Catalog 2009-2010


Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Catalog 2009-2010

  1. 1. Catalog 2009-2010 July 2009-March 2010 Addendum & Corrections for Arkansas Students Strayer University has recently been approved to offer the following programs: Addition to the School of Arts and Sciences: Criminal Justice Programs The criminal justice program at Strayer University is primarily designed for those either seeking advancement as a manager within an existing governmental or private employer in the criminal justice field or those seeking to increase their knowledge of the latest emergency management strategies and/or technologies to detect and prevent crime. Students have a choice of curriculum options within the criminal justice program. The Bachelor of Science in Criminal Justice offers a choice of four concentrations: Computer Security and Forensics, Criminal Justice Administration, Homeland Security and Emergency Management and Homeland Security Technology. UNdergradUate Program • Bachelor of Science in Criminal Justice Notice to students contemplating careers in licensed criminal justice professions Completion of Strayer University’s criminal justice programs does not guarantee that a student has met the requirements for employment in the criminal justice field. Prior to enrolling in the program, students are encouraged to consult the applicable licensing board in the field of their employment. Students should be advised that many criminal justice employers take into account the following factors when determining eligibility for employment: U.S. citizenship, state residency, criminal background screening, physical and psychological health, age and military discharge information. A listing of contact information for the most common criminal justice-related licensing boards is available on the Strayer University website at: ©2009-2010, Strayer University, Inc. Revision date: November 2009
  2. 2. Bachelor of Science area I-Core Component BUS 100Introduction to Business in Criminal Justice CIS 105Introduction to Information Systems The Bachelor of Science in Criminal CRJ 100Introduction to Criminal Justice Justice (BSCJ) provides students with the ENG 115English Composition knowledge, skills, and professional abilities MAT 105Introduction to College Mathematics relevant to the criminal justice field. Students PSY 110 Social Psychology will explore the theoretical, operational, and Component total ..........................................27.0 legal components of law enforcement and the prevention, adjudication, and correction area II-major Component of juvenile and adult crime. Graduates are CIS 170 Information Technology in prepared for careers in the public or private Criminal Justice sector of criminal justice or cyber crime and CRJ 105 Crime and Criminal Behavior security. CRJ 180 Juvenile Delinquency and Justice The BSCJ program offers area CRJ 220 Ethics and Leadership in concentrations that enable students to tailor Criminal Justice LEG 320 Criminal Law their degrees to their career and educational SOC 205 Society, Law and Government goals. Specializations include: SOC 315 Research Methods in Social • Computer Security and Forensics Sciences • Criminal Justice Administration Component total ..........................................31.5 • Homeland Security and Emergency Management area II-Concentration Component • Homeland Security Technology (Students must choose one of the following Area II Concentration Components to complete the All students in this program must complete Bachelor of Science in Criminal Justice.) the courses outlined in Area I (Core Component), Component total ..........................................40.5 Area II (Major Component) and (Concentration area III-general Studies Component Component), Area III (General Studies ENG 215 Research and Writing Component), and Area IV (Elective Component). ENG 315 Professional Communications HUM 100 Introduction to Art, Music, and Literature HUM 101 The Origins of Western Culture HUM 200 Logicr HIS 105 Contemporary U.S. History OR POL 220 Government and Politics MAT 300 Statistics PSY 100 The Individual and Society or PSY 105 Introduction to Psychology SCI 110 Introduction to Physical Science SCI 115 Introduction to Biology SCI 200 Environmental Science SOC 100 Introduction to Sociology SOC 300 Sociology of Developing Countries Component total ..........................................58.5 area IV-elective Component These courses are selected in consultation with the Academic Advisor. Component total ..........................................22.5 minimum total Quarter Hours required for graduation ............................180.0 ©2009-2010, Strayer University, Inc. Revision date: November 2009
