May 21, 2024  
2022-2023 Catalog 
    
2022-2023 Catalog [ARCHIVED CATALOG]

Course Descriptions


 

Criminal Justice (CRIM)

  
  • CRIM 204 - Interview and Interrogation


    PREREQUISITES: CRIM 101 - Introduction to Criminal Justice Systems  
    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Fall, 2014

    This course introduces students to the art of interviewing and interrogation, and further introduces them to the individual personality of the witness and/or suspect, and the means in which to secure valid information, admissions, and confessions, obtained legally and ethically, that are corroborative in nature, and that can be used to solve crimes and be introduced as evidence in court proceedings.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Comprehend the difference between interviewing and interrogating.
    2. Understand the difference between circumstantial and direct evidence and further understand that securing accurate and credible direct (eyewitness) evidence is an art and not a science.
    3. Articulate the foundational means in order to adequately prepare for an interview or interrogation.
    4. Secure victimology information and meaningfully apply the information in interviews and interrogations.
    5. Be aware of the legal foundations involved when interviewing and/or interrogating and when and when not to Mirandize witnesses and/or suspects.
    6. Learn of the need to change the style, content and demeanor of interviews and interrogation depending upon the personality of those interviewed or interrogated.
    7. Recognize that many suspects have an antisocial or similar personality disorder and understand the traits associated with the disorder and the means to secure information from these individuals.
    8. Understand and apply the basic steps of interrogation.
    9. Learn the essentials of theme development.
    10. Differentiate between the different types of offenders, including child and sexual offenders, and understand the different approaches to securing information from those different offenders.
    11. Engage in case studies involving different crimes and offenders.
    12. Read and view transcribed and recorded interviews and interrogations and critically review them.
    13. Practice interviewing and interrogation in simulated cases.


    COURSE CONTENT: Topical areas of study include -  

    • Victimology
    • Different steps of interrogation
    • Theme development
    • Securing confessions
    • False confessions
    • Interviews and interviewing
    • Miranda Rights
    • Personality disorders
    • Interviews of children
    • Interrogations of sexual offenders
    • Anti-social personalities

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CRIM 205 - Procedural Criminal Law


    PREREQUISITES: CRIM 101 - Introduction to Criminal Justice Systems .
    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Fall, 2014

    This course covers the theory and practice of procedural criminal law and introduces the student to the laws of arrest, search and seizure, probable cause, due process, confessions, suspect identification and the many types of surveillances, all the while emphasizing important U.S. Supreme Court rulings based on the U.S. Constitution.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course, the student will be expected to:

    1. Explain the structures and processes of the American criminal court system within the context of the greater criminal justice system.
    2. Differentiate between various burdens of proof and standards used within the criminal pretrial process, including reasonable suspicion, probable cause, and the exclusionary rule, as
    3. Differentiate between various levels of law enforcement searches and seizures of people, including stops, frisks, arrests, and the use of force.
    4. Differentiate between various levels of law enforcement searches and seizures of things, including motor vehicle searches, open fields, abandonment, border searches, and plain view.
    5. Identify various methods used by law enforcement to identify suspects during the pretrial process.
    6. Explain the significance of Miranda v. Arizona with respect to law enforcement interrogations, suspect confessions and admissions.
    7. Describe the procedural rights of the accused throughout the criminal trial process, from jury selection through sentencing and punishment.
    8. Recognize how law enforcement officers may be subject to legal liability under both state and federal law.
    9. Discuss when Indiana criminal procedural law may be different from federal law and when it must follow the federal rulings for criminal procedure.


    COURSE CONTENT: Topical areas of study include -  

    • Reasonable suspicion
    • Probable cause
    • Exclusionary rule
    • Stops
    • Frisks
    • Arrest
    • Use of force
    • Motor vehicle searches
    • Plain view
    • Abandonment
    • Border searches
    • Line-ups
    • Show-ups
    • Confessions
    • Admissions
    • Section 1983

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CRIM 210 - Police and Community Relations


    PREREQUISITES: CRIM 101 - Introduction to Criminal Justice Systems .
    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Fall, 2013

    This course introduces police-community relations, examines trends, practices, social and individual effects of police work. Emphasis on police line and support operations. Analysis of operations, enforcement policy, operations during civil disorders and disaster, as well as the role of the police officer in achieving and maintaining public support, human relations, and relationship with violators and complainants.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course, the student will be expected to:

    1. Identify and examine police operations.
    2. List and examine the police chief officer’s role.
    3. Explain and analyze the role of police in the community and that relationship in our society.
    4. List and explain police goals and functions in the community.
    5. Examine the role of police in the community as it relates to maintaining order.
    6. Examine the issue of civil liability of police operations.
    7. Assess the value and role of community relations and crime prevention in multicultural communities.
    8. Examine police procedures used to respond to crime and violence.
    9. Examine the need to have a police department reflective of the community it serves.


    COURSE CONTENT: Topical areas of study include -  

    • Police operations
    • Role of the police chief
    • Civil liability
    • Police community relations
    • Maintaining order
    • Functions and goals
    • Police procedures
    • Respond to crime and violence

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CRIM 211 - Criminal Law


    PREREQUISITES: CRIM 101 - Introduction to Criminal Justice Systems .
    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Fall, 2013

    A theoretical and practical survey of criminal law in the United States. This includes examining conduct that constitutes crimes and the punishments deemed appropriate for such acts. Emphasis is placed on the criminal law as it is applied and interpreted both federally, through the U.S. Supreme Court, and in the state of Indiana through the Indiana Code and state court decisions. Course topics include the American criminal justice system, criminal liability, the elements of specific crimes, constitutional limits, the Indiana Code (with specific emphasis on the penal code), criminal defenses, victims, punishments and sentencing.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Demonstrate a basic understanding of the American criminal justice system.
    2. Analyze both federal and state criminal court decisions through the development of case briefing skills.
    3. Understand and apply the Indiana Criminal Code.
    4. Develop a thorough comprehension of the following areas of criminal law in the United States and Indiana:
      1. The nature and history of criminal law
      2. Criminal liability and the essence and concept of crime
      3. Inchoate offenses and parties to crime
      4. Justifications of defenses
      5. Excuses as defenses
      6. Insanity as a defense
      7. The legal and social dimensions of personal crimes
      8. The legal and social dimensions of property and computer crimes
      9. Offenses against public order and the administration of justice
      10. Offenses against public morality
      11. Victims and the law
      12. Punishment and sentencing
    5. Identify the specific elements of crime under Indiana statutes.


    COURSE CONTENT: Topical areas of study include -  

    • American Criminal Justice System
    • Criminal defenses
    • Indiana Criminal Code
    • Criminal offenses
    • Court Decisions
    • Victims and victims’ programs
    • Criminal Liability
    • Punishment and sentencing
    • Constitutional Limits
    • Case Briefing

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CRIM 212 - Use of Force


    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 1
    LAB HOURS MIN: 4
    DATE OF LAST REVISION: Fall, 2013

    Provides hands on training in use of various forms of force in the performance of police duties in the field. Students will receive instruction in the use of physical force, use of chemical agents, use of firearms, defensive tactics, and working with police dogs. Students will also receive live firearms operation instruction and live-fire qualification testing.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Evaluate conditions and circumstances under which physical force should be used.
    2. Demonstrate the proper use of chemical agents to control subjects.
    3. Demonstrate defensive tactics when engaging subjects, e.g. armed individuals, aggressive subjects, etc.
    4. Describe the use and value of police dogs in law enforcement.
    5. Pass the physical assessment examination.
    6. Understand the importance of proper nutrition to maintain conditioning necessary to carry out police work.
    7. Demonstrate the safe use of firearms e.g. service revolvers, shotguns, rifles, etc.
    8. Qualify with service revolver, shotgun, and rifle on firing range at the marksman level.


    COURSE CONTENT: Topical areas of study include -  

    • Pepper spray
    • Incident evaluation
    • Mace
    • Firearms use and safety
    • Tear gas
    • Shock/stun devices
    • Night stick use
    • Mechanical restraint equipment/techniques
    • Nutrition
    • Defensive techniques
    • Physical fitness
    • Offensive techniques
    • Marksmanship
    • Maintaining mental health
    • Smoke diversion

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CRIM 213 - Field Practice


    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 1
    LAB HOURS MIN: 4
    DATE OF LAST REVISION: Fall, 2013

    Provides hands on training in how to handle various situations encountered by law enforcement agents in the field. The student will study the considerations and intervention techniques used by police in dealing with various types of incidents: suicide management, conflict management, elderly abuse, domestic violence, critical incidents, dealing with street gangs, hate crimes, sexual assault, and criminal profiling, etc.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Identify critical incidents.
    2. Identify intervention techniques used to deal with various individuals and groups: Juveniles, elderly, street gangs, suicides, etc.
    3. Identify and evaluate the risk inherent in working with domestic violence incidents.
    4. Explain the proper use of criminal profiling techniques and describe their importance in police work.
    5. Explain the concept of community policing.
    6. Identify and demonstrate techniques used in conflict resolution.
    7. Describe how law enforcement agents should interact with the news media.
    8. Understand basic words/terms and sentences of street level Spanish.
    9. Identify special considerations employed when working with “Special Persons” i.e. mentally ill, physically challenged, deaf, blind, etc.
    10. Demonstrate the use of “Verbal Judo” in various law enforcement incidents.


    COURSE CONTENT: Topical areas of study include -  

    • Community policing
    • Law enforcement and the media
    • Stress
    • Suicide management
    • Critical incidents
    • Conflict management
    • Sexual assault
    • Post shooting trauma/line of duty death
    • Juveniles
    • Procedures for death notification
    • Hate crimes
    • Special persons/mentally ill, deaf, blind, etc.
    • Gangs
    • Child abuse/molestation
    • Verbal Judo
    • Street level Spanish

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CRIM 215 - Police Administration and Organization


    PREREQUISITES: CRIM 101 - Introduction to Criminal Justice Systems .
    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Fall, 2014

    Emphasizes the basic principles of law enforcement administration and organizational structure, their function and activities, records, communication, public relations, personnel and training, policy formation, evaluation of personnel and complaint processing and planning. The student who successfully completes this course will have an understanding of traditional and contemporary management approaches and techniques.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course, the student will be expected to:

    1. Explain how management models have changed throughout history.
    2. Discuss and explain the different management styles.
    3. Explain the budgeting process.
    4. Discuss the planning process in a law enforcement agency.
    5. Examine policies for selecting and hiring personnel, affirmative action and equal opportunity employment, sexual harassment, and drug testing.
    6. Discuss the collective bargaining process in a law enforcement agency.
    7. Explain the use of technology in police management and line function.


    COURSE CONTENT: Topical areas of study include -  

    • The nature of police organization
    • The role of police in society
    • Leadership in police organizations
    • Management styles in policing
    • Police productivity
    • Accountability in police organizations

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CRIM 216 - Communication and Conflict Management for Criminal Justice


    PREREQUISITES: Program Chair Approval
    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: N/A

    This course covers essential communication skills for criminal justice professionals and highlights the relationship between interpersonal communication and conflict management. This course also emphasizes the role of emotional intelligence on decision making in a criminal justice setting. Students will analyze the appropriate balance between logical and emotional responses during routine and high stress situations. Lastly, students will demonstrate conflict management skills by engaging in a scenario representative of a criminal justice environment.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Identify characteristics of competent interpersonal communication.
    2. Outline strategies for professional communication skills as a benefit to conflict resolution.
    3. Discuss core competencies necessary in communication skills as a benefit to conflict resolution.
    4. Explain several barriers to effective listening in the criminal justice environment.
    5. Outline strategies for effective mindful listening in a criminal justice setting.
    6. Compare and contrast logic and emotion in terms of communication and decision making.
    7. Examine the role of emotional intelligence in the criminal justice profession.
    8. Demonstrate cultural competence and emotional intelligence through de-escalation exercises.
    9. Given a scenario, resolve ethical dilemmas using effective approaches to conflict management.


