Course Criteria

Add courses to your favorites to save, share, and find your best transfer school.
  • 3.00 Credits

    This class explores the overarching security disciplines that are important for a more rounded understanding of information technology. Discussions in this course will give the correct acumen of personnel security, physical security, and technical operational security as these principles relate and interface with information security principles. Segments in this course will further address unethical behaviors, risk management and mitigation, and security liabilities from the trusted insider threat perspective as related to personnel security. Vetting practices to be considered for positions of trust are also discussed. Authentication standards in practice will discuss such things as operational security, the use of such software as Radius or Kerberos and other control software Prerequisite: IAE- 670. Corequisites: IAE-682 and IAE-677.
  • 0.00 Credits

    Public, government and industry recognition of the CISSP credential makes it a valuable professional certification. Organizations now use it as a factor in obtaining qualified expertise for senior information assurance/information security positions. The Department of Defense Directive, DoD 8570.1, identifies the CISSP credential as fulfilling the requirements in both the Information Assurance Technical (IAT) and Information Assurance Management (IAM) Tracks as a Level 3 certification. Level 3 is the highest level and currently fulfills the certification requirements for all levels and tracks. This course will review the entire CISSP common body of knowledge and provide insight into test taking strategies for the examination.
  • 0.00 Credits

    Public, government and industry recognition of the Security+ credential makes it a valuable professional certification. Organizations now use it as a factor in obtaining qualified expertise for information assurance/information security positions. The Department of Defense Directive, DoD 8570.1, identifies the Security+ credential as fulfilling the requirements for Information Assurance Technical (IAT) Level II and Information Assurance Management (IAM) Level I certification. This course will review the entire Security+ Common Body of Knowledge (CBK) and provide insight into test taking strategies for the examination.
  • 0.00 Credits

    Public, government and industry recognition of the System Security Certified Practitioner (SSCP) credential makes it a valuable professional certification. Organizations now use it as a factor in obtaining qualified expertise for information assurance/ information security positions. The Department of Defense Directive, DoD 8570.1, identifies the SSCP credential as fulfilling the requirements for Information Assurance Technical (IAT) Levels I & II certification. This course will review the entire SSCP Common Body of Knowledge (CBK) and provide insight into test taking strategies for the examination.
  • 3.00 Credits

    Networking and the Internet have introduced us to a new set of devices and protocols that link personal computers to servers, and servers to servers. This course explores all the hardware and software that drives local and Internet computing. Special emphasis on connectivity and throughput is explored.
  • 3.00 Credits

    Computing has moved from dumb terminals connected to mainframes via RS232 cable to personal computers where the application runs locally and connects to remote data or where applications and data run on a remote server and viewed through a web browser. To examine this shift and to understand the technologies involved, this course focuses on what is now called thin client and fat client computing and the new mechanisms employed to bring legacy computing to the information economy.
  • 3.00 Credits

    This course explores the operating software underlying Internet and intranet computing. The similarities and differences between operating systems and web servers are investigated with a view to choosing the best technology and optimization practices. Topics include NT, 2000 Server, Advanced Server, Windows CE, Unix and versions, Linux, IIS, Apache, third party, and public domain.
  • 3.00 Credits

    This course will investigate the techniques used by successful network engineers to create converged network architectures and provide optimum information access to their users. These techniques include how to select the optimum mix of mobile technologies for performance and cost, and mandatory feature requirements such as expandability, extensibility and security. The course will provide an in-depth study of the current and contemplated mobile technologies that can facilitate network convergence. Students will test these mobile technologies and their applications via the virtual laboratory concept using OpNet, the most advanced network modeling software currently available. Technical information on specific equipment and software will be provided as instruction supplemental to the textbook, and case studies will be used throughout the course.
  • 3.00 Credits

    For the first time in two decades, software developers now have to be proficient in multiple programming languages to deploy thin client or fat client Internetbased applications. Choosing the right set of languages has a dramatic impact on application performance and e-commerce. This course is designed to compare and contrast the various language tools for crafting Internet-based and Web-based applications.
  • 3.00 Credits

    This course will examine Internet security concerning two key network design issues: information security and information privacy. Students will learn and understand: the technical tools to protect information from external compromise; internal and external threats; various network security technologies and protection systems; apply network design techniques capable of providing information security to local and wide-area networks; general information encryption techniques and protocols including symmetric and asymmetric cryptographic methodologies, one-way hashes and digital signatures, secure sockets layer and Internet Protocol Security (IPSEC); learn to evaluate and create corporate policies regarding privacy and information network security. Students who were required to have IA-711 and advised to take IA-712 in its place, will now take IE-712.
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
(Type the name of a College, University, Exam, or Corporation)
(For example: Accounting, Psychology)
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
(For example: Introduction To Accounting)
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
of
(For example: Find all institutions within 5 miles of the selected Zip Code)
Privacy Statement   |   Terms of Use   |   Institutional Membership Information   |   About AcademyOne   
Copyright 2006 - 2025 AcademyOne, Inc.