CIS 150
- Use elementary algorithms for sorting and searching.
- Solve problems and develop algorithms using control structures, abstractions of sequence, selection, and repetition, following a disciplined approach.
- Develop, interpret, and translate an algorithm using design tools.
- Use procedural abstraction, top-down algorithmic design, and stepwise refinement methods.
- Explore various scripting languages such as Python to write looping scripts and automate the common administrative task.
- Explore the Python programming fundamentals and write different scripts such as (loops, decisions, SQL, and functions).
CIS 260
- Describe the fundamental concept of security landscape and its application to secure system
- Discuss and analyze web application attack, different cyber-attacks, and security vulnerabilities.
- Describe the fundamental concepts of computer security and cryptography and utilize these techniques in computing systems
- Expose different types of network security devices, network security assessment tools, and security control mechanism
- Apply different security solution by identifying the social engineering attacks and explore the different access control techniques.
- Describe computer/digital forensics concept and use the tools and techniques of computer forensics
- Identify threats and implement countermeasures to ensure network system security
- Explain cryptography and the encryption process, and compare/contrast symmetric and asymmetric encryption
CIS 263
- Describe the basic network design and tools to prevent network issue.
- Install Operating Systems, customized configuration and identify the security issue of operating systems.
- Apply operating systems CLI commands and script to perform administrative and systems tasks.
- Identify and describe different security issues in various Operating Systems and methods for different securing mobile devices.
- Describe security policies, procedures and identify different security threats to apply security measures.
CIS 270
- Configure switches and end devices to provide access to local and remote network resources.
- Explain how physical and data link layer protocols support the operation of Ethernet in a switched network.
- Configure routers to enable end-to-end connectivity between remote devices.
- Create IPv4 and IPv6 addressing schemes and verify network connectivity between devices.
- Explain how the upper layers of the OSI model support network applications.
- Configure a small network with security best practices.
- Troubleshoot connectivity in a small network.
CIS 282
- Describe the digital forensics and identify various laws and policies that affects digital forensics.
- Explain basic concepts and procedures for acquiring data from mobile devices.
- Describe the purpose, standard procedures for conducting forensic analysis on virtual machines and identify legal challenges in cloud forensics.
- Utilize the computer forensic technology and tools to digital data collection, recovery, preservation, and analysis.
- Explain ways to determine best acquisition method, contingency planning, using acquisition tools, validating data acquisitions, RAID, challenges of data stored on Internet of Anything devices, and forensics acquisition tools.
- Explain digital forensics methods to investigate social media communications, and networking intrusions and authorized access.
- Describe main concepts of cloud computing, cloud service levels, and legal challenges in cloud forensics.