Emerging Technologies
|
|
- Maria Norris
- 5 years ago
- Views:
Transcription
1 Western Technical College Emerging Technologies Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours The learner will explore new technologies requiring information technology support and troubleshooting including but not limited to handheld devices, phones, tablets, storage devices, and cloud computing. This course provides a non-technical approach to practical computer security for all users, including different types of attacks, social engineering, malware, and spyware. The student will install, configure and update a variety of security software. In addition to basic security concepts, students will gain practical skills on how to protect their computers and networks from increasingly sophisticated attacks. Information Technology Associate Degree Courses Types of Instruction Instruction Type Lecture Lab Credits/Hours 2 CR / 36 HR 1 CR / 36 HR Course History Last Approval Date 5/9/2016 Textbooks No textbook required. Program Outcomes 1. Manage Information Technology Hardware Summative TSA Rubric Course Outcome Summary - Page 1 of 6
2 1.1. learner selects appropriate hardware 1.2. learner demonstrates proper safety techniques 1.3. learner installs hardware (according to established specifications) 1.4. learner configures hardware (according to established specifications) 1.5. learner tests hardware 2. Manage Software Summative TSA Rubric 2.1. learner selects appropriate software 2.2. learner installs software 2.3. learner configures software 2.4. learner maintains software 2.5. learner manages data 3. Provide End User Support Summative TSA Rubric 3.1. learner performs common Help Desk functions 3.2. learner researches technology solutions 3.3. learner recommends technology solutions 3.4. learner educates end users 3.5. learner creates effective documentation 3.6. learner follows industry practices (ITIL, HDI for example) 4. Solve Information Technology Problems Summative TSA Rubric 4.1. learner follows a troubleshooting model to solve a problem 4.2. learner monitors incident management handling Course Competencies 1. Explore computer security, terminology, and several different categories of computer attackers 1.1. Written Product Performance will be satisfactory when: 1.1. you describe why it is difficult to achieve computer security 1.2. you define information security 1.3. you can identify the three layers of protection 1.4. you can define computer security terminology 1.5. you can identify the types of attackers that are common today 1.6. you can describe how to build a security strategy Course Outcome Summary - Page 2 of 6
3 1.7. you can identify federal and state laws enacted to protect the privacy of electronic data 1.a. Describe the challenges of securing information 1.b. Define information security and explain why it is important 1.c. Identify the types of attackers that are common today 1.d. Describe how to build a security strategy 2. Explain personal security and how to reduce the risks 2.1. Written Product 2.1. you define what qualifies as a weak versus strong password 2.2. you describe the different types of password attacks; brute force, dictionary 2.3. you can identify the different types of social engineering attacks including but not limited to, psychological approaches, impersonation, phishing and their varieties, hoaxes, shoulder surfing 2.4. you have a clear understanding of what identify theft is and the techniques for stealing personal information 2.5. you can recommend defenses to increase personal security 2.a. Define what makes a weak password 2.b. Describe the attacks against passwords 2.c. Identify the different types of social engineering attacks 2.d. Describe identity theft and the risks of using social networking 2.e. Describe personal security defenses 3. Explain different types of computer attacks and how to install and use antivirus software 3.1. Written Product 3.1. you can list and describe the different types of attacks on computers 3.2. you can explain how to manage patches 3.3. you can install antivirus software 3.4. you can use antivirus software 3.5. you explain User Account Control 3.6. you describe how to recover from an attack on a computer using a rescue disk 3.a. List and describe the different types of attacks on computers 3.b. Explain how to manage patches 3.c. Describe how to install and use antivirus software 3.d. Explain User Account Control 3.e. Describe how to recover from an attack 4. Explain the risks associated with Internet Security and possible defenses Domain Cognitive Level Evaluating Status Active 4.1. Written Product 4.1. you explain how the Internet works: HTML, TCP/IP, basic port numbers 4.2. you explain the basic systems: SMTP, POP3, and IMAP you describe how attackers use mobile code, cookies, and fraudulent digital certificates 4.4. you can list the security risks with using spam, malicious attachments, embedded hyperlinks 4.5. you describe how to use Web browser settings to create stronger security Course Outcome Summary - Page 3 of 6
4 4.6. you can list several different defenses 4.a. Explain how the Internet and work 4.b. Describe how attackers can use mobile code, cookies, and fraudulent digital certificates 4.c. List the security risks with using 4.d. Describe how to use Web browser settings to create stronger security 4.e. List several different defenses 5. Explain mobile security and the attacks that may be encountered 5.1. Written Product 5.1. you define wi-fi and bluetooth 5.2. you explain how wi-fi and bluetooth work 5.3. you describe the various attacks that can be launched against a wireless network 5.4. you list the defenses for a home wi-fi network 5.5. you describe how to securely use a public wireless network 5.6. you list the types of mobile device security for laptops, tablets, and smartphones 5.a. Define Wi-Fi and Bluetooth and explain how they work 5.b. Describe the various attacks that can be launched against a wireless network 5.c. List the defenses for a home Wi-Fi network 5.d. Describe how to use a public wireless network securely 5.e. List the types of mobile device security for laptops, tablets, and smartphones 6. Identify what workplace security may be required 6.1. Written Product 6.1. you define physical access 6.2. you can list tools to restrict physcial access to facilities with sensitive equipment or resources 6.3. you describe how tokens and cards can be used for security 6.4. you explain what a security policy is and list several different types of subpolicies 6.5. you define technology and procedural access control 6.6. you list the steps that should be taken to prepare for a crisis 6.a. Define physical access and list the tools used to restrict it 6.b. Describe how tokens and cards can be used for security 6.c. Explain what a security policy is and list several different subpolicies 6.d. Define technology and procedural access control 6.e. List the steps to be taken to prepare for a crisis 7. Compare different tablets and evaluate their hardware for business use 7.1. Written Product 7.2. Oral Presentation 7.1. you identify several different tablet computers available in the current market 7.2. you evaluate the tablet computers specifications 7.3. you compare and contrast the tablet computers specifications with their competitors 7.4. you document the use of a tablet for a new user Course Outcome Summary - Page 4 of 6
5 7.5. you can troubleshoot basic problems with a tablet device 7.a. Identify several tablets available today 7.b. Evaluate the tablets specifications 7.c. Compare and contrast the specifications to their competition 7.d. Document the use of a tablet for a new user 7.e. Troubleshoot basic problems with a tablet device 8. Evaluate a variety of different tablet software applications for business use Domain Cognitive Level Evaluating Status Active 8.1. Skill Demonstration 8.1. you identify several business applications for use on a tablet computer 8.2. you research and evaluate several similar business applications for a tablet device 8.3. you explain the use of several business applications for a tablet device 8.4. you can troubleshoot basic problems with tablet software applications 8.5. you recommend a business application for a specific user 8.a. Identify several business applications for use on tablets 8.b. Evaluate similar business applications 8.c. Explain the use of several business applications for tablets 8.d. Troubleshoot basic problems with tablet software applications 9. Investigate current cell phones and evaluate the options for a business 9.1. Written Product 9.2. Oral Presentation 9.1. you identify several mobile phone models available today 9.2. you compare and contrast the specifications of selected mobile phones 9.3. you explain the use of new and advanced features of mobile phones 9.4. you can troubleshoot minor problems or direct the user to the appropriate location for assistance with their mobile phone 9.a. Identify several mobile phone models available today 9.b. Compare and contrast the specifications of selected mobile phones 9.c. Explain the use of new and advanced features of mobile phones 9.d. Troubleshoot basic problems with mobile phones 10. Explain cloud computing and demonstrate its use Domain Cognitive Level Evaluating Status Active Written Product you describe the concept of cloud computing you use cloud computing with application software on a mobile device you can demonstrate the use of cloud computing to a user 10.a. Describe cloud computing 10.b. Demonstrate the use of cloud computing 11. Explore new technologies that may require Information Technology support and Course Outcome Summary - Page 5 of 6
6 troubleshooting Domain Cognitive Level Applying Status Active Written Product Reflection you identify new technologies in Information Technology you explain the use of new technologies you determine the significance of the new technologies in business 11.a. Identify new technologies in Information Technology 11.b. Explain the use of new technologies 11.c. Determine the significance of the new technology in business Course Outcome Summary - Page 6 of 6
Cisco 1: Networking Fundamentals
Western Technical College 10150110 Cisco 1: Networking Fundamentals Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 90.00 This course
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationCERTIFIED SECURE COMPUTER USER COURSE OUTLINE
CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE
More informationCourse Outline (version 2)
Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students
More informationCisco 2: Routing Technologies
Western Technical College 10150120 Cisco 2: Routing Technologies Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 90.00 The emphasis
More informationCisco 4: Enterprise Networking
Western Technical College 10150140 Cisco 4: Enterprise Networking Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 90.00 Topics covered
More informationFundamentals of Graphic Design
Western Technical College 10201110 Fundamentals of Graphic Design Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 72.00 This course
More informationDIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018
DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information
More informationReview Kaspersky Internet Security - multi-device 2015 online software downloader ]
Review Kaspersky Internet Security - multi-device 2015 online software downloader ] Description: Benefits Protecting all your connected devices the one-licence, easy-touse solution Kaspersky Internet Security
More informationAdvanced Microsoft Word & Desktop Publishing
Western Technical College 10106149 Advanced Microsoft Word & Desktop Publishing Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 72.00
More informationSecurity Awareness. Chapter 2 Personal Security
Security Awareness Chapter 2 Personal Security Objectives After completing this chapter, you should be able to do the following: Define what makes a weak password Describe the attacks against passwords
More informationChapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.
