CCA CYBER SECURITY TRACK
|
|
|
- June Kelley
- 10 years ago
- Views:
Transcription
1 CCA CYBER SECURITY TRACK CCA Advanced Cyber Security Track A detailed description of the advanced cyber security track.
2 Courses to be offered in the CCA Advanced Cyber Security Track School Year 1 P a g e
3 Table of Contents Executive Summary...3 IT Essentials (Freshman Year)...4 Fall & Spring IT Essentials 1 & 2 (1 Credit) CompTIA A+...4 Suggested Student Learning Outcomes...4 Cyber Defense I & II (Sophomore Year)...5 Fall Computer Networks (1/2 Credit) CompTIA Network+...5 Spring Advanced Computer Networks Hardening Basics (1/2 Credit)...5 Suggested Student Learning Outcomes...5 Programming and Data Structures I & II (Junior Year)...6 Fall Programming and Data Structures I (1/2 Credit)...6 Spring Advanced Programming JAVA (1/2 Credit)...6 Suggested Student Learning Outcomes...6 System Admin I & II (Junior Year)...7 Fall System Administration I (1/2 Credit)...7 Spring System Administration II (1/2 Credit)...7 Suggested Student Learning Outcomes...7 Ethics & Survey of Programming Languages (Senior Year)...8 Fall Skills for Computing Professionals Ethics (1/2 Credit)...8 Spring Internship or Senior Project (1/2 Credit)...8 Suggested Student Learning Outcomes...8 Cybersecurity Essentials (Senior Year)...9 Fall Survey of Programming Languages (1/2 Credit)...9 Spring System Penetration Testing (1/2 Credit)...9 Suggested Student Learning Outcomes...9 Additional recommended courses of studies Introduction to Logic Introduction to Statistics Design and Analysis of Algorithms P a g e
4 Executive Summary In 2009 I started developing the Advanced Cyber Security Track. I researched what fundamental skills industry was looking for in entry level candidates. What certificates did industry accept as validation for those skills? What courses best developed the fundamental skills industry was looking for and prepared students for certifications that industry accepted. What sequence of those courses logically developed those skills, built a strong foundation, and prepared students for certifications. What course materials best facilitated instruction and learning in those courses. Lastly, what instructional methods were best for those courses? The end result is the Advanced Cyber Security Track. -Mike Miklich, Cyber Security Program Founder 3 P a g e
5 IT Essentials (Freshman Year) Fall & Spring IT Essentials 1 & 2 (1 Credit) CompTIA A+ This course is an overview of computer architecture, which stresses the underlying design principles and the impact of these principles on computer performance. General topics include design methodology, processor design, control design, memory organization, system organization, and parallel processing. We will be using the CompTIA A+ book for the instructional material, lab exercises and quizzes. It is suggested students be required to pass the CompTIA A+ practice certification exam at the end of this course to receive credits, and in order to continue with the Cyber Security program. Suggested Student Learning Outcomes CompTIA A+ Certification Testout A+ Certification 4 P a g e
6 Cyber Defense I & II (Sophomore Year) CCA CYBER SECURITY TRACK Fall Computer Networks (1/2 Credit) CompTIA Network+ This course is an introductory look at computer communication from an engineering perspective. It will focus on the principles of computer communication and the basic concepts in the architecture of computer networks. As an introductory course, it covers a broad set of concepts and implementations, addressing both theory and practice, using the layered model of computer communications. Labs are used to reinforce concepts and develop practical networking skills. We will be using CompTIA Network+ book for the instructional material, lab exercises and quizzes. It is suggested students be required to pass the Network + practice certification exam at the end of this course to receive credits, and in order to continue with the Cyber Security program. Spring Advanced Computer Networks Hardening Basics (1/2 Credit) This course proposes to introduce the student to the identification of vulnerabilities, forms of attack, appropriate countermeasures, and the detection and defense of the same. Tools and techniques for the securing of hardware, software and data, including physical security are covered. The issues and facilities available to both the intruder and administrator will be examined and evaluated with appropriate exercises to illustrate their effect. The textbook used for this course is All In One CompTIA Security+, with labs to support the learning process. Suggested Student Learning Outcomes CompTIA Network+ Certification Testout Network Certification CompTIA Security+ Certification Testout Security Certification 5 P a g e
7 Programming and Data Structures I & II (Junior Year) Fall Programming and Data Structures I (1/2 Credit) Using the C++ programming language, this course introduces algorithmic problem solving, basic control and data structures, and procedural abstraction. Topics include language syntax and semantics, arithmetic expressions, operators, functional decomposition, functional calls and parameters, file input and output, identifier scope and lifetime, switch and loop structures, array processing, strings, searching and sorting. The class will use Starting out with C++ textbook, and be instructor led, with labs. Spring Advanced Programming JAVA (1/2 Credit) The Object-Oriented Programming course is a study of concepts, terminology, and methodologies used in object-oriented systems, languages, and applications. Students will design and implement software systems using object-oriented analysis and design techniques. The purpose of this course is to develop a thorough understanding of object-oriented (OO) design, systems, and applications. The lecture portion of the course will emphasize both OO design concepts and language specific applications. Programming assignments will provide students with experience in an object-oriented programming language, namely JAVA. Also, comparisons will be made to OO design concepts in C++. The textbook used for this course will be Java for the Absolute Beginner Suggested Student Learning Outcomes C++ Portfolio JAVA Portfolio 6 P a g e
