Duration: 8 weeks, 56 hours
Project will be written by the end of the course.
Some of the standard concepts covered in these classes are as follows:
List of Common Courses
1. Computer Networks
The fundamentals of networking are covered. Students gain general knowledge of electronic data communication, industry terminology, common equipment, and standard hardware and software requirements. Topics of discussion include:
2. Wireless Networking
Although learning the basics of computer networking is necessary to advance, the real benefits come with practice, and a wireless networking course provides the practical experience students need to prepare for a job in the field. During this class, students will gain knowledge of the best practices for working with wireless networks while utilizing their skills to design, operate and troubleshoot a network of their own. Additional elements discussed include IP infrastructure and the considerations of wireless security.
3. Computer Forensics
Computers store countless amounts of data and personal information, and it may be necessary to obtain this information from someone else's computer for a variety of reasons. The computer forensics course educates students on the history of computer forensics and the proper methods for conducting computer forensic investigations. Focus is placed on tools that can be utilized during the investigation process, data recovery techniques, types and ages of operating systems and basic ethical considerations.
4. Network Security
Security is crucial for wired and wireless networks, so this course covers several aspects of security and, in some programs, prepares students for network security certification. Upon completion, individuals are better equipped for their careers because they gain hands-on experience with the equipment used to secure various types of networks on different operating systems and analyzing potential security risks. Focus is placed on products available to increase security, the impact of security on clients' businesses and the principles of risk and authentication.