Skip to main content

Fall 2025 Registration window now open. | Undergraduate Final Deadline is July 28 for fall term

Secure
A group of people around a computer monitor

Intelligence and Security Analysis Certificate

About The Program

A group of people in a lab setting having a discussion

The Intelligence and Security Analysis Certificate prepares students to excel in the high-stakes, fast-evolving field of national security. Through a rigorous 26-credit interdisciplinary curriculum, students gain a comprehensive understanding of the U.S. Intelligence Community, the intelligence cycle, and the policies and operational frameworks that drive modern defense and security strategies.

Designed for students pursuing degrees in cybersecurity, criminal justice, computer science, data science, biochemistry, and related STEM or policy disciplines, the program emphasizes both critical thinking and practical application. Students develop advanced analytical and communication skills to evaluate complex data, generate actionable intelligence, and effectively present findings to diverse stakeholders. A strong focus on ethics, legal standards, and collaborative leadership ensures graduates are equipped to make sound decisions and thrive in high-pressure environments central to national and global security.

Whether entering the intelligence workforce or advancing within it, this certificate equips students to excel in dynamic environments where timely and accurate information can shape the future of security and diplomacy.

Intelligence Community Centers for Academic Excellence 20th anniversary logo

Metro State University is proudly designated by the Office of the Director of National Intelligence (ODNI) as an Intelligence Community Center for Academic Excellence (ICCAE)—a prestigious distinction that recognizes institutions that prepare a diverse, skilled, and mission-driven workforce for the U.S. Intelligence Community (IC).

Metro State also leads the North Star Intelligence Community Center for Academic Excellence (NICCAE), a regional ODNI-funded initiative that supports:

  • Career-connected learning and internship opportunities with IC partners
  • Applied faculty and student research in cybersecurity, data analytics, and AI
  • Annual speaker series, workshops, and colloquia with national security experts
  • Outreach to underserved communities to diversify the intelligence workforce

Through NICCAE, students benefit from unique experiential learning opportunities, real-world partnerships, and access to IC career resources. Learn more at the North Star ICCAE Portal.

  • Interdisciplinary curriculum focused on intelligence, national security, and analysis
  • Core courses in intelligence operations, AI applications, and strategic communication
  • Elective pathways in cybersecurity, criminal justice, forensic science, and STEM
  • Real-world experience through internships and mentorships supported by NICCAE
  • Emphasis on ethics, leadership, and civil liberties in national security work

Program highlights

  • Interdisciplinary curriculum focused on intelligence, national security, and analysis
  • Core courses in intelligence operations, AI applications, and strategic communication
  • Elective pathways in cybersecurity, criminal justice, forensic science, and STEM
  • Real-world experience through internships and mentorships supported by NICCAE
  • Emphasis on ethics, leadership, and civil liberties in national security work

Student learning outcomes

Upon completing the certificate, students will be able to:

  • Demonstrate a thorough understanding and application of core intelligence and national security concepts, including the history and structure of the U.S. Intelligence Community and the intelligence cycle
  • Interpret and analyze intelligence data from multiple sources to generate actionable insights that impact national security decisions
  • Apply ethical standards and legal frameworks that govern intelligence work, including the protection of civil liberties and privacy
  • Communicate findings clearly and strategically, using both written reports and presentations tailored to diverse audiences
  • Lead and collaborate in high-pressure team environments, demonstrating strong coordination, problem-solving, and decision-making skills

Career outlook

The Intelligence and Security Analysis Certificate prepares students for a wide variety of careers in federal agencies, law enforcement, homeland security, defense contracting, and private intelligence firms. Graduates are prepared for roles such as:

  • Intelligence Analyst
  • Counterterrorism Specialist
  • Cyber Threat Analyst
  • Forensic Intelligence Examiner
  • Homeland Security Professional
  • National Security Policy Advisor

Job market insights:

  • The U.S. job market for intelligence analysts is projected to grow by 1.5% between 2022 and 2032, creating approximately 1,700 new positions, in addition to 4,100 replacement openings from retirements and attrition.
  • The median annual salary for intelligence analysts is approximately $70,500, with top earners making over $105,000, depending on specialization, experience, and employer.
  • Intelligence professionals are in demand across sectors, including government agencies (CIA, FBI, DHS, NSA), military intelligence, and private-sector security consultancies.

