Internet in Teaching Internet Security

Size: px
Start display at page:

Download "Internet in Teaching Internet Security"

Transcription

1 Internet in Teaching Internet Security Miloslavskaia N., Tolstoi A. Associate Professors 1

2 Content Introduction Main Aspects of the Internet Usage in the Educational Process The Internet as an enormous amount of open information resources. The Internet as environment for distance learning through the open network. Conclusion 2

3 The Global Internet Network January 2000 ( > 320 m documents; serving daily more than 115 m users; 70 m hosts (active computers with unique Internetaddresses). The Russian Public Center of Internet Technologies hosts; > information resources in Russian language (Websites, pages, servers, independent thematic sections); of Russian Internet users: have got the right of access in private usage; have access from corporate networks; from the educational and academic networks... 3

4 Main Aspects of the Internet Usage in the Educational Process the Internet as an enormous amount of open information resources presented on the World Wide Web - one of the main services of the Internet; the Internet as environment for distance learning through the open network. 4

5 Faculty of Information Security the Vulnerability and Protection Methods in the Global Internet network educational course (EC) EC was successfully tested with senior and post-graduate students EC is taught: 1) as the basic course for the Complex Maintenance of Automated Systems Information Security speciality 2) at professional re-training courses (8 hours, shortened course) 5

6 Internet users from specialists without training in the field of information technologies and home-computer users up to experts in the field of computer networks and network technologies. Aims of the Internet users from the harmless search for information and copying of graphics, audio and video and software to the intrusion into computers and networks with Internet access for the purpose of stealing information of different degrees of confidentiality and the start of the destructive software and network viruses. => difficult choice of appropriate specialized tools for protection, warning and detection of the attacks from Internet 6

7 Student s Knowledge after Training applying methods of network traffic and security monitoring applying methods of malefactors intrusion detection in a network applying and developing own methods, strategies, and tools for securing networks estimating the quality of services and products offered in the Internet carrying out research in the World Wide Web using and news groups 7

8 EC Characteristics The subject of the EC - the Internet - is very dynamic => the EC should be dynamic. The content of its core is static and is based on the fundamental principles of open network security. The Internet references maintain state-of-the-art information. 8

9 1. Internet as an Enormous Amount of Open Information Resources Internet usage in the EC: 1) search engines and databases for in-depth study of themes; 2) file transfer service for downloading text files and software; 3) for communication with other trainees, experts, and teachers; 4) discussion groups and teleconferences on certain themes; 5) composition of private address books of Web-sites with information on the newest strategies and standards of protection, reviews of research organizations, and information 9 from hacker s and other malefactors communities.

10 1). Information on security evaluation of different products: Firm Web-site Berkeley Software Design, Inc. Digital Equipment Corporation The FreeBSD Project Hewlett Packard IBM index.html Linux (general) Linux (Caldera) Linux (Debian) security/ Linux (Red Hat) Microsoft Corporation The Open BSD Project Santa Cruz Operation Silicon Graphic Inc. Sun MicroSystems Inc. 10

11 2). Special programs ("patches") for security holes for some operational systems: Firm BSD/OS Caldera OpenLinux Deban Linux DEC FreeBSD HP IBM OpenBSD RedHat Linux SCO SGI Sun NT Web-site ftp://ftp.bsdi.com/bsdi/patches/ ftp://ftp.caldera.com/pub/ ftp://ftp.freebsd.org/pub/freebsd/ ftp://ftp.sco.com/sse/ ftp://sgigate.sgi.com/patches/

12 3). Security tools available for the public: ftp://ciac.llnl.gov/pub/ciac/sectools/unix/ ftp://coast.cs.purdue.edu/pub/tools/ ftp://ftp.cert.org/pub/tools/ ftp://ftp.win.tue.nl/pub/security/ ftp://ftp.funet.fi/pub/unix/security/ 12

13 Another Useful Information 4). Attack research centers. 5). Books on security problems. 6). Mailing lists on security. 7). Web-sites concerning security. 8). Discussion groups on information security. 9). Certification organisations. 13

14 Russian Resources on Information Security - Russian State Technical Commission (Gostechcomissia) - Russian Public Center of Internet Technologies 14

15 Russian Resources on Information Security - information resources on computer security; - Web-servers of 165 companies, activities of which are connected with different aspects of security maintenance; - list of 220 data security market companies; - references on publications about computer and network security; - Internet security 15 etc.

