|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
3 Credits (3,0) Fraud examination studies the principles and methodology of fraud detection and deterrence. The course includes such topics as skimming, cash larceny, register disbursement schemes, billing schemes, payroll and expense reimbursement schemes, non?cash misappropriations, corruption, accounting principles and fraud, fraudulent financial statements and interviewing witnesses. Prerequisites: BU 114 or equivalent.
-
3.00 Credits
3 Credits (3,0) The purpose of this course is to explore the evolving crime problem rooted in decades of technology development, criminal adoption of computers and other forms of information technology for illicit purposes, and the labels for social constructs of crimes involving theft, manipulation, degradation or destruction of data.
-
3.00 Credits
3 Credits (3,1) Computer Forensics and I nvestigations presents methods to properly conduct a computer forensics investigation, beginning with a discussion of ethics then focusing on the process of identifying, collecting and analyzing computer evidence. Students will receive a working knowledge of hardware and operating systems (OSS) to maximize their success on projects and exercises.
-
3.00 Credits
3 Credits This course is designed to expose students to practical experience in an agency or department in the Criminal Justice System. Prerequisites: CJ 120, CJ 123, CJ 124, CJ 210, HU 150 and permission of instructor.
-
3.00 Credits
3 Credits This course is designed to expose students to practical experience in a corporate or private security setting. Prerequisites: CJ 120, CJ 123, CJ 124, CJ 210, HU 150 and permission of instructor.
-
3.00 Credits
3 Credits (3,1) The purpose of this course is to explore in-depth network defense concepts and techniques. This course will examine theoretical concepts that make the world of networking unique. This course will also adopt a practical approach when examining network defense techniques and includes hands-on practical applications. Along with examining different network defense strategies, this course will explore the fields of steganography and malware commonly utilized in cybercrime.
-
3.00 Credits
3 Credits (3,0) This course will explore the relationship between the physical environment and the young child, from birth through age eight. On the basis of both historical and current theories of child development, the student will learn how to select and design developmentally appropriate programs that are supportive and inclusive of all children's needs. Twelve hours of class observation in early childhood settings is required.
-
3.00 Credits
3 Credits (3,0) This course is designed to provide the student with a comprehensive introduction to education and teaching. It provides a solid background in current issues, results of research, and the intellectual foundations of education. Observation in school settings is included.
-
3.00 Credits
3 Credits (3,0) This course is designed to introduce students to the process of human growth and development from the prenatal period to puberty. The development of a child's self-concept, inclusive of the cognitive, physical, social, and emotional self, will be examined from a number of different theoretical perspectives (Freud, Erikson, Piaget, etc.). Observation in early childhood settings is included.
-
3.00 Credits
3 Credits (3,0) This course is designed to develop the student's ability to creatively design a developmentally-appropriate (emergent) curriculum that is supportive of the "whole child," from birth through age eight. The student will also learn how to utilize teaching methodologies to best meet each child's individual learning style. Prerequisite: ED 100 or permission of instructor.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2025 AcademyOne, Inc.
|
|
|