Sorry, no results were found. Please check back later.
Introduces the techniques hackers use to discover vulnerabilities. Students will learn ways to tighten the network security to protect the exposed data from the discovered vulnerabilities. Focus is on penetration-testing tools and techniques that security testers and ethical hackers use to protect computer networks.
Examines the basics of information security, including access control and organizational security policies. This course will include the process of securing user workstations, laptops and mobile devices.
Covers Basic Linux topics including operating system basics, file management, graphic user interfaces and the command line interface.
Provides an introduction to networking theory and technologies, including the basics of communication, common protocols, the OSI model, network topologies, local network media, network devices, network security and networking tools. Includes more in-depth study of the components of TCP/IP, Ethernet, and wireless networks. Involves considerable time developing troubleshooting skills.
Provides students in this final-semester course the ability to integrate and apply the skills learned throughout their study in the Network Specialist Degree program to build and manage a network environment based on real-world scenarios. Emphasis will be placed on hands-on problem identification and solution implementation.