Computer Information Science - Applications (CISA) Courses
CISA 126 Outlook: Basics
- Units:1
- Hours:18 hours LEC
- Prerequisite:None.
- Advisory:BUSTEC 302 with a grade of "C" or better
- Catalog Date:January 1, 2025
This course introduces Microsoft Outlook, the industry-leading personal information management software. Topics include understanding and navigating the Outlook environment, creating and sending email, using email special features, managing Outlook contacts, using an electronic calendar, and creating tasks and to-do items.
Upon completion of this course, the student will be able to:
- SLO 1: APPLY PROFESSIONAL BUSINESS COMMUNICATION SKILLS TO EMAIL SOFTWARE.
- Send and receive email utilizing the special features of Outlook or other email software.
- Create and modify contacts in an address book.
- SLO 2: ORGANIZE AND SET APPOINTMENTS, MEETINGS, TASKS AND REMINDERS USING ELECTRONIC CALENDAR.
- Create and organize Outlook calendar items.
- Incorporate tasks and to-do items into the personal information management software.
- SLO 3: DEMONSTRATE ABILITY TO WORK WITH EXTENDED FEATURES OF EMAIL SOFTWARE.
- Distinguish between Outlook in an Exchange environment and a stand-alone environment.
- Identify potential risks associated with the use of email.
CISA 299 Experimental Offering in Computer Information Science - Applications
- Units:0.5 - 4
- Prerequisite:None.
- Catalog Date:January 1, 2025
This is the experimental courses description.
CISA 305 Beginning Word Processing
- Units:2
- Hours:36 hours LEC
- Prerequisite:None.
- Advisory:BUSTEC 302, CISC 302, or CISC 310
- Transferable:CSU
- Catalog Date:January 1, 2025
This course introduces students to fundamental and intermediate word processing skills. The course includes basic word processing operations: formatting business documents, editing, saving, retrieving, printing text, and creating and editing simple tables. The course also includes intermediate operations: inspecting documents for hidden properties, inserting and formatting graphic elements, managing reference markers, and merging multiple documents.
Upon completion of this course, the student will be able to:
- SLO1: CREATE PROFESSIONAL LOOKING BUSINESS DOCUMENTS USING WORD PROCESSING SOFTWARE
- Demonstrate ability to analyze needs and create letters, envelopes, memorandums and reports by planning, entering text, correcting, formatting, saving and printing business documents.
- SLO2: EDIT AND FORMAT BUSINESS DOCUMENTS USING WORD PROCESSING COMMANDS
- Demonstrate ability to edit and format documents using word processing commands and features such as: setting margins, tabs, indents and alignment; changing fonts, font sizes, and font styles; finding, replacing, moving and copying text; selecting, inserting and deleting text; creating borders, symbols, bullets and numbered lists; creating and editing tables.
- SLO3: DEMONSTRATE USAGE OF THE MAIL MERGE FUNCTION
- Integrate source data from different applications into business documents to create multiple, individualized copies.
CISA 306 Intermediate Word Processing
- Units:2
- Hours:36 hours LEC
- Prerequisite:CISA 305 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This is a course designed to build upon previous training in the use of word processing. The course covers intermediate to advanced word processing features, such as styles, macros, outlines, document notations, forms, charts, and advanced mail merge techniques. Also covered are integrating word processing with other applications and creating documents for use on the Internet, i.e. web pages and e-mail attachments in word processing. Advanced business document formatting will also be included.
Upon completion of this course, the student will be able to:
- SLO1: EDIT AND FORMAT DOCUMENTS USING INTERMEDIATE AND ADVANCED WORD PROCESSING COMMANDS
- Demonstrate ability to edit and format documents using intermediate and advanced word processing commands and features such as: creating, editing and applying styles; merging a main document with a data source file; using templates and wizards to create documents; recording and running a macro; creating and using document notations; generating and modifying outlines, tables of contents and indexes; creating and modifying forms.
- SLO2: INTEGRATE WORD PROCESSING WITH OTHER APPLICATIONS AND CREATE DOCUMENTS FOR SHARED USE
- Demonstrate ability to integrate word processing with other applications by embedding and linking a spreadsheet object into a word processing document.
- Demonstrate ability to use word processing commands and features to create Web pages such as: creating and editing hyperlinks; applying background effects; saving a word processing document as a Web page; formatting a Web page.
- Demonstrate ability to compare and combine multiple document versions, track changes, and manage document properties.
- SLO3: INSERT AND MODIFY CUSTOM DOCUMENT ELEMENTS
- Demonstrate ability to insert and modify building blocks, field codes and properties, and document controls.
CISA 315 Introduction to Electronic Spreadsheets
- Units:2
- Hours:36 hours LEC
- Prerequisite:None.
- Advisory:CISC 302 or 310
- Transferable:CSU
- Catalog Date:January 1, 2025
This course is designed to introduce the student to the use of spreadsheet programs. The course will include: designing a spreadsheet, developing formulas for automatic calculations, using special functions, developing what-if models, producing charts, performing spreadsheet data base functions, and producing reports. Students will be using mathematical concepts and skills.
Upon completion of this course, the student will be able to:
- SLO 1: CREATE A PROFESSIONAL LOOKING SPREADSHEET THAT INCLUDES ACCURATE FORMULAS, FUNCTIONS, AND FORMATTING
- Produce and edit data entries in a worksheet using text, numbers, formulas, and functions.
- Prepare and produce effective worksheet presentations using appropriate formats.
- Apply the appropriate use of absolute and relative addressing when creating or copying formulas.
- SLO 2: ANALYZE DATA AND APPLY APPROPRIATE VISUAL DISPLAYS TO A SPREADSHEET
- Evaluate worksheet data to answer what-if questions.
- Develop and modify charts, and insert and format objects.
- SLO 3: DEVELOP AND ANALYZE DATABASE FUNCTIONS AND USE ANALYTICAL TOOLS TO SUMMARIZE DATA
- Utilize database functions and create and analyze pivot tables.
- SLO 4: ANALYZE AND SUMMARIZE DATA USING CONSOLIDATED SPREADSHEETS WITH LINKED REFERENCES
- Structure spreadsheets to utilize multiple worksheets simultaneously.
- Combine and link information from multiple worksheets and workbooks.
- Configure worksheets and workbooks for sharing.
CISA 316 Intermediate Electronic Spreadsheets
- Units:2
- Hours:36 hours LEC
- Prerequisite:CISA 315 with a grade of "C" or better
- Transferable:CSU
- C-ID:C-ID BSOT 122X
- Catalog Date:January 1, 2025
This course introduces students to the intermediate features of spreadsheet programs. The course will cover macros, data tables and lookup functions, logical expressions as well as advanced file operations, functions, and convenience commands. Students will follow spreadsheet templates and design their own sheets.
Upon completion of this course, the student will be able to:
- SLO 1: ANALYZE AND SOLVE PROBLEMS USING ADVANCED FUNCTIONS IN SPREADSHEETS.
- Select and utilize advanced functions including logical functions, lookup tables and functions, filtering, and database functions.
- Create forecasts, depreciation tables, and loan documents using advanced financial functions for financial analysis.
- SLO 2: UNDERSTAND THE PROCESSES USED TO AUTOMATE SPREADSHEET APPLICATIONS WITH RANGES, VALIDATION, AND MACROS.
- Validate data within a spreadsheet by using data validation tools.
- Create and utilize Range Names in functions.
- Secure worksheets and data by utilizing spreadsheet protection functions.
- Diagnose needs and create macros to automate common tasks.
- SLO 3: EVALUATE AND APPLY AN UNDERSTANDING OF THE USE OF ADVANCED SPREADSHEET APPLICATIONS FOR PROBLEM SOLVING AND ANALYSIS.
- Analyze options and possible business outcomes using both one and two-input data tables and scenario management functions.
- Utilize spreadsheet tools including Solver and Goal Seek to problem solve and facilitate decision making.
- SLO 4: UNDERSTAND THE PROCESS TO IMPORT DATA INTO SPREADSHEETS FROM EXTERNAL APPLICATIONS AND DEVELOP THE ABILITY TO UTILIZE PROGRAMMING TECHNIQUES TO MODIFY SPREADSHEET APPLICATIONS.
- Import data from other applications such as text files, external databases, or the Internet for analysis within Excel.
- Develop a basic understanding of the Visual Basic Editor to develop and modify spreadsheet applications.
CISA 320 Introduction to Database Management
- Units:1
- Hours:18 hours LEC
- Prerequisite:None.
- Advisory:CISC 302 or 310
- Transferable:CSU
- Catalog Date:January 1, 2025
This course is designed to introduce the student to the use of database management programs on the computer. The course will include designing a database; accessing, searching and updating files; and designing and producing printed reports. Students will be reading and interpreting written and oral instructions of a technical nature.
Upon completion of this course, the student will be able to:
- UNDERSTAND THE BASIC FUNCTIONS OF A RELATIONAL DATABASE (SLO 1)
- Understand database structures and types.
- Evaluate the appropriate use of different elements of a database.
- UTILIZE A RELATIONAL DATABASE TO INPUT, RETRIEVE AND REPORT DATA (SLO 2)
- Analyze the needs and requirements of a database and design an appropriate structure.
- Understand basic database functions such as developing a query and sorting, searching, filtering, and calculating data.
- Design and produce database reports.
CISA 321 Intermediate Database Management
- Units:1
- Hours:18 hours LEC
- Prerequisite:CISA 320 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This course will extend the capabilities of students who have started to use a microcomputer database. Topics and laboratory will include complex relational databases, form design, intermediate report design, advanced queries, OLE objects, macros and an introduction to visual programming.
Upon completion of this course, the student will be able to:
- DEVELOP AN UNDERSTANDING OF ADVANCED QUERIES IN A RELATIONAL DATABASE (SLO 1)
- Design complex queries using advanced processes such as: Pattern Match, List of Values Match, Not Operators, Parameter queries, and Cross-tab queries.
- Incorporate Lookup functions to simplify data retrieval.
- Integrate Data Validation rules to limit errors in databases.
- DESIGN AND DEVELOP CUSTOM FORMS FOR RELATIONAL DATABASES (SLO 2)
- Create custom forms so that database input documents reflect non-database input sources.
- Structure sub-forms so that data from related tables is viewable on a single form
- DESIGN AND DEVELOP CUSTOM REPORTS FOR RELATIONAL DATABASES (SLO 3)
- Plan customized reports to improve the presentation of database information
- Design queries to complete data required for custom reports.
CISA 340 Presentation Graphics
- Units:2
- Hours:36 hours LEC
- Prerequisite:None.
- Advisory:CISC 302 or 310
- Transferable:CSU
- Catalog Date:January 1, 2025
This course is an introduction to the use of the computer to generate graphics used in business. Topics covered include: hardware (screens, printers, input devices), software (paint, chart, CAD), types of graphics (pictures, graphs, charts, designs).
Upon completion of this course, the student will be able to:
- SLO 1: UTILIZE PRESENTATION GRAPHICS SOFTWARE FOR PRESENTATION DEVELOPMENT
- develop pictures, graphs, charts, and designs using the software.
- integrate graphics, animation, text, and charts in the development of a presentation.
- SLO 2: DISTINGUISH BETWEEN VARIOUS FILES AND SYSTEM REQUIREMENTS
- demonstrate understanding of fundamental hardware and software concepts including terminology, evaluation, installation and use.
- evaluate types of graphics available, types of files, and system requirements.
- link graphics presentations to Web sites.
- SLO 3: PLAN, PREPARE AND PRESENT ON-SCREEN PRESENTATIONS.
- apply audience analysis techniques to establish criteria and best approach to presentation.
CISA 499 Experimental Offering in Computer Information Science - Applications
- Units:0.5 - 4
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:January 1, 2025
This is the experimental courses description.
Computer Information Science - Core (CISC) Courses
CISC 295 Independent Studies in Computer Information Science - Core
- Units:1 - 3
- Hours:54 - 162 hours LAB
- Prerequisite:None.
- Catalog Date:January 1, 2025
An independent studies project involves an individual student or small group of students in study, research, or activities beyond the scope of regularly offered courses. See the current catalog section of "Special Studies" for full details of Independent Studies.
Upon completion of this course, the student will be able to:
- SLO #1: Actively engage in intellectual inquiry beyond that required in order to pass a course of study (College Wide Learning Outcome – Area 4).
- Discuss and outline a proposal of study (that can be accomplished within one semester term) with a supervising instructor qualified within the discipline.
- Design an independent study (to be completed individually or by collaboration of a small group) to foster special knowledge, skills, and experience that are not available in any one regularly scheduled course.
- Use information resources to gather discipline-specific information.
- SLO #2: Utilize modes of analysis and critical thinking to apply theoretical perspectives and/or concepts in the major discipline of study to significant problems and/or educational activities (College Wide Learning Outcome – Area 3).
- Analyze and apply the knowledge, skills and experience that are involved in the independent study to theoretical perspectives and/or concepts in the major discipline of study.
- Explain the importance of the major discipline of study in the broader picture of society.
- SLO #3: Communicate a complex understanding of content matter of the major discipline of study (College Wide Outcome – Area 3).
- Demonstrate competence in the skills essential to mastery of the major discipline of study that are necessary to accomplish the independent study.
- SLO #4: Identify personal goals and pursue these goals effectively (College Wide Outcome – Area 4).
- Utilize skills from the “academic tool kit” including time management, study skills, etc., to accomplish the independent study within one semester term.
