Computer programmers are key components of the technology industry in their role of designing and maintaining information systems as well as writing code for a variety of businesses and organizations.
Professionals who work in today's technology arena need the skills to successfully manage information resources. Whether the customers of an organization are internal or external, their needs must be met and, in most cases, the bulk of the responsibility lies on the shoulders of information technologists. Students preparing for the "real world" need to know what is expected of them and how th
Computer, information, and physical security are becoming more important at an exponential rate since the tragedies of September 11, 2001. Because of these events and new threats, the necessity for cyber security has moved to the forefront.
The Computer Science and Information Technology Department at Limestone offers a concentration in Programming for those students interested in a programming career. The department provides the students with current programming tools that help them develop the skills necessary to succeed in graduate school as well as in their future professions.
In this Associate of Science program, students take core courses in Microcomputer Applications, Basic Concepts of the Internet and World Wide Web, Operating Systems and Network Fundamentals, various Programming courses, amongst others.
This is an introduction to microcomputer applications concentrating on the use of word processing, presentation, and spreadsheet applications.
A fundamental course in understanding computer science concepts including hardware, computer systems, and the major components/architecture, data representation, number systems, operating systems, differences in programming languages, the internet, security systems, ethics, and networking concepts.
This course covers current system software, including topics as process, memory and device management, security, networking, and distributed operating systems, as well as communications of computers using networks including topics such as: basic network protocols, network operating systems, typical network hardware, and a brief overview of standard network communication applications.
A course concerned with problem-solving using a high-level language focusing on the basic techniques of programming: data types, control structures, iteration, I/O, and procedural abstraction.
A course concerned with presenting the programming approach of object-oriented languages with a focus on data abstraction, objects, classes, methods, and inheritance.
This course covers methods and mechanisms used to control access to computer resources including authorization, authentication, and activity monitoring as well as cryptography concepts including such topics as techniques for disguising data, cryptography techniques, different approaches to cryptography, and technologies for incorporating cryptography.
This course examines the internal, external, public, and private communication systems; networking structures; devices; protocols; and remote access and administration.
This is an introductory course in C# programming. Topics include data types, expressions, decision-making, repetition, arrays, methods, file I/O, and event-driven programming.
This course covers the design, development, and creation of Web pages using the HyperText Markup language (HTML) and the Extensible Markup language (xHTML).
Advanced programming techniques, data structures, and file organization are covered in depth. Program complexity and an introduction to artificial intelligence are included.
This course covers the software development life cycle, including specification of requirements, system/program design and development, and operations and maintenance.
This course covers network, hierarchical, and relational databases. Emphasis is placed on database organization, design and use of database management systems, and data description languages.
This course examines computer crimes, laws, and regulations. Also included are techniques for investigating a crime, gathering evidence, and handling procedures. Development and implementation of an incident-handling program is an important part of this course.
This course examines controls involving personnel, hardware, systems, and auditing and monitoring techniques, abuse channels and how to recognize them. Additional topics include threats, risks, and counter-measures to protect facilities, hardware, data, media, and personnel; facility selection, entry methods, and environmental safety procedures are also discussed.
This course examines the identification of company assets, the proper way to determine the necessary level of protection required, budgeting concerns for security implementation projects, and goal setting to reduce threats as well as monetary loss.
An introduction to western business technology from medieval times to the present. Examines the rise of business in America, the role of the corporation, business and labor, and business and government. Examines the process of technical change, the nature of technological systems, the diffusion of technological improvements, and the role of technology in broader historical movements.
This course covers the use of object-oriented programming languages, such as Java, in the creation of programs, applets, and interactive Web sites.
This course examines concepts, principles, and standards for designing and implementing secure applications, operating systems, and systems. It will cover international security measurement standards and their meaning for different types of platforms.
This course uses MySQL to build secure, database-driven web sites.
This course focuses on the organization and management behind large-scale information technology projects. Topics include requirements analysis and specification, testing and validation of information technology tools.
A course that focuses on the game development process.
This is the computer science capstone project course for all Computer Science majors. This course applies the foundational concepts of computer science through a comprehensive project, chosen in accordance with the student's concentration and career goals. Students will be required to plan, research, and develop a project in conjunction with the student's concentration: cyber security, information technology, or programming. Additionally, students will be required to write a formal research paper based on their concentration, and complete comprehensive exams drawn from the core computer science courses and concentration specific courses. This course may not be taken as a coordinated study.
The student is placed in a local private or public enterprise to gain work-related experience consistent with his/her field of study. The student will have a faculty sponsor as well as a supervisor at the internship site to direct the student's activities. Internships require senior standing a cumulative and major GPA of 2.5. A student is expected to complete 125 hours or 250 hours for 3 semester hours or 6 semester hours of credit, respectively.
The course provides a practical look at the methodologies, tools, and techniques necessary for implementation, operation, and maintenance of an information system, including an in-depth study of the systems development life cycle.
Focused on database design and data analytics, students will learn how to strategize database management systems that scale to meet the needs of evolving business environments as well as manage and analyze the data mined from these systems.
This course is designed to provide students with the essential tools needed for leading and managing information technology projects, which include initiating, planning, executing, controlling, reporting, and closing a project. Additional topics include the evolving role of the information technology manager.