    COURSE CONTENT: Topical areas of study include -  

    • Interpersonal communication
    • Effective listening
    • Logic and Emotion
    • Dealing with anger, thoughts, feelings, beliefs, labels
    • Emotional Intelligence
    • Communicating with vulnerable populations, mentally ill, and diverse abilities
    • Implicit bias as a barrier to effective listening
    • Cultural competence and de-escalation
    • Conflict Management

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CRIM 220 - Criminal Evidence


    PREREQUISITES: CRIM 101 - Introduction to Criminal Justice Systems .
    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Fall, 2014

    Examines the rules of evidence as applied in criminal investigation and criminal court with a discussion of relevant issues and legal standards.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Explain the history and development of the rules of evidence and how they apply.
    2. Assess the role of evidence as it pertains to the entire criminal justice system.
    3. Examine the application of the Bill of Rights and relevant case law as it pertains to evidence.
    4. Illustrate the nature of physical evidence and testimonial evidence and the roles each plays in the investigatory process.
    5. Apply knowledge gained in this class to better understand investigations, as they occur to avoid exclusionary errors.
    6. Demonstrate knowledge of laws concerning privileged communication.
    7. Describe photographic, recorded, and computer-generated evidence and rules governing their generation and admissibility.
    8. Locate documentary evidence and analyze its applicability.


    COURSE CONTENT: Topical areas of study include -  

    • Photographic/recorded evidence
    • Federal Rules of Evidence
    • Bill of Rights
    • The trial process
    • Witnesses’
    • Documentary evidence
    • The Exclusionary Rule
    • Relevant U.S. Supreme Court Case Law
    • Cyber-forensics

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CRIM 230 - Community-Based Corrections


    PREREQUISITES: CRIM 130 - Introduction to Corrections .
    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Fall, 2019

    Reviews the functioning and effectiveness of community-based correctional options that are alternatives to incarceration, including diversion, house arrest, restitution, community service,probation, parole, and work release/residential programs. The use of community-based correctional options with juveniles is covered. Discusses effective programming and special issues in community-based corrections.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Discuss the historical development and purpose of community-based correctional options within the overall context of the criminal justice system.
    2. Analyze the use of community-based correctional options for juveniles.
    3. Determine the effectiveness of community-based correctional options using a variety of measurements.
    4. Evaluate evidence-based programs and practices, and special programs utilized in community-based correctional options.
    5. Assess the classification of offenders to community-based correctional options, including supervision levels.
    6. Examine special issues in community-based correctional options.
    7. Identify the roles, duties, and legal responsibilities of probation and parole officers.


    COURSE CONTENT: Topical areas of study include -  

    • Restitution
    • Traditional incarceration
    • Probation
    • Alternatives to traditional methods
    • Parole
    • Recidivism

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CRIM 231 - Special Issues in Corrections


    PREREQUISITES: CRIM 130 - Introduction to Corrections .
    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Fall, 2013

    Investigates topics of special interest related to corrections with an emphasis on the classification and treatment of inmates. Topics may vary to reflect contemporary corrections issues.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Evaluate the system of classification of offenders by the nature of their crime and length of sentence.
    2. Analyze the effect of classification and incarceration of repeat and first-time offenders and violent and non-violent offenders together.
    3. Discuss the unique characteristics, demands and requirements of substance abuse treatment of incarcerated offenders.
    4. Evaluate the effectiveness of substance abuse treatment programs by examining recidivism rates and other pertinent, available data.
    5. Discuss the unique characteristics, demands and requirements of anger management treatment of incarcerated offenders.
    6. Evaluate the effectiveness of anger management treatment programs by examining recidivism rates and other pertinent, available data.
    7. Discuss the unique characteristics, demands and requirements of sex offenders’ treatment of incarcerated offenders.
    8. Evaluate the effectiveness of sex offender’s treatment programs by examining recidivism rates and other pertinent, available data.
    9. Demonstrate the correlation, if any, between educational and/or vocational training programs and recidivism rates.
    10. Discuss the unique problems created by juveniles, who are convicted as adults, in the area of classification, incarceration, and treatment programs.


    COURSE CONTENT: Topical areas of study include -  

    • Recidivism
    • Special issues of juvenile offenders
    • Substance abuse programs
    • Educational/vocational programs
    • Sex offender programs
    • Internal classification of offenders

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CRIM 235 - School Resource Officer


    PREREQUISITES: Program Chair approval required.
    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: N/A

    This course is designed for those who will be working within the educational environment. This course will explore the benefits as well as provide an in-depth understanding of the law enforcement professional working as a school resource officer. This course will provide students with knowledge and skills as they relate to the school resource officer concepts.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Identify early SRO programs and explain why they were or were not successful.
    2. Demonstrate an understanding of the ethical considerations unique to an SRO.
    3. Demonstrate an understanding of the social, psychological, and legal characteristics of school violence.
    4. Identify case law related to policing and education.
    5. Analyze risk factors associated with juvenile delinquency.
    6. Understand the impact of brain development on impulsive behavior as it peaks during adolescence.
    7. Understand the relationship between juvenile justice issues, school policies, and public policy.
    8. Demonstrate an understanding surrounding the issues relating to sex trafficking and exploitation youth.
    9. Identify strategies for working with troubled, traumatized and victimized youth with emphasis on de-escalation techniques and relationship building.
    10. Discuss competencies in understanding diversity along with the barriers that can foster bias.
    11. Describe how youth trends and drugs and other self-harm practices, impact the school environment and recognize the need for keeping current with these trends.
    12. Identify school threats and develop prevention and preparedness models based on identified threats to include school assessments, drills, and tactics.
    13. Demonstrate how the use of Crime Prevention Through Environmental Design (CPTED) of a school can help to reduce crime.
    14. Demonstrate the skills necessary to deal with medical/injury emergencies and discuss with clear understanding the AED and its proper use.


    COURSE CONTENT: Topical areas of study include -  

    • School Violence
    • Juvenile mental illness
    • Youth gangs
    • Juvenile incarceration
    • Child abuse and neglect
    • School bullying
    • The law and juveniles
    • Sex trafficking and youth
    • Drug trends
    • Social media / cyber security
    • First Aid/CPR/AED
    • Family Educational Rights to Privacy
    • Implicit Bias
    • Stop the Bleed

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CRIM 242 - The Death Penalty


    PREREQUISITES: Demonstrated competency through appropriate assessment or earning a grade of “C” or better in ENGL 083 - Reading Strategies for College  and ENGL 093 - Introduction to College Writing ; or ENGL 095 - Integrated Reading and Writing , or ENGL 075 - Co-Requisite Integrated Reading & Writing .
    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    DATE OF LAST REVISION: Fall, 2020

    This course provides an overview of the death penalty in the United States. This includes examining the origins, history, methods, and U.S. Supreme Court cases that have formed the modern death penalty. Emphasis is placed on the purpose of punishment, demographic characteristics of those most likely to receive capital punishment and social and financial costs of such punishment.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Understand the origins and purposes of punishment, including capital punishment.
    2. Describe the history and the U.S.S.C. cases that shaped the death penalty.
    3. Compare the methods of execution throughout the history of the U.S.
    4. Explain the demographic characteristics of the executed offender.
    5. Recognize how modern science affects the death penalty.
    6. Understand the errors that lead to wrongful convictions.
    7. Recognize the financial burdens of the death penalty of the state and federal governments.


    COURSE CONTENT: Topical areas of study include -  

    • Origins and purposes of punishment
    • History of the death penalty
    • Case law related capital punishment
    • Methods of executions
    • Demographics of capital offender’s
    • Modern science
    • Wrongful convictions
    • Financial burden of the death penalty

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CRIM 252 - Juvenile Delinquency


    PREREQUISITES: CRIM 101 - Introduction to Criminal Justice Systems .
    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Fall, 2013

    Provides an overview of the concepts, definitions, theories and measurements of juvenile delinquency. Looks at the role of environmental influences (peers, gangs, school and drugs). Develop a working knowledge of the concepts of delinquency and the concern for children of our society. Discusses an overview of the history and philosophy of the juvenile justice systems as well as ways to control and treat juvenile offenders.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course, the student will be expected to:

    1. Discuss the nature and history of juvenile delinquency.
    2. Report official statistics and crime trends in the United States.
    3. Describe racial and ethnic patterns and the effects of social class on delinquency.
    4. Explain the basic theories of delinquency.
    5. Appraise the influence of the family on delinquency.
    6. Formulate the effects of child abuse and neglect.
    7. Evaluate the emergence of gangs and the causes of gang delinquency.
    8. Describe the relationship between schools and delinquency.
    9. Identify the relationship between use and delinquency.
    10. Explain the history of the juvenile justice system.
    11. Discuss the role of the police in handling juvenile offenders.
    12. Demonstrate an understanding of pretrial procedures and the concept of detention.
    13. Learn to critically evaluate programs and policies that have been implemented to prevent and control delinquency.
    14. Delinquency trends in the 21st Century.


    COURSE CONTENT: Topical areas of study include -  

    • Nature of delinquency
    • Concepts of delinquency
    • Extent of delinquency
    • Social and developmental influences on delinquency
    • Etiology of delinquency
    • Prevention, treatment and control of delinquency
    • Theories of delinquency

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CRIM 260 - Research Methods in Criminal Justice


    PREREQUISITES: CRIM 101 - Introduction to Criminal Justice Systems  and demonstrated competency through appropriate assessment or earning a grade of “C” or better in MATH 023 - Essentials of Algebra  or MATH 080 - Mathematical Principles . Students must also have completed 40 credit hours or more OR receive program chair approval to register for CRIM 260.
    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Summer, 2020

    The course will familiarize students with the basic concepts, techniques and problems associated with conducting research in criminal justice. The course will provide students with the analytical and critical thinking skills required to understand empirical research. Students will also acquire the necessary tools to conceptualize and conduct a research project. Students will examine the advantages and limitations of decisions that are made in the process of conducting research. Problems specific to research in criminal justice will be explored.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Identify the purposes of conducting scientific research.
    2. Understand the fundamental concepts in social science research including reliability, validity, causation, sampling, data collection, and generalizability.
    3. Understand key issues related to conceptualization and measurement.
    4. Know the various forms of data collection and sampling techniques used in criminal justice research.
    5. Examine issues in research design, including units of analysis, different types of research design, and stages in the research process.
    6. Understand the ethical, political, and administrative constraints in criminal justice research.


    COURSE CONTENT: Topical areas of study include -  

    • Validity/reliability
    • Sampling
    • Generalizability
    • Variables
    • Research designs
    • Analysis
    • Evaluation
    • Ethics in social research
    • Causation
    • Conceptualization and measurement
    • Theory and design
    • Existing and secondary data
    • Experimentation
    • Analyzing data and drawing conclusions

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CRIM 271 - Terrorism


    PREREQUISITES: CRIM 101 - Introduction to Criminal Justice Systems .
    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Fall, 2013

    This course introduces students to an examination of terrorism and America’s criminal justice system, with special emphasis on policing’s investigative response. Organizational preparedness and response by America’s criminal justice system to this global threat.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Understand the history of terrorism in the United States.
    2. Comprehend a global assessment of contemporary terrorism.
    3. Be aware of the prospects for terrorism in the Twenty-First Century.
    4. Articulate the real threats and irrational fears related to terrorism.
    5. Explain the relationship of the rule of law and homeland security.
    6. Identify the organizational entities responsible for homeland security.
    7. Describe the intelligence function in defending the United States against terrorism.
    8. Develop and demonstrate knowledge of both reactive and proactive counter-terrorism measures.
    9. Interpret the example of aviation security as a model of terrorism defense.
    10. Analyze the terrorism defense role of the Federal Emergency Management Agency.
    11. Explain the complex calculations of “costs” of freedom and the war on terrorism.


