Part-time Courses - Networking
Click on the course code or title below for a full description of the course. If available for registration, clicking on "Details" in the Status column will open a new browser tab or window in the Student Portal.
|Course #||Courses||Length (Hours)||Distance||Status|
|OLRN8230||Ethical Hacking and Network Defense
Description: This course prepares students to assess and then correct the vulnerabilities present within information systems. Students learn who an ethical hacker is, why they are important to protecting corporate and government data from cyber-attacks and about the tools and penetration testing methodologies used by ethical hackers. Systems are also investigated.
|OLRN8250||Linux, Firewalls and VPNs
Description: This course explores Unix, Unix-like OSs, firewalls, and VPNs. Introducing students to the basic concepts of Unix/Linux, different file systems, editors, differences between Linux distributions, creating users, permissions, package managers, man pages, and other places to find help. This course also explores network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Students focus on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems.
|OLRN8300||Network Security and Penetration Testing
Description: Students examine the realm of network security, spotlighting the latest threats and vulnerabilities. The students address how and why people attack computers and networks--equipping them with the knowledge and techniques to successfully consider methods of combatting hackers.
|OLRN8290||Wireless and Mobile Device Security
Description: Students explore the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, the student discusses risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. Students will look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.
Description: Wireless networking is one of the fastest growing segments of the computer industry. Every electronic device seems capable of wireless connections these days: computers, handhelds, cell phones , and even digital cameras are all capable of transmitting without a tether. To many people, those wireless connections are nothing short of technical wizardry. This course will remove the mystery and give you a thorough understanding of this fascinating and lucrative technology.
Contacts for Networking.