Skip to main content

Computer Security/ Penetration Test

In this course, students examine network security topics through real-world examples. They explore how and why people attack computers and networks. Students investigate and apply tools and techniques commonly used for penetration testing. Upon completion of the course, students will be able to recognize areas of vulnerabilities in a network environment and provide security solutions for the organization.

Cloud Data Security

In this course, students examine key considerations in migrating to cloud computing. They investigate cloud deployment, service models, and cloud infrastructure. Students analyze technologies required to build classic (traditional), virtualized, and cloud data center environments. Upon completion of the course, students will be able to make informed decisions about migrating to the cloud infrastructure and choosing the best deployment model for an organization.

Red Hat Enterprise Linux II

In this course, learners explore key tasks needed to become a Linux administrator. They build on foundational Linux skills as they learn to manage security and system access; execute shell scripts; automate repetitive tasks; manage storage devices, logical volumes, and file systems; and install Red Hat Enterprise Linux using scalable methods. Upon successful completion of this course learners will be prepared to take the Red Hat Certified SystemAdministrator (RHCSA) exam.

Technical Reporting

The student will prepare and present oral and written technical reports. Types of reports may include lab and field reports, proposals, technical letters and memos, technical research reports, and case studies. This course is designed as an advanced communication course for students who have completed at least the prerequisite introductory writing course.

Managing and Configuring Firewalls

In this class, students will gain an in-depth knowledge of how to install, configure, and manage firewalls for the defense of the enterprise network archeticture. Students will also learn the theory, as well as configuration steps for the security, networking, threat prevention, logging, and reporting features of next-generation firewalls. Upon completion of this course, students can install, configure and update next-generation firewalls.

Cisco CyberOps (soc)

The CCNA Cybersecurity Operations curriculum provides an introduction to the knowledge and skills needed for a Network Security Specialist working with a Security Operations Center (SOC) team. Students learn core security skills needed for monitoring, detecting, investigating, analyzing and responding to security events, thus protecting systems and organizations from cybersecurity risks, threats and vulnerabilities. Upon completion of this course, students can prepare for the Implementing Cisco Cybersecurity Operations (SECOPS) Certification Exam.

Red Hat Enterprise Linux I

In this course, learners explore key command line concepts and enterprise-level tools. They investigate foundational Linux skills and core tasks such as file management; file systems and storage; and the update, install, and configuration of software packages. Learners administer users and groups. Upon successful completion of this course and the second course in this series (Red Hat SystemAdministration II), learners will be prepared to take the Red Hat Certified SystemAdministrator (RHCSA) exam.

Sociology, Introduction to

This course examines interpersonal relationships of humans and groups and the consequent structure of society. It details the various social processes and concepts which shape human behavior, analyzing such phenomena as organizations, deviance, race and ethnic relations, population, urbanization, social change, and social movements. Religion, education, and the family are studied.

IT Scripting

This course is designed to provide an overview of modern scripting languages commonly used to build and extend network administration and security tools. The course will introduce the student to scripting on both the Microsoft and Linux platforms. Students will explore the uses of scripting languages and third party modules for accomplishing tasks including scanning, enumeration and automation of network tasks.

Routing CCNA 2

In this course, students investigate switching, routing, and wireless essentials. They configure, troubleshoot, and secure routers and switches in a small network. They explore wireless local area networks (WLANs), dynamic addressing, switch security, and first-hope redundancy protocols. Upon completion of the course, students will have acquired the knowledge, skills, and practical hands-on experience needed to take the CCNA certification exam.