16 Russian Hakers Sites etc. 16

17 2. Internet as an Environment for Distance Learning through the Open Network A student is an active participant of the training process (even during lectures) Virtual audiences and Web-technology are an effective environment for such active training 17

18 Stages of EC development The illustrative material (IM) for the EC = presentation of > 700 slides (Windows; Microsoft PowerPoint). Location: faculty local area network (LAN) server with access to 1) staff during classes and 2) students during their independent work. Requirements: 16-Mb hard disc space and not less than 24 KB RAM for demonstration. The slides were complemented by hypertext references to Web-sites in the Internet, acquaintance with which assumes use of any standard Web-browser (Netscape Navigator, Microsoft Internet Explorer etc.). The electronic tutorial (ET) 18

19 The electronic tutorial s cover 19

20 Objectives of the ET creation 1) to help lecturers to present their professional knowledge in a most effective electronic way that would give them the necessary modern level and a high quality of stated material; 2) to apply teaching based on automation and involving extensive information resources of the Internet; 3) to place students in such an environment, where they can creatively use this technology as a part of their daily exercises within the framework of self-education, actively construct their own knowledge, set their individual style of training and master new information; 4) to give state-of-the-art information on the EC theme at the expense of usage of hypertext references to Web-sites with the newest documents, demos of the latest software information protection tools for networks, and descriptions 20 of functionality of hardware protection tools.

21 The World Wide Web is rather an attractive environment for the expansion of training opportunities due to: 1) Web-browsers are easy in use and are widely accessible; 2) Web pages can contain any information stored in a computer including multimedia (images, sound, video...); 3) Web pages support interaction by means of forms or executable code such as Java. 21

22 ET usage: independent teaching CD- ROM ("off-line training") separate block of network file server ("online training") at home PC IM can be represented on an institute Web-site at display classes with connection to network of institute, faculty or department and access to all network information resources (databases, software, libraries etc.) With an instructor 2 + access to other open systems and the global Internet network Without an instructor 22

23 Progress Test is Carried out by: 1) checking material understanding, during which a student is to do quizzes of two types with a multiple choice: a) between "yes" or "no"; b) from some substantial sentences (2, 3 or more) ( common tutorial - now exsists), 2) applying new knowledge and skills to develop new integrated network security strategies, to find and eliminate network vulnerabilities, to make conclusions about advantages and disadvantages of some security tools, to write some program modules for perfection of already available protection tools or for implementation of some remote network attacks ( practical tutorial with artificial intelligence - in future!); 23 3) doing an examination at the end of the EC.

24 Advantages of Distance Learning System in Russia 1) equal educational opportunities for everybody irrespective of where they are living; 2) the EC can be installed and run at a remote computer; 3) this remote PC can address all institute network resources and open networks to which a network manager has opened access; 4) training becomes very flexible and individual and focuses on the needs and interests of a trainee; 5) students can work irrespective of time and place with a suitable rate of acquaintance with the course material; 6) expenses for training for students are essentially reduced. 24

25 Questions Ms. Natalia Miloslavskaia - milmur@mephi.edu Mr. Alexander Tolstoi - ait@mephi.edu 25

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

Software Reliability and Reusability CS614

Software Reliability and Reusability CS614 Software Reliability and Reusability CS614 Assiut University Faculty of Computers & Information Quality Assurance Unit Software Reliability and Reusability Course Specifications2011-2012 Relevant program

More information

Department of Computer Science & Engineering

Department of Computer Science & Engineering Department of Computer Science & Engineering at Technical University of Varna http://cs.tu-varna.bg Our Mission With 45 years of history our department has trained more than 4,000 professionals. We offer

More information

Strategies for Training and Implementation Home

Strategies for Training and Implementation Home A Guide to unitedstreaming Digital Resources Strategies for Training and Implementation Presentation Menu Overview and Key Features Passcodes, Search Tools, Content Management, & Teacher Tools Implementation

More information

Introduction to Big Data

Introduction to Big Data Introduction to Big Data OVERVIEW We are experiencing transformational changes in the computing arena. Data is doubling every 12 to 18 months, accelerating the pace of innovation and time-to-value. The

More information

PerfecTIC. General description. Title. Teaching goal. Summary. Duration. Technological skills required

PerfecTIC. General description. Title. Teaching goal. Summary. Duration. Technological skills required PerfecTIC General description Title Supplementary material for a course on a Web site Teaching goal Offer students interactive, multimedia, learning materials as a supplement to the course or textbook.

