|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
Prerequisite: Program admission, CIS 1115 This course will provide knowledge and the practical experience necessary to configure the most common server platforms. Lab exercises will provide students with experience of establishing security for the network environment.
-
3.00 Credits
Prerequisite: CIS 1115, CIS 1117 This course provides knowledge and the practical experience necessary to evaluate, implement and manage secure information transferred over computer networks. Topics include network security, intrusion detection, types of attacks, methods of attacks, security devices, basics of cryptography and organizational security elements.
-
3.00 Credits
Prerequisite: CIS 1115 Students will learn how to plan, design, install and configure firewalls that will allow key services while maintaining security. This will include protecting the Internal IP services, configuring a firewall for remote access and managing a firewall.
-
3.00 Credits
Prerequisite: CIS 105, SCT 100 and a programming language Provides a review and application of systems life cycle development methodologies implemented by project teams. Topics include: role of systems analysis and design, preliminary investigation, systems analysis phase, systems design phase, systems development phase, implementation and evaluation, and post-implementation systems operation.
-
3.00 Credits
Prerequisite: CIS 1116, CIS 1117, CIS 1118, CIS 1119 This course serves as a capstone course for the information security specialist. The course will include implementing a plan to detect intruders, determine the damage caused, and discuss what precautions to use to avoid disasters.
-
3.00 Credits
Prerequisite: CIS 105 / Co-requisite CIS 124 or CIS 2128 Introduces Microsoft Windows event-driven programming. Common elements of Windows applications will be discussed created and manipulated using Microsoft's Visual Studio development environment. Topics include numeric data types and variables, decision making structures, validating input with strings and functions, repetition and multiple forms, test files, arrays, lists and common dialog controls.
-
3.00 Credits
Prerequisite: CIS 1121, CIS 124 or CIS 2128 Advanced Visual Basic.NET teaches client-server systems, n-tier development environments, relational databases, use of SQL to access data, the use of ADO.NET objects, methods and properties to access and update relational and XML databases. Advanced features of Visual Basic are explored.
-
3.00 Credits
Prerequisite: CIS 1104, CIS 1108 This course covers the creation and manipulation of images and animation using Adobe Flash and 3D creation software. Topics covered include 3D Digital Image tools, file types, download and image plug-in requirements., a systematic approach to creating images, creating 3D Objects, selecting and grouping objects, object transformation, object shading, lighting, filtering, and coloring, animation tools, file types, compression techniques, plug-in and download requirements, and creating 2D and 3D animations.
-
3.00 Credits
Prerequisite: CIS 1104, CIS 1108 This course covers the creation and manipulation of images and animation using Adobe Illustrator and Adobe LiveMotion. Topics covered include 3D Digital Image tools, file types, download and 3D image plug-in requirements, a systematic approach to creating images, creating 3D Objects, selecting and grouping objects, object transformation, object shading, lighting, filtering, and coloring, animation tools, file types, compression techniques, plug-in and download requirements, and creating 2D and 3D animations.
-
3.00 Credits
Prerequisite:CIS 103, CIS 108 This course prepares the student to search and investigate web-based criminal activity into a computer system or a network. Identify, separate, and investigate web files and data that are suspicious. Through utilization of forensics tools, track route of travel, sender, and destination of suspected files and data. Harvest data from web browsers and e-mail clients. Harvest data from cell phones and PDAs. Prepare suspected files and data for presentation at a legal proceeding.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|