Name Date Chapter 10: Security After completion of this chapter, students should be able to: Explain why security is important and describe security threats. Explain social engineering, data wiping, hard
More informationCISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline
CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment
More informationThis course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More information716 West Ave Austin, TX USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud
More informationIntroduction to Information Security Dr. Rick Jerz
Introduction to Information Security Dr. Rick Jerz 1 Goals Explain the various types of threats to the security of information Discuss the different categorizations of security technologies and solutions
More informationCourse overview. CompTIA Network+ Certification (Exam N10-007) Study Guide (G525eng v038)
Overview This course is intended for those wishing to qualify with CompTIA Network+ certification. CompTIA's Network+ Certification is a foundation-level certification designed for IT professionals with
More informationSYLLABUS DEPARTMENTAL SYLLABUS. Laptops and Mobile Devices CRTE0108 DEPARTMENTAL SYLLABUS DEPARTMENTAL SYLLABUS DEPARTMENTAL SYLLABUS
SYLLABUS DATE OF LAST REVIEW: 02/2015 CIP CODE: 11.1006 SEMESTER: COURSE TITLE: COURSE NUMBER: Laptops and Mobile Devices CRTE0108 CREDIT HOURS: 3 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE:
More informationCourse overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)
Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience
More informationCRN150 Fundamentals of Network Security
CRN150 Fundamentals of Network Security Course Information Credits 3 Washburn University Institute of Technology 5724 SW Huntoon Street Topeka, Kansas 66604 Phone: 785.670.3441 Office Fax: 785.273.7080
More informationFree antivirus software download
Cari untuk: Cari Cari Free antivirus software download 3-11-2015 Avast has one of the most popular antivirus apps around, due in part to offering a free version, and it's one that performs respectably.
More informationDestiny is the internet provider of all Br(ik buildings and student residences.