CISC 299 Experimental Offering in Computer Information Science - Core
- Units:0.5 - 4
- Prerequisite:None.
- Catalog Date:January 1, 2025
This is the experimental courses description.
CISC 302 Computer Familiarization
- Same As:JOUR 330
- Units:2
- Hours:36 hours LEC
- Prerequisite:None.
- Advisory:BUSTEC 302
- Transferable:CSU
- General Education:AA/AS Area III(b)
- Catalog Date:January 1, 2025
This is an introductory course to provide general knowledge on how computers work, computer terminology and the impact of computers on society and the work environment. Beginning level hands-on instruction using an operating system, word processing software, spreadsheet software, database software, email and the Internet will be emphasized. Students will be reading and interpreting written and oral instructions of a technical nature. This course is the same as JOUR 330, and only one may be taken for credit. See "Cross-Listed Courses" in the catalog.
Upon completion of this course, the student will be able to:
- SLO1: DESCRIBE BASIC HARDWARE AND SOFTWARE REQUIREMENTS FOR A PERSONAL COMPUTER
- Identify different hardware required for input, output, processing and storage of data on a personal computer
- Apply appropriate log on techniques to access lab computers and online course management software
- SLO2: UTILIZE OPERATING SYSTEM TO EFFECTIVELY MANAGE PROGRAMS, FILES AND FOLDERS
- Demonstrate ability to retrieve, create, copy, move and delete files and folders within a file management hierarchy
- Locate and launch programs successfully
- SLO3: DIFFERENTIATE BETWEEN, AND APPLY BASIC CONCEPTS FOR BUSINESS APPLICATION SOFTWARE
- Define and correctly select appropriate program for a given task
- Demonstrate ability with word processing commands and features such as cursor movement, entering text; formatting including setting margins, line spacing, bold, centering, underlining, changing font typeface and size; inserting images; saving, printing, retrieving, and editing a file; spelling checker
- Demonstrate ability with spreadsheet commands and features such as cursor movement; entering text, values and formulas; formatting including changing column widths, bold, centering, underlining, changing font typeface and size, formatting numbers with dollar signs; inserting and deleting rows and columns; saving, printing, retrieving, and editing a file; spelling checker
- Demonstrate ability with database commands and features such as creating a database, creating tables, creating fields, setting field widths, positioning fields, entering data through tables or forms, designing forms, formatting forms, creating reports, displaying records, changing page orientation, saving, and printing
- SLO4: COMMUNICATE, SHARE, AND ACCESS INFORMATION ELECTRONICALLY
- Utilize e-mail commands and features to communicate appropriately, sending and receiving messages, including attachments.
- Operate search engines, browsers, and related web tools to effectively find information on the World Wide Web
- Evaluate web sites for accuracy based on specific criteria
CISC 305 Introduction to the Internet
- Units:1
- Hours:18 hours LEC
- Prerequisite:None.
- Advisory:CISC 302 or 310
- Transferable:CSU
- Catalog Date:January 1, 2025
This course is an introduction to how the Internet works and how to effectively use basic Internet services. Topics include browser basics, search engines and search techniques, E-mail, the World Wide Web, Internet security, Internet resources, the Cloud, social networking, and building basic web pages using HTML.
Upon completion of this course, the student will be able to:
- SLO 1: IDENTIFY AND ACCESS VARIOUS INFORMATION SOURCES.
- describe the structure of the Internet, the Domain Name System, and connectivity options.
- SLO 2: DISTINGUISH BETWEEN VARIOUS INTERNET SERVICES
- distinguish between and use the World Wide Web, a browser, E-mail, FTP, and Social Media services.
- SLO 3: UTILIZE INTERNET SERVICES AND TECHNOLOGY
- download, attach, view, and print files from the Internet.
- create a personal web page following a predefined format.
CISC 306 Introduction to Web Page Creation
- Units:1
- Hours:18 hours LEC
- Prerequisite:CISC 305 with a grade of "C" or better; or equivalent skills for an intermediate level of Internet proficiency to be determined by the instructor of the course.
- Transferable:CSU
- Catalog Date:January 1, 2025
The student will be able to produce a Web page, including design, layout, construction, and presentation. HTML will be used to format a Web page.
Upon completion of this course, the student will be able to:
- SLO 1: EXAMINE AND PRACTICE WEB PAGE CREATION.
- evaluate content needs and apply appropriate design techniques.
- design a Web page.
- SLO 2: CREATE WEB DOCUMENTS USING CODE.
- Use XHTML to format Web pages.
- present a completed Web page.
- Evaluate design enhancements.
CISC 308 Exploring Computer Environments and the Internet
- Units:1
- Hours:18 hours LEC
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:January 1, 2025
The course acquaints the student with the fundamentals of
microcomputer hardware, software and computer networking, focusing on widely used hardware and operating systems, Intel-based PCs and the Windows operating system. The fundamentals of the Internet and Internet tools are introduced, as well as effective electronic communication.
Upon completion of this course, the student will be able to:
- SLO #1: DIFFERENTIATE AND APPLY BASIC CONCEPTS OF OPERATING SYSTEMS AND COMPUTER HARDWARE.
- Explain how computers work, as well as the functions of basic computer components.
- Design a customized computer system utilizing the control panel and other accessories.
- Use appropriate commands to capture and print screens.
- List and discuss basic operating system and Internet terminology and concepts.
- SLO #2: ORGANIZE COMPUTER FILES AND FOLDERS.
- Manage files by utilizing effective procedures for creating, modifying, moving, copying, renaming, and deleting files and folders.
- Utilize effective operating system search techniques to locate files, folders and data stored on various drives using various filenames and wildcards.
- Utilize all frequently used operating system commands required to store, manage, back-up, access and maintain files stored on either network, hard drives or other external storage devices.
- SLO #3: RESEARCH AND APPLY INTERNET CONCEPTS AND SEARCH TECHNIQUES.
- Choose appropriate settings to control the behavior of web browsers.
- Demonstrate use of efficient Internet search techniques using search engines and subject directories.
- Create and manage Favorites, links, and browser home page settings.
- Identify some of the various security threats from Internet access and which operating system tools could be appropriate protection.
- Demonstrate effective use of electronic communication techniques.
CISC 310 Introduction to Computer Information Science
- Units:3
- Hours:54 hours LEC
- Prerequisite:None.
- Advisory:Students should be familiar with basic functions of word processing, spreadsheet, and web browser software applications, or they should have successfully completed a Computer Technology course in middle or high school.
- Transferable:CSU; UC
- General Education:AA/AS Area II(b); AA/AS Area III(b)
- C-ID:C-ID BUS 140; C-ID ITIS 120
- Catalog Date:January 1, 2025
This course covers fundamental concepts related to information technology and its applications in organizations and society. The student will learn about digital devices, computer software, networks, cybersecurity, information systems, database management, and related applied ethical considerations. The student will apply concepts by using hands-on projects to develop computer-based solutions.
Upon completion of this course, the student will be able to:
- Understand current and emerging information and communication technologies and their impact on organizations and society. (SLO#1).
- explain how computers represent data.
- distinguish various digital devices and their hardware components.
- categorize various types of software.
- distinguish various digital media file types.
- differentiate between various computer network types and scopes.
- discuss social issues pertaining to information technology, including ethics, copyright, privacy, and cybersecurity.
- Demonstrate an understanding of the development and use of information systems in organizations and society. (SLO#2)
- explain the secure use of various computing resources.
- use various cloud-based resources effectively.
- describe the phases of the System Development Life Cycle.
- Solve common problems using appropriate information technology applications and systems. (SLO#3)
- produce informative documents using word processing software.
- construct solutions to common problems using spreadsheet software.
- construct a simple database using database management software.
- develop basic software solutions using various internet technologies.
CISC 323 Linux Operating System
- Units:1
- Hours:18 hours LEC
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:January 1, 2025
This course introduces the Linux operating system for desktop computers. Concepts include kernels, file structures, Daemons, shells, GUIs, procedures for installing software, creation of user accounts, shell commands, scripts, and file security.
Upon completion of this course, the student will be able to:
- SLO #01: ANALYZE THE FUNDAMENTALS OF AN OPERATING SYSTEM.
- Demonstrate use of basic Linux commands and editing, disk, file, and printer management
feature.
- Compare Linux with other operating systems.
- SLO #02: EVALUATE SERVER HARDWARE.
- Analyze hard disk and memory management.
- Compare physical and logical drives and describe their functionality.
- SLO #03: ASSESS COMMON APPLICATIONS, PROTOCOLS, MEDIA AND SOFTWARE.
- Analyze the relationship of the operating system to other applications programs.
- Evaluate and formulate various command lines with correct syntax.
CISC 324 Intermediate Linux Operating System
- Units:1
- Hours:18 hours LEC
- Prerequisite:CISC 323 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This course covers the Linux operating system for desktop computers. It covers advanced shell scripting, C Shell, K Shell, and BASH. Other topics covered in this course include decision-making logic, looping, and nesting. Consult the class schedule for specific operating system offered.
Upon completion of this course, the student will be able to:
- SLO #01: EVALUATE AND CONTRAST DIFFERENT SERVER CONFIGURATIONS.
- Identify network operating system characteristics and versions.
- Apply Linux system concepts to install advanced Linux feature sets.
- Identify and verify the availability of system resources.
- Examine network operating system hardware requirements.
- Evaluate different network operating system installations and upgrades techniques.
- SLO #02: DIFFERENTIATE THE USE OF COMMON SHELL PROGRAMMING ENVIRONMENTS AND APPLICATIONS.
- Implement decision making logic in scripts.
- Create, analyze, and evaluate advanced script files.
- Compare C shell, K shell, and BASH.
- Implement looping and nesting in a script.
- Describe the function of monitoring processes.
- SLO #03: DISTINGUISH BETWEEN THE VARIOUS INSTALLATION METHODS.
- Examine network operating system hardware requirements.
- Identify characteristics of the IDE interface and configure IDE devices.
- Assess and identify the reason the cause for failed installations.
- SLO #04: EVALUATE METHODS TO MANAGE DISKS, FILE SYSTEMS, AND PERIPHERAL DEVICES.
- Investigate, configure, and troubleshoot volumes and disks.
- Design and configure removable media, such as tape devices, DVD and CD-ROM devices.
- Manage, configure, and troubleshoot input and output (I/O) devices.
- SLO #05: MANAGE USERS AND GROUPS.
- Manage user account properties.
- Manage and troubleshoot user permissions.
- Manage user and group rights.
CISC 356 Introduction to Local Area Networks
- Units:1.5
- Hours:27 hours LEC
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:January 1, 2025
From hubs to servers this course will introduce students to the exciting field of computer networking. Beginners will become comfortable with the concepts and vocabulary of computer networking and will gain hands-on experience in basic networking technology. Some topics include the Internet and its tools; the diversity of Network Operating Systems one can use in a Local Area Network; how to configure communication protocols, such as TCP/IP; the distinction between a Local Area Network and a Wide Area Network; and the fundamentals of network architecture and design.
Upon completion of this course, the student will be able to:
- EXPLAIN AND CONFIGURE BASIC FUNCTIONS AND PROPERTIES OF NETWORK OPERATING SYSTEMS FOUND ON TYPICAL LOCAL AREA NETWORKS (LANS) (SLO #01).
- Explain the fundamentals of network operating systems.
- Describe the basic steps of network operating system installation.
- Configure network services.
- DIFFERENTIATE BETWEEN CLIENT/SERVER AND CENTRALIZED NETWORKING ENVIRONMENTS (SLO #02).
- Discuss the differences between centralized and client/server computing.
- Identify and configure the functions of clients, servers and other networking equipment that make up a typical LAN.
- Explain how to implement a network environment with diverse operating systems.
- Discuss the basics of cloud computing.
- ASSESS BASIC NETWORK SECURITY REQUIREMENTS AND IMPLEMENT BASIC NETWORK SECURITY TOOLS (SLO #03).
- Develop a network security policy.
- Assess the physical security of network equipment.
- Understand network data security.
- DEMONSTRATE AND TEST BASIC LAN ADMINISTRATION AND SUPPORT TASKS (SLO #04).
- Manage network accounts.
- Monitor network performance.
- Protect network servers from data loss.
- DISCUSS VARIOUS METHODS FOR CONNECTING LANS TO WIDE AREA NETWORKS (WANS) (SLO #05).
- Discuss the technologies used in connecting LANs to WANs.
- Explain some of the terminology used in implementing WANs.
- Configure and describe remote access protocols.
- EXPLAIN AND DEMONSTRATE DIFFERENT APPROACHES TO NETWORK PLANNING AND TROUBLESHOOTING (SLO #06).
- Describe the benefits of network management and planning.
- Explain different approaches to network troubleshooting.
- Explain the types of specialized equipment and other resources for troubleshooting.
- Describe basic measures to take in common troubleshooting situations.
CISC 360 Information & Communication Technology Essentials (A+)
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:None.
- Advisory:CISC 302 and 310
- Transferable:CSU
- C-ID:C-ID ITIS 110
- Catalog Date:January 1, 2025
This course provides an introduction to the computer hardware and software skills needed to help meet the growing demand for entry-level ICT professionals. The
fundamentals of computer hardware and software, as well as advanced concepts such as security, networking, and the responsibilities of an ICT professional, will be introduced. This course helps to prepare students for the CompTIA A+ certification exam.
Upon completion of this course, the student will be able to:
- ASSEMBLE HARDWARE AND SOFTWARE COMPONENTS BASED ON CUSTOMER REQUIREMENTS (SLO #01).
- distinguish the various hardware and software components of a computer system.
- identify different hardware required for input, output, processing and storage of data on a personal computer.
- discuss and relate the phases of the System Development Life Cycle.
- OPERATE PERSONAL COMPUTERS, DEVICES, AND SOFTWARE FOR END USERS (SLO #02).
- define and correctly select an appropriate program for a given task.
- use the commands and features of office application software.
- use e-mail commands and features to send and receive messages, including attachments.
- demonstrate effective file management techniques.
- differentiate between various digital media file types.
- locate and launch programs successfully.
- differentiate between the most commonly used computer operating systems.
- differentiate between system software and application software.
- DEMONSTRATE BASIC DATA NETWORKING AND SECURITY/FORENSICS TECHNIQUES (SLO #03).
- differentiate between various computer network types and scopes.
- install and configure network adapters for effective operation on various networks.
- DEMONSTRATE BASIC VIRTUALIZATION, DESKTOP IMAGING, AND DEPLOYMENT OPERATIONS (SLO #04).
- prepare various operating system installation and deployment activities.
- install and configure operating systems in virtual environment.
- PROPERLY AND SAFELY DIAGNOSE, RESOLVE AND RECORD COMMON HARDWARE AND SOFTWARE ISSUES WHILE APPLYING TROUBLESHOOTING SKILLS (SLO #05).
- demonstrate effective troubleshooting techniques.
- operate search engines, browsers, and related web tools to effectively find information on the World Wide Web.
- demonstrate the secure utilization of Internet resources.
- PRACTICE APPROPRIATE CUSTOMER SUPPORT TECHNIQUES (SLO #06).
- demonstrate knowledge of the changing workplace, the work-site team and environment, and ethical behavior.
- analyze customer concerns effectively.
- address customer concerns appropriately and timely.
CISC 495 Independent Studies in Computer Information Science - Core
- Units:1 - 3
- Hours:54 - 162 hours LAB
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:January 1, 2025
An independent studies project involves an individual student or small group of students in study, research, or activities beyond the scope of regularly offered courses. See the current catalog section of "Special Studies" for full details of Independent Studies.
Upon completion of this course, the student will be able to:
- SLO #1: Actively engage in intellectual inquiry beyond that required in order to pass a course of study (College Wide Learning Outcome – Area 4).
- Discuss and outline a proposal of study (that can be accomplished within one semester term) with a supervising instructor qualified within the discipline.
- Design an independent study (to be completed individually or by collaboration of a small group) to foster special knowledge, skills, and experience that are not available in any one regularly scheduled course.
- Use information resources to gather discipline-specific information.
- SLO #2: Utilize modes of analysis and critical thinking to apply theoretical perspectives and/or concepts in the major discipline of study to significant problems and/or educational activities (College Wide Learning Outcome – Area 3).
- Analyze and apply the knowledge, skills and experience that are involved in the independent study to theoretical perspectives and/or concepts in the major discipline of study.
- Explain the importance of the major discipline of study in the broader picture of society.
- SLO #3: Communicate a complex understanding of content matter of the major discipline of study (College Wide Outcome – Area 3).
- Demonstrate competence in the skills essential to mastery of the major discipline of study that are necessary to accomplish the independent study.
- SLO #4: Identify personal goals and pursue these goals effectively (College Wide Outcome – Area 4).
- Utilize skills from the “academic tool kit” including time management, study skills, etc., to accomplish the independent study within one semester term.
CISC 498 Work Experience in Computer Information Science - Core
- Units:0.5 - 4
- Hours:27 - 216 hours LAB
- Prerequisite:None.
- Enrollment Limitation:Students must be in a paid or unpaid internship, volunteer position or job related to career goals in Computer Information Science.
- Transferable:CSU
- General Education:AA/AS Area III(b)
- Catalog Date:January 1, 2025
This course provides students with opportunities to develop marketable skills in preparation for employment in their major field of study or advancement within their career. It is designed for students interested in work experience and/or internships in transfer level degree occupational programs. Course content includes understanding the application of education to the workforce; completion of required forms which document the student's progress and hours spent at the work site; and developing workplace skills and competencies. Appropriate level learning objectives are established by the student and the employer. During the semester, the student is required to participate in a weekly orientation and complete 27 hours of related work experience for 0.5 unit. An additional 27 hours of related work experience is required for each additional 0.5 units. Students may take up to 16 units total across all Work Experience course offerings. This course may be taken up to four times when there are new or expanded learning objectives. Only one Work Experience course may be taken per semester.
Upon completion of this course, the student will be able to:
- SLO #1 DEMONSTRATE AN UNDERSTANDING AND APPLICATION OF PROFESSIONAL WORKPLACE BEHAVIOR IN A FIELD OF STUDY RELATED ONE’S CAREER.
- Understand the effects time, stress, and organizational management have on performance.
- Demonstrate an understanding of consistently practicing ethics and confidentiality in a workplace.
- Examine the career/life planning process and relate its relevance to the student.
- Demonstrate an understanding of basic communication tools and their appropriate use.
- Demonstrate an understanding of workplace etiquette.
- SLO #2 DESCRIBE THE CAREER/LIFE PLANNING PROCESS AND RELATE ITS RELEVANCY TO ONE'S CAREER.
- Link personal goals to long term achievement.
- Display an understanding of creating a professional first impression.
- Understand how networking is a powerful job search tool.
- Understand necessary elements of a résumé.
- Understand the importance of interview preparation.
- Identify how continual learning increases career success.
- SLO #3 DEMONSTRATE APPLICATION OF INDUSTRY KNOWLEDGE AND THEORETICAL CONCEPTS AS WRITTEN IN LEARNING OBJECTIVES IN PARTNERSHIP WITH THE EMPLOYER WORK SITE SUPERVISOR.
CISC 499 Experimental Offering in Computer Information Science - Core
- Units:0.5 - 4
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:January 1, 2025
This is a course designed to give students an opportunity to study topics in Computer Information Science which are not included in the current course offerings. This course may be repeated for credit providing there is no duplication of topics.
Computer Information Science - Data Science (CISD) Courses
CISD 299 Experimental Offering in Computer Information Science - Data Science
- Units:0.5 - 4
- Prerequisite:None.
- Catalog Date:January 1, 2025
This is the experimental courses description.
CISD 499 Experimental Offering in Computer Information Science - Data Science
- Units:0.5 - 4
- Prerequisite:None.
- Catalog Date:January 1, 2025
This is the experimental courses description.
Computer Information Science - Networking (CISN) Courses
CISN 300 Network Systems Administration
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISC 310 with a grade of "C" or better
- Transferable:CSU
- C-ID:C-ID ITIS 155
- Catalog Date:January 1, 2025
This course will provide a student with the knowledge and skills required to build, maintain, troubleshoot and support server hardware and software technologies. The student will be able to identify environmental issues; understand and comply with disaster recovery and physical/software security procedures; become familiar with industry terminology and concepts; understand server roles/specializations and interaction within the overall computing environment. Consult the class schedule for specific operating system offered.
Upon completion of this course, the student will be able to:
- SLO #01: EXAMINE SERVER FUNDAMENTALS
- Differentiate between peer-to-peer and client-server networking models
- Investigate server functions and benefits
- SLO #02: IDENTIFY THE HARDWARE COMPONENTS OF A SERVER
- Identify characteristics that distinguish server hardware from client hardware
- Rank user demands on a server
- Optimize server placement
- SLO #03: EVALUATE SERVER HARDWARE
- Evaluate motherboard buses
- Inspect common server processors, and common types of memory
- Contrast how clock frequency affects performance
- Compare physical and logical drives and describe their functionality
- Identify characteristics of the IDE interface and configure IDE cabling and connectors
- SLO #04: DESCRIBE THE FEATURES OF SERVER SOFTWARE
- Calculate, adequately test and pilot the server upgrade
- Verify the availability of system resources
- SLO #05: ASSESS COMMON NETWORKING PROTOCOLS, TOPOLOGIES, MEDIA AND EQUIPMENT
- Examine bus, ring, and star network topologies
- Describe Token Ring and Ethernet media access methods
- Uncover the purpose behind bridges, switches, hubs, and routers
- Discuss NetBEUI, IPX/SPX, and TCP/IP protocols
- SLO #06: CONTRAST DIFFERENT SERVER SOFTWARE
- Identify network operating system characteristics and versions
- Examine network operating system hardware requirements
- Judge different network operating system installations and upgrades techniques
- Configure, install, and maintain a Linux, and/or Windows network operating system
- SLO #07: DIFFERENTIATE THE USE OF COMMON NETWORK SERVICES AND APPLICATIONS
- Identify and understand major network operating system services
- Discuss the different ways that servers run network applications
- Describe the function of monitoring agents
- Specify the functions of the server as a network device
- Implement and configure IPv4 and IPv6 services.
CISN 301 Network Client Systems Administration
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISC 310
- Transferable:CSU
- Catalog Date:January 1, 2025
This course covers the administration of a client in a client/server network. Topics include designing a basic network, installing and configuring a client network operating system, managing network security with user and group accounts, creating directory structures and network shares, setting up and managing network printers, backing up servers, monitoring and troubleshooting network resources, and establishing policies and procedures for network operations.
Upon completion of this course, the student will be able to:
- SLO #01: DEDUCE THE DIFFERENCE BETWEEN A NETWORK CLIENT OPERATING SYSTEM AND A NETWORK SERVER OPERATING SYSTEM
- Evaluate client operating system support features
- Identify the role of a network client operating system in the enterprise
- SLO #02: DISTINGUISH BETWEEN THE VARIOUS INSTALLATION METHODS
- Assess the needs to upgrade from a previous operating system version
- Measure ways to migrate existing user environments to a new installation
- Inspect post-installation updates and product activation
- Reason the cause for failed installations
- SLO #03: EVALUATE METHODS TO MANAGE DISKS, FILE SYSTEMS, AND PERIPHERALS DEVICES
- Investigate, configure, and troubleshoot volumes and disks
- Design and configure removable media, such as tape devices, DVD and CD-ROM devices
- Manage, configure, and troubleshoot input and output (I/O) devices
- Manage printers and fax devices
- Manage print jobs
- SLO #04: MANAGE AND CONFIGURE THE USER'S EXPERIENCE
- Choose accessibility settings
- Manage desktop components
- Manage display options
- Choose regional and language settings
- Manage users’ profiles and data
- SLO #05: MANAGE APPLICATIONS
- Manage distribution of applications
- Investigate, and troubleshoot application compatibility with the network client operating system
- Manage and configure a web browser
- SLO #06: DISCOVER HOW TO CONNECT A NETWORK CLIENT OPERATING SYSTEM TO A NETWORK
- Investigate how to configure a wireless network
- Assess how to connect to a virtual private network (VPN)
- Manage and configure Remote Desktop and Remote Assistance
- Configure and troubleshoot the TCP/IP protocol
- SLO #07: MANAGE USERS AND GROUPS
- Manage user account properties
- Manage and troubleshoot cached credentials
- Manage user and group rights
- SLO #08: PLAN FOR COMPUTER SECURITY, RECOVERY AND PERFORMANCE
- Manage security configuration with templates
- Discover how to back up and restore systems and data
- Establish, implement, and monitor a security audit policy
- Monitor system performance
- Manage tasks
- Infer how to optimize memory, disk, and CPU performance
CISN 303 Network Administration - Linux Server
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISC 323 with a grade of "C" or better
- Transferable:CSU
- C-ID:C-ID ITIS 155
- Catalog Date:January 1, 2025
This course provides introductory coverage of Linux Network Administration. The course maps to the CompTIA Linux+ certification exam, and to SAIR/GNU's Linux Networking course. Specific course topic coverage includes: introducing Linux; exploring the desktop; using the Shell; understanding users and file systems; understanding text processing; managing processes; using network clients; installing Linux; understanding system initialization; managing software packages and file systems; managing users; configuring networks; system and kernel management; writing Shell scripts; and advanced topics and troubleshooting. The course requires many hands-on projects, which allow students to practice what they learn.
Upon completion of this course, the student will be able to:
- SLO #01: EXPLAIN THE BASIC FEATURES OF THE LINUX OPERATING SYSTEM IN COMPARISON TO OTHER OPERATING SYSTEMS
- Describe how Linux was created and how it compares to other operating systems
- Outline the skills required and challenges facing a system administrator
- Distinguish between the graphical system used by Linux and command line
- Support the basic features of the GNOME and KDE desktop interfaces
- SLO #02: UTILIZE THE SHELL AND EVALUATE ITS FUNCTIONALITY
- Manipulate variables in the shell to control the working environment
- Formulate data at the command-line and for print files
- Manipulate text using the vi editor
- Create and manage user and group accounts
- Construct access permissions on files and directories
- SLO #03: COMPARE AND CONTRAST DIFFERENT LINUX NETWORK TOOLS
- Demonstrate how to log in to a Linux system over a network connection. Describe how it is different from a Windows network connection.
- Select the appropriate command-line tools for common network services such as FTP and the Web
- Illustrate the difference between network interfaces using command-line and graphical utilities
- Apply the skill necessary to set up a simple DHCP server, and manage networked printing services
- SLO #04: ANALYZE AND ARTICULATE THE BASIC STEPS OF A LINUX SOFTWARE INSTALLATION
- Analyze the hardware components of your computer system
- Design a hard disk space to hold a new Linux installation
- Describe the steps that hardware starts a standard PC operating system
- Explain the difference between the LILO and GRUB boot loader
- Create the init program and the scripts used to start system services
- Manage system services after start-up
- SLO #05: MANAGE AND DESIGN LINUX SECURITY
- Manage users and groups
- Design secure networks and firewalls
CISN 304 Networking Technologies
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISC 356 with a grade of "C" or better
- Transferable:CSU
- C-ID:C-ID ITIS 150
- Catalog Date:January 1, 2025
This course introduces the architecture, structure, functions, components, and models of the Internet and other computer networks. Students achieve a basic understanding of how networks operate and how to build simple local area networks (LAN), perform basic configurations for routers and switches, implement Internet Protocol (IP) and enterprise technologies, including cloud and virtualization. Students will apply the knowledge and skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; and implement network security, standards, and protocols. Preparation for the CompTIA Network+ certification exam.
Upon completion of this course, the student will be able to:
- IDENTIFY THE PURPOSE AND FUNCTION OF THE MOST WIDELY USED PROTOCOLS (SLO #01).
- List the services provided by network protocols.
- Explain how the upper layers of the OSI model support network applications.
- IDENTIFY THE LAYERS OF THE OSI MODEL (SLO #02).
- Describe the functions associated with each of the OSI model layers.
- LIST THE CABLING TOPOLOGIES USED TO BUILD LOCAL AREA NETWORKS (SLO #03).
- Name the types of cables used to build LANs.
- List the grading systems used for the various cable types.
- Describe how to install cables externally, secure them in place, and run them around common obstacles.
- Explain the steps involved in an internal cable installation.
- Describe the wiring of a crossover cable.
- DESCRIBE THE FUNCTION OF TYPICAL NETWORKING HARDWARE (SLO #04).
- Associate the importance of the troubleshooting process with a network interface adapter.
- Describe the difference between a hub, switch and a router. Understand the functions of each.
- LIST THE ETHERNET PHYSICAL LAYER STANDARDS (SLO #05).
- Describe the functions of the Ethernet frame.
- List the physical layer options for Token Ring networks.
- Distinguish between the various types of FDDI network connections.
- DESCRIBE THE FUNCTIONS OF THE INTERNET PROTOCOL (IP) PROTOCOL AND THE VARIOUS IP HEADER FIELDS (SLO #06).
- Summarize the basics of IP addressing, routing, and fragmentation.
- Describe the functions of the Internetwork Packet Exchange (IPX) protocol and the various IPX header fields.
- List the function of the Address Resolution Protocol (ARP).
- Describe the functions of the Internet Control Message Protocol (ICMP).
- Configure switches and end devices to provide access to local and remote network resources.
- IDENTIFY THE FUNCTIONS OF A ROUTER AND DESCRIBE THE INFORMATION IN A ROUTING TABLE (SLO #07).
- Distinguish between static and dynamic routing.
- Create a static route in a routing table.
- Explain the operation of routing protocols.
- IDENTIFY HOW TO CONFIGURE TCP/IP CLIENT PARAMETERS ON AN OPERATING SYSTEM (SLO #08).
- Configure a small network with security best practices.
- Create IPv4 and IPv6 addressing schemes and verify network connectivity between devices.
- Identify the directory services provided with major operating systems.
- Explain how Dynamic Host Configuration Protocol (DHCP) assigns TCP/IP configuration settings to workstations.
- SUMMARIZE THE MECHANISMS USED TO MAKE NETWORK DATA CONTINUOUSLY AVAILABLE (SLO #09).
- Describe how clustering ensures the constant availability of vital network servers.
- Report how to use redundant equipment to provide fault-tolerant network communications.
- Describe the types of hardware used to perform backups.
- Outline the capabilities of software backup products.
- Distinguish among full, incremental, and differential backups.
- DESCRIBE THE TYPES OF TECHNOLOGIES USED TO CONNECT REMOTE COMPUTERS TO NETWORKS (SLO #10).
- Express how frame relay provides flexible wide area networks (WAN).
- Describe the characteristics of the Asynchronous Transfer Mode (ATM) protocol.
- Describe the Serial Line Internet Protocol (SLIP) and Point-to-Point Protocol (PPP) frame formats.
- LIST THE TOOLS USED TO MONITOR SYSTEM AND NETWORK PERFORMANCE IN THE MAJOR NETWORK OPERATING SYSTEMS (SLO #11).
- Describe the troubleshooting functions of crossover cables and loopback connectors.
- List the capabilities of more elaborate cable testing equipment.
- Describe the process of isolating the source of a network problem.
- Distinguish among network problems, computer problems, and user problems.
CISN 341 CISCO Networking Academy (CCNA)tm:Switching, Routing, and Wireless Essentials
- Units:3.5
- Hours:54 hours LEC; 27 hours LAB
- Prerequisite:None.
- Corequisite:CISN 304
- Transferable:CSU
- C-ID:C-ID ITIS 151
- Catalog Date:January 1, 2025
The second course in the CCNA curriculum focuses on switching technologies and router operations that support small to medium business networks and includes wireless local area networks (WLANs) and security concepts. Students learn key switching and routing concepts. Students will perform basic network configuration and troubleshooting, identify and mitigate LAN security threats, and configure and secure a basic WLAN.
Upon completion of this course, the student will be able to:
- TROUBLESHOOT AND SOLVE ROUTING PROBLEMS WITHIN A ROUTING DOMAIN (SLO 1).
- Understand and describe the purpose, nature, and operations of a router, routing tables, and the route lookup process, dynamic routing protocols, distance vector routing protocols, and link-state routing protocols, the purpose and types of access control lists (ACLs), and the operations and benefits of Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS) for IPv4 and IPv6, and Network Address Translation (NAT).
- CONFIGURE AND TROUBLESHOOT BASIC OPERATIONS OF A SMALL SWITCHED NETWORK (SLO 2).
- Configure and verify static routing and default routing; configure and troubleshoot basic operations of routers in a small routed network including Routing Information Protocol (RIPv1 and RIPv2) and Open Shortest Path First (OSPF) protocol (single-area OSPF); Configure, monitor, and troubleshoot ACLs for IPv4 and IPv6; and configure and troubleshoot NAT operations.
- CONFIGURE AND TROUBLESHOOT VLANS IN A SMALL SWITCHED NETWORK (SLO 3).
- Configure VLANs and Inter-VLAN routing while applying security best practices.
- Troubleshoot inter-VLAN routing on Layer 3 devices.
- Configure redundancy on a switched network using STP and EtherChannel.
- Configure WLANs via a WLC while using L2 security best practices.
- Configure switch security to mitigate LAN attacks.
- Configure IPv4 and IPv6 static routing on routers.
CISN 342 CISCO Networking Academy (CCNA)tm: Enterprise Networking, Security, and Automation
- Units:3.5
- Hours:54 hours LEC; 27 hours LAB
- Prerequisite:CISN 341 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This course provides advanced routing and switching technologies. Topics include advanced router configurations, network management, network design, WANs concepts and network security. This is the third course in preparation for CISCO CCNA certification examination. CRC is a certified CISCO Networking Academy, and all courses are taught by CISCO Certified Academy Instructors (CCAI).
Upon completion of this course, the student will be able to:
- SLO 1 - Configure a wide area network.
- Install and maintain a multi-protocol routed network.
- SLO 2 - Implement network security concepts.
- SLO 3 - Explain how networking devices implement QOS.
- Design, implement, configure and troubleshoot enterprise networks.
- Explain the purpose and characteristics of network virtualization.
CISN 490 Networking Helpdesk Practicum
- Units:3
- Hours:36 hours LEC; 54 hours LAB
- Prerequisite:CISC 360, CISN 300, and CISN 304 with grades of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This course focuses on key information and skills for user support professionals, including troubleshooting and problem solving, successful communication with users, determining a client's specific needs, and training end users. For those considering entering the field, alternate career paths for user-support workers are covered. With balanced coverage of both people skills and technical skills, this course is an excellent resource for those in or preparing for the technical-support field.
Upon completion of this course, the student will be able to:
- SUMMARIZE THE NEED FOR EFFECTIVE COMPUTER USER SUPPORT (SLO #01).
- Define the term end-user computing and briefly describe the developments that led to end-user computing and user support.
- Describe the characteristics of early computer systems.
- Describe a microcomputer.
- Discuss the basic hardware and add-on peripherals that are commonly used.
- Define the total cost of ownership (TCO).
- Discuss the different types of user support and names for user support personnel, including help desk, call center, and technical support.
- DEMONSTRATE EFFECTIVE COMMUNICATION SKILLS (SLO #02).
- Define the term customer-service ethic and explain why organizations place so much emphasis on excellent customer service.
- Discuss strategies for building understanding, and the importance of ethics in the workplace.
- Define the term incident management strategy.
- Categorize the four dimensions of personality measured on the Myers-Briggs Type Indicator (MBTI) personality analysis.
- Describe a difficult client.
- REVIEW THE SKILLS FOR TROUBLESHOOTING COMPUTER PROBLEMS (SLO #03).
- Define the term troubleshooting and explain that troubleshooting computer problems is an iterative process that does not have a fixed series of steps.
- Define the term problem solving and explain how problem solving might apply to fixing a malfunctioning printer, for example.
- Explain how troubleshooters must use decision-making skills to choose between several possible solutions to a problem.
- Describe the different ways that troubleshooters must use communication skills to get information about the problem and to communicate the solution.
- Explain that active listening plays an important role in understanding the problem. Paraphrasing can be helpful in making sure the troubleshooter has an accurate picture of what is going on.
- Define the term escalation and explain how this approach can help solve a problem that does not yield to more common methods.
- Define the term replication and explain how this strategy can help to solve a problem.
- Discuss how hardware and software device configuration should be examined for possible fixes.
- EXAMINE COMMON SUPPORT PROBLEMS (SLO #04).
- Define the term bug and describe the ways in which software vendors repair bugs and add new features using patches, updates, service packs, releases, new versions, and upgrades. Describe how release numbers are used to label software versions.
- Explain that performance problems result from poor interaction between hardware and software.
- Describe the types of misunderstandings that may cause users to perceive that there is a computer problem.
- DESCRIBE THE FUNCTION OF A HELP DESK (SLO #05).
- Define the term incident management and the more specific term call management.
- Discuss the importance of making sure the user is qualified to receive support.
- Describe the manner in which a support agent assigns a priority code to an incident. Explain that the priority code determines the position of the incident in the incident queue.
- Review the factors that may cause job stress for support workers.
- Describe the importance of the managerial role to help desk support staff.
- DEVELOP AND IMPLEMENT TYPICAL PRODUCT SUPPORT STANDARDS (SLO #06).
- Examine the resources that can be used to help make product evaluation decisions.
- Review the criteria for choosing to upgrade to a newly released product or service.
- Discuss the balance between allowing users freedom to choose the best software and hardware for their specific purposes and providing support services for a diverse base of different products.
- MEASURE A USER’S NEEDS (SLO #07).
- Define the problem clearly.
- Identify the roles of stakeholders.
- Identify sources of information.
- Develop an understanding of the existing system.
- Investigate alternatives to the existing system.
- Develop a model of the proposed solution.
- DEMONSTRATE HOW TO INSTALL AND MANAGE END-USER COMPUTERS (SLO #08).
- Review pre-installation site preparation tasks.
- Discuss the purpose and contents of a site management notebook.
- Define the steps to install and configure hardware, operating systems, networks, and application software.
- Analyze ongoing site management tasks.
- REVIEW HOW TO TRAIN END-USERS (SLO #09)
- Identify the four steps in the training process: planning, preparation, presentation, and progression.
CISN 499 Experimental Offering in Computer Information Science - Networking
- Units:0.5 - 4
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:January 1, 2025
This is the experimental courses description.
Computer Information Science - Programming (CISP) Courses
CISP 300 Algorithm Design/Problem Solving
- Units:3
- Hours:54 hours LEC
- Prerequisite:Intermediate Algebra (or equivalent in high school) or higher with a C or better or eligibility for transfer-level mathematics.
- Transferable:CSU; UC
- General Education:AA/AS Area II(b)
- Catalog Date:January 1, 2025
This course covers the design and debugging of software applications. Students will learn the programming concepts that are part of every desktop, web, mobile, and database application and every programming language.
Upon completion of this course, the student will be able to:
- Design a software application (app) with a text-based user interface that solves a word problem. (SLO 1)
- Design the content and format of the user interface for the app.
- Determine valid ranges for app input data. Alert users of the valid ranges with clear input prompts.
- Develop the sequence of calculation steps in the app to convert starting data values into answer(s). There may be more than one set of calculation steps for a given word problem.
- Manage the data used by an algorithm (SLO 2)
- Classify data as a real number, an integer number, a string, or a Boolean value.
- Identify and descriptively name the variables necessary for a set of calculation steps.
- Distinguish between literal data and data stored in variables.
- Recognize that string data can be considered as one entity, as a collection of substrings, or as a collection of individual characters, depending on the needs of an algorithm.
- Apply the foundational data operations in programming (SLO 3)
- Create one variable of a specific data type to hold one piece of data.
- Display one or more pieces of data on one line of the execution window.
- Assign one piece of data to one variable of the same type. The data may be literal or input from the keyboard.
- Combine two pieces of same type data into one. Two numbers will combine through arithmetic. Two strings will combine through concatenation.
- Compare two pieces of same type data. The result will be a Boolean value.
- Translate an algorithm into a set of data operations and data (SLO 4)
- Create a sequence of operations to capture initial data, transform the data into correct answer(s), and display results to the user. Every operation will execute for every application execution.
- Design conditional structures based on comparisons of current data values. The conditional structures (ifs) will execute one of several sets of algorithm operations. Which set of operations executes depends on current data values during an execution.
- Design repetition structures based on comparison(s) of current data values. The repetition structures (loops) will execute a part of the algorithm operations from zero to many times depending on current data values.
- Combine several repetition and/or conditional structures to perform complicated logic in an algorithm.
- Organize an algorithm into functions (SLO 5)
- Use predefined library functions to do a task in an algorithm.
- Design and test custom functions to do a task in an algorithm. These functions will contain foundational data operations, loops, and ifs.
- Create local (function) scope variables and parameters.
- Design the data transfer into and out of a function.
- Design and debug fully modularized algorithms with one main() function and one or more custom functions.
- Process string data (SLO 6)
- Use library functions to search string data for a substring value, access an individual character in a string using a zero-based index, determine the current length of a string, or combine two strings into one longer string using concatenation.
- Combine data operations, repetition structures, conditional structures, and library function calls to perform complicated tasks like find-and-replace with strings.
- Verify the correctness of an algorithm (SLO 7)
- Execute an algorithm by hand using several sets of starting data. Each execution will follow the algorithm steps exactly as written. The execution will generate one window and one set of answers for one set of input data.
- Correct the algorithm sections that cause incorrect answers. Continue testing and rewriting the algorithm until the algorithm gives correct results for all valid input data.
CISP 310 Computer Architecture and Organization
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:CISP 360 with a grade of "C" or better
- Transferable:CSU; UC
- C-ID:C-ID COMP 142
- Catalog Date:January 1, 2025
This course is an introduction to computer architecture using assembly language programs. Topics include: binary representation of data and instructions, memory addressing modes, subroutines and macros, operating system interrupts, processor architecture, and interfacing with high level languages.
Upon completion of this course, the student will be able to:
- SLO 1: RECOGNIZE THE COMPUTER ARCHITECTURE ISSUES NEEDED TO WRITE ASSEMBLY LANGUAGE CODE.
- Analyze the architecture of a processor and the organization of its memory by discussing such topics as registers, clock speed, busses, and addressing modes.
- SLO 2: COMPARE AND CONTRAST THE BINARY REPRESENTATION OF DATA AND ASSEMBLY LANGUAGE INSTRUCTIONS.
- Analyze the binary representation of data using contextual clues to translate the data into characters, positive or negative integers, positive or negative fractional numbers, or machine instructions.
- Correlate integer values in different bases (e.g. binary, octal, decimal, and hexadecimal).
- Correlate the external (monitor) string representation of numbers and their internal (memory) binary format.
- SLO 3: CREATE ASSEMBLY LANGUAGE PROGRAMS THAT ACCEPT INPUT, PERFORM CALCULATIONS AND MAKE DECISIONS BASED ON THE INPUT, AND DISPLAY AN ANSWER.
- Solve memory access problems by using the addressing modes supported by the processor.
- Solve bit-level problems using AND, OR, NOT, XOR and bit-shifting instructions on binary values.
- Solve simple calculation issues using arithmetic instructions.
- Solve keyboard input and display monitor output problems using operating system interrupt calls.
- Differentiate between the temporary storage of the stack and named memory locations (variables).
- Compare and contrast subroutines and macros to organize assembly language statements. Create subroutines and macros, both internal and external to the main body of the program.
- Understand the role of the stack and the instruction pointer register in subroutine execution.
- SLO 4: EXPLAIN THE ROLES OF SOFTWARE IN THE CREATION, BUILDING, AND DEBUGGING OF EXECUTIBLE FILES USING ASSEMBLY LANGUAGE.
- Coordinate the use of text editors, compilers, linkers, and debuggers during the creation of assembly language programs.
- Analyze the memory space (RAM and registers) of an executing program with a debugging tool to trace the execution and determine the correctness of the execution.
- Explain how memory is allocated for a program during the compilation process.
CISP 350 Database Programming
- Units:3
- Hours:54 hours LEC
- Prerequisite:CISA 320 with a grade of "C" or better; and three units in any programming language.
- Transferable:CSU; UC
- General Education:AA/AS Area II(b)
- Catalog Date:January 1, 2025
This is an introductory course in programming databases. Topics include analysis and design, modular programming, screen displays and menus, and multiple databases.
Upon completion of this course, the student will be able to:
- IDENTIFY THE PURPOSE OF COMMON DATABASE LANGUAGES (SLO# 1)
- Write, develop and synthesize programs in one of the common database languages.
- Describe the fundamentals of SQL programming language.
- Analyze, comprehend problems for computer applications, as evidenced through program documentation.
- Explain how SQL programming language is used to extract data from the database.
- Assess and utilize common SQL query constructs.
- Distinguish between Data Definition Language (DDL) and Data Manipulation Language (DML).
- List common structure of a database query using SQL.
- Utilize SQL select statements for sorting and grouping data from the database.
- DEVELOP REPORTS TO DISPLAY DATA EXTRACTED FROM THE DATABASE (SLO# 2)
- Design and produce small databases,
screen displays.
- Organize data to generate reports based on data in the database that conform to user requests.
- DESCRIBE THE FUNCTION OF VARIOUS JOINS (SLO# 3)
- Utilize the fundamental vocabulary and constructs of SQL to perform joins on tables in the database.
- Outline the various types of table joins.
- Distinguish among outer and inner joins.
- ANALYZE AND DEVELOP PL/SQL SCRIPTS (SLO# 4)
- Create Pl/SQL as a programming tool to enable automation of multiple database interaction tasks.
- Develop PL/SQL scripts to meet programming specifications.
- Develop, write, assess and evaluate triggers.
- Analyze PL/SQL script algorithms to achieve desired output.
CISP 351 Introduction to Relational Database Design and SQL
- Units:3
- Hours:54 hours LEC
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:January 1, 2025
This course is designed to introduce relational database technology, normalization, entity relationships, logical model design, and ISO-ANSI standard Structured Query Language (SQL). Topics covered include: database design, basic properties of a relational database such as relations, tables, primary keys, foreign keys and principles of normalization, simple SQL select statements, sorting and grouping data, joining tables, subqueries and views. The course covers core concepts in identifying data and information management requirements for organizations, data modeling, and normalization techniques. The database design section focuses on logical model design and entity relationship (ER) modeling. The course exposes students to the use of Relational Database Management Systems using an industrial-strength database management system. Students will leave the course with a good working knowledge of database technology.
Upon completion of this course, the student will be able to:
- SLO# 1: Demonstrate an understanding of basic Relational Database Management System terminology
- Define, compare and contrast database design and tradeoff methodologies, Relational Database Management Systems
- Develop and utilize the fundamental vocabulary and constructs of the SQL.
- SLO# 2: Define and understand the concept of joins, sorting and grouping data, joining tables, subqueries and views.
- Construct and implement easy to medium difficulty queries in SQL
- create database objects using Data Definition Language.
- SLO# 3: construct subqueries, and joins using Data Query Language.
- demonstrate an understanding of transaction control statements in SQL.
- SLO# 4: Demonstrate a basic understanding of logical model design and entity relationship (ER) modeling.
- Explain normalization and entity-relationships in table design
CISP 352 Intermediate SQL
- Units:3
- Hours:54 hours LEC
- Prerequisite:None.
- Advisory:CISP 351
- Transferable:CSU
- Catalog Date:January 1, 2025
This course builds upon the Introduction to Relational Databases and SQL course with more in-depth SQL constructs common to most commercial database products and extensions to the SQL language. Topics include: complex joins including inner and outer joins, correlated subqueries, complex table definition, table and column constraints, Union, Intersection, Minus, triggers, procedures and packages.
Upon completion of this course, the student will be able to:
- SLO# 1: Design, implement, and demonstrate an understanding of SQL constructs to include data definition language, data manipulation language, and data query language
- Design and implement queries for information extraction from databases
- SLO# 2: Demonstrate use advanced SQL concepts like multiple-table joins, subqueries and logical data extraction.
- SLO# 3: Distinguish and utilize the concept of joins, sorting and grouping data, joining tables, subqueries and views.
- SLO# 4: Design and implement medium to complex difficulty queries in SQL using procedures, packages and triggers.
CISP 353 Application Development in a Client Server Environment
- Units:3
- Hours:54 hours LEC
- Prerequisite:None.
- Advisory:CISP 352
- Transferable:CSU
- Catalog Date:January 1, 2025
This course is designed for the intermediate level SQL programmer to design, create and deploy GUI applications that access relational database management systems. Topics include: GUI design fundamentals, data control and access methods (remote and local), creating datasets, implementing joins, transaction processing, multi-user data access, record locking, and deploying and installing applications on client workstations.
Upon completion of this course, the student will be able to:
- SLO# 1: Design and develop robust Graphical User Interfaces (GUIs).
- Choose input and output controls to place on the GUI that allow clear communication between the program and the end user, as defined by the current version of Visual Basic.
- Design GUI behavior to limit user options with the techniques of hiding or disabling controls based on the previous user actions.
- Ensure that positive user action is required to display the output for each new set of inputs, utilizing the specific technique that depend on the abilities of the current version of Visual Basic.
- Use common VB.NET Windows controls effectively in an application (for example, TextBox, CheckBox, RadioButton, Label, PictureBox, GroupBox, ListBox, and ComboBox.
- SLO #2: Install a GUI application on a client workstation.
- Choose input and output controls to place on the GUI that allow clear communication between the program, the end user and the underlying database.
- Design GUI behavior to limit user options with the techniques of hiding or disabling controls based on the previous user actions.
- Ensure that positive user action is required to display the output for each new set of inputs.
- SLO #3: Use software to establish connection to database server.
- Access remote and local data on a database server.
- SLO #4: Develop and implement input data validation.
- Implement logic that ensures that input data is valid before using the data.
- Demonstrate the process to hide or disable controls on the GUI and alert the user of an input error for invalid input data.
- Construct methods to identify user input errors.
- Access and read input data from a text file.
- SLO #5: Construct MDI applications with menus.
- Organize related clickable operations into a pull-down or pop-up menu.
- Design GUI behavior to perform advanced processing options with the techniques of selecting data from the database based on user input.
- Construct an application that allows users to input select criteria to be passed as parameters to queries.
CISP 354 Introduction to Relational Database Administration
- Units:3
- Hours:54 hours LEC
- Prerequisite:None.
- Advisory:CISP 352
- Transferable:CSU
- Catalog Date:January 1, 2025
This course is designed to introduce students to administering a relational database management system. Topics include: managing users, privileges, resources, and tablespaces; creating an operational database, managing database files; how to start up and shut down an instance or database, the data dictionary, transaction processing, and backup and recovery issues. Completion will provide students with sufficient knowledge for an entry level Database Administration position in industry.
Upon completion of this course, the student will be able to:
- DESCRIBE NORMALIZATION OF DATA IN A DATABASE (SLO #01).
- Evaluate database model for conformance to various normal forms.
- Audit the normalization process to the third normal form.
- Convert database model between 1st, 2nd, and 3rd normal forms.
- SUMMARIZE THE MECHANISMS USED TO INSTALL A RELATIONAL DATABASE MANAGEMENT SYSTEM(SLO #02).
- Classify, install, incorporate, prepare and manage a Relational Database Management System (RDBMS) installation.
- Demonstrate, simulate outline and sketch start up and shut down of a database.
- LIST THE TOOLS USED TO MONITOR THE DATABASE FOR TYPICAL USER CONFIGURATION (SLO #03).
- Prepare, tabulate, employ and compile typical configurations of client workstations to access the RDBMS.
- Document common configurations to be deployed across workstations to enable access to the RDBMS.
- Differentiate between user and administration configurations of the RDBMS.
- IDENTIFY HOW TO MANAGE USERS WITH ACCESS TO THE RDBMS(SLO #04).
- Validate and demonstrate ability to create, modify and remove users, groups and roles.
- Evaluate existing user roles and manager user permissions.
- DESCRIBE THE TYPES OF BACKUP METHODOLIGIES USED TO BACKUP DATA IN THE DATABASE(SLO #05).
- Formulate, draft and incorporate database backup and recovery procedures.
- Document database backup plan for review.
- SUMMARIZE MECHANISMS USED TO MAKE USER ACCESS TOT THE DATABASE CONTINUOUSLY AVAILABLE (SLO #06).
- Define, Plan, audit and critique system documentation.
- Generate user help documentation for ease of access to the RDBMS and user accounts.
- Create user FAQ to provide user self-help guide.
CISP 356 Relational Database Design and Information Retrieval
- Units:3
- Hours:54 hours LEC
- Prerequisite:CISP 350 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This course is designed to serve as an advanced-level course within the Database Design certificate. The course covers advanced database concepts. Topics include: data analysis, principle data models with emphasis on the relational model, entity-relationship diagrams, logical design, data administration and normalization.
Upon completion of this course, the student will be able to:
- SLO#1: assess and utilize knowledge of the scientific method in database design.
- compare and contrast the scientific method to other ways of information retrieval.
- evaluate and report the various advantages and disadvantages.
- SLO#2: evaluate the various relational database design approaches.
- analyze and describe the major paradigms within database architectures.
- apply and synthesize knowledge of concepts, theory, and research findings surveyed within the following sub-disciplines in database modeling: Semantic object modeling, object oriented modeling, entity relationship diagrams, data normalization, network and hierarchical architectures.
- SLO#3: infer and sketch trends within the field.
- develop and evaluate information retrieval and presentation techniques including SQL, form and report generation.
- adapt and extrapolate the database modeling and information retrieval processes and its connection to other fields.
- SLO#4: critique, analyze and demonstrate tradeoffs in relational database design methodologies
CISP 360 Introduction to Structured Programming
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:CISP 300 or MATH 400 with a grade of "C" or better, or placement through the assessment process.
- Transferable:CSU; UC
- General Education:AA/AS Area II(b)
- C-ID:C-ID COMP 112
- Catalog Date:January 1, 2025
This course is an introduction to structured programming. Sample topics include typed variables and constants, operators, control structures, standard libraries, arrays, pointers, I/O with keyboard/monitor and files, and an introduction to objects.
Upon completion of this course, the student will be able to:
- SLO 1: DEMONSTRATE AN UNDERSTANDING OF STRUCTURED PROGRAMMING CONCEPTS
- Write clear and complete comments to describe the logic of an algorithm that has been translated into a set of structured programming instructions.
- Create programs that accept input from either the keyboard or a file and to send output to a file or the monitor.
- Organize conditional and repeated algorithm steps into conditional (If) and looping control statements.
- Organize program instructions into logically separate procedures. Each procedure will communicate with other procedures through argument lists.
- Write instructions to store data temporarily (in variables, constants, or arrays) or permanently (in files).
- Select an appropriate data type (integer, floating point, character, string, boolean, etc.) to temporarily store intermediate results.
- Compare the advantages and disadvantages of using local, procedure, and global scope for variables. Select the appropriate variable scope for assigned programs.
- Compare and contrast the use of arrays and structures. Select the appropriate one for assigned programs.
- Dynamically allocate and access memory using a language concept such as pointers.
- SLO 2: DISCUSS AT AN INTRODUCTORY LEVEL THE USE OF CLASSES AND OBJECTS IN A PROGRAM
- Compare the use of objects to store data with the use of non-object variables or arrays or structures.
- Recognize the format of a class definition and the relationship between a class and objects that are based on that class.
- SLO 3: USE DEBUGGING SOFTWARE TO TEST PROGRAMS FOR CORRECT EXECUTION
- Test completed programs for correct execution using a set of possible input values. Debugger software will be used to view intermediate results for input values that lead to incorrect results.
- Find existing procedure libraries and include these in programs to take advantage of pre-defined language capabilities such as keyboard input and monitor output.
CISP 370 Beginning Visual Basic
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:None.
- Advisory:CISC 310 or CISP 300
- Transferable:CSU; UC
- General Education:AA/AS Area II(b)
- Catalog Date:January 1, 2025
This course covers development of Windows-based desktop applications using VB.NET. Topics include best practices for GUI design, use of the Visual Studio .NET development software, organizing code into procedures and modules, calculation techniques, input data validation, file I/O, variable scope, arrays, multiple-window applications, and class development. This course is designed for students who want a strong foundation in building GUI applications and transfer MIS majors.
Upon completion of this course, the student will be able to:
- SLO #1: Design and develop robust Graphical User Interfaces (GUIs).
- Choose input and output controls to place on the GUI that allow clear communication between the program and the end user.
- Design GUI behavior to limit user options with the techniques of hiding or disabling controls based on the previous user actions.
- Ensure that positive user action is required to display the output for each new set of inputs.
- Use common VB.NET Windows controls effectively in an application. Examples are the TextBox, CheckBox, RadioButton, Label, PictureBox, GroupBox, ListBox, and ComboBox.
- SLO #2: Implement programming logic using Visual Basic procedures.
- Implement logic within event handler procedures to respond to user actions on the GUI such as clicking, scrolling over, and tabbing.
- Demonstrate understanding of the use of by-reference and by-value parameters in procedures.
- Use pre-existing procedures such as Val() and IsNumeric() to simplify a program.
- SLO #3: Develop and implement input data validation.
- Implement logic that ensures that input data is valid before using the data.
- Hide or disable controls on the GUI and alert the user of an input error for invalid input data.
- SLO #4: Develop and implement data storage strategies.
- Create variables of the appropriate type and scope for temporary storage of data.
- Write to a text file to permanently store data.
- Read input data from a text file.
- SLO #5: Group related data and procedures together.
- Temporarily store related constants in a construct such as an enumeration.
- Temporarily store related data in one-dimensional and two-dimensional arrays.
- Organize functionally related controls in a "grouping" control such as a GroupBox.
- Organize a block of code that performs a single task into a custom procedure. If the task is calculation of a single value, use a function. For all other tasks, use a subroutine.
- Organize related clickable operations into a pull-down or pop-up menu.
- Recognize a class as a grouping of functionally related variables and procedures.
- SLO #6: Use the Integrated Development Environment (IDE) to build, compile, execute, and debug Visual Basic applications.
- Create a Windows Application project.
- Uncover answers to syntax questions using the Help utility of the IDE.
CISP 400 Object Oriented Programming with C++
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:CISP 360 with a grade of "C" or better
- Transferable:CSU; UC
- General Education:AA/AS Area II(b)
- C-ID:C-ID COMP 122
- Catalog Date:January 1, 2025
This course is an intermediate C++ course designed to further enhance the students’ abilities to design and develop object-oriented programs. Included is an emphasis in higher level programming skills development. Detailed information into class design and implementation, function templates, dynamic data allocation, pointers, strings, arrays, control structures, operator overloading, inheritance, virtual functions, polymorphism, data stream input and output, exception handling and file processing. (C-ID COMP 122)
Upon completion of this course, the student will be able to:
- SLO #1: DEMONSTRATE AN UNDERSTANDING OF C++ OBJECT ORIENTED PROGRAMMING (OOP) CONCEPTS.
- understand and recall an intermediate-level of OOP terminology, such as inheritance, composition, and polymorphism.
- compare and contrast C and C++ languages and understand and know how to use the existing classes and functions.
- SLO # 2: APPLY THE LEARNED CONCEPTS TO CREATE EFFECTIVE AND EFFICIENT PRODUCTION C++ PROGRAMS.
- Design and implement higher level programming interfaces through the use of abstract data type (ADT) and create new classes.
- Design and implement intermediate level programming assignments by using operator overloading, templates, exception handling, file processing, pointers and strings.
- SLO # 3: USE WINDOWS DEBUGGING SOFTWARE TO TEST PROGRAMS FOR CORRECT EXECUTIONS.
- Work with non-text files and design programs in a graphic user interface compiler.
- SLO # 4: COMMUNICATE, SUPPORT, ANALYZE AND ADAPT DIFFERENT LOGIC AND PROGRAMS.
- Work effectively as part of a project team.
CISP 401 Object Oriented Programming with Java
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:CISP 360 with a grade of "C" or better
- Transferable:CSU; UC
- Catalog Date:January 1, 2025
This course is an introduction to object oriented programming using the Java language. The student will learn the Java programming language as well as the Java compiler. Topics will include: creating Java applications, writing Java applets, using the control statements, creating Java methods, declaring Java arrays, object-based programming, object-oriented programming: inheritance and polymorphism, handling strings and characters, controlling graphics by using graphics and Java 2D, generating graphics by using graphical user interface components, exception handling, multithreading, and managing files and streams handling.
Upon completion of this course, the student will be able to:
- SLO #1: DISCOVER AND UNDERSTAND THE OBJECT ORIENTED JAVA PROGRAMMING CONCEPTS, KNOWLEDGE AND POTENTIALS.
- Understand the Java software development "Process and Object Oriented Methodology" (such as Inheritance, Polymorphism, Abstract Classes, and Interfaces).
- Comprehend the Java Applications, Applets, multithreading and GUI Components creations.
- Demonstrate knowledge in Strings Handling, Function Overloading, and Arithmetic Operations of Java language.
- Describe the Data and Files process, Input / Output Control and exception handling.
- SLO # 2: APPLY THE LEARNED JAVA KNOWLEDGE TO CREATE EFFECTIVE AND EFFICIENT PRODUCTION JAVA PROGRAMS USED IN COMPUTERS AND WEB SITES.
- Solve a program question by using Java language.
- SLO # 3: USE JAVA INTERGRATED DEVELOPMENT ENVIRONMENT DEBUGGING SOFTWARE TO TEST PROGRAMS FOR CORRECT EXECUTIONS.
- Work in a Java IDE.
- SLO # 4: COMMUNICATE, SUPPORT, ANALYZE AND ADAPT DIFFERENT LOGIC AND JAVA PROGRAMING SKILL LEVELS WITH PROJECT TEAM MEMBERS.
- Work effectively in a team project environment.
CISP 402 Java - Data Handling
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:CISP 401 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This course is an intermediate JAVA class. The student will enhance their knowledge in Java Application Program Interface (API) and programming skills. Topics will include Files and Streams, Networking, Multimedia (Images, Animation and Audio), Data Structures, Java Utilities Package and Bit Manipulation, Collections, Java Database Connectivity with JDBC™, Servlets and JavaServer Pages (JSP).
Upon completion of this course, the student will be able to:
- SLO #1: EMPLOY JAVA TO CREATE HIGHER LEVEL PROGRAMS.
- Use Java to design a complete graphic user interface.
- Implement a data structure by using JAVA API (such as Stack, Collections, Queues, Utilities Package, etc).
- SLO #2: CONSTRUCT DATABASE AND INFORMATION SHARING ENVIRONMENTS.
- Compose a networking connection program and be able to share information in the environment.
- Construct Java Database Connectivity with JDBC™.
- Access existing system by using Servlets.
- SLO #3: SUPPORT ANIMATION, AUDIO, VIDEO, TEXT, AND DIFFERENT DATA TYPES OF DATABASES FOR WEB ACCESS.
- Create web dynamic contents by using the JSP.
- Create a multimedia environment and access files and information in the Internet and World Wide Web.
CISP 405 Object Oriented Programming using C# on Visual Studio .NET
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:CISP 400 or 401 with a grade of "C" or better, or placement through the assessment process.
- Transferable:CSU; UC
- Catalog Date:January 1, 2025
This course is an introduction to C# object-oriented programming language in a Visual Studio environment. Topics will include Visual Studio IDE, Constructors, Methods, Arrays, Inheritance, Polymorphism, Exception Handling, GUI, and Multithreading. This course is designed for students to understand the web-based as well as system development capabilities of C#.
Upon completion of this course, the student will be able to:
- SLO #1: DISCOVER AND UNDERSTAND THE OBJECT ORIENTED C# PROGRAMMING CONCEPTS, KNOWLEDGE AND POTENTIALS.
- Define and show how to use any or all of the following: control structures, methods, array, abstract data type, constructors, and data abstraction and information hiding.
- Implement graphic user interface, multithreading, and object oriented programming using C# program.
- SLO # 2: APPLY THE LEARNED C# KNOWLEDGE TO CREATE EFFECTIVE AND EFFICIENT PRODUCTION C# PROGRAMS USED IN COMPUTERS AND WEB SITES.
- Develop system and web page applications.
- SLO # 3: USE MICROSOFT .NET INTEGRATED DEBUGGING SOFTWARES TO TEST PROGRAMS FOR CORRECT EXECUTIONS.
- Demonstrate proficiency in using Visual Studio .NET integrated development environment.
CISP 430 Data Structures
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:CISP 400 or CISP 401 with a grade of “C” or better or an equivalent level programming course in the programming language used in this course
- Transferable:CSU; UC
- C-ID:C-ID COMP 132
- Catalog Date:January 1, 2025
This course applies a case study approach which incorporates techniques for systematic problem analysis, program specification, design, coding, testing, debugging and documentation of large programs. Data structures include stacks, queues, trees, lists, etc. Advanced language features related to strings, non-text files, pointers, recursion, and object-oriented programming methodology are covered. Searching and sorting techniques are discussed. Consult the class schedule for specific topics.
Upon completion of this course, the student will be able to:
- SLO #1: ANALYZE PROGRAMMING PROBLEMS AND DETERMINE WHAT OBJECT ORIENTED PROGRAMMING APPROACHES AND TOOLS WOULD BE MOST APPROPRIATE TO DEVELOP PROGRAMS TO RESOLVE THEM.
- Utilize OOP methodology to create program solutions.
- SLO # 2: UNDERSTAND STORING, SORTING, AND SEARCHING TECHNIQUES ON DATA STRUCTURES.
- Implement dynamic data structures and determine which is appropriate for a given problem.
- Implement recursive modules.
- Demonstrate a fundamental understanding of various sorting and searching techniques.
- SLO # 3: COMMUNICATE, SUPPORT, ANALYZE AND ADAPT DIFFERENT LOGIC AND PROGRAMMING SKILL LEVELS WITH PROJECT TEAM MEMBERS.
- Work effectively as part of a project team.
CISP 440 Discrete Structures for Computer Science
- Units:3
- Hours:54 hours LEC
- Prerequisite:MATH 370 with a grade of "C" or better
- Corequisite:CISP 430
- Transferable:CSU; UC
- C-ID:C-ID COMP 152
- Catalog Date:January 1, 2025
This course is an introduction to the discrete structures used in Computer Science with an emphasis on their applications. Topics covered include: counting methods, elementary formal logic and set theory, recursive programming and algorithm analysis, digital logic and combinational circuits, regular expressions, and finite state automata.
Upon completion of this course, the student will be able to:
- Validate logical arguments within the context of computer computations. (SLO 1)
- Design and analyze simple digital circuits that mimic logical arguments.
- Construct mathematically rigorous proofs of statements involving integers and sets (such as collections of characters or strings). The proofs will include induction and by contradiction forms.
- Model simple computation using finite state automata and regular languages. (SLO 2)
- Compose a valid expression from a given regular language.
- Construct a valid recognizer from a given regular language.
- Develop and analyze patterns related to programs. (SLO 3)
- Translate floating-point and signed integer numbers into IEEE binary format.
- Construct a recursive algorithm to solve a word problem.
- Exposure to the foundational mathematics behind computing. (SLO 4)
- Recognize the mathematical definitions of, and differences between, relations and functions.
- Recognize the definition of sets and basic operations on sets.
- Recognize and use counting techniques such as the pigeonhole principle and permutations and combinations.
CISP 499 Experimental Offering in Computer Information Science - Programming
- Units:0.5 - 4
- Prerequisite:None.
- Transferable:CSU; UC (Credit for variable topics courses is given only after a review of the scope and content of the course by the enrolling UC campus.)
- Catalog Date:January 1, 2025
This is the experimental courses description.
Computer Information Science - Security (CISS) Courses
CISS 300 Introduction to Information Systems Security
- Units:1
- Hours:18 hours LEC
- Prerequisite:None.
- Advisory:Some experience and/or coursework in networking.
- Transferable:CSU
- Catalog Date:January 1, 2025
This course is intended for beginner users who want to increase their understanding of information security issues and practices. It is intended for end users who use computers at home or in the office. The course covers all of the need-to-know information about staying secure, including up-to-date information on relevant topics such as protecting mobile devices and wireless local area networks. Students will learn how to maintain a secure environment and avoid security attacks through a series of real-life user experiences, hands-on projects, and case projects.
Upon completion of this course, the student will be able to:
- ANALYZE FUNDAMENTAL SECURITY CONCEPTS (SLO #01).
- Describe the challenges of securing information and define information security and explain why it is important.
- Identify the types of attackers that are common today.
- List the basic steps of an attack.
- APPLY SOUND PERSONAL SECURITY PRINCIPALS (SLO #02).
- Describe personal security defenses.
- Describe the attacks against passwords.
- Describe identity theft and the risks of using social networking.
- IDENTIFY THE NEEDS FOR A SECURE COMPUTER (SLO #03).
- List and describe the different types of attacks on computers.
- Explain how to manage patches.
- Describe how to install and use antivirus software.
- Describe how to recover from an attack.
- CONFIGURE A STRATEGY TO FIGHT AGAINST INTERNET-BASED ATTACKS (SLO #05).
- Explain how the Internet and e-mail work.
- Describe how attackers can use mobile code, cookies, and fraudulent digital certificates.
- List the security risks with using e-mail.
- FORMULATE PROVEN SECURITY PRACTICES AT THE WORKPLACE (SLO #06).
- Define physical access and list the tools used to restrict it.
- Describe how tokens and cards can be used for security.
- Explain what a security policy is and list several different policies.
- Define technology and procedural access control.
- List the steps to be taken to prepare for a crisis.
CISS 310 Network Security Fundamentals
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISC 310 with a grade of "C" or better
- Transferable:CSU
- C-ID:C-ID ITIS 160
- Catalog Date:January 1, 2025
This course is an introduction to the fundamental principles and topics of Information Technology security and Risk Management at the organizational level. It also addresses hardware, software, processes, communications, applications, and policies and procedures with respect to cyber-security. In addition, this course prepares students for the CompTIA Security+ certification exam.
Upon completion of this course, the student will be able to:
- ANALYZE FUNDAMENTAL SECURITY CONCEPTS (SLO #01).
- Describe the fundamental principles of information systems security.
- Define the concepts of threat, evaluation of assets, information assets, physical, operational, and information security and how they are related.
- Evaluate the need for the careful design of a secure organizational information infrastructure.
- Explain the need for a comprehensive security model and its implications for the security manager or Chief Security Officer (CSO).
- Explain the different types of information security careers and how the Security+ certification can enhance a security career.
- DESCRIBE POTENTIAL SYSTEM ATTACKS AND THE ACTORS THAT MIGHT PERFORM THEM (SLO #02).
- Describe the different types of software-based attacks
- List types of hardware attacks.
- Define virtualization and explain how attackers are targeting virtual systems.
- ANALYZE WAYS TO HARDEN AN OPERATING SYSTEM (SLO #03).
- Describe various software security applications.
- Explain how to protect systems from communications-based attacks.
- List ways to prevent attacks through a Web browser.
- Explain how to harden operating systems.
- EXAMINE SOME OF THE MAJOR WEAKNESSES THAT ARE FOUND IN NETWORK SYSTEMS AND WAYS TO PREVENT THEM (SLO #04).
- Explain the types of network vulnerabilities.
- Define different methods of network attacks.
- List the different types of network security devices and explain how they can be used.
- Define network address translation and network access control.
- Explain how to enhance security through network design.
- INVESTIGATE THE BASIC WIRELESS SECURITY PROTECTIONS AVAILABLE TO THEM (SLO #05).
- Describe the basic IEEE 802 wireless security protections.
- Define the vulnerabilities of open system authentication, WEP, and device authentication. Describe the WPA and WPA2 personal security models.
- Explain how enterprises can implement wireless security.
- INVESTIGATE LOGICAL AND PHYSICAL ACCESS CONTROL METHODS (SLO #06).
- Define access control and list the four access control models.
- Describe logical access control methods.
- Explain the different types of physical access control.
- EXAMINE AUTHENTICATION AND UNDERSTAND HOW IT FITS INTO ACCESS CONTROL (SLO #07).
- Define authentication. Describe the different types of authentication credentials.
- List and explain the authentication models.
- Define basic cryptography, its implementation considerations, and key management.
- DEFINE RISK AND RISK MANAGEMENT (SLO #08).
- Perform risk analysis and risk management.
- Describe the components of risk management.
- Apply risk management techniques to manage risk, reduce vulnerabilities, threats, and apply appropriate safeguards/controls.
- Describe how usage audits can protect security.
- List the methodologies used for monitoring to detect security-related anomalies.
- EXAMINE HOW TO PROTECT DATA USING THREE COMMON TYPES OF ENCRYPTION ALGORITHMS: HASHING, SYMMETRIC ENCRYPTION, AND ASYMMETRIC ENCRYPTION (SLO #09).
- Define cryptography and hashing.
- List the basic symmetric cryptographic algorithms.
- Describe how asymmetric cryptography works.
- List types of file and file system cryptography. Explain how whole disk encryption works.
- Define digital certificates. List the various types of digital certificates and how they are used.
- Describe the components of Public Key Infrastructure (PKI).
- FORMULATE REDUNDANCY PLANS AND SECURITY POLICIES (SLO #10).
- Describe the components of redundancy planning. Describe appropriate measures to be taken should a system compromise occur.
CISS 315 Ethical Hacking
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:CISS 310 with a grade of "C" or better
- Transferable:CSU
- C-ID:C-ID ITIS 164
- Catalog Date:January 1, 2025
This course introduces the network security specialist to the various methodologies for attacking a network. Students will be introduced to the concepts, principles, and techniques, supplemented by hands-on exercises, for attacking and disabling a network within the context of properly securing a network. The course will emphasize network attack methodologies with the emphasis on student use of network attack techniques and tools and appropriate defenses and countermeasures. Students will receive course content information through a variety of methods: lecture and demonstration of hacking tools will be used in addition to a virtual environment. Students will experience a hands-on practical approach to penetration testing measures and ethical hacking.
Upon completion of this course, the student will be able to:
- SLO #01: UNDERSTAND ETHICAL HACKING CONCEPTS, INCLUDING THE TERM "ETHICAL HACKER", AS WELL AS PENETRATION AND SECURITY TESTING CONCEPTS AND THE DIFFERENCES BETWEEN THEM
- Describe the role of an ethical hacker. Differentiate between what you can or cannot do legally as an ethical hacker.
- Describe how the fundamental concepts of cyber defense can be used to provide system security.
- List the fundamental concepts of the Information Assurance discipline.
- SLO #02: DESCRIBE MAJOR CONCEPTS AND ASPECTS OF THE TCP/IP PROTOCOL SUITE, INCLUDING EACH OF THE FOUR LAYERS OF THE PROTOCOL STACK: APPLICATION, TRANSPORT, INTERNET, AND NETWORK
- Describe the TCP/IP protocol stack and be able to review the addressing schemes and how they relate to TCP/IP protocol and security
- Explain the basic concepts of IP addressing.
- Explain the binary, octal, and hexadecimal numbering systems.
- SLO #03: CATEGORIZE THE DIFFERENT TYPES OF MALICIOUS SOFTWARE AND THEIR EFFECT ON A SOFTWARE OR HARDWARE
- Critique the physical security attacks and their vulnerabilities.
- Describe the different types of malicious software.
- Classify the different methods of protecting against malware attacks.
- Examine the architecture of a typical, complex system and identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed.
- SLO #04: EVALUATE THE VARIOUS TOOLS USED FOR PORT SCANNING
- Research the different types of port scans currently being used; the tools available to most hackers; their purpose, and function.
- Reason what ping sweeps are used for.
- Uncover how shell scripting is used to automate security tasks.
- SLO #05: ANALYZE SEVERAL NETWORK SECURITY DEVICES THAT SECURITY PROFESSIONALS AND NETWORK ADMINISTRATORS CAN USE TO BETTER PROTECT THEIR NETWORKS
- Describe symmetric and asymmetric encryption algorithms. Describe possible attacks on cryptosystems.
- Critique the advantages and disadvantages of different Intrusion Detection (IDS) technology currently available.
- Critique the advantages and disadvantages of different software firewall technology currently available.
- Investigate honeypots, their purpose and usefulness in a network security plan.
- SLO #06: ABILITY TO CREATE SIMPLE SCRIPTS/PROGRAMS TO AUTOMATE AND PERFORM SIMPLE OPERATIONS.
- Demonstrate their proficiency in the use of scripting languages to write simple scripts (e.g., to automate system administration tasks).
- Write simple and compound conditions within a programming language or similar environment (e.g., scripts, macros, SQL).
- Write simple linear and looping scripts.
CISS 316 Cisco Networking Academy(R): CyberOps Associate
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISN 304, CISS 300, or CISS 310 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This course covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC). It helps students to prepare for the Cisco Certified CyberOps Associate industry certification.
Upon completion of this course, the student will be able to:
- DISCUSS THREATS AND VULNERABILITIES TO NETWORK OPERATIONS (SLO #1)
- Explain the operation of the network infrastructure.
- Classify the various types of network attacks.
- Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
- Explain the features and characteristics of the Linux Operating System.
- Explain how to prevent malicious access to computer networks, hosts, and data.
- IMPLEMENT APPROPRIATE INCIDENT RESPONSE PROCESSES (SLO #2)
- Use network monitoring tools to identify attacks against network protocols and services.
- Evaluate network security alerts.
- Apply incident response models to manage network security incidents.
- Explain the impacts of cryptography on network security monitoring.
- ANALYZE THREATS AND VULNERABILITIES TO NETWORKS (SLO #3)
- Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events.
- Explain how to investigate endpoint vulnerabilities and attacks.
- Analyze the operation of network protocols and services.
- Analyze network intrusion data to identify compromised hosts and vulnerabilities.
- EXPLAIN THE ROLE OF THE CYBERSECURITY OPERATIONS ANALYST IN THE ENTERPRISE (SLO #4)
CISS 321 Scripting for Cyber Security
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISS 315 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This course is designed to cover tools that are commonly used by Information Security Professionals. Modern Operating Systems and scripting languages will be discussed as well as utilities and technologies that enable them. Topics including securing, hardening systems, incident response, automating tasks, auditing, and vulnerability assessment will be covered.
Upon completion of this course, the student will be able to:
- SLO 1: APPRECIATE THE IMPORTANCE OF SCRIPTS
- Evaluate data types
- Describe operators
- SLO 2: IDENTIFY THE DIFFERENT PARTS OF A SCRIPT
- Assess and write simple scripts.
- Describe the basic techniques used to create scripts for automating system administration tasks.
- SLO 3: ASSESS VULNERABILITY SCANNERS
- Modify current security application scripts for a specific network environment.
- Building a network scanner using a script.
- Evaluate Nmap.
- Building reports.
- SLO 4: ANALYZE EXPLOITS
- Learn to exploit a network service
- Discover how to steal browser passwords
- Evaluate scripting languages for different tasks.
CISS 327 Cisco Networking Academy(R): Network Security
- Units:3.5
- Hours:54 hours LEC; 27 hours LAB
- Prerequisite:CISN 304 and 341 with grades of "C" or better
- Advisory:CISS 310 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This course provides the theoretical understanding of network security and the hands-on skills to implement and support network security. Topics include Cisco switch and router security, Authentication, Authorization, and Accounting (AAA), Access Control Lists (ACLs), Firewalls, Intrusion Prevention System (IPS), and Virtual Private Networks (VPNs). Additionally, the Cisco Adaptive Security Appliance (ASA) and Adaptive Security Device Manager (ASDM) are covered.
Upon completion of this course, the student will be able to:
- EXPLAIN NETWORK THREATS, MITIGATION TECHNIQUES, AND THE BASICS OF SECURING A NETWORK. (SLO 1)
- explain the various types of threats and attacks.
- explain the tools and procedures to mitigate the effects of malware and common network attacks.
- DESCRIBE SECURITY THREATS FACING MODERN NETWORK INFRASTRUCTURES. (SLO 2)
- explain endpoint vulnerabilities and protection methods.
- CONFIGURE AND SECURE CISCO DEVICES. (SLO 3)
- configure command authorization using privilege levels and role-based command-line interface (CLI).
- implement the secure management and monitoring of network devices.
- implement security measures to mitigate Layer 2 attacks.
- CONFIGURE ACCESS CONTROL LISTS (ACLS) AND FIREWALL FUNCTIONS TO FILTER TRAFFIC, MITIGATE THREATS TO ROUTERS, AND NETWORKS. (SLO 4)
- implement ACLs to filter traffic and mitigate network attacks on a network.
- implement Zone-Based Policy Firewall using the CLI.
- explain how the Adaptive Security Appliance (ASA) operates as an advanced stateful firewall.
- implement an ASA firewall configuration.
- EXPLAIN METHODS FOR IMPLEMENTING SECURE COMMUNICATIONS TO ENSURE INTEGRITY, AUTHENTICITY, AND CONFIDENTIALITY. (SLO 5)
- explain how the types of encryption, hashes, and digital signatures work together to provide confidentiality, integrity, and authentication.
- explain how a public key infrastructure is used to ensure data confidentiality and provide authentication.
- CONFIGURE VIRTUAL PRIVATE NETWORKS. (VPNS)
- configure a site-to-site IPsec VPN, with pre-shared key authentication, using the CLI.
- DESCRIBE HOW TO IMPLEMENT SECURE NETWORK DESIGN, MANAGEMENT, AND REPORTING. (SLO 7)
- configure authentication, authorization, and accounting (AAA) to secure a network.
- explain how network-based Intrusion Prevention Systems (IPSs) are used to help secure a network.
- test network security.
CISS 350 Disaster Recovery
- Units:3
- Hours:48 hours LEC; 18 hours LAB
- Prerequisite:CISS 310 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This course teaches students how to identify network vulnerabilities and how to take the appropriate countermeasures to prevent and mitigate failure risks for an organization. Students will gain an understanding of the steps needed for good disaster recovery including, how to prepare a disaster recovery plan, the various risks associated with an enterprise network, the diverse job functions of employees in a Disaster Recovery Plan, and the methods needed to implement a plan once it is complete. In addition, each student will develop a Disaster Recovery Plan with a group for a real or fictitious organization.
Upon completion of this course, the student will be able to:
- DEFINE AND EXPLAIN INFORMATION SECURITY (SLO #01).
- Define and explain the basic concepts of risk management.
- Identify and define the components of contingency planning.
- Know and understand the role of information security policy in the development of contingency plans.
- MANAGE INCIDENT RESPONSE AND DISASTER RECOVERY PROCEDURES (SLO #02).
- Identify an individual or group to create a contingency policy and plan.
- Understand the elements needed to begin the contingency planning process.
- Create an effective contingency planning policy.
- Comprehend the steps needed for a business impact analysis report.
- Summarize the steps needed to create and maintain a budget for enabling the contingency planning process.
- ANALYZE THE PROCESS OF INCIDENT RESPONSE PREPARATION (SLO #03).
- Describe the process used to organize the incident response process.
- Understand how policy affects the incident response planning process and how policy can be implemented to support incident response practices.
- Describe the techniques that can be employed when forming a security incident response team (SIRT).
- Learn the skills and components required to devise an incident response plan.
- Know some of the concerns and trade-offs to be managed when assembling the final IR plan.
- IDENTIFY TRUE INCIDENTS FROM INCIDENT CANDIDATES AND FALSE POSITIVES (SLO #04).
- Identify the elements necessary to detect incidents that pose risk to the organization.
- Summarize the components of an intrusion detection system.
- Explain the processes used in making decisions surrounding incident detection and escalation.
- UNDERSTAND THE ELEMENTS OF AN INCIDENT RECOVERY RESPONSE (SLO #05).
- Build the elements of an incident recovery response, and be aware of the impact of selecting a reaction strategy, developing a notification mechanism, and the creation of escalation guidelines.
- Explain how an organization plans for and executes the recovery process when an incident occurs.
- Summarize the need for and the steps involved in the ongoing maintenance of the incident response plan.
- Summarize what forensic analysis entails, and gain an improved understanding in the processes used to collect and manage data in an electronic environment.
- PLAN FOR BUSINESS RESUMPTION FOLLOWING AN INCIDENT (SLO #06).
- Outline the relationships between the overall use of contingency planning and the subordinate elements of incident response, business resumption, disaster recovery, and business continuity planning.
- Become familiar with the techniques used for data and application backup and recovery.
- Outline the strategies employed for resumption of critical business processes at alternate and recovered sites.
- PLAN FOR A DISASTER RECOVERY (SLO #07).
- Summarize the ways to classify disasters, both by speed of onset and source.
- Explain who should form the membership of the disaster recovery team.
- Summarize the key functions of the disaster plan.
Explain the key concepts included in the NIST approach to technical contingency planning.
- Describe the elements of a sample disaster recovery plan.
- Identify the need for simultaneous wide access to the planning documents as well as the need for securing the sensitive content of the DR plans.
- SUMMARIZE THE KEY CHALLENGES AN ORGANIZATION FACES WHEN ENGAGED IN DISASTER RECOVERY OPERATION (SLO #08).
- Recognize what actions organizations take to prepare for the activation of the DR plan.
- Recognize what critical elements compose the response phase of the DR plan.
- Comprehend what occurs in the recovery phase of the DR plan.
- Identify how an organization uses the resumption phase of the DR plan.
- Identify how an organization resumes normal operations using the restoration phase of the DR plan.
- OUTLINE THE ELEMENTS OF BUSINESS CONTINUITY (SLO #09).
- Recognize who should be included in the business continuity team.
- Recognize and be able to reference two sample business continuity plans.
- Describe the steps taken to maintain the BC plan.
- Summarize the methods used to continuously improve the BC process.
- CREATE AND DEVELOP A CRISIS MANAGEMENT PLAN (SLO #10).
- Recognize the role of crisis management in the typical organization.
- Conduct the creation of a plan preparing for crisis management.
- Value and deal with post-crisis trauma and work toward getting people back to work after a crisis.
- Identify the impact of the decisions regarding law enforcement involvement.
- Manage a crisis communications process.
- Prepare for the ultimate crisis in an organization through succession planning.
CISS 353 Management of Information Security
- Units:3
- Hours:48 hours LEC; 18 hours LAB
- Prerequisite:CISS 310 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This course focuses on the managerial aspects of information security and assurance. Topics covered include project management, access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts.
Upon completion of this course, the student will be able to:
- SLO 1: UNDERSTAND THE DIFFERENCE BETWEEN LAWS AND ETHICS.
- Differentiate between law and ethics.
- Describe the ethical foundations and approaches that underlie modern codes of ethics.
- Discuss relevant professional organizations and their role and relationship to organizational InfoSec.
- SLO 2: DISCUSS THE IMPORTANCE OF GOVERNANCE AND STRATEGIC PLANNING.
- Identify the key organizational stakeholders that are actively involved in planning and compare their roles.
- Discuss the importance, benefits, and desired outcomes of information security governance and how such a program would be implemented.
- SLO 3: DEFINE THE IMPORTANCE OF A SECURITY POLICY.
- Define information security policy and discuss its central role in a successful information security program.
- Discuss the process of developing, implementing, and maintaining various types of information security policies.
- SLO 4: DISCUSS THE ROLE OF PROJECT MANAGEMENT IN INFORMATION SECURITY.
- List and describe the functional components of an information security program.
- Explain the internal and external factors that influence the activities and organization of an information security program.
- Discuss the components of a security education, training, and awareness program and explain how organizations create and manage these programs. Introduce CompTIA's Project+ exam.
- SLO 5: ASSESSING AND TREATING RISK.
- Define risk management and its role in the organization.
- Explain how risk is assessed based on the likelihood of adverse events and the effects on information assets when events occur.
- Discuss the use of the results of the risk identification process.
- Evaluate control alternatives under the defense risk treatment strategy and formulate a cost-benefit analysis (CBA) using existing conceptual frameworks.
- SLO 6: EVALUATE THE DIFFERENT SECURITY MANAGEMENT MODELS.
- Describe the dominant InfoSec management models, including national and international standards-based models.
- SLO 7: LIST THE ELEMENTS OF KEY INFORMATION SECURITY MANAGEMENT PRACTICES.
- Discuss the various types of benchmarking and their use in security planning.
- Describe the security practices used to regulate employee behavior and prevent misuse of information.
- Explain the role of information security in employee terminations.
- SLO 8: DISCUSS THE NEED FOR CONTINGENCY PLANNING
- Describe the major components of incident response, disaster recovery, and business continuity.
- Define the components of crisis management and business resumption.
- Discuss how the organization would prepare and execute a test of contingency plans.
- SLO 9: DISCUSS THE NEED FOR ONGOING MAINTENANCE OF THE INFORMATION SECURITY PROGRAM
- Identify the key factors involved in monitoring the external and internal environment.
- Describe how planning, risk assessment, vulnerability assessment, and remediation tie into information security maintenance.
- Explain how to build readiness and review procedures into information security maintenance.
CISS 360 Computer Forensics and Investigation
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:CISS 310 with a grade of "C" or better
- Transferable:CSU
- C-ID:C-ID ITIS 165
- Catalog Date:January 1, 2025
This course is an introduction to the methods used to properly conduct a computer forensics investigation beginning with a discussion of ethics, while mapping to the objectives of the International Association of Computer Investigative Specialists (IACIS) certification. Topics covered include an overview of computer forensics as a profession; the computer investigation process; understanding operating systems boot processes and disk structures; data acquisition and analysis; technical writing; and a review of familiar computer forensics tools.
Upon completion of this course, the student will be able to:
- REVIEW OF THE COMPUTER FORENSICS PROFESSION (SLO #01)
- Illustrate how to prepare for computer investigations and explain the difference between law enforcement agency and corporate investigations.
- Explain how other organizations’ codes of ethics apply to expert testimony.
- SUMMARIZE HOW TO PREPARE FOR A COMPUTER INVESTIGATION (SLO #02).
- Apply a systematic approach to an investigation.
- Describe procedures for corporate high-tech investigations.
- Explain requirements for data recovery workstations and software.
- Describe how to conduct an investigation.
- SUMMARIZE THE CERTIFICATION REQUIREMENTS FOR COMPUTER FORENSICS LABS (SLO #03).
- Catalog the physical requirements for a computer forensics lab.
- Draft the criteria for selecting a basic forensic workstation.
- MEASURE THE DIFFERENT WAYS FOR PROPER DATA ACQUISITION (SLO #04).
- Summarize the different digital evidence storage formats being used today.
- Explain ways to determine the best acquisition method.
- Explain how to use acquisition tools properly.
- Explain how to validate data acquisitions.
- CLASSIFY THE RULES FOR PROPER DIGITAL EVIDENCE HANDLING (SLO #05).
- Describe how to collect evidence at private-sector incident scenes.
- Explain guidelines for processing law enforcement crime scenes.
- Review a case to identify requirements and plan your investigation.
- ANALYZE HOW DATA IS STORED AND MANAGED ON AN OPERATING SYSTEMS (SLO #06).
- Analyze an operating system's file structure.
- ANALYZE SOME OF THE DIFFERENT COMPUTER FORENSICS TOOLS (SLO #07).
- Explain how to evaluate needs for computer forensics tools.
- Describe methods for validating and testing computer forensics tools.
- VALIDATE THE EVIDENCE DURING THE ANALYSIS PROCESS (SLO #08).
- Describe methods of performing a remote acquisition.
- Determine what data to analyze in a computer forensics investigation.
- Integrate the necessary tools to validate data and for the most common data-hiding techniques.
- IDENTIFY AND RECONSTRUCT GRAPHICS FILES (SLO #09).
- Summarize the different types of graphics file formats being used today and describe how to identify unknown ones.
- Explain types of data compression and how to locate and recover graphics files.
- Summarize the copyright issues associated with graphic files.
- DESCRIBE THE IMPORTANCE OF NETWORK FORENSICS (SLO #10).
- Illustrate the primary concerns in conducting forensic examinations of virtual machines.
- Analyze the standard procedures for performing a live or network acquisition.
- ANALYZE EMAIL INVESTIGATIONS (SLO #11).
- GENERATE A FORENSIC REPORT (SLO #12).
- Explain the importance of reports.
- Describe guidelines for writing reports.
- Explain how to use forensics tools to generate reports.
- DESCRIBE GUIDELINES FOR TESTIFYING IN COURT (SLO #13).
- Summarize the guidelines for testifying in depositions and hearings.
Computer Information Science - Web (CISW) Courses
CISW 300 Web Publishing
- Units:3
- Hours:54 hours LEC
- Prerequisite:None.
- Advisory:CISC 305
- Transferable:CSU
- Catalog Date:January 1, 2025
This course is an introduction to publishing on the Internet's World Wide Web (www). Topics include creating www pages with the HyperText Markup Language (html), organizing a series of pages into a website, and uploading web pages to a server. The course makes extensive use of the computer tools necessary to insert html tags, create images, and view web documents. This course prepares apprentice web designers and publishers to identify the information dissemination needs of a client, design appropriate World Wide Web solutions, and implement it.
Upon completion of this course, the student will be able to:
