167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
|
|
- Melvin Davis
- 8 years ago
- Views:
Transcription
1 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring, risk assessment, and ethical hacking. These courses, in conjunction with other foundational courses, will give students the technical aptitude for a career in information. The programming languages, monitoring, and ethical hacking courses taken after the completion of foundational courses will provide students with the skills and knowledge to obtain industry certifications such as the CompTIA Security+, A+ and Network+ and the Certified Ethical Hacker professional certifications. Graduates will be able to: Recognize vulnerabilities and threats to the security of computers and networks and apply anti-virus, firewall and other various solutions Understand and apply the concepts of communication, telecommunications, and networking Explain the field of information security from both the managerial and technical perspective Articulate the current risks and threats to an organizations data Analyze and verify security properties of network security designs Communicate with and provide support to investigate personnel in incident handling activities
2 Curriculum Outline 167 th Air Wing Curriculum Map Students pursuing the National Guard Security Curriculum will complete the Math and English Boot Camp prior to enrolling into the Information Security Curriculum. It has been suggested that students also complete an introduction to computers boot camp, preferably the Friday and Saturday prior to the start of the semester. Term Coursework Course Information Summer English Boot Camp 2. Math Boot Camp 3. Technology Boot Camp Geared towards IC3 completion Fall A+ Essentials A+ Certification Exam Differentiate between critical errors and user errors Curriculum= Cisco Net Generate a trouble shooting and solution log Academy Assess various computer hardware malfunctions and 8 week boot camp potential solutions to them 2. Security+ Security+ Certification Construct security solutions Exam Classify security threats Plan reaction to security infiltration and Netlabs Probe networks and computer systems in order to 8 week boot camp determine potential vulnerabilities
3 Spring 2014 Spring/Summer Introduction to Linux Perform common system administration tasks Perform system backups and troubleshoot security Provide an understanding of the essentials of Linux device drivers. Install, configure, optimize and upgrade personal computer s Determine what hardware is present on a Linux system Perform preventative maintenance on microcomputers 2. Introduction to Programming in Visual Basic Demonstrate an understanding of data types, looping decisions, functions, and subroutines written in QBasic Describe the different data types (real, integers, and strings) Describe decisions (relational and logical operators) Describe functions and subroutines 3. Introduction to Networking & Telecommunications Understand foundational concepts involved within networking and telecommunications OSI model will be examined in detail and compared to the TCP/IP model Understand methods of telecommunications and the technologies involved 4 Intrusion Detection Provides an introduction to firewalls and other network security s that work together to create an in-depth defensive perimeter around a Local Area Network. Examines firewalls in context with the other elements needed for effective perimeter security as well as security within a network. It incorporates examination of technologies such as packet filtering, authentication, proxy servers, and online Network+ Certification Exam and Netlabs 8 week boot camp
4 Summer 2014 encryption, bastion hosts, virtual private networks, log file maintenance, and intrusion detection systems. Includes firewall planning and design, developing a security policy, firewall configuration strategies, packet filtering, working with proxy servers and application-level firewalls, authenticating users, choosing a bastion host, setting up a virtual private network, building your own firewall, and ongoing administration. 1. Principles of Incident Response & Recovery Discusses methods of identifying vulnerabilities and taking appropriate measures to prevent and mitigate failure risks for an organization. Develops a foundation in disaster recovery principles and planning, and emphasizes the importance of incident response to minimize prolonged downtime that can potentially lead to irreparable loss. Addresses the overall problem of contingency planning rather than focusing on specific tasks of incident response or disaster recovery. 2. Ethical Hacking Guide students and professionals toward becoming skilled security testers and maps to the Certified Ethical Hacker certification exam objectives. Provide an ethical hacking overview, TCP/IP concepts review, network and computer Attacks, footprinting and social engineering, port scanning, enumeration, programming for security professionals, Microsoft operating system vulnerabilities, Linux operating system vulnerabilities, hacking web servers, hacking wireless networks, cryptography, and protecting networks with security devices. Background Check Required
