Sorry, no results were found. Please check back later.
Explores the basics of computer operations, including keyboarding, organization of files and folders, working with Internet, basic software, and identification of the hardware pieces that make up a standard computer system.
Introduces students with little or no programming background to programming and logic principles that apply to traditional and Windows systems. Uses C# to apply the principles by developing simple Windows applications.
Provides students with a foundation in information technology and the use of information systems in today’s business environment. Students explore fundamental computer concepts and terminology of the World Wide Web, e-mail, emerging technologies, hardware and software components and devices, programming languages, network basics, operating systems, and ethics.
Provides background in fundamental database concepts, design, documentation, implementation and distribution involving the relational database model. Students will create, query and update relational databases using Structured Query Language (SQL).
Uses hands-on exercises and projects to give students experience with using databases for data storage and retrieval. To encourage students to become more sophisticated database users, background information and general relational database concepts are included.
Covers configuring, maintaining, upgrading and repairing Intel-based computers and exploring functions and interrelations between components. The course examines system configuration, component care, system improvement, troubleshooting and failure identification.
Explores the acquisition and support of various technologies and how they interact with businesses. Students will learn how organizations implement technology solutions, research potential solutions to real-world business problems, and present their findings.
Introduces the techniques hackers use to discover vulnerabilities. Students will learn ways to tighten the network security to protect the exposed data from the discovered vulnerabilities. Focus is on penetration-testing tools and techniques that security testers and ethical hackers use to protect computer networks.
Examines the basics of information security, including access control and organizational security policies. This course will include the process of securing user workstations, laptops and mobile devices.
Covers the interpersonal, communication and problem-solving skills required in technical support positions. Exercises provide interaction with other learners in a team. Students explore the information and technical tools needed to function effectively in a support position. Students will be expected to schedule an additional hour each week in the on-campus Student Help Desk, developing skills working with customers in a help desk setting.