Course Learning Outcomes - CIS

CIS 150

  1. Use elementary algorithms for sorting and searching.
  2. Solve problems and develop algorithms using control structures, abstractions of sequence, selection, and repetition, following a disciplined approach.
  3. Develop, interpret, and translate an algorithm using design tools.
  4. Use procedural abstraction, top-down algorithmic design, and stepwise refinement methods.
  5. Explore various scripting languages such as Python to write looping scripts and automate the common administrative task.
  6. Explore the Python programming fundamentals and write different scripts such as (loops, decisions, SQL, and functions).

CIS 260

  1. Describe the fundamental concept of security landscape and its application to secure system
  2. Discuss and analyze web application attack, different cyber-attacks, and security vulnerabilities.
  3. Describe the fundamental concepts of computer security and cryptography and utilize these techniques in computing systems
  4. Expose different types of network security devices, network security assessment tools, and security control mechanism
  5. Apply different security solution by identifying the social engineering attacks and explore the different access control techniques.
  6. Describe computer/digital forensics concept and use the tools and techniques of computer forensics
  7. Identify threats and implement countermeasures to ensure network system security
  8. Explain cryptography and the encryption process, and compare/contrast symmetric and asymmetric encryption

CIS 263

  1. Describe the basic network design and tools to prevent network issue.
  2. Install Operating Systems, customized configuration and identify the security issue of operating systems.
  3. Apply operating systems CLI commands and script to perform administrative and systems tasks.
  4. Identify and describe different security issues in various Operating Systems and methods for different securing mobile devices.
  5. Describe security policies, procedures and identify different security threats to apply security measures.

CIS 270

  1. Configure switches and end devices to provide access to local and remote network resources.
  2. Explain how physical and data link layer protocols support the operation of Ethernet in a switched network.
  3. Configure routers to enable end-to-end connectivity between remote devices.
  4. Create IPv4 and IPv6 addressing schemes and verify network connectivity between devices.
  5. Explain how the upper layers of the OSI model support network applications.
  6. Configure a small network with security best practices.
  7. Troubleshoot connectivity in a small network.

CIS 282

  1. Describe the digital forensics and identify various laws and policies that affects digital forensics.
  2. Explain basic concepts and procedures for acquiring data from mobile devices.
  3. Describe the purpose, standard procedures for conducting forensic analysis on virtual machines and identify legal challenges in cloud forensics.
  4. Utilize the computer forensic technology and tools to digital data collection, recovery, preservation, and analysis.
  5. Explain ways to determine best acquisition method, contingency planning, using acquisition tools, validating data acquisitions, RAID, challenges of data stored on Internet of Anything devices, and forensics acquisition tools.
  6. Explain digital forensics methods to investigate social media communications, and networking intrusions and authorized access.
  7. Describe main concepts of cloud computing, cloud service levels, and legal challenges in cloud forensics.