This document provides the syllabus for an introductory course on architectural building technologies. The course will introduce students to building structure, enclosures, and interior environments. Students will learn about factors influencing building systems, codes and standards, structural and thermal impacts on interiors, principles of lighting and acoustics design, and integrating building systems evaluations. The course will include assignments, projects, quizzes, and discussions assessed on an 1000 point scale. The instructor's contact information and policies on submissions, late work, communication, and academic integrity are also outlined.
Recap of business plan development; Detail your e-learning project goals; Describe critical competencies; Outline your project; Validate with major stakeholders
BA 632 INFORMATION SYSTEMS SECURITY Instructor Informat.docxwilcockiris
BA 632 INFORMATION SYSTEMS SECURITY
Instructor Information
[Professor’s Name/Title]
Office Hours:
Office:
E-mail:
Telephone:
[ADD OFFICE HOURS]
Call During Office Hours
[CU Email]
[Phone Number]
Professor Contact
The best way to reach me will be by Email. I will respond to your questions within 24 to
48 hours.
Course Information
Online Course
Textbook
Principles of Computer Security, Conklin and White, 4th Edition, McGraw-
Hill Companies, 2016; ISBN: 978-0-07-183597-8.
Course Description
This course covers the common body of knowledge, skills, techniques, and tools in the
domain of information technology security. Topics include threat management, risk
diagnosis, accountability, security frameworks, enterprise security policy, encryption,
wireless security, legal, and ethical issues.
Learning Outcomes
1. Recognize the management of common information security concerns.
(Assessed using quizzes, discussion, project, and individual assignments)
2. Illustrate and discuss the threats, risks, and assessments for an organization’s information
security program.
(Assessed using quizzes, discussion, project, and individual assignments)
3. Assess information security needs and policies.
(Assessed using quizzes, discussion, project, and individual assignments)
4. Analyze the tradeoffs between security and system functionality.
(Assessed using quizzes and individual assignments)
5. Examine the ethical and legal obligations related to information.
(Assessed using quizzes, discussion, project, and individual assignments)
6. Assess the need for disaster recovery and business continuity.
(Assessed using quizzes and assignments)
Information Systems Security Page 2
Maps to CompTia Security+ Exam SY0-401
By studying this textbook, students will be better prepared to take and pass the CompTIA
Security+ Certification Exam. See Appendix A and B for more information. The textbook
includes a CD which contains Practice Exam Software, a PDF copy of the textbook, and
technical support information.
Style for Writing
Use the APA format for papers, etc. Use spell check, grammar check, etc., to make sure that
your papers are submitted in professional form with no keyboarding or grammatical errors.
Resource: Publication Manual of the American Psychological Association. 6
th
edition. ISBN 13:
978-1-4338-0561-5. ISBN 10: 1-4338-0561-8. References are required in your papers.
Suggested Membership
Student membership in the Association for Computing Machinery www.acm.org for online
access to research materials and tutorials.
Additional Materials Needed
Computer access – you will need access to a computer with MS Word and PowerPoint installed.
Your computer should be reliable and accessible. You MUST have a plan of action in the
event your primary computing resources become unavailable to you. Sources for an
alternative may include u.
1 School of Computer & Information Scien.docxadkinspaige22
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste.
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste.
1 School of Computer & Information Sciendrennanmicah
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste ...
Course SyllabusHSV400 – Ethical and Leal Issues in Human Servi.docxvanesaburnand
Course Syllabus
HSV400 – Ethical and Leal Issues in Human Services
Course Description:
This course will evaluate ethical and legal standards as related to critical professional issues. Students will gain an understanding of the relationship and integration of values for the counselor's role in practice, training, supervision, and consultation.
Course Outcomes:
After completing HSV 400, the student should be able to:
· The student will be able to respond to ethical dilemmas by a decision-making process.
· The student will be able to communicate his or her value system, with emphasis on how these values are likely to impact counseling practice.
· The student will be able to identify the different major components of ethical codes for professional counselors.
· The student will be able to communicate an understanding of the laws for counselors and therapists in the state in which he/she intends to practice.
· The student will be able to communicate how her/his personal values influence her/his ethical posture.