Intelligence Community opportunities:

According to IntelligenceCareers.gov, the Intelligence Community offers a variety of roles in fields such as:

  • Cybersecurity – Safeguarding national infrastructure from cyber threats
  • Data Science – Analyzing and modeling intelligence data to uncover patterns
  • Foreign Languages – Translating and interpreting foreign communications
  • Policy and Strategy – Supporting decision-makers with actionable insights
  • STEM and Technology – Advancing tools and systems to support intelligence operations

A career in the IC offers meaningful public service, career mobility, and intellectually engaging work critical to the safety and security of the United States.

How to enroll

Program eligibility requirements

Students interested in pursuing the Intelligence and Security Analysis Certificate should consult with their assigned academic advisor to confirm eligibility and plan their academic path accordingly. To be considered for admission to the certificate program, students must submit an Undergraduate Program Declaration Form once one of the following conditions has been met:

  • Current Students: Formal declaration of a major in one of the following approved disciplines at Metro State University, with a cumulative GPA of 2.5 or higher:
    Cybersecurity, Computer Science, Computer Information Technology, Computer Forensics, Biochemistry, Data Science, Criminal Justice, Mathematics, Information Assurance, or Management Information Systems (MIS).

OR

  • Post-Baccalaureate Students: Completion of a bachelor’s degree in any discipline from a regionally accredited college or university with a cumulative GPA of 2.5 or higher.

Formal acceptance into the certificate program and the review of student qualifications are conducted by the Department of Computer Science and Cybersecurity (CSC).
Evaluation of any transfer coursework is conducted by the academic department responsible for the corresponding major or course subject area.

Apply to Metropolitan State now

Start the journey toward your Intelligence and Security Analysis Certificate now. Learn about the steps to enroll or, if you have questions about what Metropolitan State can offer you, request information, visit campus or chat with an admissions counselor.

Get started on your Intelligence and Security Analysis Certificate

Courses and Requirements

SKIP TO COURSE REQUIREMENTS

Guidelines for completing the Intelligence and Security Analysis (INSA) undergraduate certificate

The Intelligence and Security Analysis Certificate is designed for individuals seeking to enhance their expertise in intelligence operations, analysis, and related security practices. The certificate is open to:

  • Current undergraduate students who have formally declared a major in one of the following approved disciplines at Metropolitan State University:
    Cybersecurity, Computer Science, Computer Information Technology, Computer Forensics, Biochemistry, Data Science, Criminal Justice, Mathematics, Information Assurance, or Management Information Systems (MIS), and have a cumulative GPA of 2.5 or higher.
  • Post-baccalaureate students who have completed a bachelor’s degree in any discipline from a regionally accredited college or university with a cumulative GPA of 2.5 or higher.

Students should consult with their assigned academic advisor to determine their eligibility and ensure they meet the program requirements. To declare the Intelligence and Security Analysis Certificate, students must submit an Undergraduate Program Declaration Form and meet the eligibility criteria as outlined above.

Formal acceptance into the certificate program and qualification review are conducted by the Department of Computer Science and Cybersecurity (CSC). Evaluation of transfer coursework is conducted by the academic department responsible for the relevant major or course subject.

To successfully complete the certificate, the following requirements must be met:

  • All courses must be completed with a minimum grade of C- or higher.
  • At least 12 upper-division credits applicable to the certificate must be earned at Metropolitan State University.
  • Students are expected to review and understand the transfer credit and prerequisite policies detailed in the General Guidelines section of the catalog.

Certificate Requrements (26 credits)

+ Core courses (10 credits)

This course provides an overview of the U.S. Intelligence Community and examines how the community supports foreign policy and homeland security. Students examine the intelligence cycle and the structure, constraints, and oversight of the agencies that comprise the intelligence community. Specific attention is given to collection operations, analysis, and dissemination of finished intelligence products to consumers, with emphasis on how global intelligence is used to protect and police local communities. Also explored is how intelligence products build a common operational picture for national security management at top levels of government and how intelligence analysis supports Homeland Security by assisting federal, state, and local political leaders and law enforcement officials. Students also discuss human intelligence operations, counterintelligence, UAV (drone) operations, interrogation, and detention, and the moral, ethical, and legal framework inside which those disciplines…

Full course description for The U.S. Intelligence Community

This course develops and enhances critical analytical skills necessary for practical intelligence work, focusing on cultivating students' abilities in critical thinking, structured analytic techniques, and unbiased information assessment. Students will learn to identify and challenge biases and logical fallacies in information sources while mastering the application of analytical frameworks to solve complex intelligence problems. The course emphasizes the importance of clear and concise writing, effective oral communication, and delivering persuasive briefings. Through practical exercises and real-world simulations, students will develop the skills needed to analyze intelligence data critically, communicate findings effectively, and navigate the ethical and legal dimensions of intelligence analysis.

