The following table provides a map of the various course options available for ISM students.  Filter the course information for the course profiles for the various categories.  

 
  Introduction ISM 3630: Business Information Systems
Select
2 courses
Core ISM 5992: Database Systems
ISM 4575: IT Security
ISM 5530: Ethics in Information Systems
ISM 5570: Data Mining
ISM 5860: Data Communications & Networks
Select
3 courses
Tracks Inbound (IIT) Specialist
ISM 5705: Inbound Information Technology
ISM 5994: Software Tools/Business Applications
ISM 5670: Apps/Social Media
ISM 5670: Study in Boston
ISM 5670: Video Creation
Enterprise Analyst
ISM 5820: Systems Analysis & Design
ISM 5900: Project Management
ISM 5200: ERP Systems: Concepts and Practices 
ISM 5560: Survey of E-commerce

Select
1 course
Capstone ISM 6997: Information Systems Policy & Management
  Additional ISM 4900: Directed Study in Information Systems Management
ISM 5890: Internship in Information Systems Management

 

Filter by Course Type:

 

ISM 3630: Business Information Systems

Course Type: Introduction

Lead Instructor: Christine Jackson


Course Description:

This introductory information systems management course establishes a foundation for understanding the value of information systems in organizations. This course is:

  • a man­agement-oriented study of computer-based information systems in organizations, and
  • an overview of the manner in which information systems and technology supports business processes, managerial decision-making, and organizational strategy.

It has been forecasted that there will be a vast shortfalls of information systems workers in the coming decade. Thus, information systems is becoming one of the core disciplines for a quality 21st century university education. To succeed in business, then, a university educated individual must now possess some level of proficiency and understanding of the principles of information systems.

Course Rationale:

The Information Age is a time of rapid technological innovation and constant change. Thus, the goal of this course is to help the student develop a general understanding of the drivers, methods, strategies, and tactics required to meet the rapid and dynamic changes facing organizations today. The role information systems plays in advancing, supporting and influencing organizational decisions is examined.

Using technology as a way to improve productivity is not new. Since the early 1960s, the emphasis has been on using information technology to replace manual processes thereby increasing the availability of information available to management to compete in this global environment.

In the 21st century, technology is becoming ever more powerful and embedded in the majority of business processes to meet ever-changing business needs. Organizations are becoming more dependent on the effective use of technology to make strategic and operational decisions to sustain a competitive advantage and to operate with agility and flexibility.

Course Content:

The following topics will be covered in this course:

  1. analyzing the business environment;
  2. using technology most effectively to achieve organizational goals;
  3. evaluating the impact of information systems on the organization;
  4. a broad introduction to various concepts in information systems management;
  5. information system topics including analytics, big data, business intelligence, cloud applications, collaboration, databases, data communication, mobile systems, security, and systems development;

The utilization of information systems and technology to gain a competitive advantage will be the prevailing theme in this course.

Learning Objectives:

After completing this course, students will be able to:

  1. demonstrate critical thinking abilities by applying appropriate information to solve the problem, making recommendations, and drawing logical conclusions;
  2. demonstrate effective written communication skills, so that your message is understood by individuals with diverse backgrounds, capabilities, and interests and use proper delivery tools, techniques and mechanics in presentations;
  3. understand and display characteristics and behaviors of an information professional;
  4. collaborate with persons from a variety of backgrounds, interests, and roles, while fostering an atmosphere of tolerance and fairness, and demonstrate effective work in teams in order to accomplish business related goals and objectives;
  5. demonstrate effective use of workplace productivity technology as well as electronic communication technology tools;
  6. understand and identify ethical issues in contemporary business practice, and analyze, evaluate and take a position on an ethical issue in contemporary business practice;
  7. analyze business problems affected by multiple facts, external influences, and stakeholders with varying interests/agendas;
  8. describe ways in which computers can be used in business and management to improve efficiency and effectiveness and enable new business opportunities;
  9. understand the language of computer and information systems technology;
  10. gain an awareness of the skills required to participate in systems design and project implementation including user requirements identification, awareness of data structures choices, security issues, and alternative development methodologies;
  11. be aware of managerial, ethical and organization issues that are associated with the development, implementation, and use of information systems;

Software Utilized:

Certification Prepared:




ISM 4575: Introduction to IT Security

Course Type: Core

Lead Instructor: Alexander DePetro


Course Description:

This course provides an investigation of a broad selection of contemporary issues in computer security. Students are exposed to the spectrum of security activities, methods, methodologies, and procedures. This exposure includes the inspection and protection of information assets, detection of and reaction to threats to information assets, and examination of pre- and post-incident pro­cedures, technical and managerial responses. An overview of the Information Security Planning and Staffing functions is discussed.