· The student will be able to identify the professional organizations for counselors.
Course Materials:
· Corey, G., Corey, M. S., & Callanan, P. (2015). Issues and ethics in the helping professions (9th ed.). Pacific Grove, CA: Brooks/Cole Pub Co.
· Additional reading, listening, viewing materials available on Blackboard.
Course Evaluation:
Assignment
Weight Towards Final Grade
Discussion Boards
40%
Introduction & Background Information Assignment
20%
Final Written Assignment
30%
Self-Assessment Reflection Paper
10%
Student Survey*
--
TOTAL
100%
*To ensure that we continue to meet our academic standards and your learning expectations, we routinely assess our programs, courses, and instructors. Completion of the end-of-course Student Survey is a required component of this course.
Official University Grading Scale:
The following grades are used on academic records and carry the quality points indicated:
Grade
Numerical Equivalent
A
95-100
A-
90-94
B+
87-89
B
83-86
B-
80-82
C+
77-79
C
73-76
C-
70-72
D+
67-69
D
63-66
D-
60-62
F
Below 60
Late Work:
Assignments, including discussion board postings, should be submitted on time per assignment rubric guidelines. If there is an emergency situation, a request for an extension on assignments may be requested of the instructor before the assignment deadline. If no extension request has been made, late assignments will be penalized with a 20 point deduction for each day it is submitted late. Furthermore, discussion boards
Academic Dishonesty:
“Academic dishonesty consists of plagiarism, cheating, unauthorized copying of computer discs, willful introduction of viruses, willful interruption of systems, and may also include unintentional complicity in others’ academic dishonesty. Confirmed dishonesty may result in the assignment of a failing grade of other penalties.” (Post University Student Handbook).
All papers .
Recap of business plan development; Detail your e-learning project goals; Describe critical competencies; Outline your project; Validate with major stakeholders
BA 632 INFORMATION SYSTEMS SECURITY Instructor Informat.docxwilcockiris
BA 632 INFORMATION SYSTEMS SECURITY
Instructor Information
[Professor’s Name/Title]
Office Hours:
Office:
E-mail:
Telephone:
[ADD OFFICE HOURS]
Call During Office Hours
[CU Email]
[Phone Number]
Professor Contact
The best way to reach me will be by Email. I will respond to your questions within 24 to
48 hours.
Course Information
Online Course
Textbook
Principles of Computer Security, Conklin and White, 4th Edition, McGraw-
Hill Companies, 2016; ISBN: 978-0-07-183597-8.
Course Description
This course covers the common body of knowledge, skills, techniques, and tools in the
domain of information technology security. Topics include threat management, risk
diagnosis, accountability, security frameworks, enterprise security policy, encryption,
wireless security, legal, and ethical issues.
Learning Outcomes
1. Recognize the management of common information security concerns.
(Assessed using quizzes, discussion, project, and individual assignments)
2. Illustrate and discuss the threats, risks, and assessments for an organization’s information
security program.
(Assessed using quizzes, discussion, project, and individual assignments)
3. Assess information security needs and policies.
(Assessed using quizzes, discussion, project, and individual assignments)
4. Analyze the tradeoffs between security and system functionality.
(Assessed using quizzes and individual assignments)
5. Examine the ethical and legal obligations related to information.
(Assessed using quizzes, discussion, project, and individual assignments)
6. Assess the need for disaster recovery and business continuity.
(Assessed using quizzes and assignments)
Information Systems Security Page 2
Maps to CompTia Security+ Exam SY0-401
By studying this textbook, students will be better prepared to take and pass the CompTIA
Security+ Certification Exam. See Appendix A and B for more information. The textbook
includes a CD which contains Practice Exam Software, a PDF copy of the textbook, and
technical support information.
Style for Writing
Use the APA format for papers, etc. Use spell check, grammar check, etc., to make sure that
your papers are submitted in professional form with no keyboarding or grammatical errors.
Resource: Publication Manual of the American Psychological Association. 6
th
edition. ISBN 13:
978-1-4338-0561-5. ISBN 10: 1-4338-0561-8. References are required in your papers.
Suggested Membership
Student membership in the Association for Computing Machinery www.acm.org for online
access to research materials and tutorials.
