Formerly CBIS 41. In this class, the student will learn to install, configure, upgrade and troubleshoot a computer network. There will be discussions regarding local area networks, wide area networks, communications protocols, network topologies, transmission media, security, and assessment of career opportunities in networking. Upon successful completion of this course, students will be given a voucher to sit for the Microsoft Technology Associate (MTA) industry certification exam.
Formerly CBIS 212. In this class, the student will learn how to install, use, and manage popular wireless technologies such as WiFi, WiMax, and Bluetooth. They will build on the knowledge from COSN 10 to understand how mobile devices connect to the larger network infrastructure through various wireless technologies. Students will have hands-on experience installing, troubleshooting, managing, securing, backing up and upgrading Android, IOS, Windows and other mobile devices.
Formerly CBIS 271. Network Security Fundamentals provides a comprehensive overview of network security and prepares students to take the CompTIA Security + Certification Exam.This course covers general security concepts, communication network security, infrastructure security, cryptography basics, operational/organizational security, and computer forensics.
This course offers an introduction into computer forensics, investigating computer crimes and data recovery. Topics covered in this course include a process for investigating cybercrime and procedures for collecting, analyzing, recovering and preserving forensic evidence. Students should have completed the COSN 5 course or equivalent as preparation for this course.
This course will prepare students to perform network hacking and implement appropriate countermeasures. Students will also explore the ethical questions surrounding network and system penetration. This course covers topics such as using network penetration tools, techniques for identifying system vulnerabilities and exploiting those vulnerabilities to compromise systems and data.