Full course description for Intelligence Analytics

This course explores the transformative role of artificial intelligence (AI), focusing on generative AI, in modern intelligence operations. Students will examine how AI technologies synthesize data, automate reporting, and assist in predictive analysis to enhance intelligence assessments and operations. Topics include advanced applications of machine learning, natural language processing (NLP), and deep learning, alongside their use in creating realistic simulations for training, translating languages, decrypting communications, and generating unbiased analytical products. The course emphasizes AI's technological and ethical dimensions, preparing students to apply these tools in national security and intelligence agencies. Through hands-on projects and real-world case studies, students will learn to produce actionable intelligence insights, address ethical and operational challenges, and understand the strategic implications of AI in shaping global intelligence landscapes. This course…

Full course description for Advanced AI Applications in Intelligence Operations

+ Elective courses (16 credits)

Fulfill 16 elective credits from the selection provided below. Students are advised to work with their academic advisor to determine which combination of courses will best suit their academic background, career goals, and certificate requirements. CYBR 490: Special Topics in Cybersecurity offers rotating content that changes each semester. Students may take this course multiple times for elective credit, provided each enrollment covers a distinct topic and prior approval is obtained from either the Cybersecurity Director or the Chair of the Computer Science and Cybersecurity (CSC) Department.

This course provides a thorough major's level introduction to genetics and heredity. It will cover the fundamentals of genetic information, its transmission from parents to offspring [heredity], its phenotypic and molecular expression in cells and organisms, replication and repair of genetic material within a cell, and its population impacts. Also included are the modern techniques of genetics including: gene mapping, cloning, genome manipulation and mutation. Knowledge of species' genomes, their genes, their inheritance, and how genes impact individuals and/or populations has rapidly become an integral part of almost every aspect of biology. From public health to ecology - genetics touches all.

Full course description for Principles of Genetics

This course covers the taxonomy, structure, function and ecology of microbes including bacteria, viruses, fungi and protista. Additional topics include microbial pathogenesis, the response of the mammalian immune system to microbial infection, microbial metabolic diversity and microbial biotechnology. Labs include use of microscope, survey of types of microbes, isolation of microbes from the environment, identification of microbes, staining of bacteria, action of antibiotics and disinfectants, counting of bacteria in food and water and use of microbes in food and beverage production. Intended for Biology, Biochemistry, Environmental Science or Life Science Teaching majors.

Full course description for Advanced Microbiology

In this course, students continue not only to learn how to identify and collect digital evidence through forensics search tools, but also to study the emerging data mining techniques. The topics include how to design a plan for a computer crime investigation; how to select a computer software tool to perform the investigation; how to articulate the laws applying to the appropriation of computers for forensics analysis; how to verify the integrity of the evidence being obtained; how to prepare the evidence collected for the use in the court; and how to present the evidence as an expert eyewitness in court. Some hypothetical and real cases are also discussed in class.

Full course description for Digital Evidence Analysis

This course takes a hands-on approach to provide students with foundational concepts and practical skills in Mobile Device Forensics, which can be leveraged to perform forensically sound investigations against crimes involving the most complex mobile devices currently available in the market. Using modern tools and techniques, students will learn how to conduct a structured investigation process to determine the nature of the crime and to produce results that are useful in criminal proceedings. The course will provide walkthrough on various phases of the mobile forensics process for both Android and iOS based devices including forensically extracting, collecting, and analyzing, data and producing and disseminating reports. The course modules and labs will involve certain specialized hardware and software to perform data acquisition (including deleted data), and the analysis of extracted information.

Full course description for Mobile Device Security and Forensics

Medicinal chemistry allows the advanced chemistry student to explore the considerations of drug design and development as well as case studies on how different classes of therapeutic agents act in the human body. Topics include drug targets, drug sources, structure-activity relationships, pharmacokinetics, pharmacodynamics, and the modern drug discovery pipeline. This class is suggested for those students intending to continue in health sciences.

