In this course students install and set up a Python development environment and learn to apply fundamental concepts of Python programming by manipulating various data types. Through hands-on assignments, students execute Python scripts that use logical operators, conditional statements, and loops.
Learn MoreThis course provides students with a background in information security, security management, and the technical components of security. Students gain an overview of the entire field of information security: the history, the terminology, and the management aspects of information security programs with sufficient detail to facilitate an understanding of information security systems and their management.
Learn MoreStudents study key structure elements and terms of written information protection policy and review typical policy contents. Students develop the related standards, procedures, and guidelines for implementing the policy. Students evaluate the tools needed to select, develop, and apply a security program that meets business goals.
Learn MorePreparing students to recognize and understand the inherent vulnerabilities of Windows systems by using and understanding tools and techniques to decrease the risks arising from vulnerabilities in Microsoft Operating Systems and applications, this course introduces defense strategies through understanding of system and file permissions, password and account security, the Windows Registry, Malware prevention, encryption, and Directory Service management via policies.
Learn MoreThis course Prepares students to assess and then correct the vulnerabilities present within information systems. Students learn about tools and penetration testing methodologies used by ethical hackers and discusses what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber-attacks. Methods and tools used in attacks and their countermeasures as well as available security resources and attack "types." Systems are also investigated.
Learn MoreThis course explores legal and ethical issues faced in the information technology field. Students learn about ethical issues within an organization as they relate to relationships internally as well as with customers, partners, and society. Students explore how Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion.
Learn MoreThis course explores network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Students focus on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. This course contains mandatory group work. We recommend viewing the course schedule immediately upon logging into the course to view course and group work requirements.
Learn MoreStudents examine and analyze the landscape, key terms and concepts. Security professional need to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Students examine how attacks target networks and the methodology they follow. This course includes mandatory group work. We recommend viewing the course schedule immediately upon logging into the course to view course and group work requirements. Computer Software Requirements: Blank DVD’s and/or 4GB+ memory stick
Learn MoreThis course provides students with concepts of discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Mobile platforms. Students are introduced to a proven methodology for approaching mobile application assessments and the techniques used to prevent, disrupt and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.
Learn MoreStudents examine and discover computer forensics, operating systems and how they function. Students are introduced to forensic tools along with concepts such as chain of custody and documentation of evidence/procedures. Students evaluate how to conduct a high-tech investigation, from acquiring digital evidence to reporting its findings. This course contains mandatory group work. We recommend viewing the course schedule immediately upon logging into the course to view course and group work requirements.
Learn MoreStudents explore the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, the student discusses risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. Students will look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.
Learn MoreStudents examine the realm of network security, spotlighting the latest threats and vulnerabilities. The students address how and why people attack computers and networks--equipping them with the knowledge and techniques to successfully consider methods of combating hackers. Pre-requisite: OL463 Linux, Firewalls and VPN's
Learn More