Course Student Learning Outcomes
Computer, Software, Networking, Information Technology
ITC 101- IT Support
- Describe the essential operation of Windows and Linux systems.
- Define wireless networking and the process of computer assembly.
- Apply appropriate processes to identify problems, troubleshoot technical issues, and implement solutions.
- Describe network services, security, and infrastructure used in business networks.
- Select appropriate IT career paths based on interests, capabilities, and career goals.
ITC 111- Scripting for Security
- Use Python to create, test and debug simple scripts (e.g., to automate system administration tasks).
- Use program control flow (Boolean and conditional logic) and loop control structures (while loops, for loops, and iteration).
- Explain the type of variable, data types, functions, File I/O and error-handling via exceptions found in Python
- Solve problems by creating fully functional scripts.
- Employ shared development skills by development of scripting application in a team environment.
- Create an effective presentation to communicate aspects of application development.
ITC 201- Virtualization and Cloud Computing Security
- Configure and test hardware and software in a virtual environment, including a variety of virtual systems.
- Incorporate virtual networks and virtual storage into a secure network administration plan.
- Secure a virtual environment.
- Create and manage a set of virtual machines and configure monitoring, balancing, and automation.
- Distinguish the components of cloud infrastructures, services, and deployment models.
- Using a virtual environment, build a cloud infrastructure.
- Perform migration services and security functions in a cloud services environment.
ITC 211- Information Storage Management
- Describe data center infrastructure, third platform technologies, and software-defined storage
- Evaluate various types of intelligent storage systems and storage networking technologies and their deployment
- Analyze key processes for managing a storage infrastructure, business continuity, and archiving solutions
- Classify various security threats and controls in a storage infrastructure
- Utilize key storage and security concepts to solve data storage problems.
ITC 221- Database Systems and Security
- Explain the role of databases and database management systems in the context of enterprise systems.
- Describe the database access control systems and controls for access based on record and attributes.
- Interpret data models to implement organizational requirements using a database management system.
- Utilize database management systems to implement, manage, and secure information it a database.
- Discuss techniques for transaction integrity and data privacy for database systems.
ITC 240- Ethical Hacking
- Apply the ethics associated with the use of hacking or penetration testing tools and techniques.
- Analyze the types of malicious software found in modern networks.
- Relate the threats and countermeasures for physical security and social engineering.
- Perform enumeration (finding resources, accounts, and passwords) on Microsoft, Netware, and Unix/Linux targets.
- Construct programming scripts oriented towards the needs of network security professionals.
- Categorize system and infrastructure vulnerabilities and mitigation methods.
- Demonstrate knowledge of cryptography and hashing
- Deploy security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots
ITC 250- Information Technology Cybersecurity Capstone
- Design and implement secure systems and network solutions.
- Compare security monitoring and response strategies.
- Choose appropriate security technology for a given context.
- Implement security solutions in a hands-on environment
- Combine techniques and theories from throughout the program in developing real-world cybersecurity situations.
ITC 281- Cybersecurity I
- Explain the security features of Windows-based and Linux-based systems.
- Discuss systems and services that provide security to computing systems and networks.
- Describe common cybersecurity threats and attacks.
- Explain network defense strategies.
- Utilize network and system security data to identify and analyze security events.
ITC 282- Cybersecurity II
- Configure and secure firewalls, intrusion prevention systems, LAN equipment, and virtual private networking systems.
- Differentiate between and explain key sharing, hash, public-key and private-key cryptography.
- Discuss the connection between security policy and cybersecurity implementations.
- Explain authentication, authorization and accounting and how each part contributes to cybersecurity.
- Explore methods to continuously improve skills through life-long learning.
ITC 290- IT Internship
- Combine techniques and theories from throughout the program in developing real-world cybersecurity situations.
- Implement IT solutions in a hands-on environment
- Develop good work habits, teamwork, and professional attitudes necessary for career success.
- Develop interpersonal communication and professional writing skills through real-world practice by analyzing their contributions and experiences working.