CollegeTransfer.Net
Toggle menu
Home
Search
Search
Search Transfer Schools
Search for Course Equivalencies
Search for Exam Equivalencies
Search for Transfer Articulation Agreements
Search for Programs
Search for Courses
PA Bureau of CTE SOAR Programs
Transfer Student Center
Transfer Student Center
Adult Learners
Community College Students
High School Students
Traditional University Students
International Students
Military Learners and Veterans
About
About
Institutional information
Transfer FAQ
Register
Login
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
INTR 499: Internship
4.50 Credits
American InterContinental University-Online
With the aid of the Program Chair/Dean and the Student Affairs Office on each campus, the student participates in a practical on-site internship in which theoretical principles are applied to work situations under professional supervision.
Share
INTR 499 - Internship
Favorite
ITAS 362: Introduction to Information Assurance and Information Security
4.50 Credits
American InterContinental University-Online
This class provides students with an overview of network security principles and implementation techniques. Topics covered include authentication issues, examples of attacks and malicious code that may be used against networks and the countermeasures against these, examples of perimeter and interior attacks, and protecting file and print services. Issues regarding Trusted Computing bases (TCB), authentication, access control and authorization, discretionary and mandatory security policies, secure kernel design, secure operating systems, and secure databases from a systems architecture perspective are also covered.
Prerequisite:
ITCO 361
Share
ITAS 362 - Introduction to Information Assurance and Information Security
Favorite
ITAS 363: Telecommunications and Network Infrastructure Security
4.50 Credits
American InterContinental University-Online
This course covers network security principles and implementation techniques. Topics covered include examples of attacks and countermeasures for securing e-mail, definitions and principles underpinning all IT security, security management, and security architectures. Fundamental concepts, principles, and practical networking and internetworking issues relevant to the design, analysis, and implementation of enterprise-level trusted networked information systems are also covered.
Prerequisite:
ITCO 361
Share
ITAS 363 - Telecommunications and Network Infrastructure Security
Favorite
ITAS 364: Web Application Security Strategies
4.50 Credits
American InterContinental University-Online
This course focuses on issues related to the design and implementation of Web applications and data stores. Emphases are placed on multilevel security in database systems, covert channels, SQL Injection attacks, Cross-site Scripting, Cross-site Forgery, hostile codes, and countermeasures. OWAP Top 10 vulnerabilities and countermeasures are also covered.
Prerequisite:
ITAS 362
Share
ITAS 364 - Web Application Security Strategies
Favorite
ITAS 365: Information Systems Control and Auditing
4.50 Credits
American InterContinental University-Online
The course covers the essential subjects and topics in information systems control, including types of audits, types of audit risks, frameworks for management and application controls, audit software and tools, concurrent auditing techniques, data integrity, system effectiveness, IT services delivery, life cycle management, information asset protection, IT governance, business continuity, and system efficiency. Also covered are processes for creating information systems audit and reviewing audit reports.
Prerequisite:
ITAS 362
Share
ITAS 365 - Information Systems Control and Auditing
Favorite
ITAS 367: Principles and Methods in Cryptographic Security
4.50 Credits
American InterContinental University-Online
This course covers the mathematical background to cryptography as well as providing a comprehensive review of contemporary cryptographic technologies, as applied to computer and network operations. Topics include determining the appropriate cryptographic targets and methods, digital key management, cryptographic vulnerabilities, and implementation of effective cryptographic methodologies to secure enterprisewide information systems.
Prerequisite:
ITCO 341, ITAS 362
Share
ITAS 367 - Principles and Methods in Cryptographic Security
Favorite
ITAS 369: Management of Information Security Programs
4.50 Credits
American InterContinental University-Online
This course covers the essential practices involved in developing a security policy. Topics covered include IT security policies and procedures, information security standards, frameworks, security baseline analysis, risk assessment, guidelines for security policy development, the value of security templates, and policy implementation, revision, metrics, maintenance, and enforcement, threat detection and reaction, and technical and managerial responses.
Share
ITAS 369 - Management of Information Security Programs
Favorite
ITAS 462: Information Security Certification and Accreditation Process
4.50 Credits
American InterContinental University-Online
This course covers the essential processes that are used to assess applications for risk and subsequently deploy them to production. Topics covered include risk assessment, Information security policies and procedures, security threats, likelihood and impact, security awareness training, and expected rules of behavior for end-users. Also covered are evaluation of the technical, management, and operational security controls, procedures for reporting and responding to security incidents, and contingency planning.
Prerequisite:
ITAS 363, ITAS 364
Share
ITAS 462 - Information Security Certification and Accreditation Process
Favorite
ITAS 463: Operating Systems Security Strategies
4.50 Credits
American InterContinental University-Online
This course covers techniques used to secure operating systems. Typical vulnerabilities, exploits, and countermeasures are covered. Also covered are third-party software and built-in utilities that can be used to protect operating systems from hacking. Operating systems covered include Windows, Unix, Mac, Linux, and z-OS. Vulnerabilities that are introduced by applications, open ports, and services are covered.
Prerequisite:
ITAS 362
Share
ITAS 463 - Operating Systems Security Strategies
Favorite
ITAS 464: Introduction to Computer Forensics
4.50 Credits
American InterContinental University-Online
This course covers intrusion detection, server security (with emphasis on the Windows operating system and server), and related advanced administration tasks on enterprise servers. Topics may include host and network based intrusion detection, implementing automated protection, packet filtering, software/hardware firewalls, directory concepts, account and group access control, security policies, installation and manual configuration, backup and recovery services, server and client policy security, securely deploying infrastructure servers, and hardening server security.
Prerequisite:
ITCO 361
Share
ITAS 464 - Introduction to Computer Forensics
Favorite
First
Previous
36
37
38
39
40
Next
Last
Results Per Page:
10
20
30
40
50
Search Again
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
College:
(Type the name of a College, University, Exam, or Corporation)
Course Subject:
(For example: Accounting, Psychology)
Course Prefix and Number:
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
Course Title:
(For example: Introduction To Accounting)
Course Description:
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
Within
5 miles
10 miles
25 miles
50 miles
100 miles
200 miles
of
Zip Code
Please enter a valid 5 or 9-digit Zip Code.
(For example: Find all institutions within 5 miles of the selected Zip Code)
State/Region:
Alabama
Alaska
American Samoa
Arizona
Arkansas
California
Colorado
Connecticut
Delaware
District of Columbia
Federated States of Micronesia
Florida
Georgia
Guam
Hawaii
Idaho
Illinois
Indiana
Iowa
Kansas
Kentucky
Louisiana
Maine
Marshall Islands
Maryland
Massachusetts
Michigan
Minnesota
Minor Outlying Islands
Mississippi
Missouri
Montana
Nebraska
Nevada
New Hampshire
New Jersey
New Mexico
New York
North Carolina
North Dakota
Northern Mariana Islands
Ohio
Oklahoma
Oregon
Palau
Pennsylvania
Puerto Rico
Rhode Island
South Carolina
South Dakota
Tennessee
Texas
Utah
Vermont
Virgin Islands
Virginia
Washington
West Virginia
Wisconsin
Wyoming
American Samoa
Guam
Northern Marianas Islands
Puerto Rico
Virgin Islands