Course Outcomes
CNVT Courses
- CNVT-1000: Computer Repair A+ Hardware
- CNVT-1010: Computer Repair A+ Software
- CNVT-1810: Networking 1
- CNVT-1820: Networking 2
- CNVT-1830: Networking 3
- CNVT-2030: Core Networking
- CNVT-2100: Basic Voice Over Internet Protocol (VoIP)
- CNVT-2310: Desktop Technician
- CNVT-2400: Foundation of Cloud Computing
- CNVT-2410: Cloud Architecture and Security
COMI Courses
- COMI-1050: Survey of Computer Studies
- COMI-1100: Introduction to Computers
- COMI-1150: Programming Concepts
- COMI-1170: Scripting for System Administration
- COMI-1215: Programming in C++
- COMI-1225: Programming in C#
- COMI-1240: Introduction to Object-Oriented Programming
- COMI-1260: Introduction to SQL
- COMI-1300: Introduction to Data Analytics
- COMI-1350: Data Analytics Programming
- COMI-1450: WINDOWS Operating System
- COMI-1510: Java Programming
- COMI-1750: Web Development I
- COMI-1770: Web Development II
- COMI-1800: Computer Network Software (LINUX)
- COMI-1840: Microsoft Windows Server
- COMI-2010: Client-Side Scripting Languages
- COMI-2015 Introduction to Microsoft Project
- COMI-2020: Network Security Software Fundamentals
- COMI-2031: Computer Support: Concepts
- COMI-2033: Computer Support: Network and Virtual Machine
- COMI-2035: Intro to Computer Forensics
- COMI-2036: Introduction to Computer Ethics
- COMI-2037: Introduction to Cybersecurity
- COMI-2038: Ethical Hacking
- COMI-2040: Beginning Game Programming
- COMI-2225: Advanced Programming in C#
- COMI-2510: Advanced Java Programming
- COMI-2520: Data Structures and Algorithms
- COMI-2530: Introduction to Software Engineering
- COMI-2900: Data Analytics Internship
COMP Courses
- COMP-1200: Database Design and Management
- COMP-1230: System Analysis and Design
- COMP-2430: Operating Systems
- COMP-2500: Cybersecurity Practicum/Capstone Course
CYBR Courses
- CYBR-1100: Defending External Threats Using the Cyber Range
- CYBR-1200: Defending Internal Threats Using the Cyber Range
CNVT-1000: Computer Repair A+ Hardware
As a result of this course, a student will be able to:
- identify computer hardware
- build a computer
- troubleshoot basic computer hardware problems
- build and troubleshoot a Small Office/Home Office (SOHO) environment
- describe computer terminology
- be prepared to take the CompTIA A+ hardware exam
CNVT-1010: Computer Repair A+ Software
As a result of this course, a student will be able to:
- describe computer terminology
- install operating systems in different environments
- work with different operating systems
- modify different operating system
- troubleshoot basic operating system problems
- be prepared to take the CompTIA A+ software exam
CNVT-1810: Networking 1
As a result of this course, a student will be able to:
- describe the use of Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) layered models
-
explain how physical and data link layer protocols support the operation of Ethernet in a switched network
- explain how the upper layers of the OSI and TCP/IP model support network application
- configure and secure devices (switches, routers, and end devices) to provide access to local and remote network resources
- create Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) addressing schemes and verify network connectivity between device
- build simple LANs by applying cabling and addressing schemes with security best practices
CNVT-1820: Networking 2
As a result of this course, a student will be able to:
- troubleshoot and configure Virtual LANs (VLANs) and Inter-VLAN routing applying security best practices
- configure redundancy on a switched network using Spanning Tree Protocol (STP) and EtherChannel
- explain how to support available and reliable networks using dynamic address allocation in IPv4 and IPv6 and first-hop redundancy protocols
- evaluate Wireless LANs (WLANs) using a Wireless LAN Controller (WLC) and L2 security best practice
- modify switch security to mitigate LAN attacks
- configure IPv4 and IPv6 static routing on routers
CNVT-1830: Networking 3
As a result of this course, a student will be able to:
- explain and configure dynamic routing protocols in both point-to-point and multiaccess networks
- describe how to mitigate threats and enhance network security, implement security using access control lists and security best practices
- configure NAT services on the edge router to provide IPv4 address scalability
- demonstrate techniques to provide address scalability and secure remote access for WANs
- describe how to manage, optimize using Quality of Service (QoS), monitor, and troubleshoot scalable network architecture
- explain how technologies such as virtualization, software defined networking, and automation affect evolving networks
CNVT-2030: Core Networking
As a result of this course, a student will be able to:
- configure L2 redundancy in an enterprise network
- modify Enhanced Interior Gateway Routing Protocol (EIGRP), External Border Gateway Protocol (eBGP), and advanced Open Shortest Path First (OSPF) features to optimize performance in both IPv4 and IPv6 an enterprise network
- describe the concepts of multicast operation and QoS in an enterprise network
- implement IP services and VPNs to support secure, managed site-to-site and remote-access network
- explain how wireless topologies and antennas allow Access Points (Aps) to pair with Wireless LAN Controllers (WLCs) in an enterprise network. and Implement security to manage and support wireless roaming
- implement advanced technologies to support a secure and scalable enterprise network architecture
- describe the purposes and characteristics of virtualization and network automation
CNVT-2100: Basic Voice Over Internet Protocol (VoIP)
As a result of this course, a student will be able to:
- recognize traditional voice versus unified voice
- describe the pieces of Cisco unified communications
- describe the Cisco IP phone concepts and registration
- have familiarization of Cisco Call Manager Express (CME) administration and Dial-Plan, manage endpoint and end users with CME
- configure Cisco unified CME voice productivity features
- verify and configure gateways and trunks
- describe Cisco unity express concepts
CNVT-2200: Network Security Hardware
As a result of this course, a student will be able to:
- describe security threats facing modern network infrastructures, explain network mitigation techniques, and the basics of securing a network
- secure administrative access to network devices and implement secure network management and reporting
- implement Authentication, Authorization and Accounting (AAA) on network devices
- mitigate threats to networks using ACLs and firewall technologies to secure the network perimeter
- implement intrusion detection and prevention, configure Intrusion Prevention System (IPS) and Intrusion Detection System (IDS) to mitigate attacks on the network
- describe methods for implementing data confidentiality and integrity
CNVT-2310: Desktop Technician
As a result of this course, a student will be able to:
- communicate Windows terminology appropriately
- set up Windows in different environments
- configure security within the Windows Operating System
- organize enterprise clients
- troubleshoot basic operating system problems
- be prepared to take the Microsoft Desktop exam
CNVT-2400: Foundations of Cloud Computing
As a result of this course, a student will be able to:
- identify and describe the advantages of cloud computing.
- describe key cloud technologies and how they work.
- demonstrate an understanding of cloud compliance and regulatory models.
- identify cloud storage technologies.
- describe cloud auto-scaling and monitoring technologies.
- be prepared to take industry certification exam.
CNVT-2410: Cloud Architecture & Security
As a result of this course, a student will be able to:
- design, develop, and secure a highly resilient and scalable website.
- demonstrate the ability to make architectural decisions for cloud computing.
- demonstrate the ability to make infrastructure scalable, reliable, and highly available.
- demonstrate the ability to enable greater flexibility and resiliency in an infrastructure.
- be prepared to take industry certification exam.
COMI-1050: Survey of Computer Studies
As a result of this course, a student will be able to:
- identify several different specializations of computer studies programs
- complete introductory tasks within each specialization
- discuss introductory concepts related to each specialization
- construct a presentation about the different specializations
COMI-1100: Introduction to Computers
As a result of this course, a student will be able to:
- identify types of computer hardware and software
- discuss topics in computer networks, including roles, types, components, and security
- demonstrate how to find and evaluate information on the Web
- discuss safe computer practices, including threats to computer safety
- demonstrate working in a word processing software
- create workbooks in spreadsheet software
- create a presentation using presentation software
COMI-1150: Programming Concepts
As a result of this course, a student will be able to:
- design and implement solutions to novel programming problems by writing code in a programming language using structured programming techniques and appropriate data representations, including conditional structures, repetition structures, functions, primitive data types, file and console I/O, and collection types
- apply program testing and debugging strategies, such as designing and running test cases, desk-checking / tracing, and using an IDE debugger
- use alternate representations such as flowcharts, hierarchy/structure charts, and IPO charts to document, design, and develop a programmed solution to a problem
- apply consistent documentation and program style standards that match documented conventions
- evaluate and develop mathematical and logical programming expressions that incorporate operator precedence, distinguish between integer and floating-point operators, and use both relational and logical (and/or/not) operators
- use computer programming terminology and apply programming principles such as readability and efficiency in discussion of course topics
COMI-1170: Scripting for System Administration
As a result of this course, a student will be able to:
- demonstrate proficiency in the use of scripting languages to write scripts to automate system administration tasks
- write linear and looping scripts
- write simple and compound conditions within a scripting language
- implement Boolean logic operations and regular expressions
- develop scripts on both Linux and Windows
- properly apply programming concepts and constructs such as variables, strings, decisions and branching, loops, functions, and debugging techniques
COMI-1215: Programming in C++
As a result of this course, a student will be able to:
- write clear and readable programs in C++ using common programming structures, such as variables, functions, conditional structures, and repetition structures
- understand arrays, vectors, and related storage types and write programs that use them appropriately
- understand low-level data storage and be able to write programs using pointers and reference types to manipulate that data, including the use of dynamic memory allocation
- understand security issues common in C++ programming and mitigate those issues by writing secure code
- develop simple object-oriented solutions in C++ using objects, encapsulation, abstraction, and single inheritance
COMI-1225: Programming in C#
As a result of this course, a student will be able to:
- solve simple problems using the fundamental syntax and semantics of the C# programming language
- write C# programs that use selection, arrays, object-oriented classes, and methods for program modularization
- apply program testing and debugging techniques using breakpoints and step throughs to examine code execution
- choose appropriate loops, decision structures, data structures, and modularization in the creation of C# programs
- demonstrate principals of good C# programming style
COMI-1240: Intro to Object-Oriented Programming
As a result of this course, a student will be able to:
- design and implement functionally decomposed solutions to novel programming problems by writing code in a programming language that uses structured programming techniques and appropriate data representations, including conditional structures, primitive data types, file and console I/O, and mutable collection types
- design and implement object-oriented solutions to novel programming problems by writing code in a programming language that uses several interacting classes and inheritance where appropriate
- apply program testing and debugging strategies, such as designing and running test cases, desk-checking/tracing, and using an IDE debugger
- use alternate representations such as UML use case, class, object, and sequence diagrams to document, design, and develop a programmed solution to a problem
- apply consistent documentation and program style standards that match documented conventions
- use computer programming terminology and apply programming principles such as readability, encapsulation, extensibility, information hiding, and efficiency in discussion of course topics
COMI-1260: Introduction to SQL
As a result of this course, a student will be able to:
- understand the concept of normalization and create proper table structure
- perform a MySQL installation
- use Command-line and graphical clients to create databases and execute commands
- create and populate database tables
- write and execute SQL queries to extract and maintain SQL functions
- design and create joins between relational database tables
COMI-1300: Introduction to Data Analytics
As a result of this course, a student will be able to:
- develop an Understanding of Data Analytics and the Data Analytics process
- implement data collection and cleansing techniques on data sets
- utilize SQL to manipulate databases
- perform statistical analysis of data
- discuss data visualization and its role in data analytics
- construct a data visualization
- analyze real-world problems based on data analysis techniques
COMI-1350 Data Analytics Programming (Formerly Data Analytics: Tools & Visualization)
As a result of this course, a student will be able to:
- manipulate data sets using programming techniques including Boolean logic, conditional statements, loops, and value-returning functions with parameters
- manipulate data sets using built-in functions and libraries that load, restructure, select, group, pivot, and summarize
- structure data for and render meaningful visualizations, following visualization principles, such as scatterplots, line plots, bar plots, and histograms
- conduct and interpret basic descriptive statistics and appropriate visualizations of distributions using built-in functions
- apply a machine learning algorithm (such as linear regression) to a problem, apply an evaluation metric, and draw appropriate conclusions
- discuss and practice ethical data analytics
COMI-1450: Windows Operating System
As a result of this course, a student will be able to:
- demonstrate how to use Windows and personalize the operating system
- show how to work with files and folders
- apply network techniques to the operating system
- manipulate the operating system for auto maintenance and optimize functionality
- modify the operating system for security
COMI-1510: Java Programming
As a result of this course, a student will be able to:
- design and implement functionally decomposed solutions to novel programming problems by writing Java code that uses structured programming techniques and appropriate data representations, including conditional structures, repetition structures, methods, primitive data types, file and console I/O, strings, simple searching and sorting techniques, and one- and two-dimensional arrays and ArrayLists
- design and implement small (two-three class) object-oriented solutions to novel programming problems by writing Java coded that uses classes, arrays/ArrayLists, or both
- apply program testing and debugging strategies, such as designing and running test cases, desk-checking/tracing, and using an IDE debugger
- use alternate representations such as flow charts and UML class and object diagrams to document, design, and develop a programmed solution to a problem
- apply consistent documentation and program style standards that match Java documentation standards
- use computer programming terminology and apply programming principles such as readability, encapsulation, and efficiency in discussion of course topics
COMI-1750: Web Development I
As a result of this course, a student will be able to:
- identify the various versions of HTML and its effect on web site development
- recognize HTML tags, elements and attributes
- plan and design web site projects
- diagram web site structures
- construct web pages and sites that integrate HTML and CSS
- develop, test and publish HTML web page documents
COMI-1770: Web Development II
As a result of this course, a student will be able to:
- recognize HTML tags, elements and attributes
- plan and design web site projects
- diagram web site structures
- construct web pages and sites that integrate HTML and CSS
- develop, test and publish HTML web page documents
COMI-1800: Computer Networking Software (LINUX)
As a result of this course, a student will be able to:
- install, configure and use Linux
- demonstrate working in the BASH shell
- show how to manage and explore the file systems
- manipulate the operating system using administrative tasks
- describe the different types of servers
- be prepared to take the CompTIA Linux+ exam
COMI-1840: Microsoft Windows Server
As a result of this course, a student will be able to:
- build a foundation in basic server administration
- install and configure Windows Server
- install and use Active Directory
- monitor Windows Server
- manage disk storage in Windows Server
- set up Windows Server Group Policy
COMI-2010: Client-Side Scripting Languages
As a result of this course, a student will be able to:
- write clear and readable programs in JavaScript using variables, functions, conditionals, repetition, and arrays to perform common website programming tasks
- navigate and manipulate frequently used objects in the Document Object Model to perform common website functions
- write programs that respond to common webpage events
- build websites with dynamically generated content using a combination of HTML 5, JavaScript, and CSS
- demonstrate knowledge of various JavaScript frameworks and their appropriate use cases
COMI-2015: Intro to Microsoft Project
As a result of this course, a student will be able to:
- explain how to use Microsoft Project
- create a project
- modify a project
- present the project
COMI-2020: Network Security Software Fundamentals
As a result of this course, a student will be able to:
- design a plan to evaluate a company's security posture and provide possible steps to reduce the risks associate and provide possible controls to be implemented
- determine policies and procedures to implement controls for different risks based on company’s policy.
- find the appropriate methods for handling threats and risks in the future
- determine and analyze whether current tools, appliances, and websites are up to date, and are a good fit for mitigating risks for security threats
- run desktop virtualization on a wide variety of operating systems, including Windows and Linux
COMI-2031: Computer Support: Concepts
As a result of this course, a student will be able to:
- identify basic components and processes that make up an IT Helpdesk
- demonstrate basic skills for troubleshooting common problems
- illustrate basic helpdesk software to acquire hands-on experience with different helpdesk tools
- explain basic jargon particular to IT support
- understand the basic concept of knowledge management systems
COMI-2033: Computer Support: Network and Virtual Machine
As a result of this course, a student will be able to:
- demonstrate basic networking
- troubleshoot basic networking problems
- construct a basic network
- describe network terminology
- construct different virtual machines
- be prepared to take the CompTIA Network+ exam
COMI-2035: Intro to Computer Forensics
As a result of this course, a student will be able to:
- Define forensics and explain the different ways of gathering digital evidence
- Perform a basic acquisition of digital evidence using various tools
- Select the tools to use to gather digital evidence on a computer network
- Produce a professional-quality forensics report on the acquisition and analysis of digital evidence
COMI-2036: Intro to Computer Ethics
As a result of this course, a student will be able to:
- discuss the development of ethical philosophy throughout history in order to relate it to current day
- provide examples of legislation that was created to enforce ethical behavior in the work place
- examine specific computer crime, copyright issues and intellectual property rights
- compare and contrast the obligations of the IT professional according to each model
COMI-2037: Introduction to Cybersecurity
As a result of this course, a student will be able to:
- explain the basic objectives of cyber security and the importance of information security as well as the current threat to networks
- explain the concepts of malware including virus, botnet, worm, and other examples of malicious code and how to best thwart these offenses
- demonstrate various cryptography concepts including plain-test, cipher-text, symmetric and asymmetric cryptography as well as the techniques for crypto-analysis
- compare and contrast techniques used for security management including conducting risk analysis and analyzing potential threats and controls
COMI-2038: Ethical Hacking
As a result of this course, a student will be able to:
- Assess the ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements.
- Analyze different phases of hacking and recommend a strategy to use ethical hacking for assessing the security of various components of an information system.
- Compare and contrast different hacking techniques and analyze the legal implications of hacking.
- Examine different vulnerabilities, threats, and attacks to information systems and recommend countermeasures.
- Assess various network security techniques and tools and then implement an appropriate level of information security controls based on evidence, information, and research.
- Prepare for the EC-Council Certified Ethical Hacker exam.
COMI-2040: Beginning Game Programming
As a result of this course, a student will be able to:
- design and implement functionally decomposed solutions to novel game programming problems by writing code in a programming language that uses structured programming techniques and appropriate data representations, including conditional structures, repetition structures, methods, primitive data types, file and console I/O, and mutable collection types
- design and implement object-oriented solutions to novel game programming problems by writing code in a programming language that uses several interacting classes and inheritance where appropriate
- design and implement event-driven game software that uses a loop that processes and responds to user events such as key presses and mouse clicks
- design and implement game software that uses graphics and sound
- apply consistent documentation and program style standards that match documentation standards
COMI-2225: Advanced Programming in C#
As a result of this course, a student will be able to:
- use C# to design and create advanced computer applications
- demonstrate knowledge of advanced C# concepts
- demonstrate an understanding of advanced C# concepts
- apply the C# concepts to real world situations
COMI-2510: Advanced Java Programming
As a result of this course, a student will be able to:
- design and program software using object-oriented techniques such as inheritance and polymorphism
- use UML class, object, and sequence diagrams to design and document programs
- write a program that meets specifications based on UML class, object, and sequence diagrams
- write programs that use internal documentation (block comments and Javadoc) and standard white space conventions to communicate program design
- write programs using advanced concepts according to current trends and industry needs
COMI-2520: Data Structures and Algorithms
As a result of this course, a student will be able to:
- choose appropriate data structures and algorithms to solve a problem
- compare different algorithms and data structures based on efficiency using algorithm analysis techniques
- implement solutions with appropriate use of recursive functions
- implement common searching and sorting algorithms
- implement and use basic data structures, including stacks, queues, priority queues, and trees
- implement and use other commonly used data structures such as maps and hash tables
COMI-2530: Intro to Software Engineering
As a result of this course, a student will be able to:
- use software engineering terminology correctly in discussion of course topics
- apply techniques from a variety of Software Development Life Cycle models to a medium-sized software development problem
- explain the core principles behind Agile development
- choose appropriately from among common software architectures and choose appropriately from implement common design patterns
- develop a project thorough the complete Software Development Life Cycle, including requirements analysis, implementation, and testing
- document all phases of the Software Development Life Cycle using industry-standard practices informed by industry partner
- discuss current and emerging trends and technologies in Software Engineering
COMI-2900: Data Analytics Internship
As a result of this course, a student will be able to:
- apply the knowledge and skills learned in the Data Analytics Certificate coursework in a real-world setting
- analyze, identify and connect the experiences from working in the field to the knowledge and skills learned in the program coursework
- self-assess his/her progress during the practicum experience and identify any problems or concerns related to the experience
- develop appropriate workplace attitudes and will identify, understand, and work within professional standards
COMP-1200: Database Design and Management
As a result of this course, a student will be able to:
- introduce database language and terminology
- explore the different database models
- illustrate the Entity Relationship model through the construction of E-R Diagrams
- normalize database tables
- develop a database application utilizing the course concepts and techniques
COMP-1230: Systems Analysis and Design
As a result of this course, a student will be able to:
- conduct a needs analysis with end users.
- construct Activity Diagrams to analyze work flows.
- design a database to support an information system
- create an application to support the needs analysis
- document procedures to support a system design
- present a system solution to the end-user
COMP-2430: Operating Systems
As a result of this course, a student will be able to:
- describe what operating systems are, including what they do, how they do it, and how their performance can be evaluated
- list and describe core items of operating systems including memory management, networks, processor management, system security, device management, systems management, and file management
- students will learn how to install, configure, customize, manage, and trouble shoot Operating Systems using a hands-on approach
COMP-2500: Cybersecurity Practicum/Capstone
As a result of this course, a student will be able to:
- apply the knowledge and skills learned in the Cybersecurity Certificate coursework in a real-world setting
- analyze, identify and connect the experiences that they were exposed to during their time in the field to the knowledge and skills learned in the program coursework
- self-assess his/her progress during the capstone experience and identify any problems or concerns related to the experience
- students develop appropriate workplace attitudes and will identify, understand, and work within professional standards
CYBR-1100: Defending External Threats using the Cyber Range
As a result of this course, a student will be able to:
- assess the current risk environment as portrayed by cyber range
- discuss methods collecting, analyzing and disseminating information
- apply mitigation and countermeasure strategies
- evaluate partnership and network building roles and responsibilities
- develop the subject matter expertise needed to solve cyber attack
CYBR-1200: Defending Internal Threats using the Cyber Range
As a result of this course, a student will be able to:
- assess the current risk environment as portrayed by cyber range
- discuss methods of collecting, analyzing and disseminating information
- apply mitigation and countermeasure strategies
- evaluate partnership and networking building roles and responsibilities
- develop the subject matter expertise needed to solve cyber attacks