New Course Offerings

New Cybersecurity Degree Courses

COMI-2035, COMI-2036, COMI-2037, CYBR 1100, CYBR 1200

New Computer Science Course Offerings

COMI-2520, COMI-2225, COMI-2055

Introduction to Computer Forensics - COMI-2035

This course starts with basics in computer technology to build a foundation for understanding where evidence can be found. It introduces students to technology and procedures of acquiring and analyzing digital evidence taken from computers. This course also exposes the students to software being used in the industry.

Introduction to Computer Ethics - COMI-2036

This course explores the ethical impact of computer technology in the world, as well the rules and regulations that ensures the proper use of technology, Internet crime, privacy protection and first amendment rights that protect our freedom in cyberspace are closely examined.

Introduction to Cybersecurity - COMI-2037

Cyber Security is a primary concern of the U.S. government as well as most major corporations in the country. This course introduces students to the opportunity that exists in the cybersecurity field. Topics such as certified ethical hacking, cyber threats and vulnerabilities and cryptography are introduced.

Introductory Cyber Range Tools and Techniques
CYBR 1100

This course focuses on techniques, considered preventative in nature, which are used to manage and protect networking devices from external attacks. This course utilizes hands-on virtual labs which allow students to examine sophisticated devices such as ASA firewalls and to explore how these devices may be used to control access to resources. We will also explore methods to test, audit, and analyze the outcomes of a cyber-attack. (Taken in Final semester)

Defending Internal Threats using the Cyber Range
CYBR 1200

This course focuses on techniques, considered preventative in nature, which are used to manage and protect networking devices from internal attacks. This course utilizes hands-on virtual labs which allow students to examine sophisticated devices such as ASA firewalls and to explore how these devices may be used to control access to resources. We will also explore methods to test, audit, and analyze the outcomes of a cyber-attack. (Taken in Final semester)

Cybersecurity Practicum/Capstone Course CYBR 2500

The Cybersecurity Practicum/Capstone course provides “hands on” experience to promote development of important skills. Weekly meetings with the course instructor will review key program topics. To complete the course, the student is required to spend an average of 10 hours per week of field work under the guidance of industry professionals in order to apply the accumulation of program knowledge in a real world setting. The student will be required to produce a report relating to the work experience and how it is connected to the content of this program. This class also has an on-campus meeting requirement which will be used to develop a portfolio identifying the experiences the student has been exposed to in the field. Students will keep a working journal during the semester to help assess the progress of their experience. (Prerequisite: Final semester standing)

New Computer Science Course Offerings

Data Structures and Algorithms - COMI 2520 (Coming soon)

This course introduces the student to data structures, algorithm design, and space and time complexity analysis. Topics include common data structures such as linked lists, stacks, queues, binary trees, searching and sorting algorithms, maps, and hash tables, and techniques of run-time complexity analysis such a Big O notation.

Advanced C# Programming - COMI-2225

This course introduces the student to advanced topics in programming and software design using C#. Applications include Windows event driven applications, classes, abstract classes and inheritance, ADO.NET data driven applications using database, ASP.Net for web applications, Collections, File Streams, and applications using a mobile device.

Introduction to Computer Virtualization - COMI-2055

This course is hands on coverage of Virtual Computing including installing, configuring, and using virtualization products.

This page developed and maintained by Computer Studies. Send comments and suggestions to dscattone@ccri.edu .


Top
Last Updated: 7/18/18