Full course description for Medicinal Chemistry

This course focuses on theories, concepts, narratives, and myths of crime and delinquent behavior. Contemporary issues and controversies within the criminal justice field are explored in social, political, and economic contexts. Special emphasis is placed on the roles of race, class, gender, and culture in relation to the etiology, prevention, control, and treatment of crime and delinquency. This course is committed to general theoretical debate, examination of the interrelation between criminological theory and research, and empirical analyses of policy and practice.

Full course description for Criminology and Public Policy

This course provides students with international perspectives on criminal justice. Through a comprehensive review of cross-national research data, students examine the features, successes and failures of various distinct criminal justice systems around the globe and use that information to evaluate the American criminal justice system. By exploring justice institutions in other parts of the world, students learn that criminal justice systems are shaped by the values, norms, customs or standards of behavior characteristic of the society in which they are found.

Full course description for Comparative Criminal Justice

This course presents an overview of white collar crime. Students explore theories of white collar crime and corporate criminal liability. The investigation, prosecution and sentencing of white-collar offenders are examined. "Crime in the suites" is compared to "crime in the streets." Issues related to diversity are explored.

Full course description for White Collar Crime

This course examines the fundamental principles and practices of emergency management including how it functions within the homeland security enterprise. Mass shootings, acts of terror, infrastructure collapse, and natural disasters all are examples of emergencies examined in this course. This course also explores the human and economic costs of emergencies and the intended and unintended consequences of intervention.

Full course description for Emergency Management for Criminal Justice

This course provides an in-depth exploration of fundamental concepts in Artificial Intelligence (AI) and Machine Learning (ML), with a focus on their applications in cybersecurity. Students will analyze AI principles, classical algorithms, and modern ML techniques, evaluating their role in enhancing security protocols and predicting cyber threats. The course emphasizes ethical considerations, governance frameworks, and the responsible use of AI technologies. Through case studies and hands-on applications, students will apply AI and ML tools to solve complex cybersecurity challenges, developing critical skills for securing digital environments.

Full course description for Fundamentals of AI and ML in Cybersecurity

This course provides students with the practical skills and theoretical knowledge required to proactively hunt for cyber threats and conduct advanced intelligence analysis. Students will explore methods to synthesize complex data into actionable intelligence, leveraging tools for data mining, information gathering, and threat management. Emphasis is placed on understanding and applying Indicators of Compromises (IOCs), adversary Tactics, Techniques, and Procedures (TTPs), and integrating cyber threat intelligence into security operations. Through hands-on exercises, case studies, and projects, participants will gain proficiency in detecting, investigating, and mitigating advanced threats. The course also addresses the ethical and legal dimensions of cyber intelligence, equipping students with the expertise to conduct thorough and effective intelligence operations. This curriculum prepares students to utilize advanced methodologies and technologies to enhance the accuracy and…

Full course description for Cyber Threat Hunting and Intelligence Analysis

As medical devices become increasingly interconnected and reliant on digital technologies, they introduce new cybersecurity risks that can impact patient safety and healthcare operations. This course provides an in-depth examination of the security challenges, regulatory requirements, and risk management strategies associated with medical device cybersecurity. Students will explore the evolving landscape of medical device threats and vulnerabilities while analyzing relevant cybersecurity regulations, standards, and best practices. Through case studies, technical labs, and real-world scenarios, students will develop the foundational knowledge necessary to secure medical devices throughout their lifecycle. Topics include threat modeling, security controls, patching strategies, incident response, and emerging technologies such as artificial intelligence (AI), mobile health applications, and wearables. By the end of the course, students will be equipped with practical skills to assess,…

Full course description for Cybersecurity for Medical Devices

The medical device industry faces unique cybersecurity challenges due to the direct impact of security threats on patient health and safety. To address these risks, cybersecurity professionals leverage established control frameworks and risk management methodologies to assess and mitigate potential threats.This course provides an in-depth exploration of cybersecurity risk management in the medical device sector, emphasizing the application of industry-recognized control frameworks such as those developed by the National Institute of Standards and Technology (NIST) and the International Organization for Standardization (ISO). Students will gain hands-on experience in identifying, evaluating, and mitigating cybersecurity risks through threat modeling, security assessments, and the implementation of appropriate security controls. Key topics include cybersecurity risk assessment methodologies, security-by-design principles, technical solutions for securing connected medical devices, and…

