This course starts with basics in computer technology to build a foundation for understanding where evidence can be found. It introduces students to technology and procedures of acquiring and analyzing digital evidence taken from computers. This course also exposes the students to software being used in the industry.
This course explores the ethical impact of computer technology in the world, as well the rules and regulations that ensures the proper use of technology, Internet crime, privacy protection and first amendment rights that protect our freedom in cyberspace are closely examined.
Cyber Security is a primary concern of the U.S. government as well as most major corporations in the country. This course introduces students to the opportunity that exists in the cybersecurity field. Topics such as certified ethical hacking, cyber threats and vulnerabilities and cryptography are introduced.
This course focuses on techniques, considered preventative in nature, which are used to manage and protect networking devices from external attacks. This course utilizes hands-on virtual labs which allow students to examine sophisticated devices such as ASA firewalls and to explore how these devices may be used to control access to resources. We will also explore methods to test, audit, and analyze the outcomes of a cyber-attack. (Taken in Final semester)
This course focuses on techniques, considered preventative in nature, which are used to manage and protect networking devices from internal attacks. This course utilizes hands-on virtual labs which allow students to examine sophisticated devices such as ASA firewalls and to explore how these devices may be used to control access to resources. We will also explore methods to test, audit, and analyze the outcomes of a cyber-attack. (Taken in Final semester)
The Cybersecurity Practicum/Capstone course provides “hands on” experience to promote development of important skills. Weekly meetings with the course instructor will review key program topics. To complete the course, the student is required to spend an average of 10 hours per week of field work under the guidance of industry professionals in order to apply the accumulation of program knowledge in a real world setting. The student will be required to produce a report relating to the work experience and how it is connected to the content of this program. This class also has an on-campus meeting requirement which will be used to develop a portfolio identifying the experiences the student has been exposed to in the field. Students will keep a working journal during the semester to help assess the progress of their experience. (Prerequisite: Final semester standing)
This course introduces the student to data structures, algorithm design, and space and time complexity analysis. Topics include common data structures such as linked lists, stacks, queues, binary trees, searching and sorting algorithms, maps, and hash tables, and techniques of run-time complexity analysis such a Big O notation.
This course introduces the student to advanced topics in programming and software design using C#. Applications include Windows event driven applications, classes, abstract classes and inheritance, ADO.NET data driven applications using database, ASP.Net for web applications, Collections, File Streams, and applications using a mobile device.
This course is hands on coverage of Virtual Computing including installing, configuring, and using virtualization products.