My Portfolio

My time at the University of Louisville was very enduring, and a challenge. I have completed challenging courses that gave me classroom experience in my career field. This is the Coursework I have completed that displays what I learned in each class


Business and Systems Analysis

CIS 410

Management of Information Systems – CUE

In this course, I explored:

  • Strategic development of information technology.
  • How the value chain is analyzed and applied to information resource management.
  • Planning for information systems.
  • Organizing, staffing, and controlling development of IT.
  • The development of an IT platform and it architecture that relates to organizational success.
  • Analyzing an organization’s position based on Porter’s Five Forces and how it can affect an organization.
  • How an Internet Enabled Business Model is able to contribute to how successful an organization can be.

This course was one of the last classes I took during my time at the University of Louisville. The Cass Analysis I wrote helped me improve my writing skills, and gave me some insight on what decisions are possible for a business to implement. I also got the chance to do a strategic assessment with a business of my choosing, and get an insight of how they can improve in the near future

CIS 320

System Analysis and Design

In this course, I explored:

  • Processes of Information systems by which are understood, analyzed, and designed.
  • Creating an information system deliverable that was used to conduct planning, analysis, and design activities.
  • Understanding and using object-oriented modeling using unified Modeling Language (UML).
  • Introducing and understanding iterative and incremental development.
  • Develop problem solving and critical thinking skills as a systems analyst.
  • Gain practical experience in discussion making in a group and as a member of an information systems development team.
  • Develop client engagement and skills that are expected of a systems analyst.

This course was designed to be like a consulting project with a business. These documents will provide an overview of how I created use cases, use case diagram, sequence diagrams, class diagrams, and a Gantt chart to keep track of project progress

Database Design and Applications

CIS 310

Database Design

In this course, I explored:

  • The fundamentals of relational database design and implementation
  • Entity relationship modeling concepts and techniques
  • Basic features of the current version of SQL
  • Design and implementation of data warehouses
  • fundamentals of database administration
  • Extensive coverage of E-R modeling
  • Extensive coverage of the relational model, normalization, and SQL

This course helped me to understand database design, and the importance of entity relationship models to when it comes to designing a database. Running SQL queries for data retrieval from tables stored in databases. I used Microsoft SQL management studio for most of my class work

Data Models

The Relational Database Model

Database Design and Modeling

SQL Queries

CIS 300

Computer Information Systems

In this course, I explored:

  • Functions of organizational information systems
  • Roles that information systems play within organizations
  • Collect, organize, and manipulate data that generates important information to make decisions
  • Expand my knowledge of Microsoft Excel and Access software tools that businesses use
  • Analyze and solve different types of business problems

This course further explored the use of Microsoft Excel, and explore other possible functions that are possible when using Excel. I also explored Microsoft Access, but we never dived deep into that area in this course. These assignments gave me the opportunity to make me expand my knowledge of Excel, and understand how it is important when analyzing data

Retrieving data by IF, AND, COUNT, COUNTIF, SUM, MAX, and MIN Functions

Retrieving data by COUNT, MIN, SMALL, MAX, LARGE, AVERAGE, SUM, MEDIAN, COUNTIF, COUNTIFS, AVERAGEIF, and SUMIF Functions

Retrieving data by Left, Mid, Right, ConCATENATE, FIND, UPPER, AND LOWER Functions

Retrieving data by DATEDIF, FILTERING, AUTOFILTERING, CALULATING SUBTOTALS, PIVOT TABLES, AND PIVOT CHARTS

CIS 420

Development Project

In this course, I explored:

  • Participate in planning of information systems development activities, and to monitor and to report progress with respect to plan expectations;
  • Apply iterative development techniques to design and to implement an information system;
  • Design an information system using object-oriented modeling techniques;
  • Demonstrate an understanding of system implementation practices, including topics such as design patterns, development frameworks, Platform-as-a-Service (PaaS), Software-as-a-service (SaaS), code versioning, software integration, and testing;
  • Implement an information system in accordance with design models and standard practices;
  • Apply systems technologies acquired in previous courses to the development of an information system;
  • Refine written and oral communication skills;
  • Take the initiative in developing a software solution and in contributing to/leading group activities: and
  • Gain practical experience in group decision-making and in functioning as a member of an information systems development team.