More information

Strategies for Training and Implementation Home

Strategies for Training and Implementation Home A Guide to Discovery Ed Streaming Strategies for Training and Implementation http://discoveryeducation.com Log in - - - -> Click on DE STREAMING Page Page From the Page, you can search for digital media

More information

Installation Instructions

Installation Instructions Installation Instructions Network Version An Access File is required to use this program. To request an Access File, register the CDROM at www.longman.com/ae/multimedia. Click on the Register tab at the

More information

Considerations in the Development of an Online Teaching Course

Considerations in the Development of an Online Teaching Course International Conference on Engineering Education and Research "Progress Through Partnership" 2004 VSB-TUO, Ostrava, ISSN 1562-3580 Considerations in the Development of an Online Teaching Course Hamid

More information

The Information Technology Program (ITS) Contents What is Information Technology?... 2

The Information Technology Program (ITS) Contents What is Information Technology?... 2 The Information Technology Program (ITS) Contents What is Information Technology?... 2 Program Objectives... 2 ITS Program Major... 3 Web Design & Development Sequence... 3 The Senior Sequence... 3 ITS

More information

3.0 OBJECTIVE OF THE PROGRAMME

3.0 OBJECTIVE OF THE PROGRAMME 3.0 OBJECTIVE OF THE PROGRAMME 3.0 DUAL TRAINING SYSTEM The Dual Training System (DTS) is a mode of training delivery which combines the strength of the principles taught in class and that of a simulated

More information

BSc (Honours) Computer Science Curriculum Outline

BSc (Honours) Computer Science Curriculum Outline BSc (Honours) Computer Science Curriculum Outline 1. Introduction: The economic and strategic importance provided by Computer Science and Information Technology is increasing daily. This importance is

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015 MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015 CATALOG DESCRIPTION ONLINE EEGR.483 INTRODUCTION TO SECURITY MANAGEMENT CREDITS: 3 THIS COURSE IS A

More information

NEW BRUNSWICK. IT Systems Administrator

NEW BRUNSWICK. IT Systems Administrator NEW BRUNSWICK *Please scroll to see other provinces. IT Systems Administrator PROGRAM OBJECTIVES The IT Systems Administrator program will provide students with the skills and knowledge to pursue certifications

More information

CMPSC 311- Introduction to Systems Programming Module: UNIX/Operating Systems

CMPSC 311- Introduction to Systems Programming Module: UNIX/Operating Systems CMPSC 311- Introduction to Systems Programming Module: UNIX/Operating Systems Professor Patrick McDaniel Fall 2015 Assignment #1 See webpage Due 9/14/15 Page 2 UNIX Utilities: tar tar collects multiple

More information

Apply Your Knowledge. 1. Create a Presentation to Introduce Your Products and Services

Apply Your Knowledge. 1. Create a Presentation to Introduce Your Products and Services BCIS_U4_AP_PRJ.qxd 2/11/04 3:20 PM Page 668 Apply Your Knowledge Complete the following exercises in order, as directed by your teacher. As you work through these projects, you will use PowerPoint to create

More information

Chris Vegter University of Northern Colorado Monfort College of Business (970)

Chris Vegter University of Northern Colorado Monfort College of Business (970) Chris Vegter University of Northern Colorado Monfort College of Business (970) 351-1244 Email: chris.vegter@unco.edu Education MBA, Colorado State University, 2006. Area of Study: Business Administration

More information

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Please consult the Department of Engineering about the Computer Engineering Emphasis. COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals

More information

PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS CIW JAVASCRIPT FUNDAMENTALS CERTIFICATION WEB 2391

PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS CIW JAVASCRIPT FUNDAMENTALS CERTIFICATION WEB 2391 PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS CIW JAVASCRIPT FUNDAMENTALS CERTIFICATION WEB 2391 Class Hours: 1.0 Credit Hours: 1.0 Laboratory Hours: 0.0 Revised: Fall 06 Note: This course

More information

Course Description. Call Us CRAW Security

Course Description. Call Us CRAW Security Certified Associate Course Description Oracle Certified Associate (OCA) DBA 11g is designed for IT professionals who are beginning to work with Oracle technologies. Oracle 11g is designed to handle the

More information

Part A: Course Outline

Part A: Course Outline University of Macau Faculty of Science and Technology Course Title: Department of Electrical and Computer Engineering Part A: Course Outline Communication System and Data Network Course Code: ELEC460 Year

More information

Your Student s Head Start on Career Goals and College Aspirations

Your Student s Head Start on Career Goals and College Aspirations Your Student s Head Start on Career Goals and College Aspirations INFORMATION TECHNOLOGY (IT) NETWORKING PATHWAY The Destinations Networking Pathway prepares students to test and evaluate computer network

More information

ISO LEAD AUDITOR TRAINING

ISO LEAD AUDITOR TRAINING FINAL CERTIFICATION AWARDED BY PECB CANADA ISO 22301 LEAD AUDITOR TRAINING & CERTIFICATION (Business Continuity Management) Master the Audit of Business Continuity Management System (BCMS) based on ISO

More information

Tennessee. Trade & Industrial Course Web Page Design II - Site Designer Standards. A Guide to Web Development Using Adobe Dreamweaver CS3 2009

Tennessee. Trade & Industrial Course Web Page Design II - Site Designer Standards. A Guide to Web Development Using Adobe Dreamweaver CS3 2009 Tennessee Trade & Industrial Course 655745 Web Page Design II - Site Designer Standards A Guide to Web Development Using Adobe Dreamweaver CS3 2009 ation Key SE Student Edition LE Learning Expectation

More information

Sign up for the Barco University experience Best in class, first in business

Sign up for the Barco University experience Best in class, first in business Sign up for the Barco University experience Best in class, first in business Barco certification training Validate your expertise In today s competitive marketplace, exclusive skills and profound knowledge

More information

2D Computer Animation for Visual Communication: Advanced

2D Computer Animation for Visual Communication: Advanced Higher National Unit Specification General information for centres Unit title: 2D Computer Animation for Visual Communication: Advanced Unit code: DX3D 36 Unit purpose: The Unit is designed to extend candidates

More information

COMPUTER INFORMATION SYSTEMS PROGRAMS

COMPUTER INFORMATION SYSTEMS PROGRAMS COMPUTER INFORMATION SYSTEMS PROGRAMS The Computer Information Systems programs provide courses to improve students computer and software knowledge and skills. The CIS Associate in Science degrees enables

More information

Department of Computer Science and Engineering

Department of Computer Science and Engineering Department of Computer Science and Engineering 1 Department of Computer Science and Engineering Department Head: Professor Edward Swan Office: 300 Butler Hall The Department of Computer Science and Engineering

More information

University of Moratuwa

University of Moratuwa University of Moratuwa Faculty of Information Technology Bachelor of Information Technology (BIT) External Degree Programme Administered by the Centre for Open & Distance Learning (CODL) Mode 01 Collaboration

More information

School of Engineering & Computational Sciences

School of Engineering & Computational Sciences Catalog: Undergraduate Catalog 2014-2015 [Archived Catalog] Title: School of Engineering and Computational Sciences School of Engineering & Computational Sciences Administration David Donahoo, B.S., M.S.

More information

School of Engineering and Computational Sciences

School of Engineering and Computational Sciences Catalog: Undergraduate Catalog 2012-2013 [Archived Catalog] Title: School of Engineering and Computational Sciences School of Engineering and Computational Sciences David Donahoo, B.S., M.S. Interim Dean,

More information

The CIW Web Foundations courses prepare students to take the CIW Web Foundations Associate certification exam.

The CIW Web Foundations courses prepare students to take the CIW Web Foundations Associate certification exam. xi Course Description Site Development Associate teaches you essential Webpage development skills. You will learn to develop Websites using Hypertext Markup Language version 5 (HTML5) and Cascading Style

More information

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program. ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Technology Informatiio on Technology PhD Program IT PH.D. Program Page 0 Assiut University Faculty of Computers & Informationn

More information

How can you purchase the Appway Academy services?

How can you purchase the Appway Academy services? Education Catalogue How can you purchase the Appway Academy services? Education Catalogue Buy individual training, certifications attempt or coaching sessions. Academy Credits Packages Optimize your Education

More information

Cybersecurity for IT Online. kaspersky.com/awareness #truecybersecurity. Kaspersky Enterprise Cybersecurity

Cybersecurity for IT Online. kaspersky.com/awareness #truecybersecurity. Kaspersky Enterprise Cybersecurity Kaspersky Enterprise Cybersecurity Cybersecurity for IT Online First line incident response training for general IT specialists kaspersky.com/awareness #truecybersecurity Cybersecurity for IT Online (CITO)

More information

Course Details. OUR VISION To empower people to achieve their aspirations by using Information and Communication Technologies

Course Details. OUR VISION To empower people to achieve their aspirations by using Information and Communication Technologies Course Details OUR VISION To empower people to achieve their aspirations by using Information and Communication Technologies OUR MISSION To be the premier corporate resource delivering relevant products

More information

IT Systems Administrator

IT Systems Administrator IT Systems Administrator PROGRAM OBJECTIVES The IT Systems Administrator program will provide students with the skills and knowledge to pursue certifications and careers in computer and networkrelated

More information

CompTIA Network+ (Exam N10-006)

CompTIA Network+ (Exam N10-006) CompTIA Network+ (Exam N10-006) Course Specifications Course Number: ELK93-012_rev1.1 Course length: 5.0 day(s) Course Description The CompTIA Network+ (Exam N10-006) course builds on your existing user-level

More information

Microsoft PowerPoint level 1 course content (1-day)

Microsoft PowerPoint level 1 course content (1-day) http://www.multimediacentre.co.za Cape Town: 021 790 3684 Johannesburg: 011 083 8384 Microsoft PowerPoint level 1 course content (1-day) Course Description Microsoft Office PowerPoint Beginners course

More information

Tennessee. Business Technology Course Code Web Design Essentials. HTML Essentials, Second Edition 2010

Tennessee. Business Technology Course Code Web Design Essentials. HTML Essentials, Second Edition 2010 Tennessee Business Technology Course Code 6501240 Web Design Essentials HTML Essentials, Second Edition 2010 Notation Key SE Student Edition LE Learning Expectation Standard 1.0 Demonstrate knowledge of

More information

Introduction. Goal of This Book. Audience for This Book

Introduction. Goal of This Book. Audience for This Book xxvi Networking for Home and Small Businesses, CCNA Discovery Learning Guide Cisco Networking Academy is a comprehensive e-learning program that delivers information technology skills to students around

More information

Academic Course Description

Academic Course Description BEC601 - COMPUTER COMMUNICATION AND NETWORKS Course (catalog) description Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information

Masters in Software Engineering

Masters in Software Engineering Masters in Software Engineering Programme Requirements Taught Element, and PG Diploma in Software Engineering: 120 credits: IS5101 CS5001 CS5030 CS5031 CS5032 or CS5033 up to 30 credits from CS4100 - CS4450,

More information

DIS10.3:CYBER FORENSICS AND INVESTIGATION

DIS10.3:CYBER FORENSICS AND INVESTIGATION DIS10.3:CYBER FORENSICS AND INVESTIGATION ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for information

More information

EECS 282 Information Systems Design and Programming. Atul Prakash Professor, Computer Science and Engineering University of Michigan

EECS 282 Information Systems Design and Programming. Atul Prakash Professor, Computer Science and Engineering University of Michigan EECS 282 Information Systems Design and Programming Atul Prakash Professor, Computer Science and Engineering University of Michigan 1 What is the Course About? A second programming course - but different

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

Linux for IT Managers and System Administrators Training Workshop

Linux for IT Managers and System Administrators Training Workshop Linux for IT Managers and System Administrators Training Workshop Dates: 4th 6th May 2011 Venue: Futuristic Labs, Woodlands Road Call Now- +254202729313 / +254720349420 Or Register Online at http://tinyurl.com/5toxjeh

More information

Library and Information Service Mandalay

Library and Information Service Mandalay Library and Information Service Mandalay Information Technology Collection Title Barcode The 2007 Microsoft Office System Step by Step A+ certification A+ certification for dummies Active Server Pages

More information

USING POWERPOINT IN THE CLASSROOM LESSON 1 POWERPOINT BASICS

USING POWERPOINT IN THE CLASSROOM LESSON 1 POWERPOINT BASICS USING POWERPOINT IN THE CLASSROOM LESSON 1 POWERPOINT BASICS Objectives Start PowerPoint. Open an existing presentation. Save a presentation. Navigate through a presentation, and use the menus and toolbars.