Full course description for Risk and Security Controls for Medical Devices

The integration of Internet of Things (IoT) technologies with critical infrastructure has revolutionized essential services such as energy, water, transportation, and healthcare, including medical devices. However, this growing connectivity also introduces significant cybersecurity risks. This course examines the security challenges unique to IoT systems in critical infrastructure and explores effective strategies for protecting these environments from cyber threats. Students will analyze IoT-specific vulnerabilities, assess security risks, and evaluate potential attack vectors targeting critical infrastructure systems. The course covers essential cybersecurity principles, risk assessment methodologies, threat modeling techniques, security protocols, and incident response strategies tailored for IoT environments. Through hands-on labs, case studies, and applied projects, students will develop the technical expertise necessary to design, implement, and manage security measures that…

Full course description for IoT and Critical Infrastructure Security

To properly secure any organization's information infrastructure and assets, a periodic assessment of its security posture at various levels of the organization is essential. One key area is the direct assessment of vulnerabilities in the IT infrastructure, systems and applications, followed by targeting and exploitation of the same. This course covers the theoretical bases for cyber threats and vulnerabilities, and delves into selection and application of penetration testing methodologies ranging from reconnaissance to the exploitation of vulnerabilities by probing infrastructure, services and applications. The course places a strong emphasis on the use of these methodologies to demonstrate, document, report on, and provide a clear roadmap for remediation of exposed security issues.

Full course description for Vulnerability Assessment and Penetration Testing

This course focuses on applying Artificial Intelligence (AI) in defensive cybersecurity operations and security assessments. Students will explore AI-driven tools and techniques to enhance threat detection, strengthen defenses, and conduct comprehensive security assessments in a secure and ethical manner. Emphasis is placed on practical applications, critical evaluation of AI methods, and the ethical implications of utilizing AI to protect systems. Through hands-on exercises and case studies, students will develop expertise in employing AI technologies to address modern defensive cybersecurity challenges.

Full course description for Applied AI in Cyber Defense Operations

This course provides students with a thorough foundation of applied cryptography for cybersecurity practitioners. As encryption technologies continue to integrate into everyday culture, the importance of cryptography and encryption knowledge of cybersecurity practitioners continues to increase. Students will learn and be able to apply and analyze: the history of cryptography from the earliest ciphers to current encryption methodology, mathematical foundations for cryptography, symmetric and asymmetric algorithms, and applied cryptography pertaining to Virtual Private Networks (VPNs), SSL/TLS, strategies for defense utilizing encryption and cryptography, military applications, steganography, cryptanalysis, and more. Additionally, students will look to the future of cryptography and encryption including a look into quantum cryptography and encryption in cloud environments. Overlap: ICS 483.

Full course description for Cryptography for Cybersecurity Practitioners

Information is an asset that must be protected. Without adequate protection or network security, many individuals, businesses, and governments are at risk of losing that asset. It is imperative that all networks be protected from threats and vulnerabilities so that a business can achieve its fullest potential. Security risks cannot be eliminated or prevented completely; however, effective risk management and assessment can significantly minimize the existing security risks. In order to provide effective protection to the organization's critical infrastructure and services, continuous monitoring as well as various processes, procedures, and technology is required to detect and prevent cyber-attacks, breaches, and security violations. In addition, existence of a comprehensive incident response plan is vitally connected to the survivability of an organization after a severe security breach or compromise of critical business operations. This course focuses on the operational aspect of…

Full course description for Cyber Operations

In the face of escalating cyber breaches and intrusions, organizations seek professionals adept at identifying and responding to security incidents proactively. This course offers an in-depth exploration of Digital Forensics and Incident Response (DFIR) methodologies, emphasizing frameworks such as NIST and US-CERT. Students will learn to effectively detect, analyze, contain, eradicate, and recover from cyber attacks within enterprise networks. Throughout the course, students will develop expertise in identifying threat actors and security breaches, analyzing artifacts and logs, conducting post-mortem analyses, and implementing and refining mitigation strategies. The curriculum aligns with the CompTIA CySA+ objectives, ensuring students are equipped with the competencies required for effective cybersecurity analysis and incident response. By the end of the course, students will be proficient in using industry-standard forensic tools, assessing cyber attack stages, and developing…

Full course description for Cyber Incident Response and Handling

This course explores specialized and emerging topics in cybersecurity, addressing cutting-edge threats, technological advancements, and evolving best practices not covered elsewhere in the Cybersecurity program. Designed to keep pace with the rapidly changing cybersecurity landscape, this course provides students with opportunities to analyze and evaluate recent developments, apply advanced tools and methodologies, and synthesize scholarly and professional literature to solve real-world cybersecurity challenges. Emphasis is placed on ethical decision-making, professional responsibility, and adherence to legal and industry standards in addressing contemporary cybersecurity issues. The specific topic of study varies by semester, ensuring alignment with current industry trends and demands.