Course Rationale:

The goal of this course is to educate and explain to students why information systems security is important.  Consider these statistics:  

  • it will take the average business 146 days to notice a security breach;
  • the average cost paid for each lost/stolen record containing sensitive or confidential information was $154;
  • 1 in 5 organizations suffers a mobile security breach;
  • barely half of companies offer some form of security training which is considered a major security defense;
  • the average total cost of a data breach was $3,790,000;

Learn more by visiting "The Anatomy of a Data Breach" interactive website (https://cloud-platform-assets.azurewebsites.net/anatomy-of-a-breach/). The information on this website explains the issue of data security by examining the data heist.  

Course Content:

The following topics will be covered in this course:

  1. information systems security;
  2. malware and social engineering attacks;
  3. application and network attacks;
  4. vulnerability assessment and mitigating attacks;
  5. host, application, and data security;
  6. network security;
  7. administering a secure network;
  8. wireless network security;
  9. access control fundamentals;
  10. authentication and account management;
  11. basic cryptography;
  12. advanced cryptography;
  13. business continuity;
  14. risk mitigation;

Learning Objectives:

After completing this course, students will be able to:

  1. evaluate the components of corporate network infrastructures;
  2. explore technologies, processes and methodologies to design, build and maintain secure corporate networks;
  3. explore the fundamental principles of information security including access control, authentication, application and network security, cryptography, business continuity, and risk management;
  4. apply security principles to describe, evaluate, and operate a layered approach to building defensive network architecture;
  5. explore various types of design and implementation vulnerabilities, their underlying causes, identifying characteristic, methods of exploitation, and potential mitigation strategies;

Software Utilized:

Certification Prepared:




ISM 4990: Directed Study in Information Systems and Management

Course Type: Additional

Lead Instructor: Christine Jackson


Course Description:

The directed study course provides the student with the opportunity to focus on advanced readings and research in a particular area of information systems. In addition, the student could also complete a tutorial or certification under the supervision of a faculty member in an area of special interest to the student and faculty member.

Course Rationale:

The goal of this course is to ...

Course Content:

The following topics will be covered in this course:

Learning Objectives:

After completing this course, students will be able to:

Software Utilized:

Certification Prepared:




ISM 5200: ERP Systems: Concepts and Practice

Course Type: Track-Enterprise Analyst

Lead Instructor: Debra Habel


Course Description:

Enterprise Resource Planning (ERP) systems comprise the primary software applications for the accounting, operational, and man­agerial activities of an organization. This course discusses the role and function of ERP sys­tems within organizations; analyzes the major business processes in their organization and their implementation using ERP software; provides hands-on use of ERP tools for transaction processing and decision support; and describes the use of ERP systems for customer relationship management (CRM), supply chain management (SCM), and electronic commerce.

Course Rationale:

The goal of this course is to ...

Course Content:

The following topics will be covered in this course:

  1. Introduction to ERP Systems
  2. Introduction to the Sales and Purchasing Cycles
  3. Introduction to SAP ERP, Simulation Orientation
  4. SAP Simulation
  5. Financial Accounting in SAP ERP
  6. The Procurement Process in SAP ERP
  7. The Fulfillment Process in SAP ERP
  8. Introduction to the Production Process
  9. The Production Process in SAP ERP
  10. Planning and Scheduling, Simulation Orientation

Learning Objectives:

After completing this course, students will be able to:

  1. understand the nature and scope of modern ERP systems;
  2. become familiar with the business processes and management decisions they support;
  3. understand the overall structure of the database used with an ERP package;
  4. obtain experience with two popular ERP software packages;
  5. identify the critical success factors for ERP package selection and implementation;

Software Utilized:

Certification Prepared:




ISM 5530: Ethics in Information Systems

Course Type: Additional

Lead Instructor: Alexander DePetro


Course Description:

This course provides an awareness of the wider social, legal and ethi­cal issues associated with information systems use. The relationships among techno­logical change, society and the law are discussed. Students are also introduced to legal areas such as intellectual property and liability for defective software.

Course Rationale:

Information technology has revolutionized the way we conduct many aspects of our lives. The tremendous technological advancement in the area of computers and related devices created unforeseen social situations that necessitate new ethical consideration. Important issues like privacy, free speech, and ownership of the material have new meanings in the information age. As there are unique contemporary ethical issues that would not have existed if computer technology had not been invented.