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with RP6, is presenting the SANS VetSuccess CyberTalent Immersion

More information

WebLearning IBM Curriculum

WebLearning IBM Curriculum WebLearning IBM Curriculum WebSphere Commerce Suite Marketplace Edition Implementation Table of Contents: Overview Who Should Take This Course What You Are Taught Topics Include Prerequisites Duration:

More information

BOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus

BOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus BOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus 1. Course Objectives Welcome to MET CS342 Data Structures with Java. The intent of this

More information

IBM Skills Academy. For <<Academy>> Career-based Education

IBM Skills Academy. For <<Academy>> Career-based Education IBM Skills Academy Providing students with a career-oriented training program on emerging technologies such as Mobile Computing, Cybersecurity, Business Analytics, Big Data, Cloud Computing, Cognitive

More information

Course Outline. CompTIA A+: A Comprehensive Approach (Exams and )

Course Outline. CompTIA A+: A Comprehensive Approach (Exams and ) Course Outline CompTIA A+: A Comprehensive Approach (Exams 220-901 and 220902) 11 Nov 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions

More information

PROFESSOR S GUIDE TO TWEN

PROFESSOR S GUIDE TO TWEN PROFESSOR S GUIDE TO TWEN THE WEST EDUCATION NETWORK lawschool.westlaw.com PROFESSOR S GUIDE TO TWEN JULY 2010 West Customer Service Westlaw Technical and Search Assistance (available 24 hours a day)

More information

Developer Marketing: Learn UNIX Fundamentals through UNIX Computer-Based Training from NETg

Developer Marketing: Learn UNIX Fundamentals through UNIX Computer-Based Training from NETg Software Announcement May 22, 2001 Developer Marketing: Learn UNIX Fundamentals through UNIX Computer-Based Training from NETg Overview Learn the basics of UNIX and understand how UNIX can be best used

More information

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level

More information

Academic Course Description

Academic Course Description Academic Course Description SRM University Faculty of Engineering and Technology Department of Electronics and Communication Engineering EC1027 COMPUTER COMMUNICATION Seventh Semester, 2016-17 (odd semester)

More information

Administrator s Guide

Administrator s Guide Administrator s Guide Citrix ICA UNIX Clients Version 6.0 Version 3.0 Linux SGI IRIX IBM AIX Compaq Tru-64 Sun Solaris (SPARC) SunOS HP-UX Sun Solaris (x86) SCO Citrix Systems, Inc. Information in this

More information

Advanced Database Organization INF613

Advanced Database Organization INF613 Advanced Database Organization INF613 Assiut University Faculty of Computers & Information Quality Assurance Unit Advanced Database Organization Course Specifications 2010-2011 Relevant program Master

More information

Getting Started SPU Online Courses

Getting Started SPU Online Courses Getting Started SPU Online Courses Welcome to SPU Online Courses. This document will guide you through the navigation, features, and functionality of your online course. It is divided into five sections:

More information

MSc in Information Systems

MSc in Information Systems MSc in Information Systems Assoc Prof Dion Goh Programme Director WKWSCI 26 October 2018 Programme Objective To educate information systems professionals who are able to develop and manage user-centered

More information

COMPUTER GRAPHICS TECHNOLOGY

COMPUTER GRAPHICS TECHNOLOGY Credentials COMPUTER GRAPHICS TECHNOLOGY Foundation skills Certificate 16 cr. 3D and Video Graphics Certificate Graphic Arts Certificate Web and Interactive Media Certificate 3D and Video Graphics AAS

More information

Academic Course Description

Academic Course Description BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography

More information

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS FAST TRACK Three steps to a cybersecurity career QUALIFY Take the qualifying exam, complete the application process, and