Full course description for Special Topics in Cybersecurity

Statistical machine learning (often referred to simply as statistical learning) has arisen as a recent subfield of statistics. It emphasizes the interpretability, precision, and uncertainty of machine learning models. This course assesses the accuracy of several supervised and unsupervised machine learning models for both regression and classification. Topics include the bias-variance trade-off, training and test datasets, resampling methods, shrinkage and dimension reduction methods, non-linear modeling techniques such as regression splines and generalized additive models, and decision tree-based methods. Applications include examples from medicine, biology, marketing, finance, insurance, and sports.

Full course description for Applied Machine Learning

The course focuses on how to design and build process, object and event models that are translatable into project specifications and design. Topics include an overview of systems analysis and design; a framework for systems architecture; design and development using data modeling; object modeling, entities, relationships, attributes, scope rules and influences; and event models, messaging and application activation.

Full course description for Software Design Models

Interaction design is an interdisciplinary field integrating theories and methodologies across several disciplines such as computer science, cognitive psychology, technical communication, user experience, human factors, information technology and engineering design. In this course, students are introduced to the theoretical knowledge of and practical experience with concepts of interaction design, design theory and techniques, and implementation and evaluation of interfaces. Topics covered include: interaction design, human-computer interaction, prototyping, usability evaluation, universal design, multimodal interfaces, and virtual reality. In addition to lectures, students will work on individual assignments and team projects to design, implement, and evaluate various interactive systems and user interfaces.

Full course description for Interaction Design for User Experience

This course teaches students full stack Web application development using the Model View Controller (MVC) design pattern. Students will learn using a template engine for rendering front end, using a Web Framework that supports MVC and Web security, and database persistence using Object Relational Mapping (ORM) and SQL statements. Students will build a medium size database-driven web application that supports user management. Students should have some experience with object-oriented programming concepts including inheritance, and data structures such as lists and maps.

Full course description for Model View Controller Architecture-based Web Application

Covers design and development of parallel and distributed algorithms and their implementation. Topics include multiprocessor and multicore architectures, parallel algorithm design patterns and performance issues, threads, shared objects and shared memory, forms of synchronization, concurrency on data structures, parallel sorting, distributed system models, fundamental distributed problems and algorithms such as mutual exclusion, consensus, and elections, and distributed programming paradigms. Programming intensive.

Full course description for Parallel and Distributed Algorithms

Principles and practices of the OSI and TCP/IP models of computer networks, with special emphasis on the security of these networks. Coverage of general issues of computer and data security. Introduction to the various layers of network protocols, including physical, data link, network, and transport layers, flow control, error checking, and congestion control. Computer system strengths and vulnerabilities, and protection techniques: Topics include applied cryptography, security threats, security management, operating systems, network firewall and security measures. Focus on secure programming techniques. Programming projects.

Full course description for Networks and Security

Principles, techniques, and algorithms for the design and implementation of modern operating systems. Topics include operating system structures, process and thread scheduling, memory management including virtual memory, file system implementation, input output systems, mass storage structures, protection, and security. Students will implement process, memory, and file management algorithms.

Full course description for Operating Systems

This is a calculus-based probability course. It covers the following topics. (1) General Probability: set notation and basic elements of probability, combinatorial probability, conditional probability and independent events, and Bayes Theorem. (2) Single-Variable Probability: binomial, geometric, hypergeometric, Poisson, uniform, exponential, gamma and normal distributions, cumulative distribution functions, mean, variance and standard deviation, moments and moment-generating functions, and Chebysheff Theorem. (3) Multi-Variable Probability: joint probability functions and joint density functions, joint cumulative distribution functions, central limit theorem, conditional and marginal probability, moments and moment-generating functions, variance, covariance and correlation, and transformations. (4) Application to problems in medical testing, insurance, political survey, social inequity, gaming, and other fields of interest.

Full course description for Probability

This course addresses the theory and practice of using algorithms and computer programming to solve mathematical problems. Possible topics include roundoff and truncation errors, solution of nonlinear equations, systems of linear and nonlinear equations, interpolation and approximation, numerical differentiation and integration, numerical solution of ordinary differential equations.