This course allows for students to be able to take a consulting project plan that was created in a previous course, and design a project that is intended for the business to use our design. The assignments I did in the class were working with a database that would be designed to connect to a fully functional website. The SQL I have linked is the code me and a partner created to run SQL queries, and other functions

GitHub link to my SQL Code for the Development Project

CIS 483

Intro to Database Security

In this course, I explored:

  • The fundamentals of database security, and concepts used in both SQL management studio, and Linux
  • Understand access controls, and how they work in a database
  • Develop and manage database architectures
  • Getting familiar with laws that consider computer privacy
  • Use alternatives to encrypt data that is stored
  • Understanding commercial systems, and how they enforce security, and possible vulnerabilities that could potentially affect their systems

This course allows students to get an understanding of how database security is so important when it comes to storing critical data. I worked with both Microsoft Management Studio, and Linux operating system to get a better understanding. I also worked with a partner to write a paper on data mining, and how crucial it is in the business world

Data Encryption Lab

Penetration Testing Lab with Kali Linux

System Identifier for the Database Lab

Data Mining Term Paper

Programming Application

CIS 150

Fundamentals of Information Systems

In this course, I explored:

  • Explain the Role and Impact of Technology in the Professional Business Community. Assess and identify critical knowledge and skill gaps related to core Business functions and IT functions. (LO1)
  • Learn about methods of software development. Describe the tools and strategies critical to software development. Analyze the use of protective measures to safeguard computers and data. (LO2)
  • Understand and Develop HTML through the creation of an HTML Document, understanding the Attributes and Elements and ability to link files within a website. (LO3)
  • Work with browser developer tools to aid in the creation and maintenance of fully functioning website. Learn to use the most current CSS styles to create visually interesting pages and captivating graphical designs. (LO4)
  • Learn about and develop JavaScript comments and code to insert an element into a web page design. Use JavaScript properties and methods and use browser debugging tools in developing your web pages. (LO5)

This course explores HTML, CSS, and JavaScript to understand how they work together to create functional web pages that interact with one another. HTML gives the layout for a webpage, CSS is the design for how a webpage looks, and JavaScript has many functions that can create a dynamic environment to handle events on webpages. The following code is examples of webpages that show the basic layout for HTML, and CSS code

Coding Challenge 1 HTML

Coding Challenge 1 HTML Code

Coding Challenge 2 Using HTML and CSS

Coding Challenge 2 Code

Tutorial 1

Tutorial 1 Code

Tutorial 4

Tutorial 4 Code

CIS 199

Software Development I

In this course, I explored:

  • The fundamental concepts in computer programming
  • Introduced with the basic features of C#, how it is laid out, and how it works. With an introduction to arrays, methods, classes, and control flow
  • Introduced to Object-Oriented Programming concepts
  • Explore the use of Graphical User Interface (GUI) programming in C#
  • Using Visual Studio to create, edit, debug, and execute C# programs and applications

This course explores C# programming, and how Microsoft Visual Studio is a great tool to use when creating programs. Visual Studio was the main tool I used for the class, and the assignments gave me a basic understanding of C# programming.

Creating a simple Debug C# Program

Lab 1

Creating a C# Program to Calculate Diameter, Surface Area, and Volume of a Circle when a Radius is entered

Lab 3

Creating a C# Program to take a Future Value, Interest Rate, and Amount of Years to return its Present Value

Lab 7

Business Communication & Writing

BUS 301

Business Communication

In this course, I explored:

  • Crafting professional messages based on your communication goals (instrumental, relational, and identity) and the needs of your receivers.
  • Identifying five core competencies of effective business communication (professional, clear, concise, evidence-driven, persuasive)
  • Skillfully selecting and applying a variety of techniques for meeting each competency
  • Research, organize, and deliver professional messages using appropriate communication channels

This course helped me develop my business communication skills, and teach me the differences between writing a business document, and an academic paper. I was also given the opportunity to work with Christy Jarboe, and Louisville Forward to talk about a business cluster, and how it can improve. A long report was written for this cluster in a small group, and showcases our written business communication skills. I also wrote a good, and bad news messages to understand the appropriate ways of writing these types of messages

Business Cluster Memo for Louisville Forward

Good News Message

Bad News Message

Business Cluster Long Report

Information Security

CIS 481

Introduction to Information Security

In this course, I explored:

  • Define information security
  • Recount the history of computer security and how it evolved into information security
  • Define key terms and critical concepts of information security
  • List the phases of the security systems development life cycle
  • Describe the information security roles of professionals within an organization
  • Discuss the organizational business need for information security
  • Explain why a successful information security program is the shared responsibility of an organization’s general management and IT management
  • List and describe the threats posed to information security and common attacks associated with those threats
  • Describe the relationship between threats and attacks against information within systems
  • Describe the significance of attack timing in threat assessment
  • Describe the functions of and relationships among laws, regulations, and professional organizations in information security
  • Explain the differences between laws and ethics
  • Identify major national laws and regulations that affect the practice of information security including:
    • Computer Security Act
    • Sarbanes–Oxley
    • Gramm–Leach–Bliley
    • COPPA/HIPAA/FERPA
    • USA Patriot Act
    • Americans with Disabilities Act, Section 508
    • FDA 21 CFR part 820/806
  • Discuss the role of culture as it applies to ethics in information security
  • Describe management’s role in the development, maintenance, and enforcement of information security policy, standards, practices, procedures, and guidelines
  • Explain what an information security blueprint is, identify its major components, and explain how it supports the information security program
  • Discuss how an organization institutionalizes its policies, standards, and practices using education, training, and awareness programs
  • Explain the difference between Enterprise Information Security Policy (EISP), Issue-Specific Security Policy (ISSP), and Systems-Specific Security Policy (Sys-SP)
  • Develop ISSP/Sys-SP plans for the protection of intellectual property, the implementation of access controls, and patch and change management
  • Describe what contingency planning is and how it relates to incident response planning, disaster recovery planning, and business continuity plans
  • Develop contingency plans for mock organizations of various sizes
  • Define risk management, risk identification, and risk control
  • Describe how risk is identified and assessed
  • Assess risk based on probability of occurrence and likely impact
  • Explain the fundamental aspects of documenting risk via the process of risk assessment
  • Describe the various risk mitigation strategy options
  • Identify the categories that can be used to classify controls including NIST 800-53
  • Discuss conceptual frameworks for evaluating risk controls and formulate a cost-benefit analysis
  • Discuss ways to document and manage exceptions
  • Discuss the important role of access control in computer-based information systems, and identify and discuss widely used authentication factors
  • Describe firewall technology and the various approaches to firewall implementation
  • Identify the various approaches to control remote and dial-up access by authenticating and authorizing users
  • Discuss content filtering technology
  • Describe virtual private networks and discuss the technology that enables them
  • Identify and describe the categories and models of intrusion detection and prevention systems
  • Describe the detection approaches employed by modern intrusion detection and prevention systems
  • Define and describe honeypots, honeynets, and padded cell systems
  • List and define the major categories of scanning and analysis tools, and describe the specific tools used within each category
  • Chronicle the most significant events and discoveries in the history of cryptology
  • Explain the basic principles of cryptography including:
  • common cryptographic uses (data protection, data integrity, authentication, non-repudiation)
  • block vs stream
  • symmetric cryptography
  • asymmetric (public-key) cryptography
  • hybrid cryptography (including Diffie-Hellman)
  • hash functions and collision resistance
  • digital signatures
  • public key infrastructure
  • digital certificates
  • Describe the operating principles of the most popular cryptographic tools
  • Awareness of federal cryptographic standards (including FIPS 140, 180, 186, 197, 198, and SP 800-32, and 800-38x)
  • List and explicate the major protocols used for secure communications including:
  • DES, Blowfish, Twofish, AES/Rijndael
  • MD4, MD5, SHA-1, SHA-2, SHA-3
  • RSA, ECC, ElGamal, DSA
  • Describe common failures in cryptographic systems including:
  • Types of attacks (brute force, chosen plaintext, known plaintext, differential and linear cryptanalysis, etc.)
  • Implementation failures
  • Discuss the relationship between information security and physical security
  • Describe key physical security considerations, including fire control and surveillance systems
  • Identify critical physical environment considerations for computing facilities, including uninterruptible power supplies
  • Explain how an organization’s information security blueprint becomes a project plan
  • Discuss the many organizational considerations that a project plan must address
  • Explain the significance of the project manager’s role in the success of an information security project
  • Describe the need for professional project management for complex projects
  • Describe technical strategies and models for implementing a project plan
  • List and discuss the nontechnical problems that organizations face in times of rapid change
  • Describe where and how the information security function should be positioned within organizations
  • Explain the issues and concerns related to staffing the information security function
  • Enumerate the credentials that information security professionals can earn to gain recognition in the field
  • Discuss how an organization’s employment policies and practices can support the information security effort
  • Identify the special security precautions that must be taken when using contract workers
  • Explain the need for separation of duties
  • Describe the special requirements needed to ensure the privacy of personnel data
  • Discuss the need for ongoing maintenance of the information security program
  • List the recommended security management models
  • Define a model for a full maintenance program
  • Identify the key factors involved in monitoring the external and internal environment
  • Describe how planning, risk assessment, vulnerability assessment, and remediation tie into information security maintenance
  • Explain how to build readiness and review procedures into information security maintenance
  • Discuss digital forensics, and describe how to manage it
  • Describe the process of acquiring, analyzing, and maintaining potential evidentiary material
  • Apply critical thinking skills to case analysis, security research paper summaries, and company security assessment

This course explores different concepts in the world of information security, and the history of IS. The course also explores different IT related laws, and regulations that have passed to ensure our data is secured. These class exercises allowed me to work in a group, and discuss these ideas in further detail to demonstrate teamwork. I also wrote a paper with a partner about how much impact Cyber Warfare has on Cyber Security, and what we can do to prevent further attacks