    COURSE CONTENT: Topical areas of study include -  

    • Terrorism
    • Weapons of Mass Destruction
    • Domestic Terrorism
    • Weapons of Mass Effect
    • International Terrorism
    • Soft Targets
    • Al-Qaeda
    • Strategic Targets
    • Department of Homeland Security
    • Symbolic Targets
    • Liberty
    • National Security
    • Racial Profiling
    • US VISIT
    • Biological Weapons
    • Chemical Weapons
    • Dirty Bomb
    • Radiological Dispersal Device (RDD)
    • Crisis Management
    • FEMA
    • Cyber-Terrorism
    • Terror-Focused Government

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CRIM 280 - Internship


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Criminal Justice
    CREDIT HOURS MIN: 4
    LECTURE HOURS MIN: 2
    PRACTICUM HOURS MIN: 10
    DATE OF LAST REVISION: Fall, 2014

    Provides fieldwork experience in an approved social, educational, law enforcement, corrections or other criminal justice organization.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course, the student will be expected to:

    1. Explain the agency’s policies and procedures, organizational structure, and its relationship to the community.
    2. Explain the major goals of the agency and describe the methods used to realize these goals.
    3. Demonstrate communication and problem solving skills in the internship experience.
    4. Demonstrate professionalism in appearance, communication, and prompt reporting for work.
    5. Maintain a weekly journal describing and documenting experiences.
    6. Demonstrate competence in observing, listening, and writing.
    7. Demonstrate ability to identify, assess, and resolve problems during internship experience.
    8. Demonstrate effective job search and interview strategies through writing a cover letter, writing a resume, writing a thank you letter, and completing a mock interview.
    9. Evaluate the internship experience.


    COURSE CONTENT: Topical areas of study include -  

    • Developing professionalism in interaction with those persons involved with the agency
    • Managing the stress experienced by the criminal justice professional in the workplace
    • Learning to work under supervision
    • Recognizing and understanding diversity in the criminal justice professions
    • Experiencing the real world of criminal justice professions

     
    Course Addendum - Syllabus (Click to expand)  


Computer Science (CSCI)

  
  • CSCI 101 - Computer Science I


    PREREQUISITES: Demonstrated readiness for College-level Calculus
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Fall 2020

    Introduces the fundamental concepts of procedural programming. Topics include data types, control structures, functions, arrays, files, and the mechanics of running, testing, and debugging. The course also offers an introduction to the historical and social context of computing and an overview of computer science as a discipline.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Demonstrate fundamental programming constructs:
      1. Explain the syntax and semantics of a higher level language
      2. Create a program utilizing
        1. Expressions,
        2. Assignments,
        3. I/O,
        4. Iterative and conditional control structures, and
        5. functions.
      3. Utilize an integrated development environment (IDE) to create, execute, test, and debug programs.
      4. Use the techniques of decomposition to modularize a program.
      5. Apply consistent documentation and program style standards that contribute to the readability and maintainability of software.
    2. Analyze and explain the behavior of simple programs utilizing variables, expressions, assignments, I/O, control structures, functions, parameter passing, preconditions, postconditions, and invariants.
    3. Explain the role of algorithms in the problem-solving including;
      1. Analyze the best, average, and worst-case behaviors of an algorithm
      2. Analyze the performances of an algorithm with various input sizes.
      3. Estimate time and space complexities for a given algorithm using Big-O notation;
      4. Implement a basic numerical algorithm and apply to a given problem.
      5. Discuss the halting problem and why it has no algorithmic solution.
      6. Investigate factors other than computational efficiency that influence the choice of algorithms.
      7. Compare multiple algorithms for a given problem.
    4. Utilize fundamental data types including:
      1. Primitive types (Integers, Real Numbers, Booleans, and Characters), Pointers, Arrays, Records/Structures, Strings, Enumerations
    5. Analyze machine level representation of data including:
      1. Bits, bytes, and words
      2. Numeric data representation (Binary, Hexadecimal, BCD, 1’s Complement, 2’s Complement, and Floating Point format)
      3. Non-numeric data (Characters, Images, Sounds, Video)
      4. Illustrate color models and their use in computer graphics.
      5. Conversion of numerical data from one format to another
      6. Affect of fixed-length number representations on accuracy and precision
    6. Describe the components of Computer Architecture
      1. Classify the organization and functional units of the Von Neumann machine.
      2. Illustrate how high-level language patterns map to assembly/machine language, including subroutine calls.
      3. Create simple assembly language program segments.
      4. Describe the basic concepts of interrupts and I/O operations.
      5. Compare and contrast different components of the memory hierarchy and memory technology, such as SRAM, DRAM, virtual memory, and cache.
      6. Explain the impact of memory latency on execution time (Von Neumann Bottleneck)
    7. Examine major objectives, functions, features, and concepts of modern operating systems.
      1. Discuss the role and purpose of operating systems
      2. Compare prevailing types of operating systems.
      3. Discuss potential threats to operating systems and appropriate security measures.
      4. Diagram the interaction of an Application Programming Interface (API) with an operating system.
      5. Illustrate how applications use computing resources managed by the operating system.
      6. Explain the need for concurrency within an operating system and common methods to implement concurrency.
      7. Illustrate the principles of memory management including virtual memory, paging, thrashing, and partitioning.
      8. Discuss features of an operating system used to provide protection and security.
      9. Diagram the physical hardware devices and the virtual devices maintained by an operating system.
    8. Investigate principles of secure design.
      1. Analyze the tradeoffs associated with designing security into a product.
      2. Implement input validation in applications
      3. Discuss the security implications of relying on open design vs the secrecy of design.
      4. Explain the tradeoffs of developing a program in a typesafe language.
      5. Investigate potential errors detected from both strong-type and weak-type languages.
      6. Investigate potential vulnerabilities in provided programming code.
      7. Create programs which use defensive programming techniques, including input validation, type checking, and protection against buffer overflow.
      8. Investigate common coding errors that introduce security vulnerabilities, such as buffer overflows, integer errors, and memory leaks.
    9. Assess human-computer interaction and design issues:
      1. Analyze the importance of human-centered software.
      2. Implement a simple usability test for an existing software application.
    10. Discuss software development methodology including:
      1. Fundamental design concepts and principles
      2. Structured and Iterative design
      3. UML (Unified Modeling Language)
      4. Coding Standards
      5. Test-case design (Unit, Integration, System, and Acceptance Testing)
      6. Programming languages
      7. Development environments
    11. Apply a variety of strategies to the testing and debugging of simple programs:
      1. Apply consistent documentation and program style standards that contribute to the readability and maintainability of software.
      2. Conduct code reviews (focused on common coding errors) on program components.
      3. Differentiate between program validation and verification.
      4. Investigate potential vulnerabilities in provided programming code.
      5. Use software tools to evaluate, test, and debug programs.
      6. Analyze the extent to which another programmer’s code meets documentation and programming style standards.
      7. Implement refactoring within given program components.


    COURSE CONTENT: Topical areas of study include -  

    • Abstraction mechanisms
    • Human-computer interaction
    • Assembly level machine language
    • Language translation
    • BCD/1’s Complement/2’s Complement
    • Memory Hierarchy
    • Binary/Hexadecimal
    • Operating systems
    • Coding Standards
    • Security
    • Compilation
    • Software design
    • Declarations and types
    • UML
    • Development Environments
    • Verification/Validation
    • Debugging/Testing

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 102 - Computer Science II


    PREREQUISITES: CSCI 101 - Computer Science I  and MATH 211 - Calculus I .
    COREQUISITES: MATH 211 - Calculus I .
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Spring, 2019

    Provides a working understanding of the fundamentals of procedural and object-oriented program development using structured, modular concepts and modern object-oriented programming languages. Reviews control structures, functions, data types, variables, arrays, and data file access methods. This is a first-level course in object- oriented computer programming, using a language such as Java or C. Object-oriented concepts studied include classes, objects, inheritance, exception handling, recursion, abstract data types, streams and file I/O, reusable software, and event-driven programming.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Demonstrate the basic procedural concepts of computer programming, including variables, constants, character strings, and data types.
    2. Demonstrate how to use arithmetic operators, expressions and statements.
    3. Demonstrate how to use the basic control structures of sequence, selection, and repetition.
    4. Demonstrate the use of user defined methods and functions in satisfying programming objectives.
    5. Demonstrate the use of arrays and array processing.
    6. Demonstrate the use of simple searching and sorting algorithms.
    7. Demonstrate the basic object-oriented concepts of computer programming, including classes and subclasses, objects, inheritance, exception handling, graphical user interfaces using an API, and event-driven programming.
    8. Discuss database systems and database query languages.
    9. Discuss software engineering, software maintenance and software reuse.
    10. Demonstrate how to create and access data files using streams.


    COURSE CONTENT: Topical areas of study include -  

    • Variables
    • Sorting algorithms
    • Constants
    • Classes, subclasses and objects
    • Character strings
    • Inheritance
    • Arithmetic operators
    • Exception handling
    • Expressions and statements
    • Graphical user interfaces using an API
    • Repetition techniques
    • Event-driven programming
    • Methods and functions
    • Database systems
    • Array processing
    • Software engineering
    • Searching algorithms
    • Accessing data files and streams
    • Query languages
    • Software maintenance
    • Software reuse

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 105 - Discrete Logic for Computers


    PREREQUISITES: CSCI 101 - Computer Science I  or (SDEV 140  and CSCI 179 )
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Fall 2020

    This course introduces students to discrete mathematical concepts including reasoning and proof, especially with the discrete phenomenon often used in the field of Computer Science. Students will learn the applicable mathematical vocabulary and its correct usage. Other topics include sets, functions, notation, proofs, proof techniques, relations, induction, counting and countability, probability, and partitions.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Interpret and write proofs, both directly and through contradiction.
    2. Apply formal logic proofs and/or informal, but rigorous, logical reasoning to real problems such as predicting the behavior of software or solving problems such as puzzles
    3. Apply proof techniques (direct proof, proof by contradiction, and induction) in the construction of a sound argument.
    4. Demonstrate usage of functions, relations and sets
    5. Explain the Pigeonhole Principle, cardinality and “countability.”
    6. Describe Boolean values and perform standard operations on them.
    7. Explain and apply de Morgan’s laws.
    8. Identify and implement logical connectives, truth tables, normal forms and validity.
    9. Discuss the concepts of digital logic: logic gates, flip-flops, counters, circuit minimization.
    10. Demonstrate different aspects of descriptive statistics, including methods of collecting data, frequency distribution, measures of central tendency, variation and position, and use of z-scores.
    11. Describe the basics of counting including counting arguments, permutations and combinations and binomial coefficients.
    12. Describe how symbolic logic can be used to model real-life situations or applications, including those arising in computing contexts such as software analysis (e.g., program correctness), database queries, and algorithms.
    13. Convert logical statements from informal language to propositional and predicate logic expressions.
    14. Describe the strengths and limitations of propositional and predicate logic.
    15. Apply the rules of inference to construct proofs in propositional and predicate logic.
    16. Explain the relationship between weak and strong induction and give examples of the appropriate use of each.
    17. Explain the basic terminology of graph theory and discuss real-world problems solvable by using graphs.


