Students will scan, test, hack and secure systems. Implement perimeter defenses, scan and attack virtual networks. Other topics include intrusion detection, social engineering, footprinting, DDoS attacks, buffer overflows, SQL injection, privilege escalation, trojans, backdoors, and wireless hacking. Legal restrictions and ethical guidelines emphasized. This course also helps prepare students to pass the Certified Ethical Hacker (C|EH) exam.
De Anza College
De Anza's Computer Information Systems (CIS) department has been a leading educational institution in Silicon Valley since the college was founded. Over the years it has developed a rich and diverse series of courses in many areas.
This course list provides an overview of courses per college course catalogs. Not all of the courses listed use NETLAB+. For complete information, please see the individual college website.
Introduction to computer cyber crime and hacking investigation processes. Topics include computer forensics tools, hacking investigation tools, data recovery, information gathering techniques, computer data preservation techniques, and computer cyber crime investigation techniques. System administrators, security professionals, IT staff, and law enforcement personnel, would benefit from taking this course. Also, this course can help prepare students to pass computer forensics certification examinations, such as the EC-Council Computer Hacking Forensic Investigator (CHFI) or the Certified Forensic Computer Examiner (CFCE) credential.
A beginner’s computer security course for small office or home users. Learn to stop hackers, worms, viruses, spyware, web bugs, identity theft, and other cyber threats. Learn vulnerabilities found in web browsers, e-mail, and operating systems. Protect against online purchase dangers, install firewalls, manage cookies, restrict ports, evaluate wireless networks and examine encryption. The course includes numerous hands-on exercises to demonstrate security concepts.
This course will focus on programming in Visual Basic, with an emphasis on Windows programming using the Visual Basic environment, and the development of well structured VB projects using forms, buttons, labels, picture boxes, and text boxes.
This course prepares students to develop professional-looking and deployable Visual Basic applications using advanced controls, user-created classes, incorporating databases with ADO.NET 3.5, calling APIs, and creating Web applications.
This course provides knowledge and skills to set up, configure, use, and support the Microsoft Windows server and workstation operating systems. Windows features including configuring and troubleshooting will be covered. Concepts on how to configure Windows security, file sharing, storage, DHCP, DNS, Active Directory, network connectivity, and subsystems. Additional topics include utilizing Windows built-in applications.
This course is an introduction to the features of the Unix/Linux operating system including text editing, text file manipulation, electronic mail, Internet utilities, directory structures, input/output handling, and shell features.
Expanded coverage of regular expressions and grep. Advanced topics in Unix/ Linux include egrep, find, sed, awk, file archiving, compression, and conversion, version control, makefile, basic shell scripts and installation of a Linux distribution.
Application of software engineering techniques to the design and development of large programs; data abstraction and structures and associated algorithms: stacks, queues, linked lists, trees, graphs, and hash tables; internal and external sorting; use of recursion; team project. As an honors course the students will be expected to complete extra assignments to gain deeper insight in design and implementation of data structures.
Computer information systems (IS) basic terms and concepts. Important IS trends. Using systems development to build information systems. Survey of functions and components of an information system including applications software, systems software, telecommunications, networks, the Internet and Web. Social and organization issues
Provides broad-based knowledge and hands-on experience with many facets of network security. The course includes website and database attacks/defense, identified vulnerability exploits, layered security approaches, and Active Directory security policy settings. Includes cryptography, hashing, access controls, physical, application, data defenses, auditing and security protocols. Also, the course can help prepare students to pass the CompTIA Security+ Certification exam.
This course is an introduction to establishing, configuring, managing, and controlling access to Internet servers.
This course covers the current tools of structured systems analysis and design: data flow diagrams, structure charts, HIPO charts, VTOCs, data structure/dictionaries, decision trees and tables, and pseudo code.
Rudiments of database design, implementation and use. Basic understanding of various data modeling techniques. Overview and comparison of database management systems. Emphasis on relational databases; introduction to SQL.
Introduction to Oracle SQL (Structured Query Language), DML (Data Manipulation Language) processing techniques, DDL (Data Definition Language) techniques, selecting and sorting data, joins, SQL functions, Oracle objects, Oracle data processing concepts to maintain large database systems.
This course covers Oracle PL/SQL features including data definition and data manipulation using expressions, control structures, and Oracle objects. Error handling, predefined packages, triggers, transactions, and advanced PL/SQL features are also covered.
Emphasis on importance of Performance Tuning, techniques for tuning several Oracle components, optimizing database for high volume transactions and Data Warehouses
This course addresses the fundamental challenges in the design, implementation, and deployment of large-scale distributed systems. Concepts covered include concurrency, synchronization, connection establishment, event handling, inter process communication, storage management, and service registration, discovery, and lookup. It also covers issues related to distributed objects such as life cycle management, mobility, security, naming, location, evolution, and autonomy.
Introduction to Big-Data deluge, management of unstructured and structured data and design of large scale database systems. Concepts covered include Map-reduce parallel processing algorithms, Real-time analytics, classification, and predictive analytics, attributes of Big-Data and related issues. Introduction to large scale file systems and operations and parallel processing algorithms.
Concepts of communication, data communications, and networks. Overview of connectivity options, common protocols, local and wide area networks.
Fundamental concepts of Local Area Network architecture and protocols. Emphasis on basic concepts needed to design, configure, and implement Local Area Networks. Emphasis on the evolution of Fast Traditional Ethernet, Fast Ethernet, Gigabit Ethernet, Ten-Gigabit Ethernet, ATM, and wireless LANs.
Fundamental concepts of telephony, telecommunication, and wide area networking. Emphasis on analog and digital transmission techniques. Emphasis on circuitswitching and packet-switching. Exploration of optimization in telecommunication.
Coverage of systems programming in the Unix/Linux/Posix environments, with emphasis on low-level Unix/Linux/Posix system calls from C programs and Shell scripts. Discussion of differences in major Unix/Linux/Posix environments.
Software testing basics - equivalence classes, boundary values, edge cases, corner cases, positive vs. negative tests, verification vs. validation, black-box testing, white-box testing, gray-box testing, smoke testing, alpha vs. beta testing, requirements documents and traceability matrices; justification for testing software; types of testing - accessibility, functional, security, performance, visual; breaking software and defect reporting; test-driven development; test case management (TCM) tools; and automating tests for web applications.
The architecture and underlying protocols of the Internet. The Internet will be examined as a layered product. Layers discussed will include mid-level packet delivery and address computation and high-level client/server applications using the TCP/IP Protocol Suite.
This course covers writing client/server applications using the TCP/IP protocol suite.
All server classes - “well known”, iterative, concurrent, and polling - will be explored
and used. Typical Internet programming problems will be addressed including
resource availability, machine addressing, and differences in data representation
between communicating with computers.
Concepts of how to secure an enterprise by creating a security policy and developing procedures to maintain that security policy. Perform risk analysis and assessment on enterprise security. System Administrators, IT Managers, and Analysts would benefit from this course, as well as Technologists wanting to broaden their impact.
Establish the Cloud strategy within a business context and focus on governance issues and business processes; the administration of Cloud services; support, monitoring, and billing; documenting a Cloud strategy, which optimizes expense structure, improves security, and supports conformance; standards and protocols for the Cloud; and management of devices that connect to the Cloud.
This course presents the practical aspects of design, installation, testing, and troubleshooting cable carrying voice, data, video, and wireless signals. Successful completion of this course makes a student eligible to sit for the Fiber Optics Association (FOA) certification examination.
This course is an introduction to Microsoft Windows server operating system and network support. Topics include user accounts, groups and group scopes, permissions, security, Active Directory terminology, optimizing Internet Protocol (IP) address allocation, utilities, and Web Services.
This course introduces students to the installation and configuration of Microsoft Windows Professional on standalone computers and on client computers connected to a work-group or domain. The skills and knowledge necessary to install and configure Windows Server, to create files, print, and Terminal Servers will be covered. Students will also administer an organizational unit within a single domain structure.
This course presents an overview of the installation and configuration of both Microsoft and VMWare Virtualization Technologies. Topics include storage systems, business continuity, storage security and management, virtualization technology and concepts. Deployment and administration of various operating systems, Hyper-V, Virtual machine networks will also be covered.
This course provides an introduction to the fundamental
principles and topics of information technology security and
risk management at the organizational level. Hardware, software, processes, communications, applications, and policies
and procedures with respect to organizational cybersecurity
and risk management are addressed. Preparation for the
CompTIA Security+ certification exams is provided.
This course is intended to prepare students for the following certifications: AccessData Certified Examiner credential, Certified Information Systems Security Professional (CISSP), Cisco Certified Security Professional (CCSP), Security+, and Microsoft Security Certification. Students will analyze computers and networks for vulnerabilities, collect data, and preserve information for forensic investigation. Laws pertaining to computer and network forensic investigation will be presented and students will complete case studies on cyber attack investigations.