|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
Learn to develop an approach to technology which best serves the needs of your organization. This course will provide an overview of how to plan for technology including website development, online marketing, data base management, finance and accounting and working with consultants. [5/28/2002]
-
3.00 Credits
Course will provide an overview of GIS applications at the administrative level of emergency management. Topics covered will include uses of GIS within the planning and mitigation phases, along with response and recovery assessments. Students will gain a valuable perspective on planning for and administering resources. A final course project will be assigned to include GISbudget funding and implementation strategies relative to individual administrative roles. [5/28/2002]
-
3.00 Credits
An analytic course that is designed for public safety officers, elected officials & business community leaders for developing collaborative approaches to counter - terrorism and other security threats. Topics include vulnerability assessments, hazard mitigation, best practices, emergency planning, physical security surveys, networking of experts and community policing. Students will conduct a vulnerability assessment survey within their organization and community and present a comprehensive response plan. [9/4/2002]
-
3.00 Credits
Hands-on study of methods of legal research for non-lawyers, with a concentration in utlilization of both fee-based and free Internet legal sites. Instruction will also be provided in the procedures used in analyzing and interpreting court opinions and statues. Students will prepare and present a legal brief, with supportive refrences and arguments, regarding an assigne legal issue. This hybrid course consisting of classroom instruction and asynchronous on-line delivery plus independent research at FDU's law library (Lexis Nexis & Westlaw). [9/4/2002]
-
3.00 Credits
This course, taught by international experts, covers the following topics in a lecture/seminar format: Emergency Management, Hazardous risk analysis, social dimensions of disasters, disaster recovery and organizational continuity, the psychology of terrorism, counter-terrorism, weapons of mass destruction, bio-defense mobilization, and cyber security and forensics. [9/4/2002]
-
3.00 Credits
This analytic course will cover the appropriate protocols for seizure of computer systems and their examination in cases of internet or computer fraud, terrorism, child pornography, internet sex crimes, and other high tech crimes or violations of organization rules & regulations. It will explore the use of technology to retrieve data and copy data on computers and on websites without distrubing the original data/site. It will study essential protocols needed to ensure the integrity of the data from the investigation process through prosecution or administrative disciplinary problems. [9/4/2002]
-
3.00 Credits
This course will provide an introduction to the basics of computer security (confidentiality, message integrity, authencity, etc.) and investigate ways to prevent hackers from accessing websites. Encryption processes and firewall protection may not be enough for someone who wants to access data maintained on your computer system. The course wil analyze formal criteria and properties of hardware, software, and database security systems, and will determine ways to improve overall site and system security. Additional topics to be reviewed include: formal specifications, verification of security properties, security policies that includes hardening a site amd preventing an intrusion, detection of an intruation and how to react to such an intrustion, safeguards for systems, organizational training and protocols, and other methods for providing data security in this technological age will be reviewed and assessed. [9/4/2002]
-
3.00 Credits
This analytic course will study what is necessary to become a forensic expert, the methods for preparing and presenting technical information in a courtroom or administrative hearing setting, and the use of technical and scientific witnesses in the area of high-tech crimes or violations of agency rules and regulations. Appropriate interaction with criminal justice agencies to develop internal security protocols will be emphasized. Individuals will learn how to trace security intrusions, what constitutes admissable proof, evidence, and how to develop proactive initiatives in this area. [9/4/2002]
-
3.00 Credits
This course examines the principles of leadership during times of significant stress. Various models, strategies and tactics of leadership are studied using the examples of civilian and military leaders during the planning, implementation and execution of the WWII D-Day operation of June 1944 [1/27/2003]
-
3.00 Credits
This seminar will examine relevant legal issues in the workplace with a comparison of US and UK law. Topics presented by leading experts will include Workplace Violence, Social and Privacy Issues in the Workplace, the Troublesome Employee. Harassment in the workplace, and various issues of hiring and termination. [1/27/2003]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Cookies Policy |
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2025 AcademyOne, Inc.
|
|
|