Additional Materials Needed
Computer access – you will need access to a computer with MS Word and PowerPoint installed.
Your computer should be reliable and accessible. You MUST have a plan of action in the
event your primary computing resources become unavailable to you. Sources for an
alternative may include u.
1 School of Computer & Information Scien.docxadkinspaige22
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste.
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste.
1 School of Computer & Information Sciendrennanmicah
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste ...
Course SyllabusHSV400 – Ethical and Leal Issues in Human Servi.docxvanesaburnand
Course Syllabus
HSV400 – Ethical and Leal Issues in Human Services
Course Description:
This course will evaluate ethical and legal standards as related to critical professional issues. Students will gain an understanding of the relationship and integration of values for the counselor's role in practice, training, supervision, and consultation.
Course Outcomes:
After completing HSV 400, the student should be able to:
· The student will be able to respond to ethical dilemmas by a decision-making process.
· The student will be able to communicate his or her value system, with emphasis on how these values are likely to impact counseling practice.
· The student will be able to identify the different major components of ethical codes for professional counselors.
· The student will be able to communicate an understanding of the laws for counselors and therapists in the state in which he/she intends to practice.
· The student will be able to communicate how her/his personal values influence her/his ethical posture.
· The student will be able to identify the professional organizations for counselors.
Course Materials:
· Corey, G., Corey, M. S., & Callanan, P. (2015). Issues and ethics in the helping professions (9th ed.). Pacific Grove, CA: Brooks/Cole Pub Co.
· Additional reading, listening, viewing materials available on Blackboard.
Course Evaluation:
Assignment
Weight Towards Final Grade
Discussion Boards
40%
Introduction & Background Information Assignment
20%
Final Written Assignment
30%
Self-Assessment Reflection Paper
10%
Student Survey*
--
TOTAL
100%
*To ensure that we continue to meet our academic standards and your learning expectations, we routinely assess our programs, courses, and instructors. Completion of the end-of-course Student Survey is a required component of this course.
Official University Grading Scale:
The following grades are used on academic records and carry the quality points indicated:
Grade
Numerical Equivalent
A
95-100
A-
90-94
B+
87-89
B
83-86
B-
80-82
C+
77-79
C
73-76
C-
70-72
D+
67-69
D
63-66
D-
60-62
F
Below 60
Late Work:
Assignments, including discussion board postings, should be submitted on time per assignment rubric guidelines. If there is an emergency situation, a request for an extension on assignments may be requested of the instructor before the assignment deadline. If no extension request has been made, late assignments will be penalized with a 20 point deduction for each day it is submitted late. Furthermore, discussion boards
Academic Dishonesty:
“Academic dishonesty consists of plagiarism, cheating, unauthorized copying of computer discs, willful introduction of viruses, willful interruption of systems, and may also include unintentional complicity in others’ academic dishonesty. Confirmed dishonesty may result in the assignment of a failing grade of other penalties.” (Post University Student Handbook).
All papers .
Cbu online and professional studies syllabusSania Baker
CBU’s Division of Online and Professional Studies (OPS) specializes in “distance education” for working adults and others who need a flexible learning schedule.
School of Computer & Information SciencesCOURSEtroutmanboris
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name:
ITS831 – Info-Tech Import Strat Plan
Section – 11
Fall 2020 – Bi-term –Asynchronous (Online)
Professor:
Dr. George J Trawick
Contact Information:
Office Hours: By appointment
E-mail: [email protected]
Online Support (IT) and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing, information or communication resources must act responsibly. http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website:
Access to the course website is required via the iLearn portal on the University of the Cumberlands website: http://www.ucumberlands.edu/ilearn/
Course Description:
This course focuses on the information technology (IT) leader’s collaborative roles working with an organization’s senior leadership, including aligning business strategy with IT strategy, acting as an equal contributor to the formation of organizational strategy, and integrating ethical policies and practices into an organization. Learners evaluate multidisciplinary research and practices related to leadership, organizational structures and culture. Through the lens of complexity / chaos and change theories, learners analyze IT’s role in contributing to organizational resiliency.