  3. 3. Concentration in Criminal Justice administration Concentration in Homeland Security technology CRJ 310 Law Enforcement Operations CIS 333 Network Security Fundamentals and Management CIS 359 Disaster Recovery CRJ 320 Criminal Investigation CIS 462 Security Strategy and Policy CRJ 330 Comparative Criminal Justice CIS 499 Senior Seminar in Information CRJ 410 Corrections Systems CRJ 475 Advance Topics in Criminal Justice CRJ 440 Terrorism and Antiterrorism CRJ 499 Senior Seminar in Criminal Justice CRJ 475 Advanced Topics in LEG 420 U.S. Courts Criminal Justice SEC 300 Principles of Public and Private SEC 305 Computer Security Security SEC 310 Homeland Security Organization SEC 310 Homeland Security Organization and Administration and Administration SEC 402 Information Warfare and Homeland Security Component total: ........................................40.5 Component total ..........................................40.5 Concentration in Homeland Security and Concentration in Computer Security and emergency management Forensics CRJ 320Criminal Investigation CIS 333 Network Security Fundamentals CRJ 410Corrections CIS 344 Network Defense and Counter CRJ 420Emergency Management Procedures Measures CRJ 440Terrorism and Antiterrorism CIS 414 Operating Systems Security CRJ 475Advanced Topics in Criminal Justice CIS 417 Computer Forensics CRJ 499Senior Seminar in Criminal Justice CIS 462 Security Strategy and Policy SEC 310Homeland Security Organization CIS 499 Senior Seminar in Information and Administration Systems SEC 300 Principles of Public and CRJ 475 Advanced Topics in Private Security Criminal Justice SEC 315 Security Assessment SEC 305 Computer Security and Solutions SEC 405 Computer CSI Component total .........................................40.5 Component total: .........................................40.5 minimum total Quarter Hours required for graduation ............................180.0 All courses are 4.5 credits each ©2009-2010, Strayer University, Inc. Revision date: November 2009
  4. 4. Addition to the School of Information Systems: Information Systems Programs Rapidly advancing technology demands skilled and informed professionals. Whether you are a seasoned professional in the IT field looking to enhance your skills or just entering the workforce looking for the essential tools to move into a new position, Strayer University offers Information Technology courses and programs that suit your needs. The programs combine technical courses with management courses for a wellrounded approach to information technology. All of the courses and programs have an applications- oriented approach, so that what you learn can be immediatelyapplied in the workplace. gradUate ProgramS • Master of Science in Information Systems Notice to students contemplating careers in licensed Information Systems professions Credits earned from Strayer University do not automatically qualify the holder to participate in professional licensing examinations to practice certain information systems professions. General information about information systems licensure options is available from web sites such as Licensing information is also available from the following web sites: Cisco,; Microsoft, learning/mcp/; Oracle,; SANS,; and the Institute for Certification of Computing Professionals, A listing of contact information for the most common information-systems-related licensing boards is available on the Strayer University website at: ©2009-2010, Strayer University, Inc. Revision date: November 2009
  5. 5. master of Science in Information area I-Core Component ACC 557 Financial Accounting Systems CIS 500 Information Systems for Decision-Making The Master of Science in Information ECO 550 Managerial Economics Systems (MSIS) is a professional degree and Globalization program that stresses the technical, MAT 540 Quantitative Methods managerial, and policy issues associated Component total ..........................................18.0 with building computer based systems that support modern organizations. The MSIS area II-major Component program addresses the theoretical and CIS 512 Enterprise Architecture practical aspects of specifying, designing, CIS 517 IT Project Management implementing, and managing systems CIS 532 Network Architecture and Analysis CIS 590 Directed Research Project that possess qualities such as portability, RES 531 Research Methods scalability, and interoperability (open Component total ..........................................22.5 systems). The MSIS program treats information as area III-Concentration Component an organizational resource that is subject to (Students must choose one of the following Area managerial planning and control. It focuses III Concentration Components to complete the on integration of data and distribution Master of Science in Information Systems) of information in helping organizations Component total ..........................................13.5 to be more competitive. In addition, the minimum total Quarter Hours MSIS program offers graduates most of required for graduation ..............................54.0 the academic background necessary to pursue certification as a Certified Computer Professional (CCP). Students who have not earned degrees from appropriate fields of study may be required to take additional coursework as a prerequisite for completing the program. Within this curriculum, students have the option of choosing a concentration in: • Computer Security Management • Decision Support System Management • Enterprise Resource Management • Network Management • Software Engineering Management • Systems Development Management ©2009-2010, Strayer University, Inc. Revision date: November 2009
