Lindenwood’s online IT Management degree program requires you to complete 12 information technology courses online including a capstone course or optional internship in information technology management.
This class will focus on the overarching responsibility of securing a network. It will include both physical security, data security, and a detailed evaluation of managing security in a corporate environment.
This course reviews industry accepted standards and the frameworks that provide the cornerstones of IT compliance and management in organizations, which serve as the foundation for the development of IT policies to manage IT resources and the relationship between IT and other organizational entities. Several standards and frameworks will be examined, such as COBIT, ITIL, Zachman, PCI DSS, ISO 2700 series, NIST 800 series, and others, focusing on how they are used to develop IT policies and procedures to manage and protect organizational IT resources and the relation between IT and other business entities in an ethical fashion.
In this course students will analyze frameworks and best practices for managing IT projects, including agile and waterfall, to achieve organizational goals and objectives. Topics to be covered include definition of project scope, time and cost, trade-off analysis, cost estimation techniques, and learning curves. Students will define the requirements for a software development or network security deployment project, including the technical requirements; business user requirements; reporting and data requirements; security, access control, and compliance requirements; and/or service level requirements, as applicable for the type of project. Students will also create a project plan for their software development or network security deployment project as their major assignment in the course.
This course integrates theory, research, and applications that provide the cornerstones for the study of managing within organizations. The functions of management, human behavioral studies, and leadership styles are examined. In addition, IT and its relationship to other departments is considered.
This course is designed to introduce students to the convention and expectations of graduate coursework and to the business and technological communication of IT professionals. Topics will include: academic integrity, academic formatting, paraphrasing, citation, and referencing; thesis writing; presentation, support, and development of ideas; coherence, language formality, language accuracy, and voice; types of academic, business, and IT writing. The goal of this course is to develop students? abilities to communicate accurately and effectively in their academic and professional careers.
This course will explore the management of database integration in the business environment. Database integration is an iterative and ongoing process. An emphasis will be placed on the following areas: treatment of existing data and the standards used with this data, exploration of data standards that are consistent with wider national and international standards, and the role that web access has with integrating and managing database access.
This course will introduce procedures for integrating new technologies into existing organizational systems. It will focus on the benefits as well as the downfalls of incorporating these technologies in the corporate environment.
This course will discuss the concepts and practices used to integrate all departments and functions across an organization onto a single computer system that can serve all departments of the organization effectively. ERP combines multiple software systems used throughout the organization into a single, integrated software system running off a single database allowing various departments to more readily share information and communicate.
This course covers virtualization and cloud technologies. Students will learn about different technologies and concepts of cloud and virtualization and their impact on the design and deployment of information technology in organizations. Different models of cloud services and their pros and cons from the viewpoint of the consumer will be examined. Topics discussed include vendor selection and the development process for cloud computing initiatives, highlighting major design considerations such as security, data storage, monitoring, APIs, and more
This course will address Big Data, its origins, sources, and data types by category. Tools and methodologies for storage, extraction, transformation and visualization will be identified. Big Data analysis including data mining, machine learning and artificial intelligence applications will be discussed. It will also identify real-world business and social problems that may be solved through Big Data solutions.
This course discusses the theory and application of Blockchain technology. Blockchain is an emerging technology that is the foundation of the cryptocurrency marketplace. It is now a driver of technology innovation for business in diverse fields such as supply chain, IoT, smart contracts and more. This course is designed to give the student valuable insights into how Blockchain technology can be used and the considerations for deploying business Blockchain projects.
Choose 3 hours from following
This course will be the culminating project for the degree program. The instructor will mentor students and guide them to completion of an internship, demonstrating successful completion of the degree. Procurement of the Internship site will be the responsibility of the student. Must be taken upon completion of all coursework or concurrent with last course.
This course will tie together components of managing information technology. Students will use the experiences and reflections from previous classes to prepare a paper and a presentation to demonstrate how they will implement the IT policy to ensure efficient usage and protection of corporate IT resources. The paper and the presentation will cover how students will create awareness among employees to facilitate implementation and ensure smooth enterprise-wide adoption of the policy. Finally, the presentation and the paper will demonstrate students’ ability to identify organizational technology needs and how to successfully acquire and deploy the identified technology using the policy. Must be taken upon completion of all coursework or concurrent with last course
As you’re making your decision about pursuing an online degree, you are likely to have questions. From program information to details about the application process, we’re here to help you find the answers you need.