Campus code
L
Page URL
/academics/online-learning/cityonline

Internet Basics & Begin HTML

Students become critical participants on the Internet and World Wide Web, analyzing methods of using the Internet, and its history, technical underpinnings, and protocols. Create Web content and learn skills for effective online communication through technologies and tools, including electronic mail, connecting to remote computers, file transfer, and the World Wide Web. Delve into the complex worlds of computer security, copyright, electronic commerce, and artificial intelligence as it is implemented in modern Internet tools.

Internet Basics & Begin HTML

Students become critical participants on the Internet and World Wide Web, analyzing methods of using the Internet, and its history, technical underpinnings, and protocols. Create Web content and learn skills for effective online communication through technologies and tools, including electronic mail, connecting to remote computers, file transfer, and the World Wide Web. Delve into the complex worlds of computer security, copyright, electronic commerce, and artificial intelligence as it is implemented in modern Internet tools.

Firewalls

Fundamentals, techniques, and procedures to design an effective secure Internet connection using software or hardware firewalls. Discussion of types of firewalls, packet filtering, proxy servers, Intrusion Detection Systems, and Virtual Private Networks (VPNs).

Network Security

Knowledge and skills - to recognize security vulnerabilities, implement security measures, analyze network environments for known security threats or risks, defend against attacks or viruses, ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security: access control, authorization, encryption, packet filters, firewalls and Virtual Private Networks (VPNs).

Network Security

Knowledge and skills - to recognize security vulnerabilities, implement security measures, analyze network environments for known security threats or risks, defend against attacks or viruses, ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security: access control, authorization, encryption, packet filters, firewalls and Virtual Private Networks (VPNs).