8 System Admin I & II (Junior Year) CCA CYBER SECURITY TRACK Fall Computer Systems Technology I (1/2 Credit) System Administration I topics focus on Microsoft Windows This course is designed to provide students with essential knowledge and skills to implement, administer, and troubleshoot servers in a networked environment. Operating system concepts, such as installing a standalone system, file systems authentication, and user support services are explored. Topics will include security issues, user and group administration, active directory services, DHCP, DNS, SSH, backup and restoration strategies and techniques, integrated mass storage technologies and alternative client technologies. The class will use Configuring Windows server 2008 Active Directory textbook, and be instructor led with, with labs delivered through the Microsoft IT Academy E-learning suite. Spring Computer Systems Technology II (1/2 Credit) System Administration II topics focused on the Linux operating system. This course is designed to provide students with essential knowledge and skills to implement, administer, and troubleshoot servers in a networked environment. Operating system concepts, such as installing a standalone system, file systems authentication, and user support services are explored. Topics will include security issues, user and group administration, directory services, DHCP, DNS, SSH, electronic system update and maintenance, backup and restoration strategies and techniques, integrated mass storage technologies and alternative client technologies. The class will use the textbook A Practical Guide to Ubuntu Linux, be instructor led, with labs. Suggested Student Learning Outcomes MCITP Exam or MTA Windows Fundamentals and MTA Server Fundamentals CompTIA Linux+ 7 P a g e
9 Ethics & Survey of Programming Languages (Senior Year) Fall IT Fundamentals - Skills for Computing Professionals Ethics (1/2 Credit) The Skills for Computing Professionals will focus on the professional skills that computer scientists will need to be successful in their careers and lives. There are two key areas of study, communication skills needed by computer scientists and their ethical responsibilities. Communication skills will include writing and giving oral presentations about computer science topics and life skills. Ethical issues will be explored from a computer science perspective. Spring Internship or Senior Project (1/2 Credit) The students will intern and journal their productivity, meeting as a class on a weekly basis to discuss their experiences. If no internship program is available students will work on a senior project Suggested Student Learning Outcomes Comprehensive Computer Scientist Ethical Responsibilities Report Internship or Senior Project 8 P a g e
10 Cybersecurity Essentials (Senior Year) CCA CYBER SECURITY TRACK Fall IT Programming - Survey of Programming Languages (1/2 Credit) The Survey of Programming Languages course is a collection of selected programming languages for students familiar with programming. Students will write programs in a broad variety of languages, with an emphasis on Python. Students at the conclusion of this course will be familiar with Ruby, Perl, XHTML and Python. Textbooks used for this course will include Ruby Programming for the absolute beginner, Perl Programming for the absolute beginner, Python Programming for the absolute beginner and HTML, XHTML, & CSS for the Absolute Beginner. Spring IT Programming - System Penetration Testing (1/2 Credit) This class will immerse the students into a hands-on environment where they will be shown how to conduct penetration testing. They will be exposed to an entirely different way of achieving optimal information security posture in their organization. They will scan, test, penetrate and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, Virus Creation and others. EC-Council textbook on CEHv8 will be used in this course. Suggested Student Learning Outcomes Python, Ruby, and Perl Portfolios CEH Certification 9 P a g e
11 Additional recommended courses of studies Introduction to Logic Study of correct reasoning, including the recognition, analysis, and criticism of arguments; relevant topics include informal fallacies, syllogistic reasoning, and systems of deduction. Each one of us wants to think clearly and correctly. Logic helps us to do this by studying the forms that valid reasoning takes. This course will treat both informal and formal logic. We will cover common rhetorical fallacies, classical syllogistic logic, and propositional logic. The course aims to provide students with the tools needed to improve their critical thinking and inference skills. Introduction to Statistics Statistics has become known as the mathematical tool or approach for analyzing data in order to draw reliable conclusions. This course will consider the most useful statistical methods; identify the statistical methods most widely used in education, psychology, and the social sciences; and study the mathematical formulas that are used in statistical applications. Prerequisite: MTH 113 or MTH 123. The textbook used for this course will be Statistics for the Utterly Confused. Design and Analysis of Algorithms In this course you will learn several fundamental principles of algorithm design: divide-andconquer methods, graph algorithms, practical data structures (heaps, hash tables, search trees), randomized algorithms, and more. 10 P a g e
12 For more information about the organization we partner with (iforce) and the Advanced Track, visit
Course Descriptions. preparation.
Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating
Computer Science Course Descriptions Page 1
CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating systems, the Internet,
Course Descriptions. CS 101 Intro to Computer Science
Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating
COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)
COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) Computer Science (COSC) courses are offered by the School of Information Arts and Technologies within the Yale Gordon College of Liberal Arts.
Brandman University. School of CCNA
Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
Information Systems Security Certificate Program
Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate
EC Council Certified Ethical Hacker V8
Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
BIT Course Description
BIT Course Description Introduction to Operating Systems BTEC 101 This course follows a systematic approach to operating systems explaining why they are needed and what they do. Topics include the basic
Computer and Information Sciences
Computer and Information Sciences Dr. John S. Eickmeyer, Chairperson Computers are no longer huge machines hidden away in protected rooms and accessible to only a few highly-trained individuals. Instead,
Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
[CEH]: Ethical Hacking and Countermeasures
[CEH]: Ethical Hacking and Countermeasures Length Audience(s) Delivery Method : 5 days : This course will significantly benefit security officers, auditors, security professionals, site administrators,
Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and
Cybersecurity comes to Allegany College of Maryland 107 Intro to Cybersecurity Offered fall and spring semesters. This course provides a broad overview of computer security, ethical issues and information
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
Please consult the Department of Engineering about the Computer Engineering Emphasis.
COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals
Networking and Cyber Security Overview
Acknowledgements Networking and Cyber Security Overview Manitoba Education and Advanced Learning gratefully acknowledges the contributions of the following individuals in the development of Grades 9 to
PCCC PCCC Course Description
Course Description CIS 101 Computer Concepts and Applications 3 credits (formerly Introduction to Computers and Information Processing) Introduces a variety of topics in computers and computing including
Computer Information Systems (CIS)
Computer Information Systems (CIS) CIS 113 Spreadsheet Software Applications Prerequisite: CIS 146 or spreadsheet experience This course provides students with hands-on experience using spreadsheet software.
138 To satisfy a prerequisite, the student must have earned a letter grade of A, B, C or CR in the prerequisite course, unless otherwise stated.
Computer Science and Information Systems: Information Technology - Networking CSIT 131 Word (1) (Formerly CSIS 127) Word word processing software. Prepares individuals who are seeking to become a Microsoft
Information and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
Access FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at [email protected]. To speak with a Help Desk
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Cybersecurity Certificate Programs
Cybersecurity Certificate Programs Maryland Workforce Outlook Forum May 26th, 2016 Homer Minnick, Director, Cybersecurity Academy, UMBC Training Centers umbctraining.com 443-692-6600 About UMBC Training
02-201: Programming for Scientists
1. Course Information 1.1 Course description 02-201: Programming for Scientists Carl Kingsford Fall 2015 Provides a practical introduction to programming for students with little or no prior programming
Computer Network Engineering
226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering
Technical Courses. Course Catalog
COMPUTER INSTITUTE Technical Courses Course Catalog Copyright 1983, Computer Institute Volume September 23, 2009 1335 Rockville Pike Rockville, MD 20852 WWW.TRAINUS.COM (301) 424-0044 TABLE OF CONTENTS
9-12 An exploratory level course that provides an exposure to. careers and issues in information technology. Students
Course Course Name 27101 Introduction to Information Technology 27102 Computer Software Applications 27120 Introduction to Programming Languages 27122 Programming Essentials-Visual Basics Grade 9-12 An
PC/Network Technician Certification Program: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications
: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications ZAPL- 007 CompTIA A+, Microsoft MTA: Windows OS Essentials, CWTS Wireless Certifications) Fee: $3,175 - Includes training, comprehensive
EC-Council. Certified Ethical Hacker. Program Brochure
EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional
APPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c
APPLICATION FOR BOARD APPROVAL of Locally Developed Course MCP CERTIFICATION 11/12a/12b/12c John Murtha APPLICATION FOR BOARD APPROVAL Of the Locally Developed MCP CERTIFICATION 11/12a/12b/12c PREAMBLE:
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised
Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
Department of Computer Science
The University of Texas at San Antonio 1 Department of Computer Science The Department of Computer Science offers a Bachelor of Science degree in Computer Science and a Minor in Computer Science. Admission
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
LINUX / INFORMATION SECURITY
LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,
DIABLO VALLEY COLLEGE CATALOG 2014-2015
COMPUTER SCIENCE COMSC The computer science department offers courses in three general areas, each targeted to serve students with specific needs: 1. General education students seeking a computer literacy
GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours
GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY Career Cluster: Career Pathway: Career Major: Career Major Hours: Information Technology (IT) Network Systems (IT001) Cyber Security Forensics Specialist
Cyber Security Certificate
Mount Wachusett Community College 1 Cyber Security Certificate Technical Standards for CSC Students entering these programs must be able to demonstrate the ability to: Comprehend textbook material at the
2667A - Introduction to Programming
2667A - Introduction to Programming Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction Elements
Preliminary Course Syllabus
Preliminary Course Syllabus Designing Security for Microsoft SQL Server 2005 Elements of this syllabus are subject to change. Key Data Product #: 1917 Course #: 2787A Number of Days: 2 Format: Instructor-Led
CCNA Security 2.0 Scope and Sequence
CCNA Security 2.0 Scope and Sequence Last Updated August 26, 2015 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security
Montgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS
TECHNOLOGY PROGRAMS PROGRAM PAGE A+... 4 CISCO NETWORKING ACADEMY... 2 CITRIX IT ACADEMY... 3 COMPUTER AIDED DRAFTING... 8 COMPUTERIZED ACCOUNTING... 6 COMPUTERS... 5 CYBER SECURITY... 3 MICROSOFT ADMINISTRATION...
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The
Cyber R &D Research Roundtable
Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes
School of Management and Information Systems
School of Management and Information Systems Business and Management Systems Information Science and Technology 176 Business and Management Systems Business and Management Systems Bachelor of Science Business
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
Bachelor of Information Technology (Network Security)
Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking
Kilgore College Course Syllabus
Windows Server 2008 Active Directory Configuration (ITMT 2302) Credit: 3 semester credit hours (2 hours lecture, 3 hours lab) Prerequisite/Co-requisite: ITMT2301 Course Description A study of Active Directory
EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker
EC-Council Hacking Technology C Certified E Ethical Hacker Certified Ethical Hacker v8 Certified Ethical Hacker Course Description CEHv8 is a comprehensive Ethical Hacking and Information Systems Security
COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.)
VCU 1 COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.) The Bachelor of Science in Computer Science is built on a rigorous, highly concentrated, accredited curriculum of computer science courses. The program
Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering
Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document
COURSE TITLE COURSE DESCRIPTION
COURSE TITLE COURSE DESCRIPTION CS-00X COMPUTING EXIT INTERVIEW All graduating students are required to meet with their department chairperson/program director to finalize requirements for degree completion.
Department of Computer Science
82 Advanced Biochemistry Lab II. (2-8) The second of two laboratory courses providing instruction in the modern techniques of biochemistry. Experiments are performed on the isolation, manipulation and
Course Title: ITAP 3471: Web Server Management
Course Title: ITAP 3471: Web Server Management Semester Credit Hours: 4 (3,1) I. Course Overview The primary objective of this course is to give students a comprehensive overview of the tools and techniques
INFORMATION TECHNOLOGY (IT) 515
INFORMATION TECHNOLOGY (IT) 515 202 Old Union, (309) 438-8338 Web address: IT.IllinoisState.edu Director: Mary Elaine Califf. Tenured/Tenure-track Faculty: Professors: Gyires, Li, Lim, Mahatanankoon. Associate
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
Table of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students
Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
Degrees Major in Computer Science Minor in Computer Science Major in Software Engineering
LT400, Independent Study: Directed reading registering. (U)(1). LT401, Independent Study: Directed reading registering. (U)(2). LT402, Independent Study: Directed reading registering. (U)(3). LT499, Honors
Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6)
Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6) Programme Structure STAGE ONE This stage makes up the Diploma in Information Technology (Level 5) 120
CURRICULUM VITAE EDUCATION:
CURRICULUM VITAE Jose Antonio Lozano Computer Science and Software Development / Game and Simulation Programming Program Chair 1902 N. Loop 499 Harlingen, TX 78550 Computer Sciences Building Office Phone:
IT and Cyber Security Training Courses
AN FORAS RIARACHÁIN INSTITUTE OF PUBLIC ADMINISTRATION IT and Cyber Security Training s Spring 2016 Protection Through Knowledge, Skills, Practice Institute of Public Administration / 01 240 3600 IT Security
EC-Council. Program Brochure. EC-Council. Page 1
Program Brochure Page 1 Certified Ethical Hacker Version 7 Revolutionary Product releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and
Department of Computer Science
Department of Computer Science Ali Sekmen, PhD 2, Chair 005, McCord Hall 615-963-5712 Faculty: K. Al Nasr, W. Chen, E. Erdemir, M. Hayes, H. Miao, T. Rogers, G. Shao, F. Yao General Statement: The Department
Connecting PTE to Careers in Idaho
1 Connecting PTE to Careers in Idaho Wendi Secrist Director, Business Outreach July 21, 2015 www.pte.idaho.gov 2 School Portals NextSteps Career Information Where do I start? SkillStack lmi.idaho.gov College/University
COP 2250 Object-Oriented Programming (Java SE) (3) PR General Elective (3) MAD 2104 Discrete Mathematics (3) General Elective (3)
BS in Information Technology: Information Security/Systems Admin (ASI) Concentration 2015-16 USFSM Catalog *EXAMPLE* Curriculum Progression Ladder Year 1 Fall Freshman (13 credit hours) Spring Freshman
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com
Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)
Computer Information Technology
Computer Information Technology Business and Social Sciences Division, Room A44, (847) 543-04 The Computer Information Technology degree programs provide five specialty options with a common core of general
DIVISION OF BUSINESS AND COMPUTER INFORMATION SYSTEMS BUSINESS DEPARTMENT -50- Statement of Business Department Mission and Purpose
DIVISION OF BUSINESS AND COMPUTER INFORMATION SYSTEMS The Division of Business and Computer Information Systems seeks to provide students with a foundation for success in their chosen vocation. BUSINESS
ADVANCED SCHOOL OF SYSTEMS AND DATA STUDIES (ASSDAS) PROGRAM: CTech in Computer Science
ADVANCED SCHOOL OF SYSTEMS AND DATA STUDIES (ASSDAS) PROGRAM: CTech in Computer Science Program Schedule CTech Computer Science Credits CS101 Computer Science I 3 MATH100 Foundations of Mathematics and
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 210 COURSE NUMBER: CIS 210 COURSE NAME: MEETING PLACE: Random On-Line DIVISION: Business, Computing & Applied Technology
Bachelor of Science in Business Administration - Information Systems and Technology Major
Bachelor of Science in - Information Systems and Technology Major Ling Li, Chair Li Xu, Information Technology Area Coordinator Roya Ardalan, Chief Discipline Advisor The information systems and technology
Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.
Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc. Foundstone Labs October, 2003 Table of Contents Table of Contents...2 Introduction...3 Scope and Approach...3
Management Information Systems 260 Web Programming Fall 2006 (CRN: 42459)
Management Information Systems 260 Web Programming Fall 2006 (CRN: 42459) Class Time: 6:00 8:05 p.m. (T,Th) Venue: WSL 5 Web Site: www.pbvusd.net/mis260 Instructor Name: Terrell Tucker Office: BDC 127
CCNA Security v1.0 Scope and Sequence
CCNA Security v1.0 Scope and Sequence Last updated April 7, 2011 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security
MiraCosta College Computer Studies Department ~
MiraCosta College Computer Studies Department ~ CSIT: Computer Studies and Information Technology Course Catalog Effective Fall 2010 (pending final approval) Table of Contents CSIT Courses... 3 CSIT 100:
ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011
ACADEMIC PROGRAM REVIEW of PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE May 12-13, 2011 Report Amended October 2011 Table of Contents PC AGE Organizational Profile... 3 Academic Program Review
CS 391-950 Ethical Hacking Spring 2016
CS 391-950 Ethical Hacking Spring 2016 Instructor: Shahriar Nick Rahimi Office: Faner 2136 Office Hours: MW 8:30 am-11 am Friday 10 am- 11 am E-Mail: [email protected] Course Web Site: https://online.siu.edu/
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Security+ P a g e 1 of 5. 5-Day Instructor Led Course
P a g e 1 of 5 Security+ 5-Day Instructor Led Course Overview This course is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic
Computer Network Engineering
208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of
Interested in Expanding your Technical Skills?
Interested in Expanding your Technical Skills? The ideal learning path to expand your technical knowledge differs based on your experience, goals, and how much time you have available to devote to practicing
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