  6. 6. Concentration in Computer Security management Concentration in Network management CIS 502 Theories of Security Management CIS 505 Communication Technologies CIS 523 Security in Distributed Computing CIS 513 Enterprise Wireless Networks CIS 550 Case Studies in the Management CIS 516 Enterprise Network Management of Information Security Component total: .........................................13.5 Component total: .........................................13.5 Concentration in Software engineering Concentration in decision Support System management management CIS 510 Advanced Systems Analysis CIS 501 Decision Support for Management and Design CIS 519 Decision Support & Intelligent CIS 515 Strategic Planning for Database Systems Systems CIS 522 Data Warehousing Systems CIS 518 Advanced Software Engineering Component total ..........................................13.5 Component total: .........................................13.5 Concentration in Systems development Concentration in enterprise resource management management CIS 521 Enterprise Technology CIS 511 Enterprise Resource Process Models Planning Systems CIS 530 Simulation and Modeling I CIS 537 Enterprise Resource Technologies CIS 531 Enterprise Planning Architecture in Business Component total: .........................................13.5 CIS 538 Designing Enterprise Resource Planning Systems minimum total Quarter Hours Component total ..........................................13.5 required for graduation ..............................54.0 All courses are 4.5 credits each ©2009-2010, Strayer University, Inc. Revision date: November 2009
  7. 7. CIS 511 InforMatIon SySteMS enterprise resource Planning CourSeS Prerequisite: CIS 500 CIS 500 This course covers the operations of a business Information Systems for decision-making and how information systems fit into business This course provides an overview of operations. ERP software is discussed and how microcomputer applications including a brief it is used in supporting business operations. introduction to computer concepts, computer CIS 512 operating systems, software and hardware. enterprise architecture It introduces the student to word-processing, Prerequisite: CIS 210 spreadsheets, the Internet, graphics, and database software. Included is the creation of This course covers the concepts of corporate web pages, integration of the applications, and data models and strategies for transforming hands-on introduction to Microsoft Windows the models into physical designs. It provides commands, files, features and functions. a foundation for implementing the physical designs onto various computer architectures. CIS 501 decision Support management CIS 513 This course presents the concept of Decision enterprise Wireless Networks Support Systems, from a management Prerequisite: CIS 175 perspective, including the integral function This course provides the theory and its of the Internet. Emphasizing management application necessary to design an Enterprise application, it explores the implications of Wireless Network. Emphasis is placed on decision support technology on management, wireless technologies that deliver reliable voice the role of DSS in enhancing creativity and and data communication to centralized and problem solving, the use of intelligent software dispersed organizational entities. agents, and commercial data mining. CIS 515 CIS 502 Strategic Planning for database Systems theories of Security management Prerequisite: CIS 210 Prerequisite: CIS 333 This course covers strategies for developing This course presents current and emerging and implementing an effective database system. theories in security management. This course Topics include database systems organization, addresses the policies, guidance, technologies, creation, and maintenance; and evaluation and organizational concerns that security criteria and standardization of database systems. managers must be aware of and take into CIS 516 account to provide a secure computing enterprise Network management environment. Prerequisite: CIS 175 CIS 505 This course provides the foundation necessary Communication technologies to develop a network management system for Prerequisite: CIS 175 the Enterprise. Emphasis is placed on operating, This course presents the general trends and monitoring, and controlling the network to topics of the computer communication theory. ensure it provides value to the organization. It provides a foundation for analysis, design, CIS 517 implementation, and management of computer It Project management communication systems. Prerequisite: CIS 210 CIS 510 This course provides a practical and theoretical advanced Systems analysis and design foundation for applying project management Prerequisite: CIS 210 activities to Information Technology projects. This course provides an integrated approach Emphasis is placed on how the systems to the study of systems analysis and design. It development life cycle, prototyping, rapid highlights CASE tools and analysis as means of application development, and acquiring and solving problems. maintaining systems are managed and used in Enterprise System solutions. ©2009-2010, Strayer University, Inc. Revision date: November 2009