Thus, the goal of this course is to provide the student with an awareness of the wider social, legal and ethical issues of information systems and technology. The course describes the relationship between technological change, society and the law, emphasizing the role that computers and information systems professionals play in a technological society. The course also introduces the student to legal areas, for example, intellectual property, liability for defective software, computer misuse, and seeks to provide an understanding of ethical concepts that are important to both information systems and business professionals.

Course Content:

The following topics will be covered in this course:

  1. an overview of ethics;
  2. ethics for information systems professionals;
  3. professional ethics and responsibilities;
  4. computer and internet crime;
  5. privacy and personal information;
  6. freedom of expression / freedom of speech;
  7. intellectual property;
  8. software development;
  9. the impact and control of computer technology;
  10. employer / employee issues and computers in the workplace;
  11. the impact of information systems on the quality of life;

Learning Objectives:

After completing this course, students will be able to:

  1. determine the impact of the privacy laws on information security policies;
  2. understand the issues related to intellectual freedom, intellectual property, and copyright law as they relate to electronic publishing;
  3. determine and identify ethical procedures and behaviors in the organization related to information security;
  4. appreciate how rapid changes in technology might affect ethical issues and changing norms of behavior;
  5. understand the issues related to privacy and confidentiality as they relate to information systems;
  6. understand the ethical issues associated with gathering, storing and accessing personal information in databases;

Software Utilized:

Certification Prepared:




ISM 5560: Survey of e-Commerce

Course Type: Track-Enterprise Analyst

Lead Instructor: Toni Somers


Course Description:

This course provides an introduction to electronic commerce. The course discusses e-commerce scope, busi­ness-to-business (B2B) and business-to-consumer (B2C) activities, supporting software, hardware, networking, and security technologies. There are various readings and online discussions.

Course Rationale:

The goal of this course is to ...

Course Content:

The following topics will be covered in this course:

Learning Objectives:

After completing this course, students will be able to:

Software Utilized:

Certification Prepared:




ISM 5570: Data Mining / Analytics

Course Type: Core

Lead Instructor: Ajit Sharma


Course Description:

This course focuses on developing techniques on how to analyze large datasets so they can be understood and used efficiently. The course focuses on using techniques, algorithms, and software to automate the analysis and exploration of those datasets. This course covers the methodology, major software tools, and applica­tions in the data mining and analytics field.

Course Rationale:

Data mining is an increasingly important set of analytic tools for dealing with the vast amounts of data (usually measured in the zeta-bytes range -- a billion trillion bytes) which is often collected in a haphazard manner resulting in many missing values.

Thus, the goal of this course is to analyze, manage, and make decisions with this volume of data. Since there are various data mining techniques which involve transforming many fields of data, these data sets are explored yielding hidden and unknown patterns which can be used for decision making. Thus, data mining involves pattern recognition as well as mathematical and statistical techniques to search data to gain insights.

Course Content:

The following topics will be covered in this course:

  1. powerpivot introduction;
  2. data management;
  3. data analysis expressions (DAX);
  4. powerview overview;
  5. data mining topics ...
    • overview
    • classification
    • estimate
    • clustering
    • forecasting
    • association

Learning Objectives:

After completing this course, students will be able to:

  1. perform critical thinking using analytic models;
  2. develop a research avenue for the investigation of competitive resources;
  3. practice presentation and communication skills;
  4. expand their ability to think and reason rigorously through using pattern detection;

Software Utilized:

Certification Prepared:




ISM 5820: Systems Analysis and Design

Course Type: Track-Enterprise Analyst

Lead Instructor: Arik Ragowsky


Course Description:

This course is a structured, formal approach to information systems development. Analysis, logical requirements specification, general and detailed design, control, and implementation of information sys­tems are discussed.

Course Rationale:

The goal of this course is to ...

Course Content:

The following topics will be covered in this course:

  1. design and analyze algorithms;
  2. select appropriate paradigms;
  3. have an awareness of modern development and testing tools;

This knowledge area brings together those fundamental concepts and skills related to the software development process.

Learning Objectives:

Students must be able to design and analyze algorithms, select appropriate paradigms, and have an awareness of modern development and testing tools. This knowledge brings together those fundamental concepts and skills related to the software development process.

On completing the course, students should be able to ...

  1. undertake system design in a methodical manner;
  2. proceed from a general system or product requirement to a design that addresses user needs;
  3. develop design models and prototypes in an iterative manner recognizing managerial risks;

Formal analysis, design methodologies, team projects, and the systems development` life cycle thus integrating Complexity, and/or Software Analysis and Design knowledge.

  • Problem-solving strategies
  • Iterative and recursive analysis of data structures
  • Divide-and- conquer strategies
  • Fundamental design concepts and principles
  • Program decomposition
  • Prototyping
  • Introduction to software process models (e.g., waterfall, incremental, agile)

Software Utilized:

Certification Prepared:




ISM 5860: Data Communications and Networks

Course Type: Core

Lead Instructor: Alexander DePetro


Course Description:

In this course, data communication concepts and terminology, commu­nication system design approaches, data communications standards, data communications software and hardware, network architecture, and distributed information systems are discussed.

Course Rationale:

The goal of this course is to introduce the undergraduate business student to various facets of business data communications. This includes the concepts and terminology, approaches to designing systems, standards, hardware and software, network architectures, distributed information systems, and electronic commerce. This course blends technical and managerial aspects of business data communications and it’s importance in the business / enterprise environment.

Course Content:

The following topics will be covered in this course:

  1. introduction to data communications;
  2. application layer;
  3. physical layer;
  4. data link layer;
  5. network and transport layers;
  6. network design;
  7. wired and wireless local area networks;
  8. backbone networks;
  9. wide area networks;
  10. the internet;
  11. network security;
  12. network management;

Learning Objectives:

After completing this course, students will be able to:

  1. explain the meaning of terms describing common techniques and concepts in data communications and networks utilizing wireshark network protocol analyzer software;
  2. identify and differentiate among alternative designs for meeting data communications requirements of various organizations;
  3. describe the most important standards that currently apply to data communications and networks in having a better understanding of the five layer internet network model;
  4. demonstrate proficiency in using wireshark network protocol analyzer software to see the packets and different layers utilized when sending electronic mail, using the World Wide Web, and uploading/downloading files;

Software Utilized:

WireShark, Trace Plus

Certification Prepared:




ISM 5890: Internship in Information Systems Management

Course Type: Additional

Lead Instructor: Christine Jackson


Course Description:

For an internship course, student performs assigned tasks and responsibilities in a professional manner under the supervision of the host-employer. The internship is for a mini­mum of 160 hours during the semester. The student is expected to abide by the rules and reg­ulations established by the employer and expected of all employees at the organization. Student must satisfactorily complete all course requirements outlined in the internship program for the Ilitch School of Business.

Course Rationale:

The goal of this course is to ...

Course Content:

The following topics will be covered in this course:

Learning Objectives:

After completing this course, students will be able to:

Software Utilized:

Certification Prepared:




ISM 5900: Project Management

Course Type: Track-Enterprise Analyst

Lead Instructor: Arik Ragowsky


Course Description:

This course provides the student with an understand­ing and appreciation of the different knowledge areas of project man­agement. In addition, insight into developing the inputs, tools, techniques, and outputs to successfully manage projects are discussed.

Course Rationale:

The goal of this course is to ...

Course Content:

The following topics will be covered in this course:

Learning Objectives:

After completing this course, students will be able to:

Software Utilized:

Certification Prepared:




ISM 5992: Database Systems

Course Type: Core

Lead Instructor: Kyunghee Lee


Course Description:

This course details the importance of data in today's enterprise. The theories, models, and techniques for designing, developing, creating, and manipulating a database are described. In addition, students practice data modeling, physical database design, database implementation, and complete introductory SQL exercises. Lecture informa­tion is used to reinforce practical exercises.

Course Rationale:

The amount of data created worldwide will swell to a total of 163 zettabytes (163 billion trillion bytes) by 2025. Organizations must determine what portion of that data to manage and how to manage it. Data represents a digital existence with more than 25% of it created in real-time with IoT (Internet of Things) data constituting 95% of it. Database systems provide a structured methodology to organize collections of related data for rapid retrieval and for fact-based or evidence-based decision making.

Thus, the goal of this course is to provide the student with knowledge in database concepts and applications which are essential for information systems professionals as databases connect all business functions and processes in an organization. Thus, this course focuses on the fundamentals of database design, theories, models, and techniques for designing, developing, creating and manipulating a database.

Course Content:

The following topics will be covered in this course:

  1. database concepts and architecture;
  2. entity relationship (ER) modeling;
  3. normalization;
  4. structured query language (SQL);
  5. database application issues of control and security;
  6. emerging database management technologies;

Learning Objectives:

After completing this course, students will be able to:

  1. define the theoretical models used to construct databases;
  2. analyze complex information system management problems with database solutions;
  3. articulate database functions and data modeling concepts;
  4. articulate relevant concerns regarding database control and security;
  5. articulate various business rules through the use of table constraints;
  6. create a database conceptual design using Entity-Relationship (ER) modeling;
  7. explain the trends of database-related technologies;
  8. implement a database design using a relational database management system (RDMS);
  9. utilize Structured Query Language (SQL) to retrieve, join tables, and manage information;
  10. write database queries to answer business questions;
  11. demonstrate the role of a database in supporting web applications;

Software Utilized:

Oracle 10G server,

Certification Prepared:




ISM 5994: Software Tools for Business Applications

Course Type: Track-Inbound Information Technology

Lead Instructor: John Heinrichs


Course Description:

This course introduces the student to designing and developing smart, personalized, and responsive websites. Students create responsive web pages to provide an optimal viewing experience on multiple and varied devices. They also learn to integrate database functionality into web pages allowing all web pages to "know" who is looking at the information and to present different content to different viewers in different formats. Smart design includes creating content complete with video, progressive forms, and focused calls-to-action.

Course Rationale:

The goal of this course is to introduce the use of the internet and the various tools and techniques to design and develop websites. Students will be employed in organizations competing in an environment characterized by rapid change, voluminous data, and complex dynamics that is rapidly shifting toward internet usage. With significant website traffic coming from mobile devices, responsive web design demands that the organization's website(s) are designed and developed to provide an optimal viewing experience across a wide range of devices. In addition, effective organizational websites integrate database functionality allowing all pages to “know” who is looking at the information and to present different content to different viewers in different formats. This “smart” design includes content complete with video, progressive forms and focused calls-to-action. Thus, competitive organizations personalize each type of page for each visitor’s unique requirements. In this course, students learn how to design professional websites to enhance the organization's digital presence and then to assess and analyze its impact.

Course Content:

The following topics will be covered in this course.

  1. HTML5 and CSS3: complete projects highlighting images, text, menu navigation;
  2. Responsive Design: develop web page templates / web pages that are responsive;
  3. Email: create responsive templates for email and newsletters; monitor email analytics;
  4. Blogs: develop blog templates using HTML5 and CSS3 standards
  5. Landing Pages: integrate call-to-action buttons into landing pages;

Learning Objectives:

After completing this course, students will be able to:

  1. articulate the fundamental concepts of web design and development;
  2. practice web-based presentation skills;
  3. articulate the required concepts of smart, personalized, and responsive design & development;
  4. investigate the various usages and benefits of CSS3;
  5. develop an avenue for the investigation of WWW resources;
  6. understand and apply a multimedia capture and presentation tool;
  7. utilize a web authoring tool;

Software Utilized:

VPN, NotePad++, Filezilla, HubSpot Website,

Certification Prepared:

Email Certification, Design Certification




ISM 6997: Information Systems Policy and Management

Course Type: Capstone

Lead Instructor: Arik Ragowsky


Course Description:

Within the overall structure of the systems approach, this capstone course integrates the managerial, technical, and strategic planning and control concepts developed throughout the undergraduate courses. This course also focuses on the concepts and meth­odologies necessary for management of information systems projects.

Course Rationale:

The goal of this course is to ensure students are able to be effective in helping an organization make better use of its information systems and computers and then to help the organization's staff understand more about the information systems and its capacity for improving business effectiveness.

Course Content:

The student will achieve a levels Familiarity, the capability of Usage and the ability to Assess.

  • Familiarity: The student understands what a concept is or what it means. This level of mastery concerns a basic awareness of a concept as opposed to expecting real facility with its application. It provides an answer to the question “What do you know about this?”
  • Usage: The student is able to use or apply a concept in a concrete way. Using a concept may include appropriately using a specific concept in a program, using a particular proof technique, or performing a particular analysis. It provides an answer to the question “What do you know how to do?"
  • Assessment: The student is able to consider a concept from multiple viewpoints and/or justify the selection of a particular approach to solve a problem. This level of mastery implies more than using a concept; it involves the ability to select an appropriate approach from understood alternatives. It provides an answer to the question “Why would you do that?”

Learning Objectives:

After completing this course, students will be able to:

  1. establish and manage professional relationships;
  2. gather and analyze information;
  3. structure unstructured problems;
  4. research alternative solutions;
  5. analyze buy versus build decisions;
  6. perform technology planning;
  7. develop and communicate a scope-of-work and work plan;
  8. communicate difficult technical concepts to a non-technical audience;
  9. document and analyze outcomes;
  10. formulate persuasive recommendations;
  11. present project outcomes;

Software Utilized:

Certification Prepared:




ISM 5705: Inbound Information Technology

Course Type: Track-Inbound Information Technology

Lead Instructor: John Heinrichs


Course Description:

This course focuses on providing insights and practical guidelines to help students learn how to create an appealing and engaging digital presence for businesses. The course discussion focuses on topics relevant to planning, managing, and implementing online and social media interactivity such as search engine organization (SEO), inbound links, blogging, page ranking, tagging content, pillaring content, tweeting, publishing content, analytic reports, and social media.

Course Rationale:

The Inbound Information Technology (IIT) movement is an effective way to leverage content on the internet to grow a business. The goal of this course is to use industry-recognized certifications, resources, exercises, and software tools to create a comprehensive approach to running and growing a business.

Thus, this course provides a framework to prepare students to enter the world of inbound information technology as educated and informed information systems professionals and entrepreneurs. Students are required to become a content managers/creators and share insights about the data coming into the organization.

Students use social media tools to develop reach and engagement, analytical models to create insights, and inbound technologies to promote competitive operations. Students conduct research in the areas of keyword generation, process and workflow creation, landing pages, blogs, social monitoring, email campaigns, search engine optimization, intelligence gathering, and campaign development and tracking.

Course Content:

The following topics will be covered in this course.

  1. Driving Awareness: how to drive organic traffic from search engines to the content and websites;
  2. Content Development: understand the various elements of content; content ‘pull’, story-first, and hyper-personalized;
  3. Conversion Rate Optimization: to ensure that the website is the most effective tool when it comes to turning visitors into customers
  4. Social Media: investigate the power of social media in the areas of video publishing, social networks, presentation sharing, photo sharing, and social news
  5. Insight Generation: investigate the insights that can be discovered from using visitor data

Learning Objectives:

After completing this course, students will be able to:

  1. create an effective inbound information technology (IIT) strategy;
  2. understand the inbound methodology and technologies (how inbound helps startups attract visitors, convert leads, nurture prospects, close customers and generate revenue);
  3. perform critical thinking using inbound information technology analytic models;
  4. articulate the fundamental concepts of inbound techniques, tools, and technologies;
  5. apply social media tools and applications to various organizational scenarios;

Software Utilized:

HubSpot Marketing, HubSpot CRM

Certification Prepared:

Inbound Certification




ISM 5670: Digital Video Creation and Analytics

Course Type: Track-Inbound Information Technology

Lead Instructor: Richard Lerman


Course Description:

Most of us already own a camera or smart phone that can shoot digital video. This course helps the student use various devices to shoot professional looking video that can be posted on YouTube or another website, and then to analyze its impact.

Course Rationale:

The goal of this course is to to prepare the student to create video content as it is forecasted that video traffic currently makes up 57% of all consumer internet traffic and video traffic is expected to increase to 82% by 2020. Users upload 300 hours of new video to YouTube every minute, and view almost 5 billion videos every day. Customers expect to find video content on organization's websites and consumers are 64% more likely to purchase a product after watching a video. Organizations big and small are looking for employees that can develop compelling videos to meet their customer’s demand for video consumption.

Course Content:

The following topics will be covered in this course:

  1. Captioning: add closed captioning to videos; add videos to a webpage;
  2. Post Production: introduction / advanced topics in post-production editing of video;
  3. Production Planning: plan and shoot video (A roll vs. B roll);
  4. Tools / Equipment: cameras, resolutions, tripods, and different shots;
  5. Trends: explore emerging video trends;

Learning Objectives:

After completing this course, students will be able to:

  1. articulate the value of digital video in the enterprise;
  2. script and storyboard a short narrative sequence;
  3. setup appropriate lighting and sound for professional looking video;
  4. utilize editing techniques for post-production and prepare videos for distribution via the web;
  5. apply effective team communication and coordination skills to complete the video process from pre-production script development through web deployment;
  6. evaluate video analytics to determine the impact of a video;
  7. articulate on emerging video trends;

Software Utilized:

Certification Prepared:




ISM 4500: Business Co-op Assignment

Course Type: Additional

Lead Instructor: Christine Jackson


Course Description:

This course provides the students with practical application of theory to on-the-job experience. Students will normally be assigned to cooperating business organization for internship periods of one semester.

Course Rationale:

Course Content:

Learning Objectives:

Software Utilized:

Certification Prepared: