Information Systems Technology Archives - º£½ÇÂÒÂ× /academic-area/information-systems-technology/ º£½ÇÂÒÂ× Wed, 11 Mar 2026 16:16:52 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 /wp-content/uploads/2019/10/favicon1.ico Information Systems Technology Archives - º£½ÇÂÒÂ× /academic-area/information-systems-technology/ 32 32 Fiber Optic Data Communications /course/fiber-optic-data-communications/ Tue, 01 Apr 2025 12:20:23 +0000 /?post_type=gb_course&p=34528 As informational systems approach physical limitations in performance of copper, understanding electronics, Fiber Optics, and electromagnetic propagation is critical for IST professionals. In this course, physical layer operations including communications […]

The post Fiber Optic Data Communications appeared first on º£½ÇÂÒÂ×.

]]>
As informational systems approach physical limitations in performance of copper, understanding electronics, Fiber Optics, and electromagnetic propagation is critical for IST professionals. In this course, physical layer operations including communications theories, guided and unguided signal propagation in Fiber Optic signaling, and physical layer phenomena are explored using intuitive, modeled, and experimental approaches This course involves lecture and very intense hand-on labs.  This class can lead to a Fiber Optic Association certification as a Certified Fiber Optic Technician (FOA CFOT)

Spring semester

The post Fiber Optic Data Communications appeared first on º£½ÇÂÒÂ×.

]]>
CCNA Cybersecurity Operations /course/ccna-cybersecurity-operations/ Fri, 22 May 2020 15:30:39 +0000 /?post_type=gb_course&p=7651 The CCNA Cybersecurity Operations curriculum provides an introduction to the knowledge and skills needed for a Security Analyst working with a Security Operations Center team. It teaches core security skills […]

The post CCNA Cybersecurity Operations appeared first on º£½ÇÂÒÂ×.

]]>
The CCNA Cybersecurity Operations curriculum provides an introduction to the knowledge and skills needed for a Security Analyst working with a Security Operations Center team. It teaches core security skills needed for monitoring, detecting, investigating, analyzing and responding to security events, thus protecting systems and organizations from cybersecurity risks, threats and vulnerabilities. Prerequisite: IST122G. Spring semester

This is a Cisco Academy course.

The post CCNA Cybersecurity Operations appeared first on º£½ÇÂÒÂ×.

]]>
Enterprise Networking, Security and Automation (ENSA) /course/enterprise-networking-security-and-automation/ Wed, 22 Apr 2020 18:32:08 +0000 https://live-great-bay-wp.pantheonsite.io/?post_type=gb_course&p=6474 Enterprise Networking, Security, and Automation (ENSA) describes the architecture, components, operations, and security to scale for large, complex networks, including wide area network (WAN) technologies. The course emphasizes network security […]

The post Enterprise Networking, Security and Automation (ENSA) appeared first on º£½ÇÂÒÂ×.

]]>
Enterprise Networking, Security, and Automation (ENSA) describes the architecture, components, operations, and security to scale for large, complex networks, including wide area network (WAN) technologies. The course emphasizes network security concepts and introduces network virtualization and automation. Students learn how to configure, troubleshoot, and secure enterprise network devices and understand how application programming interfaces (API) and configuration management tools enable network automation. This is an instructor-led course and is the 3rd of 3 courses in the Cisco CCNAv7 curriculum. The course includes activities using Packet Trace and hands-on lab work. Prerequisite: IST122G or permission of the Instructor. Fall/Spring semesters

The post Enterprise Networking, Security and Automation (ENSA) appeared first on º£½ÇÂÒÂ×.

]]>
Legal Issues in Information Security /course/legal-issues-in-information-security/ Wed, 22 Apr 2020 18:26:19 +0000 https://live-great-bay-wp.pantheonsite.io/?post_type=gb_course&p=6473 This course provides an in-depth study of the legal issues affecting the selection, design, and implementation of internal security controls in business and government organizations. Students will study security policies, […]

The post Legal Issues in Information Security appeared first on º£½ÇÂÒÂ×.

]]>
This course provides an in-depth study of the legal issues affecting the selection, design, and implementation of internal security controls in business and government organizations. Students will study security policies, standards, procedures, guidelines, laws, regulations, industry best practices, and related concepts in order to apply this information for selecting the proper security control framework to meet business and government objectives. An understanding of the legal issues affecting internal control is critical to understanding appropriate security measures used to meet business and government objectives.

The post Legal Issues in Information Security appeared first on º£½ÇÂÒÂ×.

]]>
Information Assurance / Information Risk Management /course/information-assurance-information-risk-management/ Mon, 20 Apr 2020 13:50:20 +0000 https://live-great-bay-wp.pantheonsite.io/?post_type=gb_course&p=6406 This course provides an in-depth study of information assurance and information risk management covering risk management business challenges; implementing risk mitigation; and, developing risk mitigation plans. Part 1 lays the […]

The post Information Assurance / Information Risk Management appeared first on º£½ÇÂÒÂ×.

]]>
This course provides an in-depth study of information assurance and information risk management covering risk management business challenges; implementing risk mitigation; and, developing risk mitigation plans. Part 1 lays the foundation for understanding risk management terms and techniques including how to recognize cyber-security threats, security vulnerabilities and vulnerability exploits. Part 2 covers defining risk assessment approaches, performing risk assessments, identifying and analyzing security threats, vulnerabilities, and exploits as well as identifying administrative, technical and physical controls that mitigate both information and technology risk; and, most importantly, how to turn risk assessments into executable risk mitigation plans. Part 3 offers direction on creating and implementing several different risk mitigation plans – Business Impact Analysis, Business Continuity, Disaster Recovery, and Computer Incident Response. Spring semester

The post Information Assurance / Information Risk Management appeared first on º£½ÇÂÒÂ×.

]]>
Mobile Systems Architecture /course/mobile-systems-architecture/ Wed, 15 Jan 2020 17:08:47 +0000 https://live-great-bay-wp.pantheonsite.io/course/mobile-systems-architecture/ This course will focus on Computer Systems for Mobile and imbedded processing. System on a Chip (SoC) architectures will be examined in an integrated approach that combines hardware and software […]

The post Mobile Systems Architecture appeared first on º£½ÇÂÒÂ×.

]]>
This course will focus on Computer Systems for Mobile and imbedded processing. System on a Chip (SoC) architectures will be examined in an integrated approach that combines hardware and software functions of the CPU. To support this study the components of the ARM architecture and its programming environment will be thoroughly explored. Basic microControllers and multicore processors will be used in the lab exercises to support the study of the interplay between the hardware & software.

Prerequisite: IST112G Applied Logic

Spring semester

The post Mobile Systems Architecture appeared first on º£½ÇÂÒÂ×.

]]>
Cloud Deployment and Management /course/cloud-deployment/ Wed, 15 Jan 2020 17:08:47 +0000 https://live-great-bay-wp.pantheonsite.io/course/advanced-virtualization/ This course in the IST Cloud path focuses on concepts surrounding enterprise virtualization with emphasis on public cloud services. Enterprise and cloud-based application delivery through virtualization will be examined. Subsections […]

The post Cloud Deployment and Management appeared first on º£½ÇÂÒÂ×.

]]>
This course in the IST Cloud path focuses on concepts surrounding enterprise virtualization with emphasis on public cloud services. Enterprise and cloud-based application delivery through virtualization will be examined. Subsections will include configuring storage, networking, high availability, and systems management for cloud-based virtual infrastructures. Required knowledge includes PC experience, PC and server architecture, Windows servers and Active Directory, storage technologies, and a thorough understanding of TCP/IP networking.

Prerequisite: IST142G or Permission from Instructor.

Summer semester

The post Cloud Deployment and Management appeared first on º£½ÇÂÒÂ×.

]]>
Security+ /course/security/ Wed, 15 Jan 2020 17:08:47 +0000 https://live-great-bay-wp.pantheonsite.io/course/security/ This course provides an in-depth study of the security requirements in a business enterprise environment. The core material is based on the Security+ SY)-401 exam. Students will study risk related […]

The post Security+ appeared first on º£½ÇÂÒÂ×.

]]>
This course provides an in-depth study of the security requirements in a business enterprise environment. The core material is based on the Security+ SY)-401 exam. Students will study risk related concepts and apply appropriate risk mitigation strategies. An understanding of the types of equipment found in a network is critical to understanding appropriate security measures used to protect network assets. The end result of this class is to be ready to take the CompTia Security+ exam proctored by a third party. Prerequisite: IST122G or Permission from Instructor. Summer semester

The post Security+ appeared first on º£½ÇÂÒÂ×.

]]>
Configuration Security Appliance /course/configuration-security-appliance/ Wed, 15 Jan 2020 17:08:36 +0000 https://live-great-bay-wp.pantheonsite.io/course/configuration-security-appliance/ This course in the IST Security track focuses on the configuration of the Cisco PIX Security Appliance, with a major emphasis on hands-on skills in the areas of secure perimeter, […]

The post Configuration Security Appliance appeared first on º£½ÇÂÒÂ×.

]]>
This course in the IST Security track focuses on the configuration of the Cisco PIX Security Appliance, with a major emphasis on hands-on skills in the areas of secure perimeter, secure connectivity, security management, identity services, and intrusion detection. Specific labs include basic configuration, DHCP server, NAT/PAT, conduits, multiple interfaces, advanced ACL/CBAC/PAM, object groups, AAA Security, CSACS, advanced protocols and intrusion detection systems, failover and system maintenance. Some knowledge of TCP/IP protocol is assumed. This course covers many of the Security+ Certification Domains of Knowledge. Prerequisite: IST223G or equivalent competencies. Fall semester

The post Configuration Security Appliance appeared first on º£½ÇÂÒÂ×.

]]>
Internship /course/ist-internship/ Wed, 15 Jan 2020 17:08:36 +0000 https://live-great-bay-wp.pantheonsite.io/course/internship-3/ This capstone course will allow students to receive on-the-job experience at an off-site location related to their specific area of academic concentration. Students are required to work eight hours per […]

The post Internship appeared first on º£½ÇÂÒÂ×.

]]>
This capstone course will allow students to receive on-the-job experience at an off-site location related to their specific area of academic concentration. Students are required to work eight hours per week at paid/unpaid positions that meet the criteria established by the Internship Manual. A seminar meeting one period per week will review internship progress and discuss issues related to successful employment. Outside work and research concerning the weekly topic will be required.

Prerequisite: Completion of coursework for the first three semesters of the student’s program of study and approval of the Department Chair and/or Program Advisor.

The post Internship appeared first on º£½ÇÂÒÂ×.

]]>