    COURSE CONTENT: Topical areas of study include -  

    • Boolean algebra
    • Descriptive statistics
    • Digital logic
    • Elementary number theory
    • Functions
    • Fundamentals of counting
    • Graph Theory
    • Predicate logic
    • Proof techniques
    • Propositional logic
    • Recurrence relations
    • Relations
    • Sets

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 179 - Computer Science Bridging Course


    PREREQUISITES: Demonstrated Readiness for College-Level Calculus and SDEV 140 - Introduction to Software Development  
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 1
    LECTURE HOURS MIN: 1
    DATE OF LAST REVISION: N/A

    Covers the additional content within the Computer Science Curriculum not already occurring in Software Development coursework. This course is required to allow students to meet the Computer Science TSAP standards for crosswalk.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Explain the parallels between ideas of mathematical and/or structural induction to recursion and recursively defined structures.
    2. Perform computations involving modular arithmetic.
    3. Calculate probabilities of events and expectations of random variables for elementary problems such as games of chance.
    4. Discuss how a problem may be solved by multiple algorithms, each with different properties.
    5. Write a program that uses file I/O to provide persistence across multiple executions.
    6. Compare alternative implementations of data structures with respect to performance.
    7. Identify common coding errors that lead to insecure programs (e.g., buffer overflows, memory leaks, malicious code) and apply strategies for avoiding such errors.
    8. Utilize a provided checklist to perform a personal code review (focused on common coding errors) on a program component.
    9. Perform a small-team code review focused on component correctness.
    10. Refactor a program by identifying opportunities to apply procedural abstraction.
    11. Analyze the extent to which another programmer’s code meets documentation and programming style standards.


    COURSE CONTENT: Topical areas of study include -  

    • Induction and Recursion
    • Modular Arithmetic
    • Programming Probabilities
    • Persistent File I/O
    • Program Performance/Efficiency
    • Error avoidance strategies
    • Personal Code Review
    • Team Code Review
    • Refactoring with Abstraction
    • Peer-review
    • Sets and Maps
    • Logic Gates

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 201 - Computer Science II


    PREREQUISITES: CSCI 101 - Computer Science I  or (SDEV 140  and CSCI 179 )
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Fall 2020

    Provides a working understanding of the fundamentals of procedural and object-oriented program development using structured, modular concepts and modern object-oriented programming languages. Reviews control structures, functions, data types, variables, arrays, and data file access methods. The course is a second level computer science course introducing object oriented computer programming, using a language such as Java or C. Object-oriented concepts studied include classes, objects, inheritance, polymorphism, operator overloading, exception handling, recursion, abstract data types, streams and file I/O. Students will explore programming concepts such as software reuse, data abstraction and event-driven programming.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Demonstrate the basic procedural concepts of computer programming through development of programs that utilize:
      1. arithmetic operators, expressions and statements,
      2. reference data types,
      3. input/output,
      4. primitive and abstract data types,
      5. selection and repetition statements,
      6. user defined methods and functions,
      7. collections including arrays, lists, vectors, stacks, and queues,
      8. streams to create and access data files, and
      9. common/standard language libraries.
    2. Demonstrate the basic object-oriented concepts of computer programming
      1. Compare and contrast functional and object-oriented programming paradigms
      2. Implement OOP constructs, including encapsulation, abstraction, inheritance, and polymorphism
      3. Utilize immutable and mutable variables in class objects
      4. Use access and visibility modifiers to secure class data and methods.
      5. diagram control flow in a program using dynamic dispatch
      6. Design and implement a simple class hierarchy using superclasses, subclasses, and abstract classes.
      7. Overload functions and operators
      8. Design and implement generic classes with templates
      9. Identify the data components and behaviors of multiple abstract data types.
      10. Apply a variety of strategies to the testing and debugging of programs.
    3. Develop Graphical User Interfaces/Event Driven Programs:
      1. Explain basic principles of computer graphics including 2D and 3D objects, transformations, clipping, windowing, rendering, lighting and ray tracing.
      2. Illustrate color models and their use in computer graphics.
      3. Write a simple application that uses a modern graphical user interface.
      4. Create an interactive program using an event-driven style.
      5. Discuss the usage of information hiding through steganography in images, messages, videos, or other media files.
    4. Discuss software engineering, software maintenance and software reuse:
      1. Illustrate the concepts of modeling and abstraction with respect to problem solving.
      2. Diagram the phases of the secure software development lifecycle (SecSDLC).
      3. Describe the concept of finite state machines
      4. Describe security as a continuous process of tradeoffs, balancing between protection mechanisms and availability.
      5. Illustrate the security implications of relying on open design vs the secrecy of design.
      6. Apply consistent documentation and program style standards
    5. Demonstrate basic concepts of networking and data communications
      1. Diagram the basic structure of the Internet.
      2. Diagram the layers of the OSI model, including associated protocols (TCP/UDP, Socket APIs, and Application Layer Protocols)
      3. Categorize the principles used for naming schemes and resource location. NC
      4. Implement a simple distributed network application.
      5. Describe security concerns in designing applications for use over wired and wireless networks.
    6. Demonstrate the principles of secure programming and design
      1. Investigate potential vulnerabilities in provided programming code.
      2. Create programs which use defensive programming techniques, including input validation, type checking, exception handling and protection against buffer overflow.
      3. Analyze the interaction between a security mechanism and its usability.
      4. Investigate potential vulnerabilities in provided programming code.
      5. Investigate common coding errors that introduce security vulnerabilities, including buffer overflows, integer errors, and memory leaks.
      6. Discuss potential errors and security implications from both strong-type and weak-type languages.
      7. Evaluate the risks in using third-party applications, software tools, and libraries.
      8. Carry out a code review on a program component using a provided security checklist.
      9. Describe potential security vulnerabilities in event-driven GUI applications.


    COURSE CONTENT: Topical areas of study include -  

    • Accessing data files and streams
    • Inheritance and Polymorphism
    • Arithmetic operators
    • Integrated Development Environments
    • Classes and objects
    • Methods and functions
    • Code Reviews
    • Security
    • Collections
    • Software engineering
    • Debugging
    • Software maintenance
    • Event-driven programming
    • Software reuse
    • Exception handling
    • Standard Library
    • Expressions and statements
    • Strings
    • Graphics and Graphical User Interfaces
    • Variables/Constants

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 202 - Data Structures


    PREREQUISITES: (CSCI 201 - Computer Science II  or ((SDEV 200 , SDEV 220 , SDEV 230 , or SDEV 240 ) AND CSCI 179 ))
    PREREQUISITES/COREQUISITE: MATH 211  or Higher

    PROGRAM: Computer Science
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Fall 2020

    Builds on the foundation of Computer Science I and II. The course provides a working understanding of the fundamentals of data structures and algorithms used in modern computer programming. Introduces a variety of data storage alternatives, including stacks, queues, linked lists, hash tables, trees and graphs. Employs the basics of algorithmic analysis, recursion, language translation and software engineering. Discusses the overview, history and comparison of programming languages, as well as virtual machines and language translation.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of the course the student will be expected to:

    1. Demonstrate with proficiency basic procedural and object-oriented concepts of computer programming.
    2. Demonstrate use of a variety of data structures, including:
      1. Stacks and queues
      2. Sets and maps
      3. Linked lists,
      4. Binary trees, AVL trees, and B-Trees,
      5. Hash tables and graphs
    3. Demonstrate fundamental computing algorithms, including:
      1. Sorting
      2. Sequential and binary searches
      3. Insertion, deletion, and balancing trees
      4. Hash tables and collision-avoidance
      5. Directed, undirected and weighted graphs
      6. In-order, depth- and breadth-first graph traversals.
      7. Recursive traversal of various data structures.
      8. Regular expressions and Regex
      9. Demonstrate basic algorithmic analysis:
      10. Analyze the performances of an algorithm with various input sizes
      11. Compare upper and average complexity bounds
      12. Differentiate best, average and worst-case behaviors
      13. Describe algorithm complexity in notation (big O, little O, omega and theta)
      14. Contrast standard complexity classes
      15. Determine empirical measurements of performance
      16. Evaluate time and space tradeoffs in algorithms
      17. Determine whether a recursive or iterative solution is most appropriate for a problem
      18. Identify a variety of real-world problems in computer science solvable using various data structures
    4. Demonstrate the effective use of software engineering principles and practices:
      1. Compare various data structures for a given problem
      2. Investigate factors other than computational efficiency that influence the choice of algorithms.
      3. Apply consistent documentation and program style standards that contribute to the readability and maintainability of software.
      4. Conduct peer code reviews (focused on common coding errors) on program components.
      5. Differentiate between program validation and verification.
      6. Investigate potential vulnerabilities in provided programming code.
      7. Use software tools to evaluate, test, and debug programs.
    5. Demonstrate the principles of secure programming and design:
      1. Investigate security vulnerabilities in various data structures
      2. Implement programs that properly handle exceptions and error conditions.
      3. Describe key terms in cryptology, including cryptography, cryptanalysis, cipher, cryptographic algorithm, and public key infrastructure.
      4. Use a cipher to encrypt plaintext into ciphertext.
      5. Describe the use of cryptographic hash functions for authentication and data integrity.
      6. Contrast symmetric and asymmetric encryption in relation to securing electronic communications and transactions.
      7. Describe security concerns in designing applications for use over networks.
      8. Illustrate secure connectivity among networked applications.
    6. Analyze the goals of parallelism and concurrency.
      1. Describe various programming constructs for synchronization.
      2. Contrast low-level data races with higher level races.
      3. Investigate methods, such as mutual exclusion, used to avoid race conditions.
      4. Discuss security vulnerabilities related to parallelism and concurrency.
    7. Discuss the history of programming languages, and be able to compare languages for features and applicability.
    8. Discuss the concept of a virtual machine and the use of intermediate languages, and/or linked libraries.
    9. Discuss interpreters, compilers, and the machine-dependent and -independent aspects of translation.


    COURSE CONTENT: Topical areas of study include -  

    • Algorithmic analysis
    • Interpreters
    • Artificial Intelligence
    • Linked libraries
    • Basic procedural concepts
    • Linked Lists
    • Compliers
    • Object-oriented programming
    • Cryptography
    • Recursion
    • Data Structures
    • Regular Expressions
    • Expert Systems
    • Security
    • Fundamental computing algorithms
    • Software engineering principles
    • Graphs
    • Trees
    • History of programming languages
    • Virtual machine
    • Intermediate languages

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 205 - Computer Organization and Architecture


    PREREQUISITES: CSCI 101 - Computer Science I  or (SDEV 140  and CSCI 179 )
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Fall, 2020

    This course introduces the concepts related to the organization and architecture of digital computers. The course begins with a discussion of data representations (fixed, floating point numbers, ASCII, Unicode, etc.), as well as arithmetic operations. The course discusses the architecture of instruction sets using both machine and assembly language. The importance of data path, timing, and control are presented. The processes of program compilation, assembly, linking and loading are covered. Considerable time is devoted to hardware-related topics such as memory, buses, peripherals, and networking. The course concludes with a presentation of advanced architectural concepts such as parallel and superscalar machines.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Describe the top-level architecture of a computer.
    2. Describe the different methods for characterizing data such as ASCII, and Unicode.
    3. Perform binary arithmetic operations using two’s complement representation.
    4. Access memory locations and input/output (I/O) devices using various addressing modes.
    5. Write code at the micro-architecture (CPU) level to implement the “fetch-execute” cycle using traps, interrupts, and other event-driven methods.
    6. Understand improvements to the traditional “fetch-execute” cycle using modern processing techniques.
    7. Discuss the differences and advantages between various microprocessor architectures.
    8. Discuss memory technology and the principles of memory access.
    9. Evaluate memory management schemes such as virtualization, caching, translation, buffering, and mapping.
    10. Explain the differences and relative advantages of serial and parallel bus architectures.
    11. Calculate the read/write times for a variety of storage and I/O devices.
    12. Describe common data integrity including detection and correction techniques.
    13. Apply the Flynn Taxonomy to characterize computer architectures.


