Carpentry-Rough Framing
An introductory course in the methods and materials necessary to build a wood framed building. This course offers hands-on practice in the framing of simple floors, walls, ceilings, roofs, and stairways.
An introductory course in the methods and materials necessary to build a wood framed building. This course offers hands-on practice in the framing of simple floors, walls, ceilings, roofs, and stairways.
This course teaches the skills for reading a variety of construction plans, details, schedules and specifications. The course is a beginning course, yet also enhances skills of those who have existing knowledge of construction drawings.
Overview of trades, design and management occupations connected to building projects. Introduction to use of project documents, plans and specifications. Introduces relevant green technologies in the construction field. Practice in using measuring, hand, and power tools. Hands-on use of tools and materials to complete group projects.
Learn modern, powerful techniques to inspect and analyze network traffic, to quickly detect abuse and attacks and respond to them. This class also covers the configuration and use of Security Onion, a popular open-source Linux distribution designed for network security monitoring.
The class focuses on practical applications: selecting, implementing, testing, and maintaining systems to protect data on modern computer networks. Mathematical underpinnings and practical applications of modern cryptographic systems, including the Advanced Encryption Standard (AES), the Secure Hash Algorithms (SHA), and Rivest-Shamir-Adleman (RSA).
Introduction to eXtensible Markup Language (XML) and JavaScript Object Notation (JSON). Hands-on experience with XML documents, Document Type Definition (DTD), namespaces, schemas, and data presentation with eXtensible Style Language (XSLT) or Cascading Style Sheets (CSS). Introduction to JSON syntax to store and exchange data.
Learn how to find vulnerabilities and exploit them to gain control of target systems including operating systems. Covers essential exploit development skills for advanced penetration testers and security professionals. Students will be required to obey high ethical principles and not exploit systems without authorization.
Learn how hackers attack computers and networks, and how to protect Windows and Linux systems. Legal restrictions and ethical guidelines will be taught and enforced. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.
Forensics tools, methods and procedures for investigating computers. Data recovery techniques and evidence collection, protection of evidence, expert witness skills and computer crime investigation techniques. Analysis of various file systems and specialized diagnostic software to retrieve data. Prepares in part for CompTIA Security+ and maps to Computer Investigation Specialists exam.
A computer literacy course using personal computers. Prepares students to use computer applications. Provides an overview of computer components including hardware, software, and data, as well as computer concepts related to networks and security. Includes fundamentals of Windows and other operating systems and applications such as word processing, spreadsheets, database, presentations and the internet. Students use computers to complete class assignments.