Term code
202570

Hacking Mobile Devices

Mobile devices run specialized operating systems with security problems. Students will learn how mobile operating systems and apps work, how to find and exploit vulnerabilities and how to defend them. Topics will include phone call, voicemail, SMS intrusion, jailbreaking, rooting, NFC attacks, mal ware, browser exploitation, and application vulnerabilities.

Computer Forensics

Forensics tools, methods and procedures for investigating computers. Data recovery techniques and evidence collection, protection of evidence, expert witness skills and computer crime investigation techniques. Analysis of various file systems and specialized diagnostic software to retrieve data. Prepares in part for CompTIA Security+ and maps to Computer Investigation Specialists exam.

Intro to Computers Using PCs

A computer literacy course using personal computers. Prepares students to use computer applications. Provides an overview of computer components including hardware, software, and data, as well as computer concepts related to networks and security. Includes fundamentals of Windows and other operating systems and applications such as word processing, spreadsheets, database, presentations and the internet. Students use computers to complete class assignments.

Operating Systems II-Command L

An intermediate to advanced-level course covering the use of Windows command line tools with the primary focus on Command Prompt and Windows PowerShell. This course is designed for students planning to take a certificate with concentration in Windows server and client administration, networking or hardware, and for advanced Windows users. Students will learn how to use Windows command line tools to manage and troubleshoot Windows servers and workstations.

Intro to Cloud Computing

Technical Cloud infrastructure skills that can be applied to a variety of Cloud vendors and technologies. Configuration and deployment, security, maintenance, management and troubleshooting of Cloud systems. Follows the objectives of the CompTIA Cloud+ certification exam and is a required course for the Cloud Administration Certificate of Achievement.

Securing Web Applications

This course teaches techniques used by attackers to breach Web applications and how to prevent security attacks. Topics include how to secure and manage assets such as authentication systems, access controls, databases, and back-end components, and how to protect users from attackers, including identifying common vulnerabilities in compiled code and source code.

Info Sec Professional (CISSP)

In-depth course in information security, including access control, application security, enterprise continuity, cryptography, technical risk management, physical security, and telecommunications and network security. This course supports preparation for the Certified Information Systems Security Professional (CISSP) credential, which is essential for high-level information security professionals.