Certificate in CyberSecurity
This course will introduce students to digital forensics as practiced by local, state, and federal law enforcement. Students will gain hands-on experience with several digital forensic tools in this laboratory based course. Students taking this course will become familiar with the emerging responsibilities of cybercrime investigators, as well as developing a hands-on working knowledge of software commonly used at many law enforcement agencies. The course will use “Encase Tools” for laboratory activities.
This course is designed to acquaint students with the security threats posed by both terrorist and criminal activity, and with strategies to combat these threats. Terrorism and security are defined as well as terrorism in its historical context. Varieties of terrorist groups, organizations and their actions are studied with targets of terrorism being a focus. Types of crime including street, employee, organization and white collar crime are studied.
This course will cover events such as identify theft, physical security during international travel, or invasion of one’s privacy. Focus will be on incidents such as cyber-crimes, fires, flooding, financial frauds, kidnapping of employees, and expropriation of resources. Covers the following conceptual areas: business risks and the management of business risk, IT risk as a component of business risk, the need to manage IT risks, and the basic type of controls required in a business system in order to control IT risks. Issues associated with new risks created by the use of the internet for business applications and electronic businesses are also covered.
This course will cover Network Security Policies and implementation of firewall policies, stateful firewalls, and firewall appliances. Network-related physical security, risk management and disaster recovery/contingency planning issues and housekeeping procedures.
This course covers the principles and practices of implementing computer database security in modern businesses and industries, including database security principles, database auditing, security implementation and database reliability. Focus will be on issues related to the design and implementation of secure data stores. Emphasis will be placed on multi-level security in database systems, covert channels, and security measures for relational and object-oriented database systems.
This course will cover the process of gathering Information Intelligence, identifying and solving Security Vulnerabilities, develop Exploits, scan and Produce Vulnerability Assessments and application of Network Attacking Techniques. Message authentication codes and key management. WLAN security, IPSec, SSL, and VPNs are also included in the topics to be covered.
Certificate in Healthcare Cybersecurity
Introduction to the concepts of computer technology related to health care and the tools and techniques for collecting, storing, and retrieving health care data. (3 credit Hours).
This course is an introductory course in collecting, examining, and preserving evidence of computer crimes. This course examines the issues, tools, and control techniques needed to successfully investigate illegal activities facilitated through the use of information technology. The tools of collecting, examining, and evaluating data in an effort to establish intent, culpability, motive, means, methods, and loss resulting from e-crimes will be examined.
This course will cover Network Security Policies, HIPPA Privacy Rule, and implementation of firewall policies, stateful firewalls, and firewall appliances. Network-related physical security, risk management and disaster recovery/contingency planning issues and housekeeping procedures.
This course provides an in-depth look at intrusion detection methodologies and tools and the approaches to handling intrusions when they occur; examines the laws that address cybercrime and intellectual property issues; and includes a study of proper computer and network forensics procedures to aid in the identification and tracking of intruders and in the potential prosecution of criminal activity.
The security issues related to web applications will be discussed in this course. Topics include web application authentication, authorization, as well as browser and web database security principles. Various web application security attack types such as code injection, cross-site scripting, and cross-site request forgery will be studied. The course will also include discussions about business aspects that contribute to a secure web-based transaction environment.
This course provides a foundation in networking technologies that are core to creating secure networks. Topics included in this course are basic cryptography, secure networking protocols, logical and physical security management and security devices. Relation between these technologies and operational and implementation issues for these technologies will also be discussed.
Certificate in Information Technology
This course is in line to provide the introductory IT student with a basic introduction to Computer programming technology and algorithmic problem solving using Java as the introductory programming language. Topics covered include control structures, arrays, functions, recursion, dynamic memory allocation, simple data structures, files, and structured program design. Elements of object-oriented design and programming are also introduced.
This course is a continuation of Programming I. This course introduces the student to object-oriented programming through a study of the concepts of program specification and design, algorithm development, and coding and testing using a modern software development environment. Students learn how to write programs in an object-oriented high-level programming language. Topics covered include fundamentals of algorithms, flowcharts, problem solving, programming concepts, classes and methods, control structures, arrays, and strings.
This course is a continuation of Programming I. This course includes an introduction to data structures such as queues and stacks. Students will use a structured programming language such as JAVA or C++ in problem solving. Examines advanced features of modern programming languages such as object oriented programming, string manipulation functions, and visual programming. Both procedural and event-driven programming is covered.
This is the laboratory activities section of BCIS 2304 and covers structured programming languages such as JAVA or C++ in problem solving. This course examines advanced features of modern programming languages such as object-oriented programming, string manipulation functions, and visual programming. Both procedural and event-driven programming is covered. This course will also include an introduction to data structures such as queues and stacks.
This course aims to introduce the student to the concept of data structures through abstract data structures including lists, sorted lists, stacks, queues, de-queues, sets/maps, directed acyclic graphs, and graphs; and implementations including the use of linked lists, arrays, binary search trees, M-way search trees, hash tables, complete trees, and adjacency matrices and lists.
This course will continue from BCIS 3301 and apply concept of algorithms design. This includes greedy, divide-and-conquer, random and backtracking algorithms and dynamic programming; and specific algorithms including, for example, resizing arrays, balancing search trees, shortest path, and spanning trees.