Course Criteria

Add courses to your favorites to save, share, and find your best transfer school.
  • 3.00 Credits

    This is the ultimate security course on protecting company assets through network security. Topics include Firewall, Perimeter Security, Intrusion Detection Systems (IDS), Edge Devices, and Assessment. Students will learn how to develop a set of firewall rules that will keep hackers out, how to look at all possible ways in which unauthorized users might gain access to network assets, and how an IDS can provide an analysis showing who has access to the system. Students will develop a security plan and monitor ongoing activities to determine effectiveness of a security model.
  • 3.00 Credits

    This course will explore the Internet of Things (IoT), creating one or more projects using microcontrollers such as the Raspberry Pi, Arduino or other microcontrollers. Vulnerabilities will be examined along with how they might be exploited and mitigated. Known exploits will be researched and students will examine their home networks in order to understand their exposure to cybersecurity threats. Ideally, interested students should be familiar with one or more of the following: Networks, Python, Java, C or C++, Linux, Raspberry Pi, and/or Arduino. The student should have demonstrated through prior coursework the ability to stay focused, problem solve and find answers to problems on their own.
  • 3.00 Credits

    This is an experiential learning course that offers students the opportunity to apply the skills, practices, policies and procedures taught in the Computer & Network Security curriculum and apply them in simulated real-world environments via NCL competitions. These games help students develop problem solving and team building skills while learning how to defend against cybersecurity attacks. In addition, the role of the ethical hacker is emphasized in order to ensure that students develop penetration testing skills while also understanding how to use these skills responsibly. Unlike many industry recognized certifications that measure rote memorization knowledge in the form of multiple-choice test questions, NCL games use performance-based assessment which helps students understand their current level of preparation for the workforce and what they need to focus on to get better: "NCL's Scouting Reports measure strengths and weaknesses amongst various cybersecurity learning objectives and industry-recognized competencies" (https://www.nationalcyberleague.org/scouting-reports). Perhaps more so than most other disciplines, cybersecurity threats are constantly changing, and practitioners need to be lifelong learners. The NCL is a learning community that makes competing fun through things like Crypto Kait's NCL Player Ambassador program (https://cryptokait.com/) that will help students grow and remain involved long after this course is over.
  • 3.00 Credits

    Students in the final year of the program who have completed the program's core requirements will be offered the option, as an elective, to receive academic credit of up to six credit hours for a supervised field experience.
  • 3.00 Credits

    Students in the final year of the program who have completed the program's core requirements will be offered the option, as an elective, to receive academic credit of up to six credit hours for a supervised field experience.
  • 3.00 Credits

    This course addresses the necessity of developing accurate Business Continuity Plans and the security implications. Within this scope, emergency response, business resumption, and disaster recovery will be evaluated as critical components for the process. Through a review of the planning process, risk impact assessment and a variety of methods and models will be considered to assist in understanding risk as well as variety of RISK Assessment frameworks.
  • 3.00 Credits

    This course introduces students to cloud security. This course is designed for students with little to no practical cyber security experience or background. This course provides students with basic terminology, concepts and security philosophy for cloud. This course introduces students to: - Cloud security defensive and offensive protection; - Identify the security benefits and responsibilities when using cloud; - Understand access control and access management vital for cloud; - Understand the different data encryption methods to secure sensitive data; - Describe and design secure network access to cloud; and - Determine which services can be used for security logging and monitoring. Topics include an overview of information security frameworks, traditional and cloud security, network infrastructure security, security and cryptography, information security policy, and defense in depth. Understand cloud security from both a tactical and strategic perspective. Students are introduced to multiple cloud platforms, deployment models and protection tools, techniques, and strategies.
  • 3.00 Credits

    The student's basic network and operating system skills will be expanded to include planning, implementation, and auditing of a system's security package. The following topics are covered: Security Principles (Windows 2000 Security Architecture, Linux Security), Account Security (Securing Accounts, Passwords, Password Aging, and Verification of System State), File System Security (Windows 2000, XP File Security, NAS Storage Security), Accessing Risk (Key loggers, Sniffers, Port Scanning), Risk Analysis (Viruses, Patches, Packaging Techniques), and Encryption.
  • 3.00 Credits

    This course will help students build a security policy and SOP for an organization which is implementing a new network, applications and web infrastructure. Topics include the following: Security Education and Advisory, Risk Management, Threats to IT Assets, Encryption, Standards and Compliance, and Security Testing and Implementation.
  • 3.00 Credits

    This course covers the concepts, drivers, challenges, and techniques for developing business analytics for security solutions. Various supporting technologies will be discussed. Also covered are techniques for managing the project life cycle in the design and development of analytic solutions using best practices. Different methods of information delivery such as query and data analysis, visualization dashboards, ODS vs OLAP, and trending scorecards are explored.
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
(Type the name of a College, University, Exam, or Corporation)
(For example: Accounting, Psychology)
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
(For example: Introduction To Accounting)
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
of
(For example: Find all institutions within 5 miles of the selected Zip Code)
Privacy Statement   |   Terms of Use   |   Institutional Membership Information   |   About AcademyOne   
Copyright 2006 - 2024 AcademyOne, Inc.