Who is Destiny? Destiny is the internet provider of all Br(ik buildings and student residences. When you have trouble accessing the internet, please follow the guidelines in this manual and save yourself
More informationWeb Development with ASP.Net
Western Technical College 10152187 Web Development with ASP.Net Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 72.00 This programming
More informationCompTIA A+ Certification ( ) Study Guide Table of Contents
CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System
More informationCompTIA Security+ Study Guide (SY0-501)
CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes
More informationSecurity Awareness. Presented by OSU Institute of Technology
Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless
More informationCourse 832 EC-Council Computer Hacking Forensic Investigator (CHFI)
Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming
More informationWeb Foundations Series Internet Business Associate
Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved
More informationCourse Outline. CISSP - Certified Information Systems Security Professional
Course Outline CISSP - Certified Information Systems Security 10 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led
More informationCHAPTER 8 SECURING INFORMATION SYSTEMS
CHAPTER 8 SECURING INFORMATION SYSTEMS BY: S. SABRAZ NAWAZ SENIOR LECTURER IN MANAGEMENT & IT SEUSL Learning Objectives Why are information systems vulnerable to destruction, error, and abuse? What is
More informationCompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management
CompTIA Security+ Lecture Six Threats and Vulnerabilities Vulnerability Management Copyright 2011 - VTC Malware Malicious code refers to software threats to network and systems, including viruses, Trojan
More informationIntroduction to PLC Systems
Western Technical College 31414390 Introduction to PLC Systems Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 108.00 This course
More informationOHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE
OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE I. Description of Course: 1. Department/Course: CNET - 174 2. Title: Computer Forensics 3. Cross Reference: 4. Units: 3 Lec Hrs:
More informationGeneral Certificate of Education Ordinary Level Computer Security System/ Social Effects of Information System
General Certificate of Education Ordinary Level Computer Security System/ Social Effects of Information System STUDENT NAME BATCH # COMPUTER SCIENCE Paper 1 2210/01 Prepared By: TANVIR IQBAL KHAN This
More informationCompTIA A+ Certification: Labs. Course Outline. CompTIA A+ Certification: Labs. 07 Dec
Course Outline CompTIA A+ Certification: 220-902 Labs 07 Dec 2018 Contents 1. Expert Instructor-Led Training 2. ADA Compliant & JAWS Compatible Platform 3. State of the Art Educator Tools 4. Award Winning
More informationJava 2. Course Outcome Summary. Western Technical College. Course Information. Course History. Course Competencies
Western Technical College 10152155 Java 2 Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 4.00 Total Hours 90.00 The goal as programmers, is to create
More informationIntroduction to Computer World Fall 2016
Introduction to Computer World Fall 2016 Introduction to Information and Communication Technologies CSD 102 Email: mehwish.fatima@ciitlahore.edu.pk Website: https://sites.google.com/a/ciitlahore.edu.pk/ict/
More informationISDP 2018 Industry Skill Development Program In association with
ISDP 2018 Industry Skill Development Program In association with Penetration Testing What is penetration testing? Penetration testing is simply an assessment in a industry computer network to test the
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationQuick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.
Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that
More informationUnit 2 Assignment 2. Software Utilities?
1 Unit 2 Assignment 2 Software Utilities? OBJECTIVES Identify software utility types and examples of common software Why are software utilities used? Identify and describe the various networking threats.
More informationSecurity+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 5 Host, Application, and Data Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 5 Host, Application, and Data Security Objectives List the steps for securing a host computer Define application security Explain
More informationPathway Assessment Blueprint
Pathway Assessment Blueprint Information Support and Services Test Code: 1131/ Version: 01 Copyright 2011. All Rights Reserved. General Assessment Information General Assessment Information Written Assessment
More informationUnit 2 Essentials of cyber security
2016 Suite Cambridge TECHNICALS LEVEL 2 IT Unit 2 Essentials of cyber security A/615/1352 Guided learning hours: 30 Version 1 September 2016 ocr.org.uk/it LEVEL 2 UNIT 2: Essentials of cyber security A/615/1352
More informationPRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS
PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS CIS 101 Computer Literacy Michael Burt 12/19/2006 Course Designator and Title Prepared by Date Barry Bugg ` Dr. Aaron Stucker
More informationIs your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner
Is your privacy secure? HIPAA Compliance Workshop September 2008 Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Agenda Have you secured your key operational, competitive and financial
More informationVendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo
Vendor: CompTIA Exam Code: 220-902 Exam Name: CompTIA A+ Certification Exam (902) Version: Demo DEMO QUESTION 1 Which of the following best practices is used to fix a zero-day vulnerability on Linux? A.
More informationMODULE NO.28: Password Cracking
SUBJECT Paper No. and Title Module No. and Title Module Tag PAPER No. 16: Digital Forensics MODULE No. 28: Password Cracking FSC_P16_M28 TABLE OF CONTENTS 1. Learning Outcomes 2. Introduction 3. Nature
More informationSYLLABUS. Departmental Syllabus. CompTIA A+ Practical Applications. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus
SYLLABUS DATE OF LAST REVIEW: 12/5/2014 CIP CODE: 11.1006 SEMESTER: COURSE TITLE: COURSE NUMBER: CompTIA A+ Practical Applications CRTE0101 CREDIT HOURS: 3 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE:
More informationITIS 104: INFORMATION TECHNOLOGY
ITIS 104: Information Technology 1 ITIS 104: INFORMATION TECHNOLOGY Discipline ITIS - Info Tech & Info Systems Course Number 104 Course Title Information Technology Catalog Course Description This course
More informationITSY Information Technology Security Course Syllabus Spring 2018
ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L
More informationVirginia Western Community College ITN 110 Client Operating System (Windows 10)
ITN 110 Client Operating System (Windows 10) Prerequisites Co-requisite: TEL 150 Course Description Covers installation, configuration, administration, management, maintenance, and troubleshooting of the
More informationCybersecurity for IT Online. kaspersky.com/awareness #truecybersecurity. Kaspersky Enterprise Cybersecurity
Kaspersky Enterprise Cybersecurity Cybersecurity for IT Online First line incident response training for general IT specialists kaspersky.com/awareness #truecybersecurity Cybersecurity for IT Online (CITO)
More informationThis ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.
EC Council Certified Ethical Hacker V9 This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different
More informationECDL / ICDL IT Security. Syllabus Version 2.0
ECDL / ICDL IT Security Syllabus Version 2.0 Module Goals Purpose This document details the syllabus for the IT Security module. The syllabus describes, through learning outcomes, the knowledge and skills
More informationStandards and Competencies ITS 1.0 Perform maintenance on systems and components
Skill Performance This portion of the contest will be a series of modules through which each contestant will rotate on a fixed time schedule to troubleshoot or complete tasks with client, server, or end
More informationITE 119 Information Literacy
ITE 119 Information Literacy COURSE OUTLINE Prerequisites: These are basic computer skills that are necessary to facilitate your successful completion in this course. Students must be able to read and
More informationCEH: CERTIFIED ETHICAL HACKER v9
CEH: CERTIFIED ETHICAL HACKER v9 SUMMARY The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever
More informationVocabulary Bank organized by module
Vocabulary Bank organized by module Module 1: Choosing a Computer Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software
More informationCisco 3: Advanced Routing & Switching
Western Technical College 10150130 Cisco 3: Advanced Routing & Switching Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 90.00 This
More informationChapter 16: Advanced Security
: Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including
More informationProgram SLOs Computer Information Science
Program SLOs Computer Information Science A.S. Degrees in CIS Computer Science, Information Systems Security, Server Administrator, Web Developer, Information Technology A.S. Degree in MIS Management Information
More informationCompTIA A+ Accelerated course for & exams
CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is
More informationChanging face of endpoint security
Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L
More informationEndpoint Security - what-if analysis 1
Endpoint Security - what-if analysis 1 07/23/2017 Threat Model Threats Threat Source Risk Status Date Created File Manipulation File System Medium Accessing, Modifying or Executing Executable Files File
More informationIT Essentials I: PC Hardware and Software v4.0 Detailed Objectives (Draft) November 2006
IT Essentials I: PC Hardware and Software v4.0 Detailed Objectives (Draft) November 2006 The following draft of detailed objectives will be used by the authoring team to write the content of the revised
More informationCybersecurity The Evolving Landscape
Cybersecurity The Evolving Landscape 1 Presenter Zach Shelton, CISA Principal DHG IT Advisory Zach.Shelton@DHG.com Raleigh, NC 14+ years of experience in IT Consulting 11+ years of experience with DHG
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationBachelor of Information Technology
Higher Education Northern Sydney Institute Bachelor of Information Technology [ Network security ] www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security ] Cybercrime
More informationSystems and Principles Unit Syllabus
Systems and Principles Unit Syllabus Level 2 7540-011 www.cityandguilds.com January 2011 Version 1.0 About City & Guilds City & Guilds is the UK s leading provider of vocational qualifications, offering
More information3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)
Principles of Information and Technology Systems IT 201 T Prereq: CS 110T This course aims to develop an understanding of the components of computing and their relationships, significant impacts of IT
More informationCompTIA Cybersecurity Analyst+
CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity
More informationIT User accounts. IT resources for McGill students. McGill ID ( a 9 digit number) Minerva PIN - (yymmdd) First time login to Minerva
IT resources for McGill students IT User accounts First time login to Minerva McGill ID - 260123456 ( a 9 digit number) Minerva PIN - (yymmdd) Will be prompted to change the initial Minerva PIN 1 IT User
More informationChapter 4 Network and Internet Security
Understanding Computers in a Changing Society, 3 rd Edition Chapter 4 Network and Internet Security Learning Objectives Explain why computer users should be concerned about network and Internet security.
More informationFrequently Asked Questions (FAQ)
Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart
More informationCOWLEY COLLEGE & Area Vocational Technical School
COWLEY COLLEGE & Area Vocational Technical School COURSE PROCEDURE FOR COMPTIA A+ ESSENTIALS CIS1756 3 Credit Hours Student Level: This course is open to students on the college level in either the Freshman
More informationINTERNET SAFETY IS IMPORTANT
INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being
More informationWhen Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.
When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the
More informationIntroduction. Assessment Test. Part I
Contents Introduction Assessment Test xxix lvii Part I 220 901 1 Chapter 1 Motherboards, Processors, and Memory 3 Identifying Components of Motherboards 5 System Board Form Factors 6 System Board Components
More informationCOPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51
Acknowledgments Introduction Part I: The Basics in Depth 1 Chapter 1: Windows Attacks 3 Attack Classes 3 Automated versus Dedicated Attacker 4 Remote versus Local 7 Types of Attacks 8 Dedicated Manual
More informationChapter 6 Network and Internet Security and Privacy
Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal
More informationChapter 12. Information Security Management
Chapter 12 Information Security Management We Have to Design It for Privacy... and Security. Tension between Maggie and Ajit regarding terminology to use with Dr. Flores. Overly technical communication
More informationIT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)
Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving
More informationInformation Technology, the Internet, and You The McGraw-Hill Companies, Inc. All rights reserved.
Click the mouse to advance the slides Click the hyperlink to directly advance to the slide associated with the link; click Return to go back to the calling slide associated with the hyperlink All key terms
More informationInformation Technology Standards
Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this
More informationOnline Security and Safety Protect Your Computer - and Yourself!
Online Security and Safety Protect Your Computer - and Yourself! www.scscu.com Fraud comes in many shapes and sizes, but the outcome is simple: the loss of both money and time. That s why protecting your
More informationSecurity Issues When Preparing for Disasters
Security Issues When Preparing for Disasters Catherine Sanders Reach, Director American Bar Association Legal Technology Resource Center November 10, 2006 Today s Topics Disaster Planning Backup Security
More informationQuick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page
Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security
More informationIT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)
Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving
More informationHow To Remove Personal Antivirus Security Pro Virus
How To Remove Personal Antivirus Security Pro Virus When hackers break into government servers to steal your personal data, there's not a The independent labs uniformly heap praise on Kaspersky Anti-Virus
More informationQuick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.
Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security
More informationSECURE USE OF IT Syllabus Version 2.0
ICDL MODULE SECURE USE OF IT Syllabus Version 2.0 Purpose This document details the syllabus for the Secure Use of IT module. The syllabus describes, through learning outcomes, the knowledge and skills
More informationInternet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.
Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Wi-Fi Name and Password..................................................... 4 Why Change
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define
More informationCIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )
Course Outline 12 Oct 2018 ( Add-On ) Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant
More informationCompTIA IT Fundamentals V5 (Course & Lab) Course Outline. CompTIA IT Fundamentals V5 (Course & Lab) 24 Jan
Course Outline CompTIA IT Fundamentals V5 (Course & Lab) 24 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led
More informationCSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam
CSC 170 Fall 2017 Dr. R. M. Siegfried Study Guide for Final Exam Definitions to know: Lecture #1 1. Data 2. Digitization 3. Bit 4. Byte 5. Binary Numbers 6. How Are Characters Stored? a. ASCII b. Unicode
More informationPRACTICING SAFE COMPUTING AT HOME
PRACTICING SAFE COMPUTING AT HOME WILLIAM (THE GONZ) FLINN M.S. INFORMATION SYSTEMS SECURITY MANAGEMENT; COMPTIA SECURITY+, I-NET+, NETWORK+; CERTIFIED PATCHLINK ENGINEER ENTERPRISE INFORMATION SYSTEMS
More informationCitrix Access Firefox Browser
Citrix Access Firefox Browser Windows or Mac Computers and Laptops Version 1.1 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment...
More informationCHAPTER 3. Information Systems: Ethics, Privacy, and Security
CHAPTER 3 Information Systems: Ethics, Privacy, and Security CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources LEARNING OBJECTIVES n Describe the
More information