{"id":22,"date":"2018-01-17T14:36:08","date_gmt":"2018-01-17T19:36:08","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis3580sec001s2018\/?page_id=22"},"modified":"2022-01-13T00:56:20","modified_gmt":"2022-01-13T05:56:20","slug":"schedule","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/schedule\/","title":{"rendered":"Schedule"},"content":{"rendered":"<table width=\"876\">\n<tbody>\n<tr>\n<td width=\"185\">\n<p><strong>Unit <\/strong><\/p>\n<\/td>\n<td width=\"32\">\n<p><strong>\u00a0<\/strong><\/p>\n<\/td>\n<td width=\"354\">\n<p><strong>Weekly<\/strong> <strong>Readings<\/strong><\/p>\n<\/td>\n<td width=\"180\">\n<p><strong>Project (60%)<\/strong><\/p>\n<\/td>\n<td width=\"126\">\n<p><strong>Exam (30%)<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"185\">\n<p>1<\/p>\n<p>Introduction<\/p>\n<p>1\/13<\/p>\n<\/td>\n<td width=\"32\">\n<p><strong>Intro<\/strong><\/p>\n<\/td>\n<td width=\"354\">\n<p>MSAD Ch. 1, Ch. 2 \u201cSystems Development Environment\u201d<\/p>\n<p>CISA Ch. 3 \u201cSystems Development Methodologies\u201d<\/p>\n<p>CISA Ch. 3 \u201cSDLC Models\u201d<\/p>\n<p>CISA Ch. 3 \u201cSDLC Phases\u201d<\/p>\n<\/td>\n<td width=\"180\">\n<p>&nbsp;<\/p>\n<\/td>\n<td width=\"126\">\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"185\">\n<p>2<\/p>\n<p>Project Management<\/p>\n<p>1\/20<\/p>\n<\/td>\n<td rowspan=\"2\" width=\"32\">\n<p><strong>Planning<\/strong><\/p>\n<\/td>\n<td width=\"354\">\n<p>MSAD Ch.1 \u201cProject Management\u201d<\/p>\n<p>CISA Ch. 3 \u201cProject Management and Governance\u201d<\/p>\n<\/td>\n<td width=\"180\">\n<p>&nbsp;<\/p>\n<\/td>\n<td width=\"126\">\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"185\">\n<p>3<\/p>\n<p>Business Case &amp; Feasibility Analysis<\/p>\n<p>1\/27<\/p>\n<\/td>\n<td width=\"354\">\n<p>MSAD Ch. 4 \u201cIdentifying and Selecting Projects\u201d<\/p>\n<p>MSAD Ch. 5 \u201cInitiating and Planning Information Systems Projects\u201d<\/p>\n<p>CISA Ch. 3 \u201cBusiness Case and Feasibility Analysis\u201d<\/p>\n<\/td>\n<td width=\"180\">\n<p><em>IS Auditors Role in Business Case Development<\/em><\/p>\n<\/td>\n<td width=\"126\">\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"185\">\n<p>4<\/p>\n<p>Requirement Determination<\/p>\n<p>2\/3<\/p>\n<\/td>\n<td rowspan=\"3\" width=\"32\">\n<p><strong>Analysis<\/strong><\/p>\n<\/td>\n<td width=\"354\">\n<p>MSAD Ch. 6 \u201cDetermining Systems Requirements\u201d<\/p>\n<p>CISA Ch. 3 \u201cRequirements Definition\u201d<\/p>\n<\/td>\n<td width=\"180\">\n<p><em>IS Auditor\u2019s Role in the SDLC<\/em><\/p>\n<\/td>\n<td width=\"126\">\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"185\">\n<p>5<\/p>\n<p>Process Modeling<\/p>\n<p>2\/10<\/p>\n<\/td>\n<td width=\"354\">\n<p>MSAD Ch. 7 \u201cStructured System Process Requirements\u201d<\/p>\n<p>CISA Ch. 3 \u201cStructured Techniques\u201d<\/p>\n<\/td>\n<td width=\"180\">\n<p>&nbsp;<\/p>\n<\/td>\n<td width=\"126\">\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"185\">\n<p>6<\/p>\n<p>Data Modeling<\/p>\n<p>2\/17<\/p>\n<\/td>\n<td width=\"354\">\n<p>MSAD Ch. 8 \u201cStructured System Data Requirements\u201d<\/p>\n<p>CISA Ch. 3 \u201cEntity Relationship Diagrams\u201d<\/p>\n<\/td>\n<td width=\"180\">\n<p>&nbsp;<\/p>\n<\/td>\n<td width=\"126\">\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"185\">\n<p>7<\/p>\n<p>2\/24<\/p>\n<\/td>\n<td colspan=\"3\" width=\"565\">\n<p>&nbsp;<\/p>\n<\/td>\n<td width=\"126\">\n<p><strong>Exam<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"185\">\n<p>8<\/p>\n<p>Database<\/p>\n<p>3\/10<\/p>\n<\/td>\n<td rowspan=\"3\" width=\"32\">\n<p><strong>Design<\/strong><\/p>\n<\/td>\n<td width=\"354\">\n<p>MSAD Ch. 9 \u201cDatabase Design\u201d<\/p>\n<p>CISA Ch. 3 \u201cControl Identification and Design\u201d<\/p>\n<p>CISA Ch. 3 \u201cRelational and Embedded Databases\u201d<\/p>\n<\/td>\n<td width=\"180\">\n<p><em>IS