5 Classes: Classes will be offered on Wednesday night, Friday night and Saturday mornings A course fee will be added to pay for the certification exam accompanying the following courses; A+, Network+ and Security + Instructors: Ron Richter- Security+, Network+, CCNA Ryan Kief- Security+, Network+, CCNA, CCNP Tony Early- A+, Security+, Network+, CCNA, CCNP, CISSP Program Contacts: Michele Morrison- Program Coordinator, Cyber Security, mmorriso@blueridgectc.edu ext Ron Richter-Program Coordinator, Information Technology, rrichter@blueridgectc.edu ext Course Descriptions: IT A+ ESSENTIALS (4) This hands-on course is designed to show students how to upgrade and troubleshoot PCs on their own. Topics include setting up motherboards and hard drives; identifying and installing memory; modifying CMOS settings; configuring sound cards and modems; troubleshooting; and installing basic operating systems. Students will also learn to install, configure and troubleshoot PC Operating Systems. Students will receive experience working with a wide variety of operating systems. Prerequisite(s): CAS 111 Course length: 8 weeks Course type: Cisco Net Academy, hybrid IT 185 Introduction to Linux (3) This course will prepare students to work with the Linux operating system and help them prepare for the Linux + CompTIA certification exam. Students will install three different Linux operating systems and complete many hands-on lab exercises. Prerequisite(s): CAS 111 Course length: 4 weeks Course type: hybrid IT 192 Introduction to Programming in Visual Basic (3) This course familiarizes the student with the Visual Studio environment using Visual Basic. Students will use Foundation Class libraries to develop simple applications. Prerequisite(s): CAS 111 Course length: 4 weeks Course type: hybrid IT SECURITY+ (3) This course is designed to provide students with the fundamentals of security, and to help prepare for the CompTIA Security+ exam. It covers material related to general security concepts, communications security, infrastructure security, basics of cryptography, and operational/organizational security. Prerequisite(s): CAS 111 Course length: 8 weeks Course type: Netlabs, textbook
6 CYBR 125 Principles of Incident Response and Disaster Recovery (3) This course presents methods of identifying vulnerabilities and taking appropriate measures to prevent and mitigate failure risks for an organization. The course presents a foundation in disaster recovery principles and planning, and emphasizes the importance of incident response to minimize prolonged downtime that can potentially lead to irreparable loss. This course addresses the overall problem of contingency planning rather than focusing on specific tasks of incident response or disaster recovery. Prerequisite: CAS 111 Course length: 4 weeks Course type: hybrid CYBR 210 Intrusion Detection (3) This course provides an introduction to firewalls and other network security s that work together to create an in-depth defensive perimeter around a Local Area Network. The course maps to the Check Point Certified Security Administrator certification exam objectives, and examines firewalls in context with the other elements needed for effective perimeter security as well as security within a network. It incorporates examination of technologies such as packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks, log file maintenance, and intrusion detection systems. Course content includes firewall planning and design, developing a security policy, firewall configuration strategies, packet filtering, working with proxy servers and application-level firewalls, authenticating users, choosing a bastion host, Prerequisite: CNET 101. Course length: 4 weeks Course type: hybrid CYBR 281 Ethical Hacking (3) This course guides students and professionals toward becoming skilled security testers and maps to the Certified Ethical Hacker certification exam objectives. Course content includes an ethical hacking overview, TCP/IP concepts review, network and computer Attacks, foot printing and social engineering, port scanning, enumeration, programming for security professionals, Microsoft operating system vulnerabilities, Linux operating system vulnerabilities, hacking web servers, hacking wireless networks, cryptography, and protecting networks with security devices. Prerequisite: CNET 101 Course length: 4 weeks Course type: hybrid CNET Intro to Networking & Telecomm (3) This course is designed to provide a detailed overview of the foundational concepts involved within networking and telecommunications. The OSI model will be examined in detail and compared to the detailed TCP/IP model. Specific protocols and their operations will be examined. Methods of providing telecommunications and the technologies involved will be covered, as well as networking hardware, cabling, documentation, troubleshooting, implementations, planning, and repair of networks and telecommunications systems. Pre or Co-requisite of CAS 111 Course length: 8 weeks Course type: Netlabs, textbook
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
More informationTrack 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
More informationIT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
More informationIT and Cyber Security Training Courses
AN FORAS RIARACHÁIN INSTITUTE OF PUBLIC ADMINISTRATION IT and Cyber Security Training s Spring 2016 Protection Through Knowledge, Skills, Practice Institute of Public Administration / 01 240 3600 IT Security
More informationSecurity+ P a g e 1 of 5. 5-Day Instructor Led Course
P a g e 1 of 5 Security+ 5-Day Instructor Led Course Overview This course is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic
More informationCCNA Security 2.0 Scope and Sequence
CCNA Security 2.0 Scope and Sequence Last Updated August 26, 2015 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security
More informationHow To Learn To Use A Computer System
Computer Repair & Networking Organization Washburn Institute of Technology Program Number 11.0901 Instructional Level Certificate Target Population Grades 11 & 12 Post-secondary Description This program
More informationPrinciples of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
More informationTable of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students
More informationPC/Network Technician Certification Program: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications
: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications ZAPL- 007 CompTIA A+, Microsoft MTA: Windows OS Essentials, CWTS Wireless Certifications) Fee: $3,175 - Includes training, comprehensive
More informationAllegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and
Cybersecurity comes to Allegany College of Maryland 107 Intro to Cybersecurity Offered fall and spring semesters. This course provides a broad overview of computer security, ethical issues and information
More informationComputer Network Engineering
226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering
More informationIT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com
More informationBrandman University. School of CCNA
Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators
More informationCCNA Security v1.0 Scope and Sequence
CCNA Security v1.0 Scope and Sequence Last updated April 7, 2011 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security
More informationIT courses For Senior Managers
Protection Through Knowledge, Skills, Practice provide expert-led training courses for IT professionals and senior managers across Ireland. www.senseicybersecurity.ie Training Course Summary provide expert-led
More informationCisco Network Specialist CCNA
Web Development I CIST 1510 3 Scripting Technologies CIST 1520 3 Web Graphics I CIST 1530 3 Information Security Fundamentals CIST 1601 3 PHP Programming I CIST 2351 4 Web Technologies CIST 2510 3 Web
More informationEC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
More informationCIS 156. Firewalls and Intrusion Detection
CIS 156 Firewalls and Intrusion Detection Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Dave White, Steve Sorden Date of proposal
More informationCH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
More informationCCNA Security v1.0 Scope and Sequence
CCNA Security v1.0 Scope and Sequence Last updated June 18, 2009 Note: The English version of this course is scheduled to be generally available in July 2009. Target Audience The Cisco CCNA Security course
More informationFedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
More informationCISCO CERTIFICATION FAQ s
CISCO CERTIFICATION FAQ s What Cisco Certification training is offered at El Centro College? El Centro is an authorized CISCO NETWORKING ACADEMY offering courses to help prepare students to take the appropriate
More informationCCA CYBER SECURITY TRACK
CCA CYBER SECURITY TRACK 2013-2014 CCA Advanced Cyber Security Track A detailed description of the advanced cyber security track. Courses to be offered in the CCA Advanced Cyber Security Track 2013-2014
More informationNetwork Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
More informationFedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
More informationMinnesota State Community and Technical College Detroit Lakes Campus
Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future
More informationComputer Support & Network Administration
Computer Support & Network Administration What You Will Learn MCTC s Information Technology program has two A.A.S. awards: Computer Support and Network Administration and Software Development, as well
More information138 To satisfy a prerequisite, the student must have earned a letter grade of A, B, C or CR in the prerequisite course, unless otherwise stated.
Computer Science and Information Systems: Information Technology - Networking CSIT 131 Word (1) (Formerly CSIS 127) Word word processing software. Prepares individuals who are seeking to become a Microsoft
More informationVendor/Industry Certifications and a College Degree: A proposed concentration for network infrastructure
Vendor/Industry Certifications and a College Degree: A proposed concentration for network infrastructure Dr. Garry L. White Gw06@business.txstate.edu Department of Computer Information Systems Texas State
More informationCompTIA Security+ In this course, you will implement, monitor, and troubleshoot infrastructure, application, information, and operational security.
CompTIA Security+ Duration: 40 Hrs Course Description Overview: CompTIA Security+ (Exam SY0-401) is the primary course you will need to take if your job responsibilities include securing network services,
More informationNETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
More informationCIS Occupational Program Assessment Plan
Department CIS Occupational Program Assessment Plan Computer and Information Systems Program Outcomes (List the student learning outcomes of each degree and certificate your program offers. Attach another
More informationComputer Network Engineering
208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of
More informationAccess FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk
More informationWyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X
More informationAPPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c
APPLICATION FOR BOARD APPROVAL of Locally Developed Course MCP CERTIFICATION 11/12a/12b/12c John Murtha APPLICATION FOR BOARD APPROVAL Of the Locally Developed MCP CERTIFICATION 11/12a/12b/12c PREAMBLE:
More informationComputer Networks I Introduction
Computer Networks I Introduction Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Malin Bornhager Instructor: CCNA, CCNP, Wireless LANs and Fundamentals of Unix
More informationFIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
More informationHow To Learn To Program In Cisco Software (For Beginners)
General Information In the associate degree program, the emphasis is on how to use computers to meet business needs. They analysis and design of systems is covered to expose the student to problems that
More informationFor more information, please contact Anne Arundel Community College s Center for Workforce Solutions at 410-777-2732.
