Course Criteria

Add courses to your favorites to save, share, and find your best transfer school.
  • 3.00 Credits

    This course surveys classics of Western literature in their cultural context. The course is divided into three parts, each focused on one of the genres featured in the course title. The first section of the course considers the sweep of drama from its earliest religious and ritual context (Oedipus the King) to works that reflect a culture adrift from its moorings (Waiting for Godot). The second section presents poetry as a ""rediscovering of common experience,"" beginning with William Shakespeare's sonnets and moving through William Blake, Walt Whitman, Emily Dickinson, Robert Frost, and Adrienne Rich. In the third part of the course, a survey of narrative literature, students read and discuss authors such as Charles Dickens, Emily Brontë, Herman Melville, Franz Kafka, and Alice Walker. Course content consists of a series of half-hour video lectures that discuss authors and works. Works of literature will be sampled or read in entirety from both online sources and hard-copy texts. This course is based on the course ""Understanding Literature and Life"" from the Teaching Company.
  • 3.00 Credits

    This course discusses and helps students appreciate representative works of Western music in relation to their historical contexts. The course takes a three pronged approach. First, it examines the historical, social, political, and religious environments that shaped the composers under study and their musical styles. Second, it focuses on certain representative works as examples of their times and as objects of art unto themselves. Finally, it develops listening skills and a musical vocabulary that allows students to isolate and identify certain types of musical phenomena. Students will emerge from the course with an expanded appreciation of the language of music. Course content is drawn from the Teaching Company's ""How to Listen to and Understand Great Music"" by Dr. Robert Greenberg.
  • 3.00 Credits

    This course surveys the great works of Western painting, sculpture, and architecture from 800 A.D. to the mid-20th century. These works are examined within the political, religious, and social context of their time, allowing students to understand both why the artwork was created by the artist and how it was at the same time a response to a particular set of historical circumstances. Students will emerge from the course with a better grasp of how to view art with both understanding and enjoyment. Course content is drawn from the Teaching Company's ""A History of European Art"" by Professor William Kloss..
  • 3.00 Credits

    This course provides a broad overview of the human services field. Students will be introduced to the social problems addressed by human service workers as well as to typical practice settings and techniques. Introduction to Human Services will help students understand the qualities and skills required of workers in this field while encouraging students to look at their own characteristics to help determine their ideal role. Students will gain a perspective on the history of the field as well as the issues that typically arise in the areas of law, ethics, values, and human diversity. The course also discusses group work, program planning, and tips for recognizing burnout and managing stress.
  • 3.00 Credits

    The 3-credit Associate-Level Human Services Capstone is an in-depth, student-centered experience that requires the integration of theory and practical experience. In this course students apply the skills and techniques they have learned as well as their knowledge of agencies and culturally diverse client populations to a specific project. The project will identify an issue, problem, information gap, or creative endeavor in which the student will explore, research, evaluate, and theorize in a final paper. On successful completion of the course, students will have met the learning outcomes of the Associate in Arts in Human Services degree program.
  • 6.00 Credits

    The 6-credit Bachelor-Level Human Services Capstone is an in-depth, student-centered experience that requires the integration of theory and practical experience. Students will apply the skills and techniques they have learned as well as their knowledge of agencies and culturally diverse client populations to a specific project. The project will identify an issue, problem, information gap, or creative endeavor in which the student will explore, research, evaluate, and theorize in a final paper. On successful completion of the course, students will have met the learning outcomes of the Bachelor of Science in Human Services degree program.
  • 3.00 Credits

    Information assurance (IA) is concerned with protecting the reliability of information and managing risks related to the use, processing, storage, and transmission of information or data. It includes securing the systems and processes that house and manipulate the data as well. IA includes protection of the integrity, availability, authenticity, nonrepudiation, and confidentiality of organizational data. IA practitioners use physical, technical, and administrative controls to accomplish these tasks. These protections apply to data in transit, both physical and electronic forms as well as data at rest in various types of physical and electronic storage facilities. Information assurance as a field has grown from the practice of information security. As opposed to information security and cybersecurity, IA relates more to the business value and strategic risk management of information and related organizational systems, rather than focusing on the creation and application of security controls. In this course students will learn to defend against malicious attacks while considering corporate governance issues such as privacy, regulatory and standards compliance, auditing, business continuity, and disaster recovery as they relate to an organization's information assets.
  • 3.00 Credits

    The impact of a security breach can be devastating to any organization. Information technology (IT) practitioners must have the skills to identify and address system vulnerabilities including weaknesses related to hardware, software, interrelated systems, and personnel. In this course, students will explore current and potential threats to information assets and will develop a comprehensive awareness of prevailing trends in malicious attacks. This course will provide students with the skills and knowledge needed to secure organizational resources and to develop effective methods to detect and monitor internal and external malicious activity. Topics covered in this course include: passive and active attacks, technology audits, physical security, computer security policies, contingency planning, business impact analysis, password management, information warfare, intrusion detection, risk assessment and auditing, operational security, permissions and user rights, service patches, securing network services, and security baseline analyzers. Students will learn to identify threat vectors and to develop strategies for implementing a prioritized, risk-based approach to mitigating security.
  • 3.00 Credits

    A countermeasure in computer security is any action, device, procedure, or method that can be used to mitigate a threat, vulnerability, or attack by either eliminating it, preventing it, minimizing its effect, or by discovering and reporting it so that corrective action can be taken in the future. In this course students will learn the principles of active defense. They will develop the skills and knowledge needed to design and implement multilayered (defense in depth) security strategies as well as expertise in using tools to harden and secure networks and organizational assets. Course topics include: threat vectors; data encapsulation at Open Systems Interconnect (OSI) layers 2, 3, 4, and 5; packet decoding; network firewalls; intrusion prevention; network address translation (NAT); access control lists (ACLs); virtual private networks (VPNs); virtual local area networks (VLANs); proxies; border routers; web application, and database security; securing the operating system (OS) and services; vulnerability assessment; baseline audits; forensics; logging; encryption; authentication; wireless security; and network access control and security tools.
  • 3.00 Credits

    Information technology professionals, whether in the public or private sector, must ensure that their information systems comply with privacy and security laws, regulations, directives, and any organizational policies, procedures, and guidelines. This challenge can be a daunting task and confronts both public and private organizations alike. To meet this charge, they develop and implement security policies and procedures that explicitly define the organization's security protocols. Security policies are custom-created, dynamic standards of business conduct. While the best practices of the information security field form the basis of any security policy, each organization has unique requirements that shape policies used to manage security. Students in this course will develop the skills and knowledge needed to access the security posture of an organization and then apply the information gathered during this assessment to inform stakeholders about the challenges inherent to their unique information assurance landscape. They will learn to develop processes and define policies that achieve the targeted level of security for an organization based on the level of risk mitigation required. With respect to securing networks and systems people are often the weakest link. To address this challenge, students in this course will learn to develop policies and best practices for members of technology groups as well as for system users. Students will develop training documentation for management, technical, and user populations that exposes them to the policies and processes required to secure information technology and to align these with the business objectives of the organization.
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
(Type the name of a College, University, Exam, or Corporation)
(For example: Accounting, Psychology)
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
(For example: Introduction To Accounting)
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
of
(For example: Find all institutions within 5 miles of the selected Zip Code)
Privacy Statement   |   Terms of Use   |   Institutional Membership Information   |   About AcademyOne   
Copyright 2006 - 2024 AcademyOne, Inc.