Course Objectives/Learner Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of the course, students will be able to:
a. Explain what managers must know about both using and managing information.
b. Explain the linkages between business and IT strategy, linkages between organizational
and IT strategy, collaboration and individual work, and business processes.
c. Explain the manager’s role and issues related to managing IT itself.
Prerequisites:
There are no prerequisites for this course.
Books and Resources:
Required Text
Pearlson, K., Saunders, C. Galletta, D. Managing and Using Information Systems:
A Strategic Approach, 6th Edition. Burlington, MA: Wiley, 2016.
Professional Associations
• International Information Systems Security Certification Consortium, Inc., (ISC)²® - This Web site provides access to current industry information. It also provides opportunities in networking and contains valuable career tools. http://www.isc2.org/
• ISACA - This Web site provides access to original research, practical education, career-enhancing certification, industry-leading standards, and best practices. It also provides a network of likeminded colleagues and contains professional resources and technical/managerial publications. https://www.isaca.org/Pages/default.aspx
• International Association of Privacy Professionals (IAPP) - This Web site provides an opportunity to interact with a community of privacy professionals and to learn from their experiences. This Web site also provides valuable career advice. https://www.privacyassociation.org/
Course Expectations
Course Activities and Experiences:
Students ar ...
Internet Explorer 6 is no longer supported. Please use a newer bro.docxmariuse18nolet
Internet Explorer 6 is no longer supported. Please use a newer browser.
Internet Explorer 7 is no longer supported. Please consider a newer browser.
Concourse works best with JavaScript enabled.
Toggle navigation
· Syllabus
· View
· Print
· Info
CMIT 451 6380 Implementing Cisco IP Routing (2162)
University of Maryland University College • Adelphi • Syllabus •
CMIT 451 6380 Implementing Cisco IP Routing (2162) CMIT-451
· Spring 2016
· Section 6380
· 3 Credits
· 01/11/2016 to 03/06/2016
Faculty Contact
Robert Chubbuck [email protected]
Course Description
Designed to help students prepare for the Cisco 300-101 ROUTE [Implementing Cisco IP Routing] Exams.) Prerequisite: CMIT 350. A comprehensive study of the implementation of a routed network using Cisco Systems Technologies. The goal is to use advanced IP routing and scalability solutions to increase the number of routers and sites without redesigning the LAN or WAN. Topics include configuration of secure routing solutions, configuration and troubleshooting of various routed environments (access, distributed, and core), and management of access and control. Students may receive credit for only one of the following: CMIT 451 or CMIT 499E.
Course Introduction
This course covers the requirements for one of the qualifying exams for the Cisco Certified Network Professional (CCNP), Cisco Certified Internetwork Professional (CCIP), and Cisco Certified Design Professional (CCDP) certifications.
Projects include configuring and implementing EIGRP, OSPF, and BGP routing protocols, implementing teleworking support services, configuring basic broadband connections, and using GRE tunnels for implementing VPNs.
UMUC does not guarantee that by completing this course you will pass the exam, nor does it provide the exam to you. The cost of the exam is not included in registration fees for the course. Registration for the exam can be done online at www.prometric.com or www.vue.com
Course Outcomes
After completing this course, students should be able to
· analyze network requirements to determine appropriate routing solutions for an organization's needs
· develop valid and reliable implementation, verification, and proactive monitoring plans based on industry standards
· configure and implement appropriate routing solutions that are scalable and secure
Course Materials
Click to access your course materials information
Class Guidelines
Students with Questions or Concerns
If you have questions related to the course content or any of the graded deliverables, contact me. For questions and concerns related to advising, e-mail [email protected] or call 301-985-7000 (toll-free: 800-888-8682).
For other questions and concerns, you can contact your academic director by writing to [email protected] or calling (240) 684-2882. Be sure to mention the course name, course number, and your section number in the subject field of your e-mail. Your e-mail will be treated confidentially.
Writing and Research
Effective w.
