13.07.2015 Views

2010-11 Course Catalog - Century College

2010-11 Course Catalog - Century College

2010-11 Course Catalog - Century College

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7 <strong>Course</strong> DescriptionsWindows and NTFSFile System ForensicsCFIT 2070 3 CreditsThis course provides an in-depth examinationof the forensic evidence left on Windowsbased file systems using a variety of methodsand tools to investigate any event for theworkplace. It covers Windows methods thatensure maximum evidence capture withoutpoisoning key evidence residing in disk spaceand memory. This course aligns with theobjectives of the International Associationof Computer Investigative Specialists (IACIS)certification.Prerequisite: CFIT 2065 or consent of instructor.Computer Investigative Law for ForensicAnalystsCFIT 2075 3 CreditsThis course presents the essential legalfoundation for computer professionalsmanaging or working in incident handlingteams. Topics include: the legal constraintsof information sharing, rules for voluntarydisclosure, and response to governmentrequests for information as well as the useof honey-pots, hack-back, and trace-backprocedures as investigative strategies withinthe legal limitations of the informationtechnology industry. Emphasis is placed onpreserving and maintaining chain of custodyprotocols for computer evidence.Open Source Forensic MethodologyCFIT 2080 3 CreditsThis forensic course begins with file systemfundamentals but moves rapidly to usingadvanced open source toolkits to perform aforensic audit of suspect computer systems.Forensic analysis is performed on gatheredevidence contained in “disk images”. Usinga disk image of a computer involved in anactual forensic case, students apply what theylearn in class by investigating the incident in ahands-on setting.Prerequisite: CFIT 2065 or consent of instructor.Incident Handling and Computer CrimeInvestigationCFIT 2081 3 CreditsThis forensic course explores a step-bystepincident handling model for dealingwith a computer incident. It focuses on riskassessment and business impact analysis120 <strong>Century</strong> <strong>College</strong> <strong>2010</strong>-20<strong>11</strong>models that assist computer auditorsto document their findings and explaintheir recommendations. Additional topicsinclude common hardware and softwarevulnerabilities and their identification during acomplete security audit.Prerequisite: MCST 20<strong>11</strong>, MCST 2013, ITT1031, ITT 2031 and ITT <strong>2010</strong> with a grade of“C” or better OR MCP Client OS, MCP Serverand CCNA OR Network+ industry certificationOR instructor consent.Windows Security and AuditingCFIT 2083 3 CreditsThis course provides a technical focuson the numerous security controls andsettings available on a Windows operatingsystem, particularly in terms of compliancemanagement and auditing. The materialprovides updated information on currentWindows 2000, XP and .NET security issues.Additional topics include a variety of Microsoftutilities available to secure the MicrosoftWindows OS, including HFNETCHK, MBSA,URLSCAN, and IIS Lockdown.Prerequisite: MCST 10<strong>11</strong> and MCST 1013with a grade of “C” or better OR MCP ClientOS, MCP Server and CCNA OR Network+industry certification OR instructor consent.Computer and Network HackerTechniques ICFIT 2085 3 CreditsThis course presents methods for conductingan effective computer vulnerability andpenetration testing analysis. Additionally,students will study the ethical use of hackingtechniques and details of reconnaissance andscanning. Students who complete this coursewill benefit from understanding how to design,build, and operate their unique systems toprevent, detect, and respond to attacks.Computer and Network HackerTechniques IICFIT 2088 3 CreditsThis course explores system vulnerability bycovering common hacking techniques oftenused for compromising systems, analyzingworm developments, exploiting weakness onweb applications and projecting these trendsinto the future to get a feel for the SuperWorms the industry is likely to face soon. Italso covers the application of basic hackingtechniques to design an IT audit checklist fordifferent OS platform.Prerequisite: CFIT 2085.Independent StudyCFIT 2795 1 - 3 CreditsThis variable-credit elective course emphasizesthe student’s independent search for advancedknowledge as well as additional hands-onskills beyond current Computer Forensicscourse offerings. The student and instructorwill devise a formal plan of study to satisfycredit workload requirements within a onesemester timeframe.Prerequisite: Consent of instructor and dean.Recommendation: CFIT 2065 and CFIT 2080.Computer ScienceExploring Computer ScienceCSCI 1010 3 CreditsThis course will take students on anexploration of computer science and thewide variety of educational and careerpaths available. It will provide a hands-onintroduction to programming computers,interacting with databases, and designinghardware and software systems. It willalso provide an interactive introduction tospecialized topics such as computer graphics,robotics, artificial intelligence, Web-basedapplications, and bioinformatics. Special focuswill be given to topics of current interest.Students will also have the opportunity toexplore the variety of educational and careeropportunities available in computer scienceand to chart their own potential path throughthese opportunities.Introduction to Game ProgrammingCSCI 10<strong>11</strong> 3 CreditsWhat goes into creating a computer game?This course, for students with no programmingbackground, explores fundamental gameelements such as sprites, basic animation,collision detection, event-responsemechanisms, and sound. Students willuse game development software to createcomplete games of varying complexity.By using programming scripts the games’complexity will be limited only by thestudents’ imagination and ingenuity.Prerequisite: Basic computer competency(use of keyboard, mouse, Windows).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!