Course Criteria

Add courses to your favorites to save, share, and find your best transfer school.
  • 1.00 - 6.00 Credits

    No course description available.
  • 1.00 - 3.00 Credits

    No course description available.
  • 3.00 Credits

    Course introduces the IT Infrastructure Library (ITIL) fundamentals of the Service Support and Service Delivery disciplines. Service support includes Service/Help Desk Configuration, Incident, Problem, Release, and Change Management. Service delivery topics include: Security, Service Level, Capacity, Continuity, Availability and IT Financial Management.
  • 3.00 Credits

    This survey course provides an understanding of communications and IT infrastructures, their vulnerabilities as well as the size and complexity of security threats faced by enterprises. Building on an understanding of these infrastructures, the development of security practices, policies, awareness and compliance programs, and legal and regulatory issues will be examined. Development of a threat assessment mapped to a solution that is supported with a cost/benefit analysis will also be developed. A review of the GSM Security Hierarchy model will be used to examine the many elements of a "secure" system.
  • 3.00 Credits

    This course is intended to be an introduction to information technology and how IT/IS functions within a global economy. Students will become conversant with technologies for competitiveness, efficiency, and effectiveness for the management of IT and also for the use of IT by the rest of the organization.
  • 3.00 Credits

    This course is designed to provide students with a working knowledge of fundamental encryption algorithms and systems supported in today's IT and secure communications networks. Topics include Stream Ciphers (Linear Shift Register Theory), Block Ciphers (DES, AES), Feedback Ciphers, Elliptical Algorithms, Private Key and Public Key Systems, Key Exchanges (Diffie-Hellman, RSA, and El-Gamal), Message Authentication (RSA Authentication, El-Gamal Algorithm), Digital Signature Standard, Digital Certificates, and Message Integrity (Secure Hashing, HMAC). Also examined are Virtual Private Networks (VPN), Tunneling (IPSec, L2TP, PPTP, L2F), Secure Socket Layer (SSL), SSH, and PGP. The history of cryptography will also be studied to provide students with a historical perspective of communications security. Final course offering - Spring 2012. Replace with new course - CYBS 6350 Data Protection.
  • 3.00 Credits

    This course is based upon the US Trusted Computer Systems Evaluation Criteria. Students will undertake a study and review of US policy in this area and be able to apply these criteria in a real world situation. The course will focus on configuration management consisting of four separate tasks: 1) identification; 2) control; 3) status accounting, and 4) auditing of systems, including operating systems. Final course offering - Summer 2012. Replace with CYBS 6355 Compliance & Legal Issues.
  • 3.00 Credits

    This course presents an overview of the many facets of eBusiness, the size and expected growth of the eBusiness markets and their complexity. E-Business and EDI systems and security parameters are explored. All facets of securing eBusiness including access controls, authentication, confidentiality, data integrity, and non-repudiation will be covered as will defenses against DDOS attacks. Security by diversity and security in depth will be presented as fundamental requirements. Final course offering - Spring 2012. Replace with equivalent course - CYBS 6357 Emerging Cyber Threats.
  • 3.00 Credits

    This course covers the basics of database and IT components and what the student needs to better manage in a technical environment. The first half of the class focuses on database fundamentals with emphasis on relational database technologies and data management in the organization. The second half covers hardware, software, networks, operating systems, and the administration of all of these components. Hands on labs will be used to illustrate class topics and for class assignments. Final course offering - Fall 2012.
  • 3.00 Credits

    Understanding business processes and their active, continuous management is fundamental to recommending IT and other managerial change solutions. Process mapping skills for "as-is" and "to-be" business processes are developed and practiced. In addition, techniques for change analysis, problem finding and resolution, technology impact analysis, benchmarking, error proofing, and change management are developed.
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
(Type the name of a College, University, Exam, or Corporation)
(For example: Accounting, Psychology)
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
(For example: Introduction To Accounting)
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
of
(For example: Find all institutions within 5 miles of the selected Zip Code)
Privacy Statement   |   Terms of Use   |   Institutional Membership Information   |   About AcademyOne   
Copyright 2006 - 2024 AcademyOne, Inc.