Emerging Technologies

Size: px
Start display at page:

Download "Emerging Technologies"

Transcription

1 Western Technical College Emerging Technologies Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours The learner will explore new technologies requiring information technology support and troubleshooting including but not limited to handheld devices, phones, tablets, storage devices, and cloud computing. This course provides a non-technical approach to practical computer security for all users, including different types of attacks, social engineering, malware, and spyware. The student will install, configure and update a variety of security software. In addition to basic security concepts, students will gain practical skills on how to protect their computers and networks from increasingly sophisticated attacks. Information Technology Associate Degree Courses Types of Instruction Instruction Type Lecture Lab Credits/Hours 2 CR / 36 HR 1 CR / 36 HR Course History Last Approval Date 5/9/2016 Textbooks No textbook required. Program Outcomes 1. Manage Information Technology Hardware Summative TSA Rubric Course Outcome Summary - Page 1 of 6

2 1.1. learner selects appropriate hardware 1.2. learner demonstrates proper safety techniques 1.3. learner installs hardware (according to established specifications) 1.4. learner configures hardware (according to established specifications) 1.5. learner tests hardware 2. Manage Software Summative TSA Rubric 2.1. learner selects appropriate software 2.2. learner installs software 2.3. learner configures software 2.4. learner maintains software 2.5. learner manages data 3. Provide End User Support Summative TSA Rubric 3.1. learner performs common Help Desk functions 3.2. learner researches technology solutions 3.3. learner recommends technology solutions 3.4. learner educates end users 3.5. learner creates effective documentation 3.6. learner follows industry practices (ITIL, HDI for example) 4. Solve Information Technology Problems Summative TSA Rubric 4.1. learner follows a troubleshooting model to solve a problem 4.2. learner monitors incident management handling Course Competencies 1. Explore computer security, terminology, and several different categories of computer attackers 1.1. Written Product Performance will be satisfactory when: 1.1. you describe why it is difficult to achieve computer security 1.2. you define information security 1.3. you can identify the three layers of protection 1.4. you can define computer security terminology 1.5. you can identify the types of attackers that are common today 1.6. you can describe how to build a security strategy Course Outcome Summary - Page 2 of 6

3 1.7. you can identify federal and state laws enacted to protect the privacy of electronic data 1.a. Describe the challenges of securing information 1.b. Define information security and explain why it is important 1.c. Identify the types of attackers that are common today 1.d. Describe how to build a security strategy 2. Explain personal security and how to reduce the risks 2.1. Written Product 2.1. you define what qualifies as a weak versus strong password 2.2. you describe the different types of password attacks; brute force, dictionary 2.3. you can identify the different types of social engineering attacks including but not limited to, psychological approaches, impersonation, phishing and their varieties, hoaxes, shoulder surfing 2.4. you have a clear understanding of what identify theft is and the techniques for stealing personal information 2.5. you can recommend defenses to increase personal security 2.a. Define what makes a weak password 2.b. Describe the attacks against passwords 2.c. Identify the different types of social engineering attacks 2.d. Describe identity theft and the risks of using social networking 2.e. Describe personal security defenses 3. Explain different types of computer attacks and how to install and use antivirus software 3.1. Written Product 3.1. you can list and describe the different types of attacks on computers 3.2. you can explain how to manage patches 3.3. you can install antivirus software 3.4. you can use antivirus software 3.5. you explain User Account Control 3.6. you describe how to recover from an attack on a computer using a rescue disk 3.a. List and describe the different types of attacks on computers 3.b. Explain how to manage patches 3.c. Describe how to install and use antivirus software 3.d. Explain User Account Control 3.e. Describe how to recover from an attack 4. Explain the risks associated with Internet Security and possible defenses Domain Cognitive Level Evaluating Status Active 4.1. Written Product 4.1. you explain how the Internet works: HTML, TCP/IP, basic port numbers 4.2. you explain the basic systems: SMTP, POP3, and IMAP you describe how attackers use mobile code, cookies, and fraudulent digital certificates 4.4. you can list the security risks with using spam, malicious attachments, embedded hyperlinks 4.5. you describe how to use Web browser settings to create stronger security Course Outcome Summary - Page 3 of 6

4 4.6. you can list several different defenses 4.a. Explain how the Internet and work 4.b. Describe how attackers can use mobile code, cookies, and fraudulent digital certificates 4.c. List the security risks with using 4.d. Describe how to use Web browser settings to create stronger security 4.e. List several different defenses 5. Explain mobile security and the attacks that may be encountered 5.1. Written Product 5.1. you define wi-fi and bluetooth 5.2. you explain how wi-fi and bluetooth work 5.3. you describe the various attacks that can be launched against a wireless network 5.4. you list the defenses for a home wi-fi network 5.5. you describe how to securely use a public wireless network 5.6. you list the types of mobile device security for laptops, tablets, and smartphones 5.a. Define Wi-Fi and Bluetooth and explain how they work 5.b. Describe the various attacks that can be launched against a wireless network 5.c. List the defenses for a home Wi-Fi network 5.d. Describe how to use a public wireless network securely 5.e. List the types of mobile device security for laptops, tablets, and smartphones 6. Identify what workplace security may be required 6.1. Written Product 6.1. you define physical access 6.2. you can list tools to restrict physcial access to facilities with sensitive equipment or resources 6.3. you describe how tokens and cards can be used for security 6.4. you explain what a security policy is and list several different types of subpolicies 6.5. you define technology and procedural access control 6.6. you list the steps that should be taken to prepare for a crisis 6.a. Define physical access and list the tools used to restrict it 6.b. Describe how tokens and cards can be used for security 6.c. Explain what a security policy is and list several different subpolicies 6.d. Define technology and procedural access control 6.e. List the steps to be taken to prepare for a crisis 7. Compare different tablets and evaluate their hardware for business use 7.1. Written Product 7.2. Oral Presentation 7.1. you identify several different tablet computers available in the current market 7.2. you evaluate the tablet computers specifications 7.3. you compare and contrast the tablet computers specifications with their competitors 7.4. you document the use of a tablet for a new user Course Outcome Summary - Page 4 of 6

5 7.5. you can troubleshoot basic problems with a tablet device 7.a. Identify several tablets available today 7.b. Evaluate the tablets specifications 7.c. Compare and contrast the specifications to their competition 7.d. Document the use of a tablet for a new user 7.e. Troubleshoot basic problems with a tablet device 8. Evaluate a variety of different tablet software applications for business use Domain Cognitive Level Evaluating Status Active 8.1. Skill Demonstration 8.1. you identify several business applications for use on a tablet computer 8.2. you research and evaluate several similar business applications for a tablet device 8.3. you explain the use of several business applications for a tablet device 8.4. you can troubleshoot basic problems with tablet software applications 8.5. you recommend a business application for a specific user 8.a. Identify several business applications for use on tablets 8.b. Evaluate similar business applications 8.c. Explain the use of several business applications for tablets 8.d. Troubleshoot basic problems with tablet software applications 9. Investigate current cell phones and evaluate the options for a business 9.1. Written Product 9.2. Oral Presentation 9.1. you identify several mobile phone models available today 9.2. you compare and contrast the specifications of selected mobile phones 9.3. you explain the use of new and advanced features of mobile phones 9.4. you can troubleshoot minor problems or direct the user to the appropriate location for assistance with their mobile phone 9.a. Identify several mobile phone models available today 9.b. Compare and contrast the specifications of selected mobile phones 9.c. Explain the use of new and advanced features of mobile phones 9.d. Troubleshoot basic problems with mobile phones 10. Explain cloud computing and demonstrate its use Domain Cognitive Level Evaluating Status Active Written Product you describe the concept of cloud computing you use cloud computing with application software on a mobile device you can demonstrate the use of cloud computing to a user 10.a. Describe cloud computing 10.b. Demonstrate the use of cloud computing 11. Explore new technologies that may require Information Technology support and Course Outcome Summary - Page 5 of 6

6 troubleshooting Domain Cognitive Level Applying Status Active Written Product Reflection you identify new technologies in Information Technology you explain the use of new technologies you determine the significance of the new technologies in business 11.a. Identify new technologies in Information Technology 11.b. Explain the use of new technologies 11.c. Determine the significance of the new technology in business Course Outcome Summary - Page 6 of 6

Cisco 1: Networking Fundamentals

Cisco 1: Networking Fundamentals Western Technical College 10150110 Cisco 1: Networking Fundamentals Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 90.00 This course

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE

More information

Course Outline (version 2)

Course Outline (version 2) Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students

More information

Cisco 2: Routing Technologies

Cisco 2: Routing Technologies Western Technical College 10150120 Cisco 2: Routing Technologies Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 90.00 The emphasis

More information

Cisco 4: Enterprise Networking

Cisco 4: Enterprise Networking Western Technical College 10150140 Cisco 4: Enterprise Networking Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 90.00 Topics covered

More information

Fundamentals of Graphic Design

Fundamentals of Graphic Design Western Technical College 10201110 Fundamentals of Graphic Design Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 72.00 This course

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Review Kaspersky Internet Security - multi-device 2015 online software downloader ] Review Kaspersky Internet Security - multi-device 2015 online software downloader ] Description: Benefits Protecting all your connected devices the one-licence, easy-touse solution Kaspersky Internet Security

More information

Advanced Microsoft Word & Desktop Publishing

Advanced Microsoft Word & Desktop Publishing Western Technical College 10106149 Advanced Microsoft Word & Desktop Publishing Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 72.00

More information

Security Awareness. Chapter 2 Personal Security

Security Awareness. Chapter 2 Personal Security Security Awareness Chapter 2 Personal Security Objectives After completing this chapter, you should be able to do the following: Define what makes a weak password Describe the attacks against passwords

More information

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each. Name Date Chapter 10: Security After completion of this chapter, students should be able to: Explain why security is important and describe security threats. Explain social engineering, data wiping, hard

More information

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

716 West Ave Austin, TX USA

716 West Ave Austin, TX USA Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud

More information

Introduction to Information Security Dr. Rick Jerz

Introduction to Information Security Dr. Rick Jerz Introduction to Information Security Dr. Rick Jerz 1 Goals Explain the various types of threats to the security of information Discuss the different categorizations of security technologies and solutions

More information

Course overview. CompTIA Network+ Certification (Exam N10-007) Study Guide (G525eng v038)

Course overview. CompTIA Network+ Certification (Exam N10-007) Study Guide (G525eng v038) Overview This course is intended for those wishing to qualify with CompTIA Network+ certification. CompTIA's Network+ Certification is a foundation-level certification designed for IT professionals with

More information

SYLLABUS DEPARTMENTAL SYLLABUS. Laptops and Mobile Devices CRTE0108 DEPARTMENTAL SYLLABUS DEPARTMENTAL SYLLABUS DEPARTMENTAL SYLLABUS

SYLLABUS DEPARTMENTAL SYLLABUS. Laptops and Mobile Devices CRTE0108 DEPARTMENTAL SYLLABUS DEPARTMENTAL SYLLABUS DEPARTMENTAL SYLLABUS SYLLABUS DATE OF LAST REVIEW: 02/2015 CIP CODE: 11.1006 SEMESTER: COURSE TITLE: COURSE NUMBER: Laptops and Mobile Devices CRTE0108 CREDIT HOURS: 3 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE:

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

CRN150 Fundamentals of Network Security

CRN150 Fundamentals of Network Security CRN150 Fundamentals of Network Security Course Information Credits 3 Washburn University Institute of Technology 5724 SW Huntoon Street Topeka, Kansas 66604 Phone: 785.670.3441 Office Fax: 785.273.7080

More information

Free antivirus software download

Free antivirus software download Cari untuk: Cari Cari Free antivirus software download 3-11-2015 Avast has one of the most popular antivirus apps around, due in part to offering a free version, and it's one that performs respectably.

More information

Destiny is the internet provider of all Br(ik buildings and student residences.

Destiny is the internet provider of all Br(ik buildings and student residences. Who is Destiny? Destiny is the internet provider of all Br(ik buildings and student residences. When you have trouble accessing the internet, please follow the guidelines in this manual and save yourself

More information

Web Development with ASP.Net

Web Development with ASP.Net Western Technical College 10152187 Web Development with ASP.Net Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 72.00 This programming

More information

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA A+ Certification ( ) Study Guide Table of Contents CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System

More information

CompTIA Security+ Study Guide (SY0-501)

CompTIA Security+ Study Guide (SY0-501) CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes

More information

Security Awareness. Presented by OSU Institute of Technology

Security Awareness. Presented by OSU Institute of Technology Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

Web Foundations Series Internet Business Associate

Web Foundations Series Internet Business Associate Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved

More information

Course Outline. CISSP - Certified Information Systems Security Professional

Course Outline. CISSP - Certified Information Systems Security Professional Course Outline CISSP - Certified Information Systems Security 10 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

CHAPTER 8 SECURING INFORMATION SYSTEMS

CHAPTER 8 SECURING INFORMATION SYSTEMS CHAPTER 8 SECURING INFORMATION SYSTEMS BY: S. SABRAZ NAWAZ SENIOR LECTURER IN MANAGEMENT & IT SEUSL Learning Objectives Why are information systems vulnerable to destruction, error, and abuse? What is

More information

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management CompTIA Security+ Lecture Six Threats and Vulnerabilities Vulnerability Management Copyright 2011 - VTC Malware Malicious code refers to software threats to network and systems, including viruses, Trojan

More information

Introduction to PLC Systems

Introduction to PLC Systems Western Technical College 31414390 Introduction to PLC Systems Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 108.00 This course

More information

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE I. Description of Course: 1. Department/Course: CNET - 174 2. Title: Computer Forensics 3. Cross Reference: 4. Units: 3 Lec Hrs:

More information

General Certificate of Education Ordinary Level Computer Security System/ Social Effects of Information System

General Certificate of Education Ordinary Level Computer Security System/ Social Effects of Information System General Certificate of Education Ordinary Level Computer Security System/ Social Effects of Information System STUDENT NAME BATCH # COMPUTER SCIENCE Paper 1 2210/01 Prepared By: TANVIR IQBAL KHAN This

More information

CompTIA A+ Certification: Labs. Course Outline. CompTIA A+ Certification: Labs. 07 Dec

CompTIA A+ Certification: Labs. Course Outline. CompTIA A+ Certification: Labs. 07 Dec Course Outline CompTIA A+ Certification: 220-902 Labs 07 Dec 2018 Contents 1. Expert Instructor-Led Training 2. ADA Compliant & JAWS Compatible Platform 3. State of the Art Educator Tools 4. Award Winning

More information

Java 2. Course Outcome Summary. Western Technical College. Course Information. Course History. Course Competencies

Java 2. Course Outcome Summary. Western Technical College. Course Information. Course History. Course Competencies Western Technical College 10152155 Java 2 Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 4.00 Total Hours 90.00 The goal as programmers, is to create

More information

Introduction to Computer World Fall 2016

Introduction to Computer World Fall 2016 Introduction to Computer World Fall 2016 Introduction to Information and Communication Technologies CSD 102 Email: mehwish.fatima@ciitlahore.edu.pk Website: https://sites.google.com/a/ciitlahore.edu.pk/ict/

More information

ISDP 2018 Industry Skill Development Program In association with

ISDP 2018 Industry Skill Development Program In association with ISDP 2018 Industry Skill Development Program In association with Penetration Testing What is penetration testing? Penetration testing is simply an assessment in a industry computer network to test the

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that

More information

Unit 2 Assignment 2. Software Utilities?

Unit 2 Assignment 2. Software Utilities? 1 Unit 2 Assignment 2 Software Utilities? OBJECTIVES Identify software utility types and examples of common software Why are software utilities used? Identify and describe the various networking threats.

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 5 Host, Application, and Data Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 5 Host, Application, and Data Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 5 Host, Application, and Data Security Objectives List the steps for securing a host computer Define application security Explain

More information

Pathway Assessment Blueprint

Pathway Assessment Blueprint Pathway Assessment Blueprint Information Support and Services Test Code: 1131/ Version: 01 Copyright 2011. All Rights Reserved. General Assessment Information General Assessment Information Written Assessment

More information

Unit 2 Essentials of cyber security

Unit 2 Essentials of cyber security 2016 Suite Cambridge TECHNICALS LEVEL 2 IT Unit 2 Essentials of cyber security A/615/1352 Guided learning hours: 30 Version 1 September 2016 ocr.org.uk/it LEVEL 2 UNIT 2: Essentials of cyber security A/615/1352

More information

PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS

PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS CIS 101 Computer Literacy Michael Burt 12/19/2006 Course Designator and Title Prepared by Date Barry Bugg ` Dr. Aaron Stucker

More information

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Is your privacy secure? HIPAA Compliance Workshop September 2008 Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Agenda Have you secured your key operational, competitive and financial

More information

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo Vendor: CompTIA Exam Code: 220-902 Exam Name: CompTIA A+ Certification Exam (902) Version: Demo DEMO QUESTION 1 Which of the following best practices is used to fix a zero-day vulnerability on Linux? A.

More information

MODULE NO.28: Password Cracking

MODULE NO.28: Password Cracking SUBJECT Paper No. and Title Module No. and Title Module Tag PAPER No. 16: Digital Forensics MODULE No. 28: Password Cracking FSC_P16_M28 TABLE OF CONTENTS 1. Learning Outcomes 2. Introduction 3. Nature

More information

SYLLABUS. Departmental Syllabus. CompTIA A+ Practical Applications. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus. CompTIA A+ Practical Applications. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus SYLLABUS DATE OF LAST REVIEW: 12/5/2014 CIP CODE: 11.1006 SEMESTER: COURSE TITLE: COURSE NUMBER: CompTIA A+ Practical Applications CRTE0101 CREDIT HOURS: 3 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE:

More information

ITIS 104: INFORMATION TECHNOLOGY

ITIS 104: INFORMATION TECHNOLOGY ITIS 104: Information Technology 1 ITIS 104: INFORMATION TECHNOLOGY Discipline ITIS - Info Tech & Info Systems Course Number 104 Course Title Information Technology Catalog Course Description This course

More information

ITSY Information Technology Security Course Syllabus Spring 2018

ITSY Information Technology Security Course Syllabus Spring 2018 ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L

More information

Virginia Western Community College ITN 110 Client Operating System (Windows 10)

Virginia Western Community College ITN 110 Client Operating System (Windows 10) ITN 110 Client Operating System (Windows 10) Prerequisites Co-requisite: TEL 150 Course Description Covers installation, configuration, administration, management, maintenance, and troubleshooting of the

More information

Cybersecurity for IT Online. kaspersky.com/awareness #truecybersecurity. Kaspersky Enterprise Cybersecurity

Cybersecurity for IT Online. kaspersky.com/awareness #truecybersecurity. Kaspersky Enterprise Cybersecurity Kaspersky Enterprise Cybersecurity Cybersecurity for IT Online First line incident response training for general IT specialists kaspersky.com/awareness #truecybersecurity Cybersecurity for IT Online (CITO)

More information

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process. EC Council Certified Ethical Hacker V9 This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different

More information

ECDL / ICDL IT Security. Syllabus Version 2.0

ECDL / ICDL IT Security. Syllabus Version 2.0 ECDL / ICDL IT Security Syllabus Version 2.0 Module Goals Purpose This document details the syllabus for the IT Security module. The syllabus describes, through learning outcomes, the knowledge and skills

More information

Standards and Competencies ITS 1.0 Perform maintenance on systems and components

Standards and Competencies ITS 1.0 Perform maintenance on systems and components Skill Performance This portion of the contest will be a series of modules through which each contestant will rotate on a fixed time schedule to troubleshoot or complete tasks with client, server, or end

More information

ITE 119 Information Literacy

ITE 119 Information Literacy ITE 119 Information Literacy COURSE OUTLINE Prerequisites: These are basic computer skills that are necessary to facilitate your successful completion in this course. Students must be able to read and

More information

CEH: CERTIFIED ETHICAL HACKER v9

CEH: CERTIFIED ETHICAL HACKER v9 CEH: CERTIFIED ETHICAL HACKER v9 SUMMARY The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever

More information

Vocabulary Bank organized by module

Vocabulary Bank organized by module Vocabulary Bank organized by module Module 1: Choosing a Computer Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software

More information

Cisco 3: Advanced Routing & Switching

Cisco 3: Advanced Routing & Switching Western Technical College 10150130 Cisco 3: Advanced Routing & Switching Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 90.00 This

More information

Chapter 16: Advanced Security

Chapter 16: Advanced Security : Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including

More information

Program SLOs Computer Information Science

Program SLOs Computer Information Science Program SLOs Computer Information Science A.S. Degrees in CIS Computer Science, Information Systems Security, Server Administrator, Web Developer, Information Technology A.S. Degree in MIS Management Information

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

Changing face of endpoint security

Changing face of endpoint security Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L

More information

Endpoint Security - what-if analysis 1

Endpoint Security - what-if analysis 1 Endpoint Security - what-if analysis 1 07/23/2017 Threat Model Threats Threat Source Risk Status Date Created File Manipulation File System Medium Accessing, Modifying or Executing Executable Files File

More information

IT Essentials I: PC Hardware and Software v4.0 Detailed Objectives (Draft) November 2006

IT Essentials I: PC Hardware and Software v4.0 Detailed Objectives (Draft) November 2006 IT Essentials I: PC Hardware and Software v4.0 Detailed Objectives (Draft) November 2006 The following draft of detailed objectives will be used by the authoring team to write the content of the revised

More information

Cybersecurity The Evolving Landscape

Cybersecurity The Evolving Landscape Cybersecurity The Evolving Landscape 1 Presenter Zach Shelton, CISA Principal DHG IT Advisory Zach.Shelton@DHG.com Raleigh, NC 14+ years of experience in IT Consulting 11+ years of experience with DHG

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

Bachelor of Information Technology

Bachelor of Information Technology Higher Education Northern Sydney Institute Bachelor of Information Technology [ Network security ] www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security ] Cybercrime

More information

Systems and Principles Unit Syllabus

Systems and Principles Unit Syllabus Systems and Principles Unit Syllabus Level 2 7540-011 www.cityandguilds.com January 2011 Version 1.0 About City & Guilds City & Guilds is the UK s leading provider of vocational qualifications, offering

More information

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4) Principles of Information and Technology Systems IT 201 T Prereq: CS 110T This course aims to develop an understanding of the components of computing and their relationships, significant impacts of IT

More information

CompTIA Cybersecurity Analyst+

CompTIA Cybersecurity Analyst+ CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity

More information

IT User accounts. IT resources for McGill students. McGill ID ( a 9 digit number) Minerva PIN - (yymmdd) First time login to Minerva

IT User accounts. IT resources for McGill students. McGill ID ( a 9 digit number) Minerva PIN - (yymmdd) First time login to Minerva IT resources for McGill students IT User accounts First time login to Minerva McGill ID - 260123456 ( a 9 digit number) Minerva PIN - (yymmdd) Will be prompted to change the initial Minerva PIN 1 IT User

More information

Chapter 4 Network and Internet Security

Chapter 4 Network and Internet Security Understanding Computers in a Changing Society, 3 rd Edition Chapter 4 Network and Internet Security Learning Objectives Explain why computer users should be concerned about network and Internet security.

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart

More information

COWLEY COLLEGE & Area Vocational Technical School

COWLEY COLLEGE & Area Vocational Technical School COWLEY COLLEGE & Area Vocational Technical School COURSE PROCEDURE FOR COMPTIA A+ ESSENTIALS CIS1756 3 Credit Hours Student Level: This course is open to students on the college level in either the Freshman

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER. When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the

More information

Introduction. Assessment Test. Part I

Introduction. Assessment Test. Part I Contents Introduction Assessment Test xxix lvii Part I 220 901 1 Chapter 1 Motherboards, Processors, and Memory 3 Identifying Components of Motherboards 5 System Board Form Factors 6 System Board Components

More information

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51 Acknowledgments Introduction Part I: The Basics in Depth 1 Chapter 1: Windows Attacks 3 Attack Classes 3 Automated versus Dedicated Attacker 4 Remote versus Local 7 Types of Attacks 8 Dedicated Manual

More information

Chapter 6 Network and Internet Security and Privacy

Chapter 6 Network and Internet Security and Privacy Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal

More information

Chapter 12. Information Security Management

Chapter 12. Information Security Management Chapter 12 Information Security Management We Have to Design It for Privacy... and Security. Tension between Maggie and Ajit regarding terminology to use with Dr. Flores. Overly technical communication

More information

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving

More information

Information Technology, the Internet, and You The McGraw-Hill Companies, Inc. All rights reserved.

Information Technology, the Internet, and You The McGraw-Hill Companies, Inc. All rights reserved. Click the mouse to advance the slides Click the hyperlink to directly advance to the slide associated with the link; click Return to go back to the calling slide associated with the hyperlink All key terms

More information

Information Technology Standards

Information Technology Standards Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this

More information

Online Security and Safety Protect Your Computer - and Yourself!

Online Security and Safety Protect Your Computer - and Yourself! Online Security and Safety Protect Your Computer - and Yourself! www.scscu.com Fraud comes in many shapes and sizes, but the outcome is simple: the loss of both money and time. That s why protecting your

More information

Security Issues When Preparing for Disasters

Security Issues When Preparing for Disasters Security Issues When Preparing for Disasters Catherine Sanders Reach, Director American Bar Association Legal Technology Resource Center November 10, 2006 Today s Topics Disaster Planning Backup Security

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving

More information

How To Remove Personal Antivirus Security Pro Virus

How To Remove Personal Antivirus Security Pro Virus How To Remove Personal Antivirus Security Pro Virus When hackers break into government servers to steal your personal data, there's not a The independent labs uniformly heap praise on Kaspersky Anti-Virus

More information

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security

More information

SECURE USE OF IT Syllabus Version 2.0

SECURE USE OF IT Syllabus Version 2.0 ICDL MODULE SECURE USE OF IT Syllabus Version 2.0 Purpose This document details the syllabus for the Secure Use of IT module. The syllabus describes, through learning outcomes, the knowledge and skills

More information

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions. Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Wi-Fi Name and Password..................................................... 4 Why Change

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define

More information

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On ) Course Outline 12 Oct 2018 ( Add-On ) Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant

More information

CompTIA IT Fundamentals V5 (Course & Lab) Course Outline. CompTIA IT Fundamentals V5 (Course & Lab) 24 Jan

CompTIA IT Fundamentals V5 (Course & Lab) Course Outline. CompTIA IT Fundamentals V5 (Course & Lab) 24 Jan Course Outline CompTIA IT Fundamentals V5 (Course & Lab) 24 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam CSC 170 Fall 2017 Dr. R. M. Siegfried Study Guide for Final Exam Definitions to know: Lecture #1 1. Data 2. Digitization 3. Bit 4. Byte 5. Binary Numbers 6. How Are Characters Stored? a. ASCII b. Unicode

More information

PRACTICING SAFE COMPUTING AT HOME

PRACTICING SAFE COMPUTING AT HOME PRACTICING SAFE COMPUTING AT HOME WILLIAM (THE GONZ) FLINN M.S. INFORMATION SYSTEMS SECURITY MANAGEMENT; COMPTIA SECURITY+, I-NET+, NETWORK+; CERTIFIED PATCHLINK ENGINEER ENTERPRISE INFORMATION SYSTEMS

More information

Citrix Access Firefox Browser

Citrix Access Firefox Browser Citrix Access Firefox Browser Windows or Mac Computers and Laptops Version 1.1 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment...

More information

CHAPTER 3. Information Systems: Ethics, Privacy, and Security

CHAPTER 3. Information Systems: Ethics, Privacy, and Security CHAPTER 3 Information Systems: Ethics, Privacy, and Security CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources LEARNING OBJECTIVES n Describe the

More information