numerical solution of ordinary differential equations.

Full course description for Computational Mathematics

This course provides students with significant problem-solving experience through investigating complex, open-ended problems arising in real-world settings. Working in teams, students apply mathematical modeling processes to translate problems presented to them into problems that can be investigated using the mathematical, statistical, and computational knowledge and thinking they have gained from previous coursework. Significant emphasis is placed on justifying approaches used to investigate problems, coordinating the work of team members, and communicating analyses and findings to technical and non-technical audiences.

Full course description for Advanced Mathematical Modeling

Business Intelligence is the user-centered process of exploring data, data relationships and trends - thus helping to improve overall decision making for enterprises. This course addresses the iterative processes of accessing data (ideally stored in the enterprise data warehouse) and analyzing data in order to derive insights and communicate findings. Moreover, the course also addresses the use of software tools for analysis and visualization of data, especially report design along with the use of dashboards.

Full course description for Business Intelligence and Analytics

This course examines the role of information systems applications involved in supporting supply chain and logistics operations. Topics covered include electronic purchasing/RFQ, Warehouse management systems, Warehouse Technology, Bar coding / RFID, mobile solutions for distribution and field force automation, MRP/ERP, Enterprise Asset Management and the Internet of Things, Transportation systems. Special emphasis is placed on building analytical skills for the detailed assessment of vendor software solutions in the supply chain arena.

Full course description for Supply Chain Information Systems

Managers need to know how to manage the diverse distributed computing environments in which they work, and leverage the opportunities these architectures provide. Integration of data and users, graphics and telephony are illustrated through emphases on client/server and N-Tier architectures, Internet, intranet/extranet, groupware, mobile, cloud and other technologies. This elective course reviews state-of-the-art technologies in each of the basic software and hardware arenas, while emphasizing management models and higher-level analysis, including the relationship with general database strategy and data warehousing. Practical projects are assigned, giving students real-world opportunities to use the tools to enhance their work and build productivity. Theory and models are taught with a management perspective as opposed to platform-specific training. Participants are asked to complete a comprehensive and applied class project and final exam.

Full course description for Management of Distributed Computing

This course explores the range of available network and telecommunications technologies and how they can be used to facilitate information access and dissemination at all levels of an organization and through the Internet. Trends of telecommunications services are analyzed. Telecommunications trends in the United States and Europe are addressed in detail. A range of emerging telecommunications services is explored as well as how such services radically alter the ways that organizations gather information for decision making. The widespread use of mobile technologies, the cloud and the World Wide Web has required many changes both in architecture and concept. The student learns how to manage these new environments.

Full course description for Telecommunications and Internet Management

A time series is a sequence of observations on a variable measured at successive points in time or over successive periods of time. This course provides an introduction to both standard and advanced time series analysis and forecasting methods. Graphical techniques and numerical summaries are used to identify data patterns such as seasonal and cyclical trends. Forecasting methods covered include: Moving averages, weighted moving averages, exponential smoothing, state-space models, simple linear regression, multiple regression, classification and regression trees, and neural networks. Measures of forecast accuracy are used to determine which method to use for obtaining forecasts for future time periods.

Full course description for Time Series Analysis and Forecasting

+ General Guidelines
Transfer Courses

The evaluation of transfer coursework equivalency is conducted by the Computer Science and Cybersecurity (CSC) Department. This process is initiated at the time of admission, with any resulting determinations reflected in the student’s DARS (Degree Audit Reporting System) report. When transferring coursework, students should be aware that many institutions—universities, community colleges, and technical colleges—offer courses that may be considered equivalent to our Pre-Major requirements. In certain cases, a lower-division course from another institution may be deemed equivalent to one of our upper-division courses, or vice versa. However, for the purpose of satisfying upper-division major electives or university graduation requirements, the classification of the course at the originating institution (i.e., whether it is designated as lower or upper division) is the determining factor.

Prerequisites

Students are responsible for understanding and meeting all prerequisite requirements for the courses in which they enroll. Enrollment in a course is contingent upon successful completion of all prerequisites with a minimum grade of C-. Students who do not meet these requirements will be administratively dropped from the course. While the registration system enforces prerequisites for many courses, discrepancies can occasionally occur. If your DARS report indicates that you have met the prerequisites, but you are unable to register due to a system error, please contact your academic advisor for assistance.