Auditor\u2019s Role in Systems Design<\/em><\/p>\n<\/td>\n<td width=\"126\">\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"185\">\n<p>9<\/p>\n<p>Software<\/p>\n<p>3\/17<\/p>\n<\/td>\n<td width=\"354\">\n<p>CISA Ch. 3 \u201cSoftware Development Methods\u201d<\/p>\n<p>CISA Ch. 3 \u201cSystem Development Tools and Productivity Aids\u201d<\/p>\n<p>CISA Ch. 3 \u201cControl Identification and Design\u201d<\/p>\n<\/td>\n<td width=\"180\">\n<p>&nbsp;<\/p>\n<\/td>\n<td width=\"126\">\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"185\">\n<p>10<\/p>\n<p>Human-Computer Interaction<\/p>\n<p>3\/24<\/p>\n<\/td>\n<td width=\"354\">\n<p>MSAD Ch. 10 \u201cDesigning Forms and Reports\u201d<\/p>\n<p>MSAD Ch. 11 \u201cDesigning Interfaces and Dialogues\u201d<\/p>\n<\/td>\n<td width=\"180\">\n<p>&nbsp;<\/p>\n<\/td>\n<td width=\"126\">\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"185\">\n<p>11<\/p>\n<p>Architecture<\/p>\n<p>3\/31<\/p>\n<\/td>\n<td rowspan=\"3\" width=\"32\">\n<p><strong>Implementation<\/strong><\/p>\n<\/td>\n<td width=\"354\">\n<p>MSAD Chapter 13 \u201cSystem Implementation\u201d<\/p>\n<p>CISA Chapter 3.5 \u201cBusiness Application Development\u201d<\/p>\n<p>CISA Chapter 3.6<\/p>\n<p>CISA Chapter 3.9<\/p>\n<p>ISACA \u201cAuditing Risks in Virtual IT Systems\u201d<\/p>\n<p>ISACA \u201cIT Audits of Cloud and SaaS\u201d<\/p>\n<\/td>\n<td width=\"180\">\n<p>&nbsp;<\/p>\n<\/td>\n<td width=\"126\">\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"185\">\n<p>12<\/p>\n<p>Software Development &amp; Testing<\/p>\n<p>4\/17<\/p>\n<\/td>\n<td width=\"354\">\n<p>MSAD Ch. 12 \u201cDesigning Distributed and Internet Systems\u201d<\/p>\n<p>CISA Ch. 3 \u201cInfrastructure Development and Acquisition Practices\u201d<\/p>\n<p>CISA Ch. 3 \u201cHardware and Software Acquisition\u201d<\/p>\n<\/td>\n<td width=\"180\">\n<p><em>IS Auditor\u2019s Role in Process Reengineering<\/em><\/p>\n<\/td>\n<td width=\"126\">\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"185\">\n<p>13<\/p>\n<p>Migration &amp; Deployment<\/p>\n<p>4\/14<\/p>\n<\/td>\n<td width=\"354\">\n<p>MSAD Ch. 13 \u201cSystems Implementation\u201d<\/p>\n<p>CISA Ch. 3 \u201cIS Auditors Role in Project Management\u201d<\/p>\n<p>CISA Ch. 3 \u201cSoftware Development Methodologies\u201d<\/p>\n<p>CISA Ch. 3 \u201cSoftware Testing\u201d<\/p>\n<\/td>\n<td width=\"180\">\n<p><em>IS Auditor\u2019s Role in Reviewing Application Controls<\/em><\/p>\n<\/td>\n<td width=\"126\">\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"185\">\n<p>14<\/p>\n<p>4\/21<\/p>\n<\/td>\n<td colspan=\"3\" width=\"565\">\n<p>&nbsp;<\/p>\n<\/td>\n<td width=\"126\">\n<p><strong>Exam<\/strong><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Unit \u00a0 Weekly Readings Project (60%) Exam (30%) 1 Introduction 1\/13 Intro MSAD Ch. 1, Ch. 2 \u201cSystems Development Environment\u201d CISA Ch. 3 \u201cSystems Development Methodologies\u201d CISA Ch. 3 \u201cSDLC Models\u201d CISA Ch. 3 \u201cSDLC Phases\u201d &nbsp; &nbsp; 2 Project Management 1\/20 Planning MSAD Ch.1 \u201cProject Management\u201d CISA Ch. 3 \u201cProject Management and Governance\u201d &nbsp; [&hellip;]<\/p>\n","protected":false},"author":8584,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"full-width-content","footnotes":""},"class_list":{"0":"post-22","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/pages\/22","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/users\/8584"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/comments?post=22"}],"version-history":[{"count":7,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/pages\/22\/revisions"}],"predecessor-version":[{"id":508,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/pages\/22\/revisions\/508"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/media?parent=22"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}