Full course description for Computational Mathematics

This course provides students with significant problem-solving experience through investigating complex, open-ended problems arising in real-world settings. Working in teams, students apply mathematical modeling processes to translate problems presented to them into problems that can be investigated using the mathematical, statistical, and computational knowledge and thinking they have gained from previous coursework. Significant emphasis is placed on justifying approaches used to investigate problems, coordinating the work of team members, and communicating analyses and findings to technical and non-technical audiences.

Full course description for Advanced Mathematical Modeling

Business Intelligence is the user-centered process of exploring data, data relationships and trends - thus helping to improve overall decision making for enterprises. This course addresses the iterative processes of accessing data (ideally stored in the enterprise data warehouse) and analyzing data in order to derive insights and communicate findings. Moreover, the course also addresses the use of software tools for analysis and visualization of data, especially report design along with the use of dashboards.

Full course description for Business Intelligence and Analytics

This course examines the role of information systems applications involved in supporting supply chain and logistics operations. Topics covered include electronic purchasing/RFQ, Warehouse management systems, Warehouse Technology, Bar coding / RFID, mobile solutions for distribution and field force automation, MRP/ERP, Enterprise Asset Management and the Internet of Things, Transportation systems. Special emphasis is placed on building analytical skills for the detailed assessment of vendor software solutions in the supply chain arena.

Full course description for Supply Chain Information Systems

Managers need to know how to manage the diverse distributed computing environments in which they work, and leverage the opportunities these architectures provide. Integration of data and users, graphics and telephony are illustrated through emphases on client/server and N-Tier architectures, Internet, intranet/extranet, groupware, mobile, cloud and other technologies. This elective course reviews state-of-the-art technologies in each of the basic software and hardware arenas, while emphasizing management models and higher-level analysis, including the relationship with general database strategy and data warehousing. Practical projects are assigned, giving students real-world opportunities to use the tools to enhance their work and build productivity. Theory and models are taught with a management perspective as opposed to platform-specific training. Participants are asked to complete a comprehensive and applied class project and final exam.

Full course description for Management of Distributed Computing

This course explores the range of available network and telecommunications technologies and how they can be used to facilitate information access and dissemination at all levels of an organization and through the Internet. Trends of telecommunications services are analyzed. Telecommunications trends in the United States and Europe are addressed in detail. A range of emerging telecommunications services is explored as well as how such services radically alter the ways that organizations gather information for decision making. The widespread use of mobile technologies, the cloud and the World Wide Web has required many changes both in architecture and concept. The student learns how to manage these new environments.

Full course description for Telecommunications and Internet Management

A time series is a sequence of observations on a variable measured at successive points in time or over successive periods of time. This course provides an introduction to both standard and advanced time series analysis and forecasting methods. Graphical techniques and numerical summaries are used to identify data patterns such as seasonal and cyclical trends. Forecasting methods covered include: Moving averages, weighted moving averages, exponential smoothing, state-space models, simple linear regression, multiple regression, classification and regression trees, and neural networks. Measures of forecast accuracy are used to determine which method to use for obtaining forecasts for future time periods.

Full course description for Time Series Analysis and Forecasting

+ General Guidelines
Transfer Courses

The evaluation of transfer coursework equivalency is conducted by the Computer Science and Cybersecurity (CSC) Department. This process is initiated at the time of admission, with any resulting determinations reflected in the student’s DARS (Degree Audit Reporting System) report. When transferring coursework, students should be aware that many institutions—universities, community colleges, and technical colleges—offer courses that may be considered equivalent to our Pre-Major requirements. In certain cases, a lower-division course from another institution may be deemed equivalent to one of our upper-division courses, or vice versa. However, for the purpose of satisfying upper-division major electives or university graduation requirements, the classification of the course at the originating institution (i.e., whether it is designated as lower or upper division) is the determining factor.

Prerequisites

Students are responsible for understanding and meeting all prerequisite requirements for the courses in which they enroll. Enrollment in a course is contingent upon successful completion of all prerequisites with a minimum grade of C-. Students who do not meet these requirements will be administratively dropped from the course. While the registration system enforces prerequisites for many courses, discrepancies can occasionally occur. If your DARS report indicates that you have met the prerequisites, but you are unable to register due to a system error, please contact your academic advisor for assistance.