  8. 8. CIS 518 CIS 531 advanced Software engineering enterprise Planning architectures Prerequisite: CIS 210 Prerequisite: CIS 210 This course combines theory with practical This course provides the knowledge and applications in developing and managing understanding needed to define planing software applications that support business architectures that support businesses. Emphasis functions. Key issues such as risk management, is placed on the development of data, technology transfer, control, modeling and application, and technology architectures that quality assurance are covered. describe the data, applications and technology needed to support the business. CIS 519 decision Support & Intelligent Systems CIS 532 This courses explores the variety and richness Network architecture and analysis of support systems – the wide range of users, Prerequisite: CIS 175 problems, and technologies employed and This course focuses on network architecture illustrates how the concepts and principles have development concepts and components been applied in specific systems. including architecture functions and use. It CIS 521 provides the student with the skills required enterprise technology Process models developing, managing, and sizing architectures in large organizations. Topics include Prerequisite: CIS 500 topologies, protocols, connectivity, transactions, This course covers the construction of a process and performance. that can be used for the development and management of enterprise information systems. CIS 537 Emphasis is placed on the relationship between enterprise resource technologies in Business business processes, requirements, architectures, This course explains Enterprise Resource and infrastructures. Planning (ERP) systems and how information systems fits into business operations. More CIS 522 specifically, it’s about looking at the processes data Warehousing Systems that makes up a business enterprise and seeing This course combines theory with practical how ERP software can improve the performance applications in developing and managing Data of these business processes. This course Warehouse Systems that support business introduces students to the world of Enterprise functions. Key issues such as risk management, Resource Planning, and prepares them for technology transfer, control, modeling and success in today’s marketplace. It focuses on a quality assurance are covered. single application (SAP R/3, the industry leader) CIS 523 for consistency, while also including coverage of Security in distributed Computing other popular ERP software. Prerequisite: CIS 333 CIS 538 This course provides the theory and designing enterprise resource Planning technologies used to provide security in a Systems distributed computing environment. Describes Prerequisite: CIS 512 firewall, intrusion detection, defense-in-depth This course concentrates on the success and operating system, and database security in an failures surrounding the implementation of ERP enterprise networking environment. systems. Assessment, risk, management and CIS 530 implementation strategies of ERP systems are Simulation and modeling I analyzed using case studies. Prerequisite: MAT 540 This course applies quantitative methods to managing and determining the capacities of computer systems. It emphasizes sampling, organizing, and analyzing data as applied to computer performance. ©2009-2010, Strayer University, Inc. Revision date: November 2009
  9. 9. CIS 550 CrIMInal JuStICe CourSeS Case Studies in the management of Information Security CrJ 100 Prerequisite: CIS 333 Introduction to Criminal Justice This course introduces students to the Provides an analysis and study of current issues components and operations of the criminal in computer and network security. Students will justice system. It examines the three main analyze security case studies and articles and components of that system: law enforcement, provide a detailed analysis of the issues, possible the courts, and corrections. Issues and remedies, and policies, procedures, and guidance challenges within the criminal justice system and affecting the outcome from a management the system’s future are also explored. perspective. CrJ 105 CIS 590 Crime and Criminal Behavior directed research Project Prerequisite: CRJ 100; PSY 100 or PSY 105 Prerequisite: DRP 999/RES 531 To be taken as This course covers the historical development of last or next to last course social and behavior explanations of adult crime, This course enables student to complete a as well as juvenile crime and new evolutions in research project in the field of major crime, including cyber crimes. Crime causation concentration. The research project will be theories are explained in relation to policies monitored by a supervising faculty member and developed from these theories and the real and must be defended by the student in an oral intended impact of these policies are discussed examination. The oral defense may be to demonstrate their impact on society in