    COURSE CONTENT: Topical areas of study include -  

    • Computer architecture
    • Data types
    • Arithmetic Operations
    • Addressing arithmetic modes
    • Memory technology
    • Access times and throughput
    • Data integrity
    • Bus architectures
    • Memory management
    • Flynn Taxonomy
    • RISC, CISC, EPIC, Multi-core, Mixed-core, and embedded systems
    • Pipelining, super pipelining, out-of-order execution, and VLIW
    • Mirroring, RAID, parity, hamming codes, vertical and cyclical redundancy checks

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 210 - Database Systems


    PREREQUISITES/COREQUISITE: CSCI 105 - Discrete Logic for Computers .

    PROGRAM: Computer Science
    CREDIT HOURS MIN: 3
    TOTAL CONTACT HOURS MIN: 3
    DATE OF LAST REVISION: Fall 2020

    The course presents the theory and practice of database systems and gives an advanced introduction into the concepts for modeling, designing, querying, and managing large and distributed databases. The emphasis will be on theoretical considerations involved in modeling data and the principles of database systems in a multi-user environment. Students will address issues associated with enterprise database processing with respect to user authentication and development in an application/internet environment.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of the course, the student will be expected to:

    1. Differentiate the use of a database from the approach of programming with data files
    2. Explain the concept of data independence and its importance in a database system.
    3. Differentiate between object-oriented, relational and other database models (structured and unstructured).
    4. Select, develop and evaluate the appropriate enterprise database architecture based on the requirements of an organization.
    5. Identify data integrity and security requirements including access control, least privilege, and database/data encryption.
    6. Demonstrate an understanding of user needs assessment for existing and future information needs
    7. Apply normalization techniques (e.g. E. F. Codd).
    8. Develop a logical/conceptual data model, including all entities, relationships, and attributes from business rules and requirements.
    9. Derive a physical design from the logical design in view of application, hardware, operating system, and network requirements.
    10. Implement user authentication, privileges and roles for major DBMSs.
    11. Process a database via SQL and application programs.
    12. Develop programs that interface with a database, implementing the insertion, retrieval, and updating of data.
    13. Assess data mining, data warehouse, and OLAP cube concepts in support of all management levels.
    14. Describe the advantages and disadvantages of central organizational control over data
    15. Explore distributed database design methods, heuristics, and design tradeoffs.
    16. Examine issues related to query execution, including optimization, transaction management, and fault tolerance.
    17. Investigate vulnerabilities and failure scenarios in database systems.
    18. Discuss ethical and privacy issues associated with database systems


    COURSE CONTENT: Topical areas of study include -  

    • Business intelligence, data warehousing and mining
    • Entity Relationship (ER) Modeling
    • Data Integrity
    • Knowledge management
    • Database administration
    • Object-oriented database
    • Database backup and recovery
    • OLAP Cube and database processing principles
    • Database connectivity
    • Performance measurement techniques
    • Database design and normalization
    • Performance tuning and query optimization
    • Database Security
    • Structured query language (SQL)
    • Database systems and data models
    • Structured/Unstructured Data
    • Distributed database & multi-user management systems
    • Transaction management and concurrency control
    • DML/DDL/DCL
    • XML/JSON Schema

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 279 - Capstone Course


    PREREQUISITES/COREQUISITE: CSCI 202 - Data Structures  

    PROGRAM: Computer Science
    CREDIT HOURS MIN: 1
    LECTURE HOURS MIN: 1
    DATE OF LAST REVISION: Fall 2020

    Prepare the student for entry into the world of Computer Science. Reviews procedures for researching a career; preparing a resume and a portfolio; interviewing; team participation; and ethical/productive job performance. Additionally, all associate degree graduates are required to complete a Technical Outcomes Assessment specific to this program. This could be in the form of an assessment exam, a national certification exam, and/or a portfolio.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Identify the career paths available to those with the program degree.
    2. List steps considered germane to successfully transferring to a senior institution.
    3. Effectively prepare for an interview, demonstrate effective behavior during the interview, questions in an interview appropriately.
    4. Explain the necessity of being an effective team player.
    5. Outline the necessity for effective communication skills and how to sharpen these skills.
    6. Describe the need for life-long learning.
    7. Practice effective time management.
    8. Demonstrate effective use of electronic presentations and create an electronic portfolio.
    9. Take required outcomes assessments.


    COURSE CONTENT: Topical areas of study include -  

    • Career paths
    • Portfolios
    • Communication skills
    • Resume and Cover Letter Development
    • Electronic presentations
    • Team Participation
    • Interviews
    • Time management
    • Life-long learning

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 281 - Special Topics


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in computer science. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 282 - Special Topics


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in computer science. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 283 - Special Topics


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in computer science. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 284 - Special Topics


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in computer science. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 285 - Special Topics


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in computer science. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 286 - Special Topics


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in computer science. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 287 - Special Topics


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in computer science. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 288 - Special Topics


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in computer science. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 289 - Special Topics


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in computer science. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 290 - Special Topics


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in computer science. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 291 - Special Topics


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in computer science. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 292 - Special Topics


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in computer science. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 293 - Special Topics


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in computer science. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSCI 294 - Special Topics


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Computer Science
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in computer science. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  


Cyber Security/Info Assur(CSIA)

  
  • CSIA 105 - Introduction to Cyber Security/Information Assurance


    PREREQUISITES: ITSP 135 - Hardware / Software Support  or (ITSP 132 - IT Support Essentials I  and ITSP 134 - IT Support Essentials II ) or NETI 104 - Introduction to Networking  or NETI 109 - Networking I  or CSCI 101 - Computer Science I  
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Fall, 2020

    The students will explore the field of Cyber Security/Information Assurance focusing on the technical and managerial aspects of the discipline. Students will be introduced to the basic terminology, concepts, and best practices of computer/network security and the roles and responsibilities of management/security personnel. The students will learn the technologies used and techniques involved in creating a secure computer networking environment including authentication and the types of attacks against an organization.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Use virtual machine technology to test security tools in a sandbox environment.
    2. Identify security threats to network services, devices, traffic and data.
    3. Use tools to secure network communications.
    4. Monitor the security infrastructure with current industry standard utilities.
    5. Discuss roles and responsibilities of information security personnel.
    6. Use cryptography and public key infrastructures to secure remote access, wireless, and virtual private networks.
    7. Implement “defense in depth” to shield against network attacks.
    8. Discuss computer forensics and incident response.
    9. Discuss basic characteristics of information.
    10. Discuss information security as it applies to application guidance, and policies.
    11. Describe the legal elements of investigative authorities in criminal prosecution, evidence collection, and evidence preservation.
    12. Understand the concepts of trust through assurance, mechanism, and policy.
    13. Understand the practical performance measures employed in designing security measures and programs.
    14. Describe and discuss administrative security procedural controls.
    15. Discuss the auditing and monitoring of security systems.


    COURSE CONTENT: Topical areas of study include -  

    • Security reviews
    • Effectiveness of security programs
    • Investigation of security breaches
    • Monitoring systems for accuracy and abnormalities
    • Privacy
    • Accountability controls
    • Audit trails and logs
    • Software design standards
    • Denial of service, spoofing, and hijacking
    • Networking
    • Defense in depth
    • Cryptography
    • Security Technologies
    • Legal, ethical and professional issues in Information Security
    • Attribution
    • Destruction of media

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 106 - Workforce Preparation: CompTIA Security+ Certification


    PREREQUISITES/COREQUISITE: CSIA 105 - Introduction to Cyber Security/Information Assurance  

    PROGRAM: Security/Information Assurance
    CREDIT HOURS MIN: 1
    LECTURE HOURS MIN: 1
    DATE OF LAST REVISION: Fall, 2020

    The workforce preparation course is focused on the CompTIA Security+ certification. Students can use this course as preparation leading to the certification or keeping the certification up to date. The preparation is designed to be a continued validation of one’s expertise and a tool to expand one’s skill set. Preparation includes practice tests and assignments based on the certification exam. Students are required to demonstrate course objectives through the appropriate certification exam preparation materials and completion of the appropriate certification exam at the end of the course. The fee for the certification exam is assessed upon enrollment in the course.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course, the student will be expected to:

    1. Apply skills necessary to prepare for workforce employment.
    2. Examine the objectives of the certification.
    3. Plan the approach to certification exam taking skills.
    4. Explore the skills required in preparation for the workforce and the certification exam.


    COURSE CONTENT: Topical areas of study include -  

    • Skills evaluation
    • Skills development
    • Workforce needs
    • Certification preparation
    • Certification objectives

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 115 - Cyber Ops


    PREREQUISITES/COREQUISITE: SVAD 111 - Linux and Virtualization Technologies Fundamentals  or CSIA 105 - Introduction to Cyber Security/Information Assurance  

    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Fall, 2020

    This course introduces the core security concepts and skills needed to monitor, detect, analyze and respond to cybercrime, cyberespionage, insider threats, advanced persistent threats, regulatory requirements, and other cybersecurity issues facing organizations. It emphasizes the practical application of the skills needed to maintain and ensure security operational readiness of secure networked systems. The skills developed in the curriculum prepares students for a career in the rapidly growing area of cybersecurity operations working in or with a security operations center (SOC) in entry-level job roles such as Security SOC Analyst and Incident Responder.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Explain role of Cybersecurity Operations Analyst.
    2. Utilize Operating Systems features needed to support cybersecurity analyses.
    3. Explain the operation of network infrastructure and classify the various network attacks.
    4. Analyze the operation of network protocols and services and use monitoring tools to identify attacks.
    5. Use various methods to prevent malicious access to computer hosts and data.
    6. Explain the impact of cryptography on network security monitoring.
    7. Explain how to investigate and evaluate endpoint vulnerabilities and network security alerts.
    8. Use virtual machines to implement, evaluate, and analyze cybersecurity threat events.
    9. Analyze network intrusion data to identify compromised hosts and vulnerabilities.
    10. Apply incident response models (CSIRSTs and NIST) to manage security incidents.
    11. Understand how a SOC team detects and responds to security incidents, and how they protect their organization’s information from modern threats.
    12. Understand further how modern organizations are dealing with detecting and responding to cybercrime, cyberespionage, insider threats, advanced persistent threats, regulatory requirements, and other cybersecurity issues facing their organizations and their customers.


    COURSE CONTENT: Topical areas of study include -  

    • Cybersecurity and the Security Operations Center
    • Protecting the Network
    • Windows Operating System
    • Cryptography and the Public Key
    • Linux Operating System
    • Infrastructure
    • Network Protocols and Services
    • Endpoint Security and Analysis
    • Network Infrastructure
    • Security Monitoring
    • Principles of Network Security
    • Incident Response and Handling

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 135 - Digital Forensics


    PREREQUISITES: (ITSP 132 ITSP 132 - IT Support Essentials I  and ITSP 134 ITSP 134 - IT Support Essentials II ) or ITSP 135 ITSP 135 - Hardware / Software Support  
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Fall 2021

    Provides students with an understanding of the detailed methodological approach to computer forensics and evidence analysis. Students will acquire hands-on experience with various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.

