Course Criteria

Add courses to your favorites to save, share, and find your best transfer school.
  • 3.00 Credits

    Prerequisites: SEC 100 or permission of instructorThis course is an introduction to techniques used in business formanaging the security component of information technology.Focus is on the development and maintenance of cyber-security,information assurance, and the security organization. Studentswill study both strategic and tactical approaches to security development and analysis. The course includes laboratory exercisesin penetration testing, network analysis, and other hands-onsecurity techniques.
  • 3.00 Credits

    This is a basic programming course to introduce technologyprofessionals to the C and C++ language particularly as they relateto GCC/G++. Basic algorithms and structures are covered but with afocus on the use of C++ in networking scripts, linux based platforms,and application troubleshooting in systems
  • 3.00 Credits

    Prerequisites: COMSC 110This course introduces students to scripting as a programmingtool. Scripting is commonly used as a mechanism for networkadministration in many different environments and basic skills inthis area will strengthen the student's knowledge of both operatingsystems and command line interfaces. Scripting in bash, ksh, cshare components as well as an introduction to basic database tools inmysql.
  • 3.00 Credits

    The course focuses on the design and implementation of relationaldatabase systems. It introduces fundamental principles of databases;the relational model (entities and attributes, tables and relationships),conceptual design (primary and foreign keys), data organizationstrategies (normalization and integrity constraints) and query.Activities focus on building databases, the design process, tools forpresenting and critiquing design models and integration with the web.
  • 3.00 Credits

    Cross Listed as CIS 375 and ENGR 455Prerequisite: SEC 100, COMSC 110 or permission of instructorIntroduction to basic data communications concepts and theirapplication to local area networks through lectures, discussions ofcase studies, and hands-on projects. The class focuses on the TCP/IPmodel of networking and the various details involved in packet basednetworks and the exchange of electronic information over a variety ofmedia.
  • 3.00 Credits

    Cross Listed as CIS 380 and ENGR 465Prerequisites: SEC 230 or permission of instructorThis is a course in applied networking which focuses on thedevelopment of networking solutions in organizations. This courseuses hands-on routing, switching and cabling to develop skills inconnectivity, firewalling, and server administration in the DMZ.Additional material focuses on the development of various routingtechnologies and protocols as well as inter and intra networkcommunications.
  • 3.00 Credits

    Prerequisite: SEC 200 or permission of the instructorThis course focuses on the ISACA COBIT methodology used in theexams like CISA and develops the idea of audit and assurance fortechnology professionals who may be required to oversee, develop, orconduct such audits in compliance with Federal or other legislationwhich may impact their organization.
  • 3.00 Credits

    Prerequisite: SEC 200 or permission of instructorThis course introduces students to techniques used in lawenforcement and corporate litigation to recover and examineelectronic media in a forensically sound fashion. The course includesthe use of commercial forensics packages and the development offull analysis of media for presentation to corporate security officers, law enforcement, or the legal system. Students will learn to examinehardware, maintain chain of custody, create forensic images, analysisforensic images, and develop analytical reports for presentation. Thecourse is typically offered online but has hands on lab components.
  • 3.00 Credits

    Prerequisite: SEC 200 or permission of instructorA technical, hands-on course focused on hacking and counter-hackingmethods. The course revolves around tools using in exploitingweaknesses in a typical network environment (pen tests) and thedefense and correction of these weaknesses. Topics include physicalsecurity, social engineering, reconnaissance, scanning, exploits, webserver hacking, server hardening, securing networks, and vulnerabilitytesting.
  • 3.00 Credits

    Prerequisites: SEC 200 or permission of instructorThis course is a historical introduction to the evolution ofcryptography intended for a general audience. Introduction totechnical terms and foundations of cryptography is accompanied bystory-telling from the cipher of Mary Queen of Scots, to Vigenerecipher, then to cracking the enigma of WWI, then to Lorenz cipherand Colossus during WWII, till the potential Quantum cryptography.We follow the development of codes and code-breaking from militaryespionage in ancient Greece to deciphering hieroglyphics via theRosetta stone to modern computer ciphers. Frequency analysis, onetime-pad security, and public key cryptography will be introduced inthis course.
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
(Type the name of a College, University, Exam, or Corporation)
(For example: Accounting, Psychology)
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
(For example: Introduction To Accounting)
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
of
(For example: Find all institutions within 5 miles of the selected Zip Code)
Privacy Statement   |   Terms of Use   |   Institutional Membership Information   |   About AcademyOne   
Copyright 2006 - 2025 AcademyOne, Inc.