More information

Computer Information Science

Computer Information Science Computer Programming Computer Information Science Program Description This program is designed to prepare the student for employment as a computer programmer trainee. Certificate of Achievement and Associate

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning

More information

Hands-On CompTIA A+ Essentials / Practical Application Certification

Hands-On CompTIA A+ Essentials / Practical Application Certification Hands-On Hands-On CompTIA A+ Essentials / Practical Application Certification Course Description This course meets the NEW DoD Directive 8140 requirements. Will Department of Defense (DoD) Directive 8140

More information

Computer Information Science xxx

Computer Information Science xxx 1 xxx The mission of the Faculty is to provide future-focused, studentcentred programmes that prepare students for the dynamic Information Systems and Information sectors of the UAE. CIS programme graduates

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS FLASH WEB Revised: Fall 08

PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS FLASH WEB Revised: Fall 08 PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS FLASH WEB 2110 Class Hours: 3.0 Credit Hours: 3.0 Laboratory Hours: 0.0 Revised: Fall 08 NOTE: This course is not designed for transfer credit.

More information

ECDL PROFILE DO IT YOU WAY

ECDL PROFILE DO IT YOU WAY NEW ECDL using MS Office 2007, 2010 or 2013 ECDL Profile ECDL PROFILE DO IT YOU WAY Your ECDL With ECDL Profile, you choose the module combinations best suited to you. After passing the tests, those modules

More information

Android App Development for Beginners

Android App Development for Beginners Description Android App Development for Beginners DEVELOP ANDROID APPLICATIONS Learning basics skills and all you need to know to make successful Android Apps. This course is designed for students who

More information

Birth of a website: THE DIGION DOMAIN and educational website development

Birth of a website: THE DIGION DOMAIN and educational website development Birth of a website: THE DIGION DOMAIN and educational website development Yvonne R. Dechance & Candace A. Magner University of New Mexico [The following is a text adaptation of "Birth of a Website, " a

More information

CMPSC 311- Introduction to Systems Programming Module: UNIX/Operating Systems

CMPSC 311- Introduction to Systems Programming Module: UNIX/Operating Systems CMPSC 311- Introduction to Systems Programming Module: UNIX/Operating Systems Professor Patrick McDaniel Fall 2014 Assignment #2 See handout/worksheet Due 9/15/14 Page 2 UNIX Utilities: tar tar collects

More information

Macromedia Breeze. Introducing web communications that really speak to people.

Macromedia Breeze. Introducing web communications that really speak to people. Macromedia Breeze Introducing web communications that really speak to people. Macromedia Breeze threatens to change the very definition of an online meeting. Patricia Seybold Group, 2004 Reach. Engage.

More information

PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS AUDIO/VIDEO FOR THE WEB WEB 2120

PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS AUDIO/VIDEO FOR THE WEB WEB 2120 PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS AUDIO/VIDEO FOR THE WEB WEB 2120 Class Hours: 3.0 Credit Hours: 3.0 Laboratory Hours: 0.0 Date Revised: Fall 03 NOTE: This course is not designed

More information

Copyright CAUSE This paper was presented at the 1993 CAUSE Annual Conference held in San Diego, California, December 7-10, and is part of the

Copyright CAUSE This paper was presented at the 1993 CAUSE Annual Conference held in San Diego, California, December 7-10, and is part of the Copyright CAUSE 1994. This paper was presented at the 1993 CAUSE Annual Conference held in San Diego, California, December 7-10, and is part of the conference proceedings published by CAUSE. Permission

More information

The CERT Survivability and Information Assurance Curriculum Building Enterprise Networks on a Firm Educational Foundation

The CERT Survivability and Information Assurance Curriculum Building Enterprise Networks on a Firm Educational Foundation The CERT Survivability and Information Assurance Curriculum Building Enterprise Networks on a Firm Educational Foundation CERT Training and Education Software Engineering Institute Carnegie Mellon University

More information

Academic Course Description

Academic Course Description BEC502 MICROPROCESSOR AND MICROCONTROLLER Course (catalog) description Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering

More information

Official Vmware Vsphere 5 Student Manuals

Official Vmware Vsphere 5 Student Manuals Official Vmware Vsphere 5 Student Manuals Install Configure And Manage VMware vsphere: Install, Configure, Manage. Delivery Methods. Classroom. Live Online. Onsite. Course Duration. Five (5) extended days

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting

More information

Qualification Specification

Qualification Specification BCS Level 2 Certificate in IT User Skills (ECDL Core) Version 2.0 March 2018 This is a United Kingdom government regulated qualification which is administered and approved by one or more of the following:

More information

E-guide Getting your CISSP Certification

E-guide Getting your CISSP Certification Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

Getting Started with Microsoft PowerPoint 2003

Getting Started with Microsoft PowerPoint 2003 Getting Started with Microsoft PowerPoint 2003 Overview: This handout provides basic introductory information about Microsoft PowerPoint and its application in the classroom. Audience: All instructional

More information

Diploma in Computer Science Computer Science Department, Faculty of Science, Sudan University of Science and Technology (SUST) First Class.

Diploma in Computer Science Computer Science Department, Faculty of Science, Sudan University of Science and Technology (SUST) First Class. RESUME of AWAD MOHD AWADELKARIM College of Computer Sciences & Information Technology Sudan University of Science & Technology P.O. Box 407 Khartoum, SUDAN Email: amawadelkarim@yahoo.com, awad@sustech.edu

More information

IBM Planning Analytics

IBM Planning Analytics Software Consulting Training Support Budgeting & Forecasting Modelling Analysis Reporting IBM Planning Analytics On Premises. On Cloud. IBM Worldwide Business Analytics Partner of the Year 2011, 2012,

More information

COMPUTER SCHOOL. Internet. Internet Courses. Work anywhere in the world. Build your future the INTEC way

COMPUTER SCHOOL. Internet. Internet Courses. Work anywhere in the world. Build your future the INTEC way COMPUTER SCHOOL Internet Internet Courses Work anywhere in the world Build your future the INTEC way Internet Courses Launch your career the INTEC way! We are living in the Information age and perhaps

More information

Computers Are Your Future Prentice-Hall, Inc.

Computers Are Your Future Prentice-Hall, Inc. Computers Are Your Future 2006 Prentice-Hall, Inc. Computers Are Your Future Chapter 5 Application Software: Tools for Productivity 2006 Prentice-Hall, Inc Slide 2 You Will Learn... ü How system software

More information

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 ITD 3443 Network Security Students will provide Cyber Defense while understanding Cyber Threats. Their attack types

More information

SANS/REN-ISAC PARTNERSHIP AGGREGATE BUY PROGRAM

SANS/REN-ISAC PARTNERSHIP AGGREGATE BUY PROGRAM SANS/REN-ISAC PARTNERSHIP AGGREGATE BUY PROGRAM www.sans.org/partnership/education SANS s mission is to ensure that InfoSec practitioners in critical organizations have the skills needed to protect national

More information

Content Evaluation Template

Content Evaluation Template Content Evaluation Template This template should be used for desk-based Content evaluations of CD-ROMs and Websites that are designed for student or teacher use. Please complete those areas marked in grey

More information

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Effective for Reviews During the 2014-2015 Accreditation Cycle Incorporates all changes approved by the ABET Board of Directors as of October 26, 2013 Computing

More information

Course Index Enterprise Online Training (Self Paced Education) Optio Advanced Labeling for Optio Document Designers

Course Index Enterprise Online Training (Self Paced Education) Optio Advanced Labeling for Optio Document Designers Optio Training Course Catalog Bottomline maintains an active schedule of instructor led classroom, instructor led online and selfpaced CD based training programs for Optio Enterprise and Optio Healthcare

More information

Introduction to Multimedia Computing

Introduction to Multimedia Computing COMP 319 Lecture 01 Introduction to Multimedia Computing Fiona Yan Liu Department of Computing The Hong Kong Polytechnic University Outline of Lecture 01 Introduction ti to multimedia technology Definition

More information

The Oracle Academy Introduction to Computer Science

The Oracle Academy Introduction to Computer Science The Oracle Academy Introduction to Computer Science The Oracle Academy Welcome! Caron Newman Senior Curriculum Manager The Oracle Academy www.sitwithme.org 2 2012 Oracle Corporation The Oracle Academy

More information