regard conducted in a conference-style meeting of to crime prevention and criminal rehabilitation. student, instructor, and second reader or technical advisor. A second type of defense CrJ 180 allows students to present a synopsis of their Juvenile delinquency and Justice projects during one of the last two scheduled Prerequisite: CRJ 100 class meetings. Students are encouraged to This course examines the criminal activity discuss the project with an instructor or of juveniles and includes the study of gangs, academic officer early in their program. status offenses, and the problems facing Students may not fulfill the directed juveniles today. An overview of American research requirement by completing another juvenile justice is also provided, in terms course. of both system and practice. The causes of juvenile crime, the juvenile court system, and the institutionalization, rehabilitation, and treatment of juveniles are explored. CrJ 220 ethics and Leadership in Criminal Justice Prerequisite: CRJ 100 This course exposes students to the various philosophical approaches for developing appropriate ethical decision-making tools for the criminal justice professional. Ethical decision- making tools are illustrated in actual application in police, courts, corrections, criminal justice policy, and criminal justice research scenarios. Emphasis is placed on professional integrity and leadership skills that support laws, policies, and procedures in criminal justice. ©2009-2010, Strayer University, Inc. Revision date: November 2009
  10. 10. CrJ 310 CrJ 420 Law enforcement operations and management emergency management Procedures Prerequisite: CRJ 100; BUS 100 Prerequisite: SEC 300 This course gives students an overview of This course provides an in-depth review of the the police and their mission in contemporary concepts of emergency management work. The society. It examines typical police operations, operational aspects are discussed in relation to the management of police organizations, and the skills needed to do emergency management some of the challenges facing policing today. work, as well as the analytical and critical think- The course also looks at technology in the ing skills needed for incident command work. service of law enforcement, and explores the Emphasis is placed on the use of technologies, future of policing. enhanced leadership skills, and the challenges of communications in disaster work. CrJ 320 Criminal Investigation CrJ 440 Prerequisite: CRJ 105 terrorism and antiterrorism The course teaches students the fundamentals Prerequisite: SEC 310 of criminal investigation by examining This course exposes the student to the processes involved in identifying and arresting various forms of terrorism. Explanations of criminal suspects, identifying types of crimes terrorism from a theoretical and sociological and offenses, and in preparing for the in-court perspective are reviewed as causal effects presentation of evidence through testimony. of past, current, and new forms of terrorist Techniques and procedures for evidence behavior. Operational responses to terrorism are collection, preservation, and examination are discussed, with special emphasis on the role of discussed, and developing ‘high technologies’ Homeland Security. useful to the criminal investigator are explored. CrJ 499 CrJ 330 Senior Seminar in Criminal Justice Comparative Criminal Justice Prerequisite: Last or next to last course Prerequisite: CRJ 100; CRJ 105 This course enables the Criminal Justice student This course offers a comparative perspective to analyze a social, psychological, or business on crime and on the practice of criminal problem within Criminal Justice, Homeland justice. The role of increased globalization in or Private Security, and recommend solutions transnational crime and justice are explored, by developing a capstone research project. The to include: trafficking in persons, transnational project will consist of an analysis of a situation crime, narcoterrorism, international cybercrime or policy, a current assessment, and a proposed and cyberscams, the relationships between solution. Emphasis will be placed on applying international terrorist organizations, and the theory, the use of research and evidence based functioning and organization of international solutions, and incorporating ethical foundations crime fighting agencies. to support solutions. CrJ 410 Corrections Prerequisite: CRJ 100; CRJ 105 This course provides a comprehensive overview of the field of corrections. It explores agencies, practices, and polices relevant to prisons, jails, and probation and parole. Students examine both historic and contemporary punishment policies in the United States, sentencing structures; socio-political economic conditions that influence disparate sentencing and confinement; facility designs and how they correlate with inmate management philosophies; the legal aspects of the care, custody and control of inmates; the constitutional rights and civil liberties of inmates; security operations, and inmate treatment services. ©2009-2010, Strayer University, Inc. Revision date: November 2009
  11. 11. Notes
  12. 12. Notes