Blue Cross and Blue Shield of Texas Homepage

Full-Time Online Schools

Report to the Community
The Minor in Digital Forensics is open to all majors in the University. Introduction to Programming Concepts. Navigation menu Personal tools Log in Request account. Freshman Composition II Q core. Must log in to PD Portal to access View the archive. Open 6am - 10pm Central Time. For additional language assistance:

Medical Records

Alexis Texas

You can save quotes for later or apply now. You have 0 saved plans in your account. Search articles and watch videos; ask questions and get answers. Topics include everything from improving your well-being to explaining health coverage. Get monthly updates on taking care of your health and simple ways to get the most from your health plan.

Welcome Employers Producers Providers. Sign Up or Log In. Cloud computing has gone from a leading trend in IT to a widely adopted mainstream computing platform.

This course introduces cloud computing concepts where students explore the basics of cloud services ecosystem and deployment models. Students will become acquainted with commonly used industry terms, typical business scenarios and applications for the cloud, security models, and benefits and limitations inherent in the new paradigm of computing. This course will help prepare students for more advanced courses in big data technology and cyber analysis. Formerly titled Cloud Technologies for Business.

The security issues related to web applications will be discussed in this course. Topics include web application authentication, authorization, as well as browser and web database security principles. Various web application security attack types such as code injection, cross-site scripting, and cross-site request forgery will be studied. The course will also include discussions about business aspects that contribute to a secure web-based transaction environment.

Formerly titled Secure Electronic Commerce. There are many policy issues, within the firm and at various levels of government, that affect information assurance. This course will examine how these policies affect electronic security. Subjects will include privacy of information, intellectual property protection, globalization of information systems, and other policy matters.

The protection and control of secured information will also be discussed. Digital Forensic Analysis I. An introductory course in collecting, examining, and preserving evidence of computer crimes. This course examines the issues, tools, and control techniques needed to successfully investigate illegal activities facilitated through the use of information technology.

The tools of collecting, examining, and evaluating data in an effort to establish intent, culpability, motive, means, methods, and loss resulting from e-crimes will be examined. Many of the critical infrastructure systems contain a system control and data acquisition SCADA component. Frequently, the control systems are remotely accessed and therefore become the focal point for attack. This course examines the control system components from the standpoint of vulnerability and protection.

Formerly titled Cyber and Physical Systems. Digital Forensic Analysis II. This course examines advanced digital forensic analysis topics, tools, techniques, and control mechanisms. Advanced topics include operating system artifacts, non-standard file systems, mobile devices, malware, and volatile memory.

Students will gain experience with state-of-the-art forensics tools and techniques needed to successfully investigate illegal activities perpetuated through the use of information technology. This class is designed to introduce students to concepts, tools and techniques associated with modern malicious code analysis.

The course will examine the methods employed by malicious actors to prevent analysis and neutralization of their exploits and discuss ways of leveraging resources and tools to effectively examine malicious code.

Cyber Attack and Defend. This course will bridge the concepts of implementing a secure network with actual cyber threats. Students will learn the necessary skills to implement key IT system components, create security policies, and understand the background of what hackers do to mandate such security measures.

Students will conduct red team assessments against common infrastructure components, and monitor residual effects of attacks. See academic advisor for the required forms. Independent research in an information systems topic under the direction of a faculty member.

Internship in Information Systems. Directed internship of at least hours of work under the supervision of a professional providing students with opportunities to apply concepts, principles, and techniques learned in the classroom. A proposal form must be completed and approved prior to registration. Internship may not be repeated for credit. Internship in Cyber Security. Special Studies in Information Systems. An organized course offering specialized study not normally or not often available as part of the regular course offerings.

Essentials of Technology Management. This survey course provides an overview of the issues that impact technology management. All technology management subsystems are included: The course is designed to help students develop the systems thinking necessary to successfully interact with the burgeoning technological world.

The course will also provide the opportunity for students to develop the entrepreneurial skills important in managing the design, development, and commercialization of technological goods and services.

Formerly titled "Management of Technology. Introduction to Project Management. This introductory course presents concepts and techniques for the management of many types of projects including engineering, construction, product development, as well as science and technology projects. The course is designed to help students develop project planning skills including scope definition, scheduling, cost-estimating and risk assessment.

The course will also provide the opportunity for students to develop skills in support of project leadership, team building and communication. The course focuses on the inputs, tools, techniques and outputs associated with the core project management processes. Students will also complete diagnostics exam instruments and practice exams.

Strategic Management of Technology and Innovation. This course examines the issues involved in the strategic management of technology in contemporary business organizations. The course will examine new product development, emerging technologies and product portfolios; and will explore the dynamics of innovation in the firm. This survey course focuses on technologies that may transform society and improve quality of life: The course will help students refine the systems thinking necessary to connect technology with users: Cooperative learning is a defining characteristic of the course.

Approval in writing from the instructor, the Department Chair, and the Dean of the College of Business. Independent research in a management of technology topic under the direction of a faculty member.

May be repeated for credit, but not more than 6 semester credit hours of independent study, regardless of discipline, will apply to a bachelor's degree. Special Studies in Management of Technology. Special Studies may be repeated for credit when the topics vary, but not more than 6 semester credit hours, regardless of discipline, will apply to a bachelor's degree. The University of Texas at San Antonio. Core Curriculum Requirements 42 semester credit hours Students seeking the B.

Core Curriculum Component Area Requirements First Year Experience Requirement 3 semester credit hours All students must complete the following course, for a total of 3 semester credit hours: Any IS junior- or senior-level course that counts for the IS major. Certificate in Pathogenic Outbreak Investigations This interdisciplinary certificate program is designed for students in biology, information systems and cyber security, computer science and computer engineering disciplines to investigate biological and digital pathogen identification, propagation prediction, and mitigation.

Students pursuing the Certificate in Pathogenic Outbreak Investigations must complete a minimum of 15 semester credit hours: Courses required by all majors: Introduction to Pathogenic Outbreak Investigations: Send Page to Printer. Download PDF of this page. Download PDF of the entire catalog. Academic Inquiry and Scholarship core. Mathematics for Business core. Freshman Composition I Q core. Introductory Microeconomics core and CBK 1. Calculus for Business core and CBK 1. Freshman Composition II Q core.

Introduction to Programming Concepts Laboratory major. Click here to find a doctor. See what Texas Health Aetna can do for you. We are not offering individual plans for This decision does not affect employer-sponsored plans. To purchase an individual plan, please visit Healthcare. Improving member experience, quality of care. Together, Texas Health Resources and Aetna are taking a new approach to the way health care is offered.

With this innovative partnership, these two industry leaders aim to provide more efficient and effective member care at a more affordable cost. By joining the right medical professionals with the right technology, members receive the benefit of quality, personalized health care. Each insurer has sole financial responsibility for its own products. Aetna provides certain management services to Texas Health Aetna. This material is for information only and is not an offer or invitation to contract.

An application must be completed to obtain coverage. Health benefits and health insurance plans contain exclusions and limitations. Providers are independent contractors and not our agents. Provider participation may change without notice. We do not provide care or guarantee access to health services. Not all health services are covered.

See plan documents for a complete description of benefits, exclusions, limitations and conditions of coverage.

An Excellent Education Close To Home