Advanced Network Systems (ANS)
Advanced Network Systems is a course that examines the issues of advanced network environments using Linux and Unix. Students will discuss concepts such as compiling applications and the kernel, optimizing Linux network performance, and using systems and software in alternative ways to reach your goals. Participants will be engaged in a very intensive hands-on project to solidify concepts learned.
Computer Forensics for the First Responder (CFFR)
Computer Forensics for the First Responder is a course that covers conceptual and pragmatic skills for the first responder for forensic investigation. All IT professionals with any security-related duties should be versed with rules of engaging in a forensic examination, including areas such as non-liturgical and liturgical forensic examination, abuse issues, intrusion management, profiling, and privacy issues.
Encryption, Public Key Infrastructure Architecture, and Administration (EPKI)
Encryption, Public Key Infrastructure Architecture, and Administration is a course of study that provides practical knowledge of encryption technology and how it is applied in various industries. Conceptual overviews of cryptographic algorithms, confidentiality, integrity, authentication, nonrepudiation, access control, and cryptographic standards and protocols are provided. Public key infrastructure (PKI) concepts including certificates, revocation, and trust models are examined with a hands-on project.
Enterprise Administration using Linux (EAUL)
The Enterprise Administration using Linux Project is a hands-on project-based course. Students must have a basic-to-intermediate level of Linux and Windows experience in order to successfully complete this project. In real-world cases, most of the back-end services are hosted on Unix/Linux servers along with Windows server operating systems. This course bridges the gap between the two industry-standard operating systems and set-up a hybrid environment for a functional network.
Hands-on Network Exploits, Vulnerabilities, and Penetration Testing (NEVP)
Hands-on Network Exploits, Vulnerabilities, and Penetration Testing is a hands-on capstone type of course in which participants will examine integrated concepts in security. Most security threats are not born from single vulnerabilities, but rather from various weak-links in components of a complex system. In this course, participants will see how attacks can be multi-pronged and stacked in-depth to achieve successful exploitation. Concentration will be on concepts including intrusion detection and monitoring, along with countermeasures and reconnaissance.
Industry Capstone Project (ICP)
The Industry Capstone Project course is not just another hands-on project course but is designed for students to demonstrate what they have learned by implementing various systems analysis and design techniques, utilize DFDs (data flow diagrams), and ERDs (Entity relationship diagrams) to design the network. Moreover, students will set up an enterprise-level network with multiple locations using a hybrid networking environment, configuring and implementing various industry-standard practices on their model network. This course will demonstrate the approach of starting from scratch to a full-fledged functional model network.
Network Optimization and Monitoring (NOM)
Network Optimization and Monitoring is more strategic than the name implies. It involves watching for problems 24/7, but it’s also about optimizing data flow and access in a complex and changing environment. Tools and services are as numerous and varied as the environments they guard and analyze. This course will discuss various industry-standard network monitoring and optimization tools such as Nagios, Cacti, and PRTGs.