    MAJOR COURSE LEARNING OBJECTIVES:  

    Upon successful completion of this course the student will be expected to: 

    1. Identify the role of computer forensics in today’s world.

    2. Describe and identify the computer forensics investigation process.

    3. Describe and identify the search and seizure process.

    4. Discuss digital evidence.

    5. Identify First Responder procedures.

    6. Discuss setup and design of computer forensics labs.

    7. Analyze hard disks and file systems. 

    8. Analyze tools and techniques involved in Windows forensics.

    9. Implement data acquisition and duplication.

    10. Recover deleted files and deleted partitions.

    11. Utilize relevant software tools for forensics investigations. 



    COURSE CONTENT: Topical areas of study include -  

    • Software tools
    • Forensic processes
    • Forensic procedures
    • Incident response
    • PC hardware
    • File system architecture
    • Digital evidence, acquisition and storage
    • Windows registry
    • Legal procedures
    • Data recovery

     
    GRADING POLICY
     

    A……………90-100

    B…………….80-89

    C…………….70-79

    D……………60-69

    F…………….0-59

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 181 - Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 182 - Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 183 - Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 184 - Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 185 - Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 186 - Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 187 - Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 188 - Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 189 - Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 190 - Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 191 - Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 192 - Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 193 - Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 194 - Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 210 - Network Protocol Analysis


    PREREQUISITES: NETI 104 - Introduction to Networking  or NETI 109 - Networking I  
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Fall, 2014

    Offers in-depth coverage of all the salient models, protocols, services, and standards that govern TCP/IP and that guide its behavior on modern networks. Specific guidance is given to reinforce the concepts introduced and to help prepare students to interact with TCP/IP on the vast majority of networks in use today. As a hands-on course, students are provided first hand experience in installing, configuring, analyzing, using, and managing TCP/IP on a network. Included are case projects that pose problems and require creative solutions that should prepare students for the kinds of situations faced on a real, live network.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Develop an understanding of basic IP packet structures.
    2. Explore and explain the Data Link and Network Layer Protocols examining packet/frame types, hardware addresses, and the Neighbor Discovery Protocol.
    3. Analyze routing and routed protocols with considerations for both IPv4 and IPv6 protocols and behaviors.
    4. Examine ICMP testing and troubleshooting methods, security issues, and ICMP message types and codes.
    5. Explain how neighbor discovery works on IPv6 networks.
    6. Describe various auto-addressing schemes and mechanisms used on IPv4 and IPv6 networks.
    7. Explain key services used to resolve symbolic, human-readable network names, and addresses into machine-intelligible network addresses.
    8. Examine the common and appropriate uses of the TCP and UDP protocols.
    9. Describe issues and techniques that apply when IPv4 and IPv6 must coexist on the same networks.
    10. Examine tunneling mechanisms and protocols.
    11. Understand, plan, deploy, and use IPv6 on modern TCP/IP networks.
    12. Appraise general network security basics with a particular emphasis on IP security topics.
    13. Review key topics including perimeter security, infrastructure security, and host device security.


    COURSE CONTENT: Topical areas of study include -  

    • Headers
    • Payloads
    • ARP
    • RARP
    • IPv4
    • IPv6
    • RIPv1/ v2
    • OSPF
    • EIGRP
    • BGP
    • DHCPv4 /v6
    • APIPA
    • Host/interface address determination
    • Stateless and stateful address auto configuration
    • ISATAP
    • 6to4
    • Teredo
    • OSI Model
    • TCP/IP Model
    • WireShark
    • TCPdump
    • Nmap

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 215 - Perimeter Defense


    PREREQUISITES: NETI 115 NETI 115 - Routing and Switching   
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Fall 2021

    Provides an advanced understanding of the concepts involved in firewalls, routers, intrusion detection, intrusion prevention and Virtual Private Networks (VPNs) in relationship to the overall enterprise network strategy. Students will learn advanced network security installation techniques; advanced network security troubleshooting; and how to make intelligent choices in firewall and router technology. Additionally, the students will have a comprehensive look at the use of routers and switches with other network security components in configuring De-Militarized Zones (DMZ) and VPNs for optimal perimeter security. Students will study such topics as packet filtering, proxy servers, authentication, encryption, and securing host computers.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to: 

    1. Explain network threats, mitigation techniques, and the basics of securing a network.

    2. Secure administrative access on the network and routers with standard Authorization, Authentication, and Accounting principles.

    3. Implement firewall and proxy server technologies to secure the network perimeter.

    4. Configure Intrusion Prevention/Detection Systems to mitigate attacks on the network. 

    5. Demonstrate understanding of packet filtering

    6. Describe LAN security considerations and implement endpoint and Layer 2 security features.

    7. Describe methods for protecting data confidentiality, integrity, and availability. 

    8. Demonstrate understanding of wireless networks and the security risks that a wireless environment will bring to an organization.

    9. Implement secure virtual private networks.

    10. Create and implement a comprehensive security policy.

    11. Implement the use of Network Address Translation to meet the security needs of an enterprise.

    12. Explain the importance of ongoing security management.



    COURSE CONTENT: Topical areas of study include -  

    • Firewall
    • DMZ
    • Intrusion Prevention Detection Systems
    • Security policies and procedures
    • Authorization, Authentication, and Accounting
    • LAN Security
    • NAT
    • VPN
    • WLAN
    • Confidentiality, Integrity, and Availability
    • Packets
    • Filtering

     
    GRADING POLICY
    A……………90-100

    B…………….80-89

    C…………….70-79

    D……………60-69

    F…………….0-59

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 225 - Ethical Hacking


    PREREQUISITES: CSIA 105 - Introduction to Cyber Security/Information Assurance  and SVAD 111 - Linux and Virtualization Technologies Fundamentals  
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Fall, 2020

    Students will learn threats and defense mechanisms; web applications and data servers; Linux, Macintosh and mobile systems; and secure network infrastructures. Hands-on practical application will be included.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Demonstrate use of resources to perform system footprinting and enumeration.
    2. Discuss the characteristics of Trojans, Viruses and worms.
    3. Use sniffing tools to glean information about a network and demonstrate how social engineering and phishing work.
    4. Defend against denial of service attacks and vulnerabilities associated with buffer overflows.
    5. Hack Web servers and database servers and use password-cracking techniques.
    6. Identify and protect against Web application vulnerabilities.
    7. Hack Linux, Macintosh, routers, cable modems, firewalls, mobile devices, Bluetooth devices, RFID and USB devices.
    8. Determine security policies for Linux, Macintosh, routers, cable modems, firewalls, mobile devices, Bluetooth devices, RFID and USB devices
    9. Hack wireless networks and discuss physical security.
    10. Evade IDS and Firewalls and detect the existence of honey pots.
    11. Apply data security and controls and use basic cryptography for secure communications.


    COURSE CONTENT: Topical areas of study include -  

    • Footprinting
    • Enumeration
    • Threats and defense mechanisms
    • Web applications
    • Data servers
    • Linux, Macintosh and mobile systems
    • Secure network infrastructure

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 235 - Advanced Digital Forensics


    PREREQUISITES: SVAD 111 - Linux and Virtualization Technologies Fundamentals  and CSIA 105 - Introduction to Cyber Security/Information Assurance  and ITSP 135 - Hardware / Software Support  or (ITSP 132 - IT Support Essentials I  and ITSP 134 - IT Support Essentials II ).
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Fall, 2020

    Provides students with practical comprehension of the process and ethics within digital forensics and evidence analysis. Students will acquire hands-on experience with forensic investigation techniques and standard tools, Linux and Windows, necessary to successfully carry-out a digital investigation. This forensics course gives students the skills necessary to identify, track, and process evidence, excel in digital evidence acquisition/handling, forensic tools (PTK, FTK, Kali tools, and more) and lawful analysis in a forensically sound manner. Successful students of this course are able to approach a mock crime scene as a final exam and process it for a mock court of law as a case study milestone objective. The entire portfolio of the case such as, chain of custody forms, prelim analysis, notes, photos, forensics field kit tools used, and more, are the final submission, along with a visual score of how and in what order the student processed the scene.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Identify the role of computer forensics in today’s world.
    2. Describe and identify the computer forensics investigation process from gathering the evidence through becoming an expert witness.
    3. Describe and identify the search and seizure process.
    4. Discuss digital evidence.
    5. Identify First Responder procedures.
    6. Discuss setup and design of computer forensics labs.
    7. Analyze hard disks and file systems.
    8. Analyze tools and techniques involved in Windows, Linux, Mac, and cloud forensics.
    9. Implement data acquisition and duplication.
    10. Recover deleted files and deleted partitions.
    11. Utilize relevant software tools for forensics investigation management
    12. Utilize relevant software tools for analyzing logs, events, images, network traffic, mobile devices and email.


    COURSE CONTENT: Topical areas of study include -  

    • Software tools
    • Forensic processes and procedures
    • Crime investigation and reporting
    • Incident response
    • Hardware
    • Digital forensics lab setup
    • File system architecture
    • Digital evidence, acquisition and storage
    • Windows registry
    • Legal procedures
    • Data recovery
    • Acquisition tools

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 245 - Cryptography/Secure Coding Theory and Application


    PREREQUISITES/COREQUISITE: SDEV 140 - Introduction to Software Development .

    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Fall, 2014

    Students will learn about cryptography as an indispensable resource for implementing strong security in real-world applications. Students will learn why conventional crypto schemes, protocols, and systems are vulnerable. The foundations of cryptography using simple mathematical terms including probability, information theory, computational complexity, number theory, and algebraic approaches will be covered. The students will assess the strength, security, and efficiency of encryption standards and use formal methods to assess their levels of security and efficiency. Discussions on application of security measures and the challenges associated with each will be covered. Part of a layered security approach begins with implementing good coding practices. Students will cover the steps for writing, testing, and deploying robust and security-enhanced code. Subjects covered include threat modeling, secure code lifecycle, current tools used in the industry, and software maintenance and incident preparedness.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Discuss and demonstrate classical encryption techniques and ciphers.
    2. Discuss the basic concepts of probability, random variables and their probability distribution, information theory, and redundancy in natural languages.
    3. Discuss and demonstrate different types of algorithms used in coding.
    4. Discuss and demonstrate the use of various private and public key technologies.
    5. Discuss everyday uses of encryption.
    6. Demonstrate authentication systems.
    7. Discuss various types of Cryptographic Attacks.
    8. Understand the importance of information security in software development.
    9. Discuss current industry standards, tools, and security practices in software development.
    10. Examine the principles and goals of secure and quality coding.
    11. Discuss and design an application guide.
    12. Understand, analyze, and interpret customer requirements.
    13. Create design diagrams or artifacts based off of customer requirements.
    14. Analyze design diagrams and artifacts for weaknesses and apply appropriate security measures.
    15. Apply proper secure coding and testing techniques.
    16. Discuss software maintenance and incident preparedness.


