top of page

Professional Portfolio

Professional Portfolio: CV

Management of Information Systems

This course provides a broad overview of the information systems management function. The course emphasizes information systems management by familiarizing the student with IT planning, organizing and control. Other topics of interest include control of user services, strategic information use, and other current IT issues such as end user computing, expert systems, distributed systems, client server, etc. The course will cover a broad range of topics to acquaint the student with areas encompassed within IT management.

Database Design

This course will provide a solid and practical foundation for the design and implementation of database systems. Emphasis will be on the relational database model, with significant coverage of basic relational database concepts, normalization, E-R modeling, and SQL. Additional topics may include data warehouse, fundamental transaction management concepts, and more recent data storage technologies if time permits. Course software includes Microsoft Visio and SQL server.

Systems Analysis & Design

This course introduces the fundamentals of object-oriented analysis and design, including experience with a CASE tool. Topics include requirements determination, feasibility analysis, modeling with Unified Modeling Language (UML) and data dictionary construction, data modeling and normalization, user interface requirements specification, and information security procedures.  Successful completion of this course requires development of problem and design specifications for an information systems project.  Project will result in a completed systems design specification plan for that NSF client. This course develops team skills, written and oral communication skills.

CIS Development Project

Focuses on the detailed design and implementation phases of the system development life cycle, including user acceptance testing, test planning, design reviews, and change procedures. Specifications created in CIS 320 (Systems Analysis and Design) are used to implement, test, and install a working version of an information system for a not-for-profit client from the Louisville Metro community. System deployment emphasizes a web-based architecture. A prototyping approach is taken to develop and test the system in an iterative manner.

Introduction to Information Security

This course covers the basic notions of confidentiality, integrity, availability, authentication models, protection models, security kernels, audit, intrusion detection, operational security issues, physical security issues, security system life cycle management, personnel security, policy formation and enforcement, trust modeling, risks and vulnerabilities assessment, basic issues of law and privacy, trade secrets, employee covenants, copyright, database protection, software and hardware validation, verification and certification.

Introduction to Network Security

This course covers the basic concepts of networking, operations security, protocol features for security, transmission security, packet filtering, TCP wrappers, firewalls, computer viruses, physical protection, legal protection, liability issues, significance of National Security Directive 42, implications of Computer Security Act, CERT recommendations, assessment of threats and vulnerabilities of systems, security countermeasures, contingency planning, disaster recovery, risk management, auditing and monitoring, and policies and procedures dealing with storage and disposition of sensitive data.

Computer Forensics

The primary aim of this course is to provide the basic knowledge to perform forensics acquisitions, perform basic computer forensic examinations and prepare reports of their findings. Basic computer forensics concepts involving evidence collection, preservation, examination, analysis, and presentation in court are covered in depth. Technology tools to analyze files, implications on privacy, ethics, policies, risk management and legal aspects will be covered. The course is intended to provide an understanding of:  Fundamentals of computer forensics, forensic acquisition methodologies, the role of the computer examiner in legal disputes, computer forensic examinations, preparing a written report of methods and findings.

Introduction to Database Security

This course is designed to teach you about the design and implementation of secure databases. Emphasis will be placed on multilevel security in database systems, covert channels, and database auditing for relational database systems. In addition the following is taught the fundamental concepts in database security, how access controls work in a database, how to develop and manage secure database architectures, the laws governing computer privacy, alternatives to encrypting stored data for security, how commercial systems such as SQL Server and Oracle
enforce security and their vulnerabilities, the security audit methods involving databases.

Project Management 

This course provides an overview of project management methodologies and how project management is utilized within business. It emphasizes fundamental knowledge areas and skills expected of a project manager in almost every field. Topics include stakeholder management, project phases and project life cycles. Project management processes and case studies are worked on throughout the course duration.I learned project planning, team coordination, and project reporting techniques. Integrating change control strategies and conflict resolution are explored as well.

Software Development: C#

This course introduces object-oriented concepts such as the use of classes, methods, encapsulation, and inheritance. The course concentrates on using object-oriented programming to solve simple problems involving input and output.

bottom of page