AMS 906 / MIS 806: Advanced Management Information Systems

Strategic digital transformation, enterprise architecture, cloud computing, data/AI, and security management for modern organizations.

Created by Ademuyiwa Olatunbosun • Lecturer: Dr. Musa Safiyanu Adam
Overview
Learning Objectives
Course Modules
Assessment
Resources

Course Overview

This course explores how information systems and emerging technologies enable strategy, transform business models, and reshape organizational processes. Building from the study materials, we cover modern IT infrastructure and networking; cloud computing models (IaaS, PaaS, SaaS); data/AI foundations; information security fundamentals (confidentiality, integrity, availability); authentication, authorization, and encryption; risk management; and the evolving cyber threat landscape (e.g., DDoS, SQL injection, ransomware, insider threats, MitM, APTs, supply chain attacks) and defenses (firewalls, IDS/IPS, MFA, encryption).


We’ll connect these foundations to enterprise architecture, analytics/AI implementation, zero trust, governance/compliance, and global MIS strategy— culminating in practical methods for threat detection, vulnerability assessment, security awareness, and incident reporting in real organizations.

Target Audience

Master's Students
PhD Candidates

Master's Focus

  • Practical implementation skills and systems thinking
  • Cloud, data/AI integration, and security tooling
  • Analytics for decision support and operations
  • Case-based, real-world deployment

PhD Focus

  • Research methods and theory-building
  • Experimental design and reproducibility
  • Security/AI governance and policy analysis
  • Publication-ready deliverables

Course Format

  • Weekly Structure: 3 hours lecture + 1 hour seminar/lab
  • Interactive lectures with current industry examples and case work
  • Hands-on labs with practical tool usage and implementation
  • Seminar debates on emerging trends and research
  • Guest speakers from industry and regulatory bodies
  • Collaborative projects with peer review

Key Learning Objectives

By the end of this course, students will be able to:

  • Explain and apply core MIS concepts to strategy and operations
  • Differentiate cloud service and deployment models; plan suitable architectures
  • Design data/AI workflows and evaluate tradeoffs in model deployment
  • Apply the CIA triad, AuthN/AuthZ, and encryption to protect systems
  • Execute risk identification, assessment, mitigation, and monitoring processes
  • Analyze common attack vectors (DDoS, SQLi, ransomware, insider, MitM, APT, supply chain)
  • Configure and interpret defenses (firewalls, IDS/IPS, MFA, logging), and threat detection methods
  • Conduct vulnerability assessments and communicate findings
  • Implement zero trust principles and align with governance/standards
  • Lead digital transformation initiatives and evaluate future technologies

Detailed Course Modules

The course is organized into comprehensive modules. Click on each topic to expand the lecture notes.

Assessment Structure

Program-level distributions are shown below. Adjustments may be announced by the lecturer.

Master's Program Assessment

PhD Program Assessment

Course Materials

Course Outline (PDF)
Download →

Core Textbooks & Readings

Enterprise Architecture as Strategy by Jeanne W. Ross et al.
View on Amazon →
Data Mesh: Delivering Data-Driven Value at Scale by Zhamak Dehghani
View on O'Reilly →

Key Frameworks & Standards

NIST: The Definition of Cloud Computing (SP 800‑145)
NIST SP 800‑145 →
NIST Zero Trust Architecture (SP 800‑207)
NIST SP 800‑207 →
ISO/IEC 27001: InfoSec Management Systems
Official ISO Page →

Essential Tools & Platforms

Cloud Platforms (AWS, Azure, GCP)
Explore AWS Free Tier →
Architecture & Diagramming
Use diagrams.net (Free) →
AI & Machine Learning
Explore Hugging Face Hub →