Anne Arundel Community College is an academic partner in the Pathways to Cybersecurity Careers Consortium in the State of Maryland. The Pathways to Cybersecurity Consortium consists of workforce, academic,
More informationNEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This
More informationAcademic Programs INFORMATION TECHNOLOGY
Academic Programs INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY The Information Systems programs at Tidewater Community College cover the essential areas of study in information systems technology. The
More informationSyllabus -- CIS 120 -- Computer Maintenance / A+ Certification
Syllabus -- CIS 120 -- Computer Maintenance / A+ Certification Cuyamaca College: Fall 2015 Tim Phillips Adapt and overcome USMC proverb 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
More informationBellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
More informationACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011
ACADEMIC PROGRAM REVIEW of PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE May 12-13, 2011 Report Amended October 2011 Table of Contents PC AGE Organizational Profile... 3 Academic Program Review
More informationNational Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
More informationAssessment of Learning Report. Computer Science Networking CPC. Fall 2008 Spring 2010
Assessment of Learning Report Computer Science Networking CPC Fall 2008 Spring 2010 Report prepared by: Michael Fuszner, Professor Computer Networking Program Coordinator John Phillips, Associate Professor
More informationMCSA Security + Certification Program
MCSA Security + Certification Program 12 credit hours 270 hours to complete certifications Tuition: $4500 Information technology positions are high-demand occupations that support virtually all industries.
More informationWhen a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
More informationNational Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
More informationTraining Program Informational Catalog 2014 WWW.STRIDECENTER.ORG
Training Program Informational Catalog 2014 WWW.STRIDECENTER.ORG NOW ENROLLING Dear Partner, The Stride Center takes pride in partnering with you to empower individuals by providing workforce relevant
More informationTraining Program Informational Catalog 2015 WWW.STRIDECENTER.ORG
Training Program Informational Catalog 2015 WWW.STRIDECENTER.ORG NOW ENROLLING Dear Partner, The Stride Center takes pride in partnering with you to empower the community by providing relevant workforce
More informationWyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised
More informationManaging and Maintaining Windows Server 2008 Servers
Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led
More informationE M P I R E C O L L E G E
34 E M P I R E C O L L E G E Specialized Associate Degree Information Technology Objective: The Specialized Associate Degree Information Technology program is intended to give the student knowledge of
More informationInformation Technology Cluster
Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network
More informationinformation security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
More informationInformation Technology
your MISD guide to careers in Information Technology Computer Support Specialist Geographer Communications Analyst Multimedia Producer Data Analysts Administrator Computer Analyst Web Developer Software
More informationCourse overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)
Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused
More informationCisco CCNA Discovery Grades 11-12
Units of Credit: One Year (Elective) Prerequisites: None Cisco CCNA Discovery Grades 11-12 Course Description: The Cisco CCNA Discovery curriculum provides general networking theory, practical experience,
More informationMicrosoft MTA Qualifications. CompTIA Qualifications. Course Title: SUPPORT SPECIALIST (ITSS) Includes Work Experience of 16 weeks with IT company
Course Title: IT SUPPORT SPECIALIST (ITSS) Program Type: Course Code: Award Type: Traineeship AT00005 Industry Professional Certification CompTIA and Microsoft Awards Objective Areas: Microsoft MTA; Server;
More informationMonfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed.
Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed. Cap: 40 CATALOG DESCRIPTION: Prerequisite: BACS 380 or consent of
More informationComputer Science Course Descriptions Page 1
CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating systems, the Internet,
More informationAssociate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
More informationCourse Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
More informationLINUX / INFORMATION SECURITY
LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,
More informationNAME: Adibo Stephen CONTACT ADDRESS:
CONTACT ADDRESS: NAME: Adibo Stephen United Nations African Institute for the Prevention of Crime and the Treatment of Offenders P. O. Box 10590, Kampala. Uganda. Tel: +256703885155 E-mail: adibo24@yahoo.com
More informationManitoba Curriculum Framework of Outcomes. Networking & Cyber Security Grades 9 11
Manitoba Curriculum Framework of Outcomes & Grades 9 11 9102 & Goal 1: Describe and apply appropriate health and safety practices. GLO 1.1: Describe and apply appropriate health and safety practices Maintain
More informationInquire about our programs at Worcester Technical High School!
