|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
This course will study how databases are used with programming applications. Topics include advanced PL/SQL (or similar database programming language), database transaction, database security, database maintenance, and distributed and web databases.
-
3.00 Credits
This course covers more advanced topics on web server site design and development including server pages, programming, database integrations, and web server systems and security administrations.
-
3.00 Credits
Fundamental concepts of computer networking. Topics include properties of signals and media, information encoding, error detection and recovery, LANs, backbones, WANs, network topologies, routing, Internet protocols, and security issues. The focus is on general concepts together with their application to support the business enterprise.
-
3.00 Credits
This course continues the study of networks. Topics include design and implementation of networks including synchronization, scheduling, exception and deadlock resolution, client server and web based collaborative systems. Network security will also be covered. Cost estimates and speed are examined from a management perspective.
-
3.00 Credits
A study of the information needs in a formal organization and the information systems required to meet those needs within the planning, control, operating and decision-making processes.
-
3.00 Credits
This course covers current issues in IT including the law, ethics and social values. Topics include copyright, patents, trademarks, trade secrets, computer ethics, computer crime, computer abuse, cultural impact, web issues, information warfare and current legislation.
-
3.00 Credits
The student develops knowledge of the principles of information assurance at the policy, procedural, and technical levels to prepare the student for a role as a business decision-maker. Real-world examples from the text and current events will be used to demonstrate the applicability of the techniques of information assurance.
-
3.00 Credits
This course covers methods and techniques to secure wireless networks against threats and attacks. Topics include: Encrypt wireless traffic for privacy and authenticity, implement WPA and the 802.lli security standards to protect Wi-Fi networks, wireless network intrusion detection and prevention, and security trouble-shooting WLANs.
-
3.00 Credits
This course focuses on detection of network and system vulnerabilities by taking an attacker-like approach to system, network, and data access. Topics include network attacks and defenses, Operating system and application vulnerabilities, social engineering attacks, and malware. Ethical, legal implications of network attacks are also discussed.
-
3.00 Credits
This course studies techniques and tools in computing investigation, digital evidence collection, recovery, and analysis. Topics include: Legal issues relating to digital evidence, recover deleted files and discover hidden information, reconstruct user activity from e-mail, temporary Internet files and cached data, assess the integrity of system memory and process architecture to reveal malicious code.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2025 AcademyOne, Inc.
|
|
|