Search

ITDF 1300: Introduction to Digital Forensics

A study of the application of digital forensic technology to collect, analyze, document, and present information while maintaining a documented chain of custody. Overview of ethics, crime, and other legal guidelines/regulations/laws. Includes an...

COSC 1336: Programming Fundamentals

Introduces the fundamental concepts of structured programming and provides a comprehensive introduction to programming for computer science and technology majors. Topics include software development methodology, data types, control structures...

ITSY 1342: Information Technology Security

Instruction in security for network computer hardware, software, virtualization, and data, including physical security; backup procedures; relevant tools; encryption; and protection from viruses. Topics may adapt to changes in industry practices.

ITSY 2300: Operating Systems Security

Safeguard computer operating systems by demonstrating server support skills and designing and implementing a security system. Identify security threats and monitor network security implementations. Use best practices to configure operating systems to...

ITSY 2330: Intrusion Detection

Computer information systems security monitoring, intrusion detection, and crisis management. Includes alarm management, signature configuration, sensor configuration, and troubleshooting components. Emphasizes identifying, resolving, and documenting...

ITSY 2301: Firewalls and Network Security

Identify elements of firewall design, types of security threats and responses to security attacks. Use Best Practices to design, implement, and monitor a network security plan. Examine security incident postmortem reporting and ongoing network...

ITSY 2341: Security Management Practices

In-depth coverage of security management practices, including asset evaluation and risk management; cyber law and ethics issues; policies and procedures; business recovery and business continuity planning; network security design; and developing and...

ITSY 2342: Incident Response and Handling

In-depth coverage of incident response and incident handling, including identifying sources of attacks and security breaches; analyzing security logs; recovering the system to normal; performing postmortem analysis; and implementing and modifying...

Cybersecurity Option A.A.S.

This degree prepares students for careers in information security. The primary emphasis of the curriculum is extensive hands-on training in information assurance for network hardware, software, and data, including physical security, backup procedures...

Cybersecurity Level 2 Certificate

This Level 2 Cybersecurity certificate is stacked from the Level 1.  With just one additional semester, students can be awarded the Level 2 Cybersecurity certificate.  The primary emphasis of the curriculum is expanded hands-on training in...