Part-time Courses - Networking
Click on the course code or title below for a full description of the course. If available for registration, clicking on "Details" in the Status column will open a new browser tab or window in the Student Portal.
|Course #||Courses||Length (Hours)||Distance||Status|
|OLRN8230||Ethical Hacking and Network Defense
Description: This course prepares students to assess and then correct the vulnerabilities present within information systems. Students learn who an ethical hacker is, why they are important to protecting corporate and government data from cyber-attacks and about the tools and penetration testing methodologies used by ethical hackers. Systems are also investigated.
|OLRN8250||Linux, Firewalls and VPN's
Description: This course explores Unix, Unix-like OSs, firewalls, and VPNs. Introducing students to the basic concepts of Unix/Linux, different file systems, editors, differences between Linux distributions, creating users, permissions, package managers, man pages, and other places to find help. This course also explores network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Students focus on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems.
|OLRN8300||Network Security and Penetration Testing
Description: Students examine the realm of network security, spotlighting the latest threats and vulnerabilities. The students address how and why people attack computers and networks--equipping them with the knowledge and techniques to successfully consider methods of combatting hackers.
|OLRN8290||Wireless and Mobile Device Security
Description: Students explore the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, the student discusses risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. Students will look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.
Description: You'll learn how wireless works, how wireless devices connect to networks, and how to build and connect to your own wireless network. We'll also explore wireless standards, wireless security, satellite Internet and cellular phone technology, as well as the future of wireless.
Contacts for Networking.