Dr. Casey G. Cegielski

Copyright © CGC CONSULTING SERVICES LLC. All rights reserved.


Information Security and Assurance (ISMN 5730)
The interconnected networks of the Internet are the infrastructure that supports “cyberspace,” a vast collection of websites, pages, and content that is accessible ubiquitously to more than 2 billion users in almost every organization on Earth. As innovations, the Internet and cyberspace provide to enterprises heretofore unknown opportunities to communicate, collaborate, and, coordinate business activities through the use of information systems. Securely managing information systems and data is perhaps the single greatest challenges for the modern enterprise. Almost daily, popular press details the consequences and repercussions of systems breaches that result in exposure of sensitive information.

As a student in this course, you will be presented with an overview of the best practices for information security management and assurance. The objectives for this course are:
1.     Understand the role of information security in today’s business environment
2.     Digest current methodologies employed in the field of information security
3.     Prepare for the professional practice of information security and assurance​

Information Systems Risk Analysis (ISMN 5740)
For individuals and enterprises living and operating in modern society, the use of information systems in daily life and the ordinary course of business is inescapable. As mainstream media details almost daily, the risks associated with the use of information systems are equally pervasive.

The question of “how safe is safe enough?” is an exercise in risk analysis and as a student in this course you will be presented with the knowledge and skills to assess systems risk from both a quantitative and qualitative perspective to facilitate organization (and personal) decision-making. Students will learn to…

1.     Gather data and formulate information pertinent to the assessment of risk
2.     Perform fundamental analysis of data and information in an effort to…
3.     Articulate risk in a decision useful fashion.

 ​Information Technology Auditing (ISMN 5750)
Developments in information technology have had a tremendous impact on business processes. The application of IT to business processes has also introduced risks that require unique internal controls and subsequent testing. Student in this course will learn…

1.      Conceptual frameworks for auditing systems
2.      Methodological approaches to test controls
3.      Methods for communicating audit results to stakeholders

Other Regular Course Offerings

Data Analytics I
This course is an introduction to the theory and application of Big Data in today's dynamic business environment. Students are introduced to the complex aspects of data ('the 3 Vs') and the opportunities available to businesses that can successfully leverage competencies to utilize data. Tool coverage includes R and SAS.

Object-Oriented System Development
This course is an exercise in applying OO concepts in business problem solving. Course topics include the fundamental concepts of object-oriented programming, the basic structure of the JAVA language, the design, implementation and testing of application controls, the development of applets/applications using JAVA API, and database (MySQL) applications using JDBC/ODBC.

Open Source Software for Analytics
This course is a hands-on exercise implementing open source systems to support common business analytics processes. Students utilize Linux OS, MySQL, Apache, Samba, and other OSS technologies to develop networked workstations, database file servers, web servers, and other business support tools that are foundational to business analytics tools such as Hadop and MapReduce. Course instruction is focused toward preparing students to successfully pass the Linux+ exam and function as business analytics infrastructure administrators.