BU3010 –Business LawCourse SyllabusSchool of Professiona.docxAASTHA76
BU3010 –Business Law
Course Syllabus
School of Professional Studies
BUS3010 – BUSINESS LAW
(Prepared 12/29/17 for SP18A)
Contents
3Overview
3Course ID
3Course Name
3Department
3Credits
3Prerequisites
3Instructor
3Telephone
3E-mail
3Office
3Office Hours
3Class Meetings
3Classroom
3Learning Management System
3Course Description
4College Information
4Centenary Greater Expectation Learning Outcomes (CGEs)
4Business Department Learning Outcomes
4Classroom Conduct
4Academic Code
4Academic Honesty
6“Publication” of Written Work and Assignments
6Academic Assistance
6Accommodations
6Technical Support
6Course Information
6Course Material
Error! Bookmark not defined.Reference Publications
Error! Bookmark not defined.Reference Websites
6Instructional Techniques
6Course Objectives
7Student Evaluation
8Attendance
9Assignments
9Late Assignments
10Course Schedule
10Session 1
10Session 2
10Session 3
11Session 4
11Session 5
11Session 6
12Session 7
12Session 8
13Activities and Rubrics
13Threaded Discussion Requirements
13Threaded Discussion Rubric
Error! Bookmark not defined.Activity 1
Error! Bookmark not defined.Activity 1 Rubric
26Activities Calendar
Overview
Course ID:BUS3010
Course Name:BUSINESS LAW
Department:
SCHOOL OF PROFESSIONAL STUDIESCredits:
4
Prerequisites:
BUS1001
Studentsshould be competent in Microsoft Word, Excel, and PowerPoint. Instructor:
Leonard P. Pasculli, JD, MBATelephone:
973-579-6143(H)E-mail:
[email protected]
Instructor will do his best to respond to telephone and e-mail messages within 24-hours.
Office:
N/A
Office Hours:
Instructor is available to meet with students before or after On Ground classes by appointment.
Class Meetings:
On-Ground (i.e., in person) each Monday, January 8 through February 26, 2018, 6:00 p.m. to 9:30 p.m. This includes Martin Luther King Jr. Day (1/15) AND President’s Day (2/19). We will meet in person on both of those days.
However, in the event of inclement weather, check Moodle and/or email.
Classroom:
7 Campus Drive, Parsippany-- Room number: ____
Learning Management System:
Access the Moodle student tutorial at: http://www.centenarycollege.edu/cms/en/moodle-help-center/moodle-help-center/students/ for instructions on how to log in, navigate, and submit assignments.
Moodle accessibility versions are available for download; please contact the IT Help Desk at ext. 2362 or [email protected] for assistance.
Course Description:
This Business course will examine areas of law affecting business including the legal process and forms of businesses; contract law; the law of sales; personal, real, and intellectual property law, and product liability and consumer protection. These and business ethics will comprise the principal focus of the course. International treaties and laws affecting those areas of law will also be explored throughout the course.College Information
Centenary Greater Expectation Learning Outcomes (CGEs):
In March 2004, th ...
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
1. -1-
id 205intro. to architectural building technologies
syllabusspring 2021
class informa on
content posted on Tuesday
course descrip on Introductory overview of building technologies associated with structure,
enclosure, and the interior environment (including par on, ligh ng,
acous cs, thermal comfort, and indoor air quality)
course objec ves At the end of the semsester, students will be able to do the following:
discuss factors that contribute to geographic varia on within building
systems
summarize key impacts of laws, codes, and standards on building systems
explain ways that structural and thermal systems may impact the design of
architectural interiors
exemplify how design decisions associated with building systems may be
informed by principles of ecological sustainability
outline basic principles of light and ligh ng design
outline basic principles of acous cs and acous cal design
describe benefits and methods of con nual integra on of building systems
informa on and evalua on throughout a building’s design and life cycle
outline basic principles of indoor air quality and rela onships between
interior product and systems selec ons and indoor air quality
no later that 8:00 a.m.
assignments/project due Sunday
no later than 5:00 p.m.
instructor informa on
billy plyler ph.d.
(e) billy.plyler@mail.wvu.edu
office hours: Monday 1:00 p.m. - 3:00 p.m.
