Since 1864, we have been investing in and creating resources for deaf and hard of hearing children, their families, and the professionals who work with them.
Programs and resources >
This course covers information security issues in corporate environments. The focus is on the threat environment, security policy and planning, cryptography, secure networks, access control, firewalls, host hardening, application security, ...
The course analyzes the protocols involved in cybersecurity investigations, and provides a thorough grounding in the principles required to assume the role of a cybersecurity investigator and to be familiar ...
This is an introductory course in cryptography for computer security. It covers classical cryptosystems, block ciphers and the advanced encryption standard, public-key cryptography, RSA cryptosystem, key establishment protocols, identification and ...
This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable ...
This course provides a comprehensive coverage of networking hardware, operating systems, topologies, protocols, design, implementation, security, and troubleshooting; along with research and communication skills necessary to succeed in the dynamic ...
Special topics in the discipline, designed primarily for seniors who are majors or minors. Students may enroll in 495 Special Topics multiple times, as long as the topics differ.
This course is designed to provide the students with the prerequisite skills and knowledge to participate in the ever-growing electronic business sector. Specific topic areas include key E-commerce concepts, emerging ...
As part two of a two-semester sequence courses intended for senior IT majors to integrate knowledge and skills acquired in the IT core curriculum and concentration courses, students will engage ...