|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
The student will learn from first-hand fieldwork experience. This experience will vary from student to student and from company to company. The dynamics of the relationships between student, cooperating supervisor and faculty advisor determine the richness, depth and breadth of the work experience.
-
3.00 Credits
The student will learn from first-hand fieldwork experience. This experience will vary from student to student and from company to company. The dynamics of the relationships between student, cooperating supervisor and faculty advisor determine the richness, depth and breadth of the work experience.
-
3.00 Credits
Students in this capstone course will review broad concepts and factors relevant for a well-informed scientist and young professional. Students will examine scientific ethics and science policy as well as core concepts of evolutionary theory. Students will also demonstrate proficiency of professional skills, including oral and written communication and information literacy. Students will examine their own career preparedness through the development of a resume, portfolio and research paper stemming from work-related experiences.
-
3.00 Credits
This course provides an in-depth knowledge of the internal operations of personal computers. Emphasis will be placed on understanding the relationship between various computer parts and peripherals, troubleshooting problems, customer service skills and safety practices. This course maps to the CompTIA A+ Certification.
-
3.00 Credits
This course provides the latest cyber security tips and techniques on Internet and computer security best practices. Topics include: important privacy legislation, case studies of infamous cyber security incidents, developing effective personal and corporate cyber security architecture, selection of security products, firewall benefits and limitations, intruder detection, correct ways to configure your computer, browser settings, virus settings, operating system vulnerabilities, strong password techniques, parasite detection, and encryption techniques. NOTE: This course is intended for non-Computer & Network Security (CNS) majors. CNS majors must instead take SEC 210.
-
3.00 Credits
This course provides the latest security tips and techniques on Internet and computer security best practices. Topics include: important privacy legislation, case studies of infamous hackers, how to develop an effective security system, selection of IT security products, firewall benefits and limitations, intruder detection, correct ways to configure your computer, browser settings, virus settings, operating system vulnerabilities, strong password techniques, parasite detection, and encryption techniques.
-
3.00 Credits
Designed for the serious computer user, this course will introduce the student to the basic concepts of the Linux operating system. Completion of the course will provide a good basic working knowledge of: essential Linux commands, login and logout sequences; Linux e-mail; fundamentals of the vi editor; piping and redirection; security and process control; Directory and File Systems and essential utilities; Linux shell programming; X Windows; Linux installation; and basic system administration.
-
3.00 Credits
This course provides an in-depth knowledge of data communications and networking requirements, including networking and telecommunications technologies, hardware, and software. Emphasis is upon the analysis and design of networking applications in organizations. Management of telecommunications networks, cost-benefit analysis, and evaluation of connectivity options are also covered. Students learn to evaluate, select, and implement different communication options within an organization.
-
3.00 Credits
Foundations in Cyber Investigations provides students with an understanding of cyber investigations entails, its impact on all forms of investigations, and practical acquisition and preservation methods of cyber based evidence. Cyber-crimes will be defined and categorized to ensure students have an overall comprehension of cyber investigations. Students are then educated on core Internet functions such as IP addressing, URLs, SMTP messages, etc. Recovery of web based artifacts and malware analysis are critical skills that are explained in fine detail. Legal matters pertaining to authority to perform cyber investigations, court issued subpoenas, legislation that affects cyber investigators, and certain factors that need to be considered are discussed in this course. Evidence collection measures, necessary equipment to conduct cyber investigations, and the role of forensic laboratories are important elements within cyber case management. Different interview techniques as well as identifying subject's motives can help investigators obtain a better understanding of the subject(s). A review of different investigation methods used by military, civilian, corporate, and government agencies, to include covert online operations.
-
3.00 Credits
This course expands upon the material studied in SEC 210. The following topics are covered: Security Principles (Windows 2000 Security Architecture, Linux Security), Account Security (Securing Accounts, Passwords, Password Aging, and Verification of System State), File System Security (Windows 2000, XP File Security, NAS Storage Security), Accessing Risk (Key loggers, Sniffers, Port Scanning), Risk Analysis (Viruses, Patches, Packaging Techniques), and Encryption (applying topics from SEC 310 to Web Sites and applications). The student's basic network and operating system skills will be expanded to include planning, implementation, and auditing of a system's security package
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2024 AcademyOne, Inc.
|
|
|