Thursday 5:00 p.m. - 7:00 p.m.
or by appointment
office: 704c allen hall**
(p) 304.293.3534
**I will be working from home this semester, therefore will not be in my tradi onal office.
2. -2-
readings:
Readings are intended to be an important supplement to the informa on
given in class. Informa on found in the readings will be applied to all other
projects and assessments. Readings will come from your books and other
relevant sources. Any reading materials not included in your text will be
available through E-Campus or online at the WVU library.
final grades will be calculated as follows:
900 - 1000 points
800 - 899 points
700 - 799 points
600 - 699 points
below 599 points
‘A’
‘B’
‘C’
‘D’
‘F’
grading/assessment
grading will be based on tests, quizzes, project assignments and par cipa on
assessment
e-campus quizzes
discussions
projects
construc on cases
Total
Bonus
number points total points
6 50
varies
varies
10
300
15 150
4
15
400
150
1000 points
tbd
Date for quizzes, projects, readings, etc. are listed on the course calendar and
are located on the e-campus calendar. All new course content will be posted
on Tuesday of each respec ve week, and it is your responsibility to be aware
of what is due each week and when.
hardware/so ware
Autodesk Revit 2021, 2020 or 2019
Respondus Lockdown Browser
required material
Building Construc on Illustrated
5th ed.
Francis, Ching
isbn: 978-1118458341
There is a 6th ed. but, the 5th is ALOT cheaper and not much different.
id 205intro. to architectural building technologies
3. -3-
e-campus quizzes
Six online quizzes will be given throughout the semester (see course
calendar). These quizzes provide a tool for reviewing materials and to assess
your understanding and reten on of the materials discussed. Test dates are
included in the course calendar, so please mark your calendar accordingly.
Quizzes are open book and open note, but they are also med so it is
important for you to study the materials before taking each quiz. Because
you will have several days to complete each quiz, there will be no make-up
quizzes given.
extra credit
Periodic opportuni es for extra credit will be available throughout
the semester. These assignments are op onal and it is your choice to
par cipate. The exact amount of available extra credit will be determined
as the course progresses. It is your responsibility to follow e-mails, and
e-campus pos ngs to be aware of any extra credit points.
course policies
The following are the guiding policies and principles that will guide the
learning process in this class:
Unless otherwise no fied, all assignments are due no later than 11:59
p.m the day they are due. Please plan your schedules accordingly to be
adequately prepared for each class and deadline. Late work will NOT be
accepted in this class. You will not receive credit for work that is submi ed
a er the stated due date. E-Campus assignments must be submi ed on
me or they will not be registered in the system and you will get a “0” for
the assignment. Online quizzes must also be submi ed by the deadline for
the system to record your grade.
Some ac vi es, projects and readings will, of course, require more me than
others. Don’t put the work off un l the last minute!
My primary way of communica ng with you be through your MIX e-mail
account. It is required that you have a working account, and that you either
check it on a regular basis (daily) or have it forwarded to an account that you
do check regularly. Grades may ONLY be discussed during office hours OR
via the e-campus message system.
I will be available for consulta on during scheduled virtual office hours or
you can set up a mee ng with me at another convenient me. You may
e-mail me at any me, but be aware that I may not receive the message
immediately. I will respond to e-mail as quickly as possible when I recieve
the message.
id 205intro. to architectural building technologies
4. -4-
COVID-19
WVU is commi ed to maintaining a safe learning environment for all students,
faculty, and staff.
Should campus opera ons change because of health concerns related to the
COVID-19 pandemic, it is possible that this course will move to a fully online
delivery format. If that occurs, students will be advised of technical and/or
equipment requirements, including remote proctoring so ware.
In a face-to-face environment, our commitment to safety requires students, staff,
and instructors to observe the social distancing and personal protec ve equipment
(PPE) guidelines set by the University at all mes. While in class, students will sit in
assigned seats when applicable and wear the required PPE. Should a student forget
to bring required PPE, PPE will be available in the building for students to acquire.
Students who fail to comply will be dismissed from the classroom for the class
period and may be referred to the Office of Student Conduct for further sanc ons.
If a student becomes sick or is required to quaran ne during the semester, they
should no fy the instructor. The student should work with the instructor to develop
a plan to receive the necessary course content, ac vi es, and assessments to
complete the course learning outcomes.