Inquire about our programs at Worcester Technical High School! For more information on: Dual Enrollment College courses Contact the Networking Academy office (508) 799-1971 For more information on the
More informationGREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours
GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY Career Cluster: Career Pathway: Career Major: Career Major Hours: Information Technology (IT) Network Systems (IT001) Cyber Security Forensics Specialist
More informationRARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 276 Windows Security Management I. Basic Course Information A. Course Number & Title: CISY-276 Windows Security Management B. Date of Revision: Spring
More informationCIS 117 DATABASE MANAGEMENT SOFTWARE APPLICATIONS
CIS 117 DATABASE MANAGEMENT SOFTWARE APPLICATIONS This course provides students with hands-on experience using database management software. Students will develop skills common to most database management
More informationInformation and Network Security Certificate Program
Information and Network Security Certificate Program University of California, Irvine, P.O. Box 6050, Irvine, CA 92612-6050 www.extension.uci.edu PROGRAM DESCRIPTION Data security is critical and increasingly
More informationNetworking: EC Council Network Security Administrator NSA
coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA
More informationCOMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)
COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) Computer Science (COSC) courses are offered by the School of Information Arts and Technologies within the Yale Gordon College of Liberal Arts.
More informationLearning Tree Training Pre-approved Training for Continuing Education Units (CEUs)
Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted
More informationSecurity + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
More informationImplementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
More informationCS 391-950 Ethical Hacking Spring 2016
CS 391-950 Ethical Hacking Spring 2016 Instructor: Shahriar Nick Rahimi Office: Faner 2136 Office Hours: MW 8:30 am-11 am Friday 10 am- 11 am E-Mail: nick@cs.siu.edu Course Web Site: https://online.siu.edu/
More informationCOMPUTER AND INTERNETWORKING TECHNOLOGIES
COMPUTER AND INTERNETWORKING TECHNOLOGIES COMPUTER AND INTERNETWORKING TECHNOLOGIES These days it s almost impossible to find any area of life not impacted by technology. As existing and emerging technologies
More informationCybersecurity AAS Program
Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of
More informationRARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 275 UNIX and Linux Security Management I. Basic Course Information A. Course Number & Title: CISY-275 - UNIX and Linux Security Management B. Date of
More informationLinux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
More informationComputer Information Technology
Computer Information Technology Business and Social Sciences Division, Room A44, (847) 543-04 The Computer Information Technology degree programs provide five specialty options with a common core of general
More informationComputer Networking Technology
degree Computing Studies certificate Degree AS Network Security and Administration Certificate Cisco Network Associate Cisco Network Professional Computer Network Technician Computer Network Administration
More informationCourse Descriptions. preparation.
Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating
More informationINFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
More informationCompTIA Mobility+ Boot Camp
CompTIA Mobility+ Boot Camp Course Description SecureNinja s CompTIA Mobility+ (5) five day training and certification boot camp in Washington DC, San Diego, CA and Live Online is designed for IT professionals
More informationRARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified
More informationMICROSOFT CERTIFICATION FAQ s
MICROSOFT CERTIFICATION FAQ s What Microsoft Certification training programs does El Centro College offer? El Centro is a MICROSOFT IT ACADEMY offering courses to help prepare students to take the appropriate
More informationMASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
More informationProgram: Systems Engineering Certificate. Prerequisite: None. Hardware/Software required:
Program: Systems Engineering Certificate Prerequisite: None Hardware/Software required: 1. PC or Mac Any device capable of running remote software. 2. Audio output capable PC so that you can interact with/listen
More informationCOMPUTER SCIENCE & INFORMATION TECHNOLOGY
ST. JOHNS RIVER STATE COLLEGE COMPUTER SCIENCE & INFORMATION TECHNOLOGY Computer Information Technology Computer Network Engineering Technology Computer Programming and Analysis Computer Programmer Computer
More informationSENIOR SYSTEMS ANALYST
CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and
More informationIntroduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
More informationHow To Pass The Information And Network Security Certificate
Information Technology Information and Network Security Certificate Program Information and Network Security Certificate Program The Information and Network Security Certificate Program helps industry
More informationEC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth
More informationCNA 432/532 OSI Layers Security
CNA 432/532 OSI Layers Location: ECC 116 Days: Thursday Semester: Fall 2012 Times: 5:00-7:50 pm Professor: Dr. Amos Olagunju E-mail: aoolagunju@stcloudstate.edu Office Hrs: 3-4 MW, Office: ECC256 Other
More information