Computer, Software, Networking, Information Technology

ITC 101- IT Support

  • Describe the essential operation of Windows and Linux systems.
  • Define wireless networking and the process of computer assembly.
  • Apply appropriate processes to identify problems, troubleshoot technical issues, and implement solutions.
  • Describe network services, security, and infrastructure used in business networks.
  • Select appropriate IT career paths based on interests, capabilities, and career goals.

ITC 111- Scripting for Security

  • Use Python to create, test and debug simple scripts (e.g., to automate system administration tasks).
  • Use program control flow (Boolean and conditional logic) and loop control structures (while loops, for loops, and iteration).
  • Explain the type of variable, data types, functions, File I/O and error-handling via exceptions found in Python
  • Solve problems by creating fully functional scripts.
  • Employ shared development skills by development of scripting application in a team environment.
  • Create an effective presentation to communicate aspects of application development.

ITC 201- Virtualization and Cloud Computing Security

  • Configure and test hardware and software in a virtual environment, including a variety of virtual systems.
  • Incorporate virtual networks and virtual storage into a secure network administration plan.
  • Secure a virtual environment.
  • Create and manage a set of virtual machines and configure monitoring, balancing, and automation.
  • Distinguish the components of cloud infrastructures, services, and deployment models.
  • Using a virtual environment, build a cloud infrastructure.
  • Perform migration services and security functions in a cloud services environment. 

ITC 211- Information Storage Management

  • Describe data center infrastructure, third platform technologies, and software-defined storage
  • Evaluate various types of intelligent storage systems and storage networking technologies and their deployment
  • Analyze key processes for managing a storage infrastructure, business continuity, and archiving solutions
  • Classify various security threats and controls in a storage infrastructure
  • Utilize key storage and security concepts to solve data storage problems.

ITC 221- Database Systems and Security

  • Explain the role of databases and database management systems in the context of enterprise systems.
  • Describe the database access control systems and controls for access based on record and attributes.
  • Interpret data models to implement organizational requirements using a database management system.
  • Utilize database management systems to implement, manage, and secure information it a database.
  • Discuss techniques for transaction integrity and data privacy for database systems.

ITC 240- Ethical Hacking

  • Apply the ethics associated with the use of hacking or penetration testing tools and techniques.
  • Analyze the types of malicious software found in modern networks.
  • Relate the threats and countermeasures for physical security and social engineering.
  • Perform enumeration (finding resources, accounts, and passwords) on Microsoft, Netware, and Unix/Linux targets.
  • Construct programming scripts oriented towards the needs of network security professionals.
  • Categorize system and infrastructure vulnerabilities and mitigation methods.
  • Demonstrate knowledge of cryptography and hashing
  • Deploy security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots

ITC 250- Information Technology Cybersecurity Capstone

  • Design and implement secure systems and network solutions.
  • Compare security monitoring and response strategies.
  • Choose appropriate security technology for a given context.
  • Implement security solutions in a hands-on environment
  • Combine techniques and theories from throughout the program in developing real-world cybersecurity situations.

ITC 281- Cybersecurity I

  • Explain the security features of Windows-based and Linux-based systems.
  • Discuss systems and services that provide security to computing systems and networks.
  • Describe common cybersecurity threats and attacks.
  • Explain network defense strategies.
  • Utilize network and system security data to identify and analyze security events.

ITC 282- Cybersecurity II

  • Configure and secure firewalls, intrusion prevention systems, LAN equipment, and virtual private networking systems.
  • Differentiate between and explain key sharing, hash, public-key and private-key cryptography.
  • Discuss the connection between security policy and cybersecurity implementations.
  • Explain authentication, authorization and accounting and how each part contributes to cybersecurity.
  • Explore methods to continuously improve skills through life-long learning.

ITC 290- IT Internship

  • Combine techniques and theories from throughout the program in developing real-world cybersecurity situations.
  • Implement IT solutions in a hands-on environment
  • Develop good work habits, teamwork, and professional attitudes necessary for career success.
  • Develop interpersonal communication and professional writing skills through real-world practice by analyzing their contributions and experiences working.

 

Last Modified: 2/7/24