Page 142 - 2018-19
P. 142

138     Computer Science/Information Systems




        180                                 186                                 193
        SYSTEMS ANALYSIS                    WORKSTATION SECURITY AND            INTRODUCTION TO
        3.0 Units                           SUPPORT                             CYBERSECURITY: ETHICAL
        CS/IS 180 course presents a systematic meth-  3.0 Units                 HACKING
        odology for analyzing a business problem or   CS/IS 186 introduces students to computer   3.0 Units
        opportunity, determining what role, if any,   workstation security and support. It includes   CS/IS 193 is a course that introduces students
        computer-based technologies can play in   an overview of workplace security issues   to the concepts, principles, and techniques,
        addressing the business need, articulating   emphasizing the importance and need for   supplemented by hands-on exercises, for
        business requirements for the technology   secure workstations and support. Students   attacking and disabling a network within the
        solution, specifying alternative approaches   learn to use various tools and techniques to   context of properly securing a network. The
        to acquiring the technology capabilities   improve workstation security. The student   course emphasizes network attack methods
        needed to address the business require-  will learn to recognize threats to workstation   with the emphasis on student use of network
        ments, and specifying the requirements for   security. It also prepares the student to main-  attack techniques and tools and appropriate
        the information systems solution in particu-  tain and support security for workstations in   defenses and countermeasures. Students
        lar, in-house development, development   the modern business environment. Lecture/  receive course content information through
        from third-party providers, or purchased   Demonstration 3 hours.  Recommended   a variety of methods: lecture and demon-
        commercial-off -the-shelf packages. Lecture 3   Preparation: CS/IS 101.   stration of hacking tools will be used in
        hours. Prerequisite: CS/IS 101. Course Typi-  187                       addition to a virtual environment. Students
        cally Off ered: Spring (Every Other Year).   ADVANCED TOPICS IN IT       experience a hands-on practical approach
        Transfer Credit: CSU, UC, USC.                                          to penetration testing measures and ethical
                                            3.0 Units
        183                                 CS/IS 187 course will cover the advanced   hacking. Lecture 3 hours.  Recommended
                                                                                Preparation: CS/IS 190 and CS/IS 196 or
        DIGITAL FORENSICS                   topics in Information Technology including   equivalent. Transfer Credit: CSU.
        FUNDAMENTALS                        Switching and Routing Concepts and appli-
        3.0 Units                           cations, Advanced Networking topics such   194
        CS/IS 183 is an introduction to the meth-  as Cloud Computing, Advanced Security   INFORMATION TECHNOLOGY
        ods used to properly conduct a computer   topics such as eff ective Intrusion Detection,   ESSENTIALS
        forensics investigation beginning with a   System, and Network administration. The   4.0 Units
        discussion of ethics, while mapping to the   topics will cover the most current and appli-  CS/IS 194 provides an introduction to the
        objectives of the International Association   cable technologies for the modern business   computer hardware and software skills
        of Computer Investigative Specialists (IACIS)   environment. Lecture 3 hours. Prerequisite:   needed to help meet the growing demand
        certifi cation. Topics covered include: an over-  CS/IS 193 or CS/IS 196 or equivalent. Transfer   for entry-level Information Technology (IT)
        view of computer forensics as a profession;   Credit: CSU.              professionals. The fundamentals of computer
        the computer investigation process; under-  190                         hardware and software, as well as advanced
        standing operating systems boot processes   INTRODUCTION TO COMPUTER    concepts such as security, networking, and
        and disk structures; data acquisition and   NETWORKS                    the responsibilities of an IT professional are
        analysis; technical writing; and a review of   3.0 Units                introduced. Preparation for the CompTIA
        familiar computer forensics tools. Lecture                              A+ certifi cation exams is included. Lecture
        3 hours.  Recommended Preparation: CS/  CS/IS 190 introduces the architecture, struc-  4 hours. Recommended Preparation: None
        IS 194 or CS/IS 196 or equivalent. Transfer   ture, functions, components, and models of   Transfer Credit: CSU.
        Credit: CSU.                        the Internet and other computer networks.
                                            The principles and structure of IP (Internet   196
        185                                 Protocol) addressing and the fundamentals   ADVANCED NETWORKING:
        DATABASE MANAGEMENT                 of Ethernet concepts, media, and operations   SECURITY
        SYSTEMS                             are introduced to provide a foundation for   3.0 Units
        3.0 Units                           further study of computer networks. It uses   CS/IS 196 is a course designed to help prepare
        CS/IS 185 covers basic database administra-  the OSI (Open Systems Interconnection) and   the student for industry-recognized certifi ca-
        tion tasks and key concepts of data quality   TCP (Transmission Control Protocol) layered   tion in advanced networking infrastructure.
        and data security. In addition to develop-  models to examine the nature and roles of   This course focuses on security installa-
        ing database applications, the course helps   protocols and services at the application,   tion, confi guration and administration in
        the students understand how large-scale   network, data link, and physical layers. This   the modern networking environment. The
        packaged systems are highly dependent on   course aff ords preparation for the CompTIA   course includes an introduction to the funda-
        the use of Database Management Systems   Network+ certification exam. Lecture/  mental principles and topics of Information
        (DBMSs). Building on the transactional   Demonstration 3 hours.  Recommended   Technology Security and Risk Manage-
        database understanding, the course provides   Preparation: CS/IS 101 or equivalent. Course   ment at the organizational level. Lecture/
        an introduction to data and information   Typically Off ered: Fall/Spring.  Transfer   Demonstration 3 hours.  Recommended
        management technologies that provide deci-  Credit: CSU. (C-ID ITIS 150)  Preparation: CS/IS 190 or equivalent. Course
        sion support capabilities under the broad                               Typically Off ered: Fall (Every Other Year).
        business intelligence umbrella. Lecture 3                               Transfer Credit: CSU.
        hours.  Recommended Preparation: CS/IS
        101 or equivalent. Transfer Credit: CSU.








        2018–2019 C A T ALOG  • G LEND ALE                                 C OMMUNITY             C OLLEGE
   137   138   139   140   141   142   143   144   145   146   147