Unless otherwise noted, all assignments are to be completed in one of three
formats:
1) using Microso word or other word processing so ware and
uploaded to e-campus as a .pdf file. If you do not know how to
create a .pdf, there are e-campus resources and many internet
resources available for this.
2) using the provided e-campus text entry system.
3) as a .pdf or .png digital file of your design project.
The expected method of submission will be posted with EACH assignment.
It is your responsibility to know which submission method is expected.
Uploading any other file format will NOT be accepted and will count as a
missed assignment.
Remember to always put your name on every assignment that is turned in.
It is the responsibility of each student to track your grades and assure that
your work is up-to-date.
academic dishonesty
All students and faulty members are urged to share in the responsibility
for removing every situa on which might permit or encourage academic
dishonesty.
“The integrity of the classes offered by any academic ins tu on solidifies the
founda on of its mission and cannot be sacrificed to expediency, ignorance,
or blatant fraud. Therefore, I will enforce rigorous standards of academic
integrity in all aspects and assignments of this course. For the detailed policy
of West Virginia University regarding the defini ons of acts considered to
id 205intro. to architectural building technologies
5. -5-
inclusivity statement
West Virginia University is commi ed to social jus ce.
“The West Virginia University community is commi ed to crea ng and
fostering a posi ve learning and working environment based on open
communica on, mutual respect, and inclusion.
If you are a person with a disability and an cipate needing any type of
accommoda on in order to par cipate in this class, please advise me and
make appropriate arrangements with the Office of Accessibility Services
(293-6700). For more informa on on West Virginia University’s Diversity,
Equity, and Inclusion ini a ves, please see h p://diversity.wvu.edu.”
fall under academic dishonesty and possible ensuing sanc ons, please see
the Student Conduct Code h p://studentlife.wvu.edu/office_of_student_
conduct/student_conduct_code. Should you have any ques ons about
possibly improper research cita ons or references, or any other ac vity that
may be interpreted as an a empt at academic dishonesty, please see me
before the assignment is due to discuss the ma er.”
mental health
College students commonly experience issues that may interfere with
academic success.
Stress, sleep problems, rela onship and social concerns, adjustment to
college, financial problems, family issues, discrimina on, or anxiety and
depression all affect one’s ability to remember, learn, and perform. If
you or a friend is struggling, we strongly encourage you to seek support.
Suppor ve resources are available on campus, and most are at no-charge.
The Carruth Center for Psychological and Psychiatric Services (CCPPS)
offers consulta ons, short-term individual therapy, group therapy, and
various mental health-related workshops. Virtual and in-person (outside of
pandemic situa ons) services are available. Crisis services are also available
24/7/365.
Please call (304) 293-4431 to schedule an appointment or speak to a
professional for help in a crisis.
For more mental health resources and informa on, visit the CCPPS website
at: h ps://carruth.wvu.edu/
Crisis services are also available through text: Text WVU to 741741 for
support 24/7 from a trained Crisis Counselor.
id 205intro. to architectural building technologies
6. -6-
sexual misconduct
statement West Virginia University (WVU) does not tolerate sexual misconduct,
including harassment, stalking, sexual assault, sexual exploita on, or
rela onship violence [BOG Policy 44].
It is important for you to know that there are resources available if you
or someone you know needs assistance. You may speak to a member of
university administra on, faculty, or staff, but keep in mind that they have
an obliga on to report the incident to the Title IX Coordinator. If you want
to speak to someone who is permi ed to keep your disclosure confiden al,
please seek assistance from the Carruth Center, 304-293-9355 or 304-293-
4431 (24-hour hotline), and locally within the community at the Rape and
Domes c Violence Informa on Center (RDVIC), 304- 292-5100 or 304-292-
4431 (24-hour hotline). For students at WVU-Tech, contact the Women’s
Resource Center at 304-255-1585 (toll free at 1-888-825-7836) or REACH at
304-340-3676. For students at Potomac State, contact the PSC Psychological
Services Office at 304-788-6976, and locally in Keyser, the Family Crisis
Center, 304-788-6061 or 1-800-698-1240 (24-hour hotline). For more
informa on please consult WVU policies at h p:// tleix.wvu.edu.
id 205intro. to architectural building technologies