    COURSE CONTENT: Topical areas of study include -  

    • Classical encryption techniques
    • Types of ciphers
    • Logons, logins and passwords
    • Probability, random variables, redundancy in natural languages
    • Breaking ciphers
    • Algorithms used in coding
    • Public and private key systems
    • Cryptographic attacks
    • Authentication systems
    • Current industry secure coding standards
    • Application guide design
    • Secure and quality coding principles
    • Customer needs assessment
    • Design diagrams and artifacts
    • Code testing techniques
    • Error handling
    • Application logging
    • Threat modeling
    • Software maintenance
    • Incident preparedness
    • Source Code Control
    • Kerberos, SSH, Radius and TACACS+

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 260 - Business Continuity in an Information World


    PREREQUISITES: CSIA 105 - Introduction to Cyber Security/Information Assurance  or IT Chair Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 3
    DATE OF LAST REVISION: Spring, 2020

    Students will learn principles of incident response and disaster recovery. Identification of vulnerabilities and appropriate countermeasures to prevent and mitigate risks to an organization will be discussed. Students will learn risk assessment, incident response, contingency planning, and prioritizing systems for disaster recovery. The importance of management’s roles and interaction with other organizational members will be discussed. Students will learn how to create a hardened network by developing system specific plans for the protection of intellectual property, the implementation of access controls, and patch/change management. Students will gain an understanding of information assurance including the governing rules and guidelines.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Explain network threats, mitigation techniques, and the basics of securing a network.
    2. Describe methods for protecting data confidentiality, integrity, and availability.
    3. Develop and demonstrate an understanding of incident response (human and non-human) specific to an organization.
    4. Describe legal and ethical issues concerning disaster recovery and business continuity planning.
    5. Describe assets to be included in planning.
    6. Describe the handling process of disaster recovery, business continuity and security policy planning documentation, and schedule maintenance of documents.
    7. Describe the process of building redundancy into systems for disaster recovery ensuring business continuity.
    8. Develop maintenance schedule for equipment and assessment of equipment needs for disaster preparedness.
    9. Create a disaster recovery plan to include a comprehensive security policy; the steps and conditions that would initiate the plan becoming active; and the life of the plan and the cross over for business continuity.
    10. Demonstrate how to implement, test and assess a disaster recovery plan and to secure equipment and information.


    COURSE CONTENT: Topical areas of study include -  

    • Information security
    • Security policies and procedures
    • Business continuity
    • Risk management
    • Information assurance
    • Confidentiality, Integrity, and Availability
    • Authorization, Authentification, and Accounting
    • Incident response
    • Disaster recovery
    • Maintenance
    • Documentation
    • Legal and ethical issues
    • Redundancy

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 281 - Advanced Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 282 - Advanced Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 283 - Advanced Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 284 - Advanced Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 285 - Advanced Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 286 - Advanced Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 287 - Advanced Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 288 - Advanced Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 289 - Advanced Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 290 - Advanced Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 291 - Advanced Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 292 - Advanced Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 293 - Advanced Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSIA 294 - Advanced Special Topics in Cyber Security/Information Assurance


    PREREQUISITES: Program Advisor Approval.
    PROGRAM: Cyber Security/Information Assurance
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in cyber security/information assurance with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  


Central Service Tech (CSTC)

  
  • CSTC 102 - Surgical Instrumentation


    PREREQUISITES: Demonstrated competency through appropriate assessment or earning a grade of “C” or better in or ENGL 093 - Introduction to College Writing  andENGL 083 - Reading Strategies for College  or ENGL 095 - Integrated Reading and Writing , or ENGL 075 - Co-Requisite Integrated Reading & Writing .
    COREQUISITES: CSTC 105 - Fundamentals of Central Service Technician Skills  
    PROGRAM: Healthcare Specialist
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Spring, 2019

    Prepares the student to identify surgical instruments by category, type and use. Emphasis on quality assurance enables the student to inspect, assemble and prepare instrumentation for packaging.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course, the student will be expected to:

    1. Identify basic surgical instruments by type, function, and name.
    2. Understand the importance of properly inspecting surgical instruments. Inspect surgical instruments.
    3. Describe the use of surgical instruments.
    4. Perform instrument sharpness testing.
    5. Differentiate between reusable and Discuss the reuse of single use medical devices.
    6. Demonstrate the proper procedure for assembling instrument/procedure trays.
    7. Differentiate between various types of specialty instrumentation utilized in operating rooms.


    COURSE CONTENT: Topical areas of study include -  

    • Categories of surgical instruments
    • Types of surgical instruments
    • Quality assurance and inspection of surgical instruments
    • Instrument damage from solutions and chemicals
    • Regulations regarding instrument reuse

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSTC 105 - Fundamentals of Central Service Technician Skills


    PREREQUISITES: HLHS 101 - Medical Terminology  and CSTC 102 - Surgical Instrumentation  
    COREQUISITES: HLHS 101 - Medical Terminology  and CSTC 102 - Surgical Instrumentation  
    PROGRAM: Healthcare Specialist
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Fall, 2019

    Introduce the field of central service and the personnel within the department. The principles and importance of the flow of material are determined. The student will learn about environmental control factors affecting the central service department. The student will differentiate between equipment management systems and compare out-sourcing and insourcing. Various types of purchasing issues and inventory methods will be explored.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course, the student will be expected to:

    1. Describe the functions of the central supply department.
    2. Differentiate between RCST and CRCST
    3. Trace the flow of materials
    4. Examine environmental control factors
    5. Use proper medical terminology
    6. Practice total quality management
    7. Practice safety and risk management
    8. Practice inventory management
    9. Apply information technology
    10. Differentiate between management systems
    11. Examine technology management
    12. Analyze inventory methods
    13. Discuss storage and inventory of sterile supplies


    COURSE CONTENT: Topical areas of study include -  

    • Introduction to central service
    • Regulation and recommended practices
    • Medical terminology
    • Safety and risk management
    • Quality assurance and management
    • Outdates
    • Par levels
    • Sterile packaging and storage
    • Point of use systems
    • Exchange carts

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSTC 107 - Applications of Central Service Technician Skills


    PREREQUISITES: CSTC 102 - Surgical Instrumentation  and CSTC 105 - Fundamentals of Central Service Technician Skills  
    PROGRAM: Healthcare Specialist
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Fall, 2018

    Emphasis on the practice of high and low sterilization methods. Students will differentiate between the various sterilization methods. Students will learn the protocol for control infection and the spread of blood borne pathogens.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course, the student will be expected to:

    1. Differentiate between the various sterilization methods.
    2. Compare the different solutions used to sterilize.
    3. Identify the procedure for sterilizing instruments after exposure to infectious diseases.
    4. List steam, gas, and chemical sterilization components.
    5. Define accepted processes for disinfection of equipment.
    6. Differentiate between sterilization and disinfection.
    7. Recognize the importance of sterile technique in the OR.
    8. Discuss the procedure for loading and operating Washer /sterilizer.
    9. Analyze the effectiveness of various types of transfer systems used in central processing departments.
    10. Demonstrate the process of cleaning patient care equipment.
    11. Demonstrate various techniques for wrapping packages.
    12. Recognize the importance of microbiology for the central processing technician.


    COURSE CONTENT: Topical areas of study include -  

    • Dry heat sterilization
    • Pick sheets
    • Steam sterilization
    • Distribution
    • Gas sterilization
    • Record keeping
    • Chemical sterilization
    • Tracking systems
    • Ultrasonic cleaner
    • Packaging techniques
    • Disinfection
    • Pouches
    • Aseptic Technique
    • Flat wraps
    • Drapes
    • Rigid containers
    • Blood borne pathogens
    • Linen folding

     
    Course Addendum - Syllabus (Click to expand)  

  
  • CSTC 108 - Clinical Experiential Seminar


    PREREQUISITES: CSTC 102 - Surgical Instrumentation , CSTC 105 - Fundamentals of Central Service Technician Skills , CSTC 107 - Applications of Central Service Technician Skills  
    PROGRAM: Healthcare Specialist
    CREDIT HOURS MIN: 5.5
    LECTURE HOURS MIN: 0.5
    INTERNSHIP/EXTERNSHIP HOURS MIN: 25
    DATE OF LAST REVISION: Fall, 2019

    Allows the student the opportunity to complete practical hours in a Central Processing department. Prepares and provides the students with the hours needed to take the International Association of Healthcare Central Service Material Management (IAHCSMM) Certification Exam.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course, the student will be expected to:

    1. Discuss the responsibilities of the central process technician’s management of patient care equipment
    2. Understand the proper procedures for assembling and testing patient care equipment
    3. Demonstrate proper cleaning of instruments and equipment by manual and mechanical processes.
    4. Prepare equipment for terminal cleaning in a washer/sterilizer.
    5. Demonstrate proper use of sterilizers including high temperature, low temperature, and point of use systems.
    6. Wrap and package instrument trays
    7. Demonstrate the proper handling of sterile supplies
    8. Perform basic packaging procedures for peel pouches and flat wrapping materials Understand basic information about packaging and storage of sterile supplies.
    9. Explain the various inventory replenishment systems used by the central process. Define the term universal precautions and review its role in preventing the transmission of infectious organisms.
    10. Discuss the advantages and disadvantages of purchase, rent, or loan options for patient care equipment.


    COURSE CONTENT: Topical areas of study include -  

    • Care of patient equipment
    • General cleaning
    • Wrapping packages
    • Assemble instrument and procedure trays
    • Sterilization
    • Storage of clean and sterile supplies
    • Linen folding
    • Case Carts
    • Distribution
    • Universal precautions

     

    Ivy Tech cannot guarantee that any student will pass a certification or licensing exam. The goal of providing a certification exam studies class is to assist you in understanding the material sufficiently to provide a firm foundation for your studies as you prepare for the exam.

    Course Addendum - Syllabus (Click to expand)  


Data Analytics (DBMS)

  
  • DBMS 110 - Introduction to Data Analytics


    PREREQUISITES: Demonstrated readiness for college-level English and demonstrated readiness in QUANT MATH or STEM MATH - Route 2.
    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Fall, 2020

    Introduces students to the basic concepts of databases including the types of databases, the general database environment, and the importance of data to the business world. Discussion with hands-on activities will include database design, normalization of tables, and development of tables, queries, reports, and applications. Students will be familiarized with use of the ANSI Structured Query Language. Discussions will include database administration and data maintenance. Students will be introduced to data concepts such as data warehousing, data mining, data visualization, data analysis, and big data. Students will be required to demonstrate skills such as team building, work ethic, communications, documentation, and adaptability.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Define data and evaluate its need for decision-making in a business setting.
    2. Identify, define or describe the types and nature of databases in a business setting.
    3. Compare and contrast the general structure and organization of relational, hierarchical, and network database structures.
    4. Demonstrate an understanding of the relational data model.
    5. Given a scenario, plan, design, create and modify a database schema.
    6. Document a database by creating entity-relationship diagrams (ERDs), describing the field names, field types, and relationships among tables.
    7. Demonstrate an understanding of normalization techniques in the design of databases utilizing 1NF, 2NF, & 3NF.
    8. Define and describe higher normal forms.
    9. Discover unstructured data techniques including Key-pair and JSON.
    10. Retrieve, insert, update, and manipulate data using SQL commands.
    11. Define stored procedures, triggers, views and functions.
    12. Identify data integrity and security requirements.
    13. Discuss the concepts and use of big data, data warehousing, and data mining.
    14. Discuss the use and implementation of distributed database systems.
    15. Explore job opportunities in data analytics.


    COURSE CONTENT: Topical areas of study include -  

    • Creating and Managing Data
    • Multiple Table Queries
    • Introduction to Database Management
    • Database Design Methodology
    • Database Design Normalization
    • Data Security and Integrity
    • ANSI Structured Query Language (SQL)
    • Database Manipulation Language (DML)
    • Database Definition Language (DDL)
    • Business Intelligence, Data Warehousing and Mining
    • Data Sources & Streams
    • Relational Algebra
    • 1NF, 2NF, 3NF, and BCNF
    • Primary and Foreign Key Relationships
    • Key-pair and JSON

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 120 - Database Server Installation and the Virtual Environment


    PREREQUISITES/COREQUISITE: DBMS 110 - Introduction to Data Analytics  and ITSP 135 - Hardware / Software Support   or (ITSP 132 - IT Support Essentials I  and ITSP 134 - IT Support Essentials II )

    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Spring, 2014

    Introduces students to terminology, concepts, theory, and practice of installing, implementing, and maintaining a database server. Discussion will include the relationships between network servers and database servers. Students will explore server virtualization and using data servers in virtual environments. Students will be introduced to database and database server security concepts.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Demonstrate the ability to install/create a virtual server for a database management system.
    2. Explain the concepts of server, network, and storage virtualization.
    3. Discuss the advantages and disadvantages of server virtualization.
    4. Identify the software components required for an installation such as applications, drivers, libraries, and supporting utilities.
    5. Identify hardware requirements for an installation - storage space, memory, processor speed.
    6. Install and configure a database management system within a virtual environment.
    7. Import, Export and Replicate a virtual server instance between multiple virtual environments.
    8. Discuss the considerations for installing updates and patches to the server and the virtual environment.
    9. Implement a backup and recovery strategy for the virtual environment.
    10. Discuss security and licensing issues related to virtualized systems.


    COURSE CONTENT: Topical areas of study include -  

    • Virtualization
    • Virtual Environment Installation
    • Network Configuration
    • Storage Allocation
    • Hardware requirements
    • Software Requirements
    • Operating System Requirements
    • Storage Requirements
    • Device Drivers
    • Performance Monitoring
    • Oracle Database Server
    • Microsoft SQL Server
    • Virtual Environments
    • Software Licensing
    • Version Control
    • Updates and Patches
    • Backup and Recovery
    • Access Control

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 130 - Data Management using Structured Query Language


    PREREQUISITES: DBMS 110 - Introduction to Data Analytics .
    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Fall, 2020

    Students are introduced to Structured Query Language (SQL) which is a database computer language used to manage, query, retrieve and manipulate data. Students are introduced to SQL as a high level tool in the management of data in client and server database environments. Students will use relational database management systems to develop SQL skills in a lab environment.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be able to:

    1. Discuss procedural versus declarative languages.
    2. Utilize SQL to identify and describe the structure and contents of a database.
    3. Design DDL Statements to Create and Manage Tables.
    4. Implement keys and constraints to ensure data and referential integrity.
    5. Utilize SQL DML commands to insert, update, and delete data.
    6. Utilize SQL commands to retrieve data from single and multiple tables.
    7. Employ Set Operators to combine the results of multiple queries.
    8. Design and execute table joins and aggregate functions.
    9. Modify SQL commands to restrict and sort data.
    10. Use single-row and multiple-row subqueries to improve query performance.
    11. Differentiate between Single-Row and Multi-Row functions.
    12. Develop and alter stored procedures and user-defined functions (UDFs).
    13. Demonstrate how to extract, transform, and load data into various data systems.
    14. Compare performance and usage of relational vs. big data and NoSQL systems.
    15. Implement and utilize scripts in order to declare and enumerate schema objects.


    COURSE CONTENT: Topical areas of study include -  

    • Define a database using SQL
    • Data Types
    • DDL - Database Design Language
    • Conditional Expressions
    • DML - Database Manipulation Language
    • Common Table Expressions (CTS’s)
    • Data and Referential Integrity
    • DCL - Database Control Language
    • Database Manipulation
    • SQL SELECT statements
    • Single and multiple-table queries
    • Aggregate Functions
    • Joins - Unions, Left, Right, Inner, Outer
    • Indexes
    • Views
    • Synonyms
    • Transactions
    • Nested Queries
    • Normalization
    • Big Data

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 131 - Workforce Preparation: Oracle SQL Foundations Certification


    PREREQUISITES/COREQUISITE: DBMS 130 - Data Management using Structured Query Language  

    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 1
    LECTURE HOURS MIN: 1
    DATE OF LAST REVISION: Fall, 2020

    The workforce preparation course is focused on the Oracle SQL Foundations certification. Students can use this course as preparation leading to the certification or keeping the certification up to date. The preparation is designed to be a continued validation of one’s expertise and a tool to expand one’s skill set. Preparation includes practice tests and assignments based on the certification exam. Students are required to demonstrate course objectives through the appropriate certification exam preparation materials and completion of the appropriate certification exam at the end of the course. The fee for the certification exam is assessed upon enrollment in the course.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course, the student will be expected to:

    1. Apply skills necessary to prepare for workforce employment.
    2. Examine the objectives of the certification objectives.
    3. Plan the approach to certification exam taking skills.
    4. Explore the skills required in preparation for the workforce and the certification exam.


    COURSE CONTENT: Topical areas of study include -  

    • Skills evaluation
    • Skills development
    • Workforce needs
    • Certification preparation
    • Certification objectives

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 150 - Database Administration


    PREREQUISITES: DBMS 110 - Introduction to Data Analytics  
    PREREQUISITES/COREQUISITE: SVAD 111 - Linux and Virtualization Technologies Fundamentals  

    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Fall, 2020

    Introduces program applications in a database environment with emphasis on installing, configuring, modifying, and maintaining the database by means of structured query language and Enterprise Manager. Students will discuss data structures; indexed and direct file organizations; models of data, including hierarchical, network and relational; storage philosophies, data administration and analysis; design; and implementation.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Describe database architecture.
    2. Perform an installation and configuration of a database.
    3. Configure middle tier services.
    4. Configure and manage the database storage structures.
    5. Create and administer user accounts.
    6. Perform basic backup and recovery of a database.
    7. Create and implement a plan to manage users and schemas.
    8. Construct and implement a plan for the management of data and concurrency.
    9. Perform administration and monitoring of undo data.
    10. Analyze and monitor performance using administration tools to tune the database configuration.
    11. Use the database diagnostic monitor.
    12. Describe concepts relating to database security.


    COURSE CONTENT: Topical areas of study include -  

    • Structured Query Language SQL
    • Database space requirements
    • Database management
    • Database Components and Architecture
    • Installation and Configuration
    • Network Environment Configuration
    • Database Creation and Configuration
    • Database Encryption
    • Database Storage and Schema Objects
    • File System Encryption
    • Moving Data
    • Communication Encryption
    • Database Instance
    • Transaction Commit and Undo
    • Data Concurrency
    • Backup and Recovery
    • Security and Auditing
    • Database, Table, and Record Locking
    • Database Compression
    • Distributed and Fragmented Databases
    • Security Roles and Permissions

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 151 - Workforce Preparation: Oracle Administration I Certification


    PREREQUISITES/COREQUISITE: DBMS 150 - Database Administration  

    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 1
    LECTURE HOURS MIN: 1
    DATE OF LAST REVISION: Fall, 2020

    The workforce preparation course is focused on the Oracle Administration I certification. Students can use this course as preparation leading to the certification or keeping the certification up to date. The preparation is designed to be a continued validation of one’s expertise and a tool to expand one’s skill set. Preparation includes practice tests and assignments based on the certification exam. Students are required to demonstrate course objectives through the appropriate certification exam preparation materials and completion of the appropriate certification exam at the end of the course. The fee for the certification exam is assessed upon enrollment in the course.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course, the student will be expected to:

    1. Apply skills necessary to prepare for workforce employment.
    2. Examine the objectives of the certification objectives.
    3. Plan the approach to certification exam taking skills.
    4. Explore the skills required in preparation for the workforce and the certification exam.


    COURSE CONTENT: Topical areas of study include -  

    • Skills evaluation
    • Skills development
    • Workforce needs
    • Certification preparation
    • Certification objectives

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 160 - Data Visualization and Analysis


    PREREQUISITES: Demonstrated readiness for college-level English and (INFM 109 - Informatics Fundamentals  or BOAT 218 - Microsoft Excel  or ADMF 205 - Sensors in Manufacturing  or INDT 206 - Programmable Automation Controls II  or PAET 222 - Precision Agriculture Applications of Geographic Information Systems )
    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 3
    LECTURE HOURS MIN: 2
    LAB HOURS MIN: 2
    DATE OF LAST REVISION: Fall, 2020

    Data Visualization and Analysis will introduce students the concepts and tools used to visualize and analyze data. Students will connect to data stored in databases and spreadsheets, use data visualization software to gather, organize, categorize, and visualize data. Students will identify patterns in data through the creation of various charts and tables.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. Identify and describe fundamental design principles and various types of data visualization.
    2. Identify and describe best practices in data visualization.
    3. Identify and describe the business value and features of data visualization tools.
    4. Connect to and prepare data; construct visualizations by creating charts, heat maps, tables, and scatter plots.
    5. Use predefined calculations such as basic arithmetic calculations, custom aggregations and ratios, date math, and quick table calculations.
    6. Practice validation and management of data within workbooks and dashboards.
    7. Demonstrate how to connect to data using external data sources.
    8. Enhance and create visualizations to demonstrate a problem or situation using predefined datasets.
    9. Identify sources of data including; institutional knowledge, Customer Relationship Management applications, transaction data, social media, and marketing sources.


    COURSE CONTENT: Topical areas of study include -  

    • Spreadsheets
    • Key Design Principles
    • Data Validation
    • Conditional Formatting
    • Data Analysis
    • Pivot Tables and Charts
    • Data Visualization
    • Data Preparation and Presentation
    • Data Collection and Processing
    • Data Visualization Dashboards
    • Color Theory

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 181 - Special Topics in Database Management and Administration


    PREREQUISITES: Program Advisor Approval
    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory database management and administration with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 182 - Special Topics in Database Management and Administration


    PREREQUISITES: Program Advisor Approval
    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory database management and administration with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 183 - Special Topics in Database Management and Administration


    PREREQUISITES: Program Advisor Approval
    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory database management and administration with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 184 - Special Topics in Database Management and Administration


    PREREQUISITES: Program Advisor Approval
    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory database management and administration with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 185 - Special Topics in Database Management and Administration


    PREREQUISITES: Program Advisor Approval
    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory database management and administration with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 186 - Special Topics in Database Management and Administration


    PREREQUISITES: Program Advisor Approval
    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory database management and administration with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 187 - Special Topics in Database Management and Administration


    PREREQUISITES: Program Advisor Approval
    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory database management and administration with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 188 - Special Topics in Database Management and Administration


    PREREQUISITES: Program Advisor Approval
    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory database management and administration with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 189 - Special Topics in Database Management and Administration


    PREREQUISITES: Program Advisor Approval
    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory database management and administration with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 190 - Special Topics in Database Management and Administration


    PREREQUISITES: Program Advisor Approval
    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory database management and administration with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

  
  • DBMS 191 - Special Topics in Database Management and Administration


    PREREQUISITES: Program Advisor Approval
    PROGRAM: Data Analytics
    CREDIT HOURS MIN: 1 CREDIT HOURS MAX: 3
    LECTURE HOURS MIN: 1 LECTURE HOURS MAX: 3
    LAB HOURS MIN: 0 LAB HOURS MAX: 4
    DATE OF LAST REVISION: Spring, 2014

    Discusses topics of current interest in introductory database management and administration with emphasis on the application of information technology skills during lab time. Identifies and offers various special topics during each term under this course number.

    MAJOR COURSE LEARNING OBJECTIVES: Upon successful completion of this course the student will be expected to:

    1. To be determined by the nature of the special topic.


    COURSE CONTENT: Topical areas of study include -  

    • To be determined by the campus offering this special topic class.

     
    Course Addendum - Syllabus (Click to expand)  

 

Page: 1 <- 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12Forward 10 -> 23