SC 3705 Integration of Computer Applications

The aim of this course is for students to understand and apply EA methodology to define organizational logic and IT infrastructure, meeting the demands of integration and standardization of the business operating model and ensuring that IT investments are in line with business strategies and the process is transparent. EA (Enterprise Architecture), Zackman, and Open Group: Togaf, methodologies are recommended, as well as the study of lateral thinking and creativity.

SC 3470 Computer Technology Security

The aim of this course is for students to: (1) Master I.T. security standards and apply computational tools and environments designed for this purpose. (2) Study an international information security standard as an option to obtain a certification (Security Mechanisms, Operational Aspects, Policies, Attacks, Security Domains, Coroner Computing, Informational Reports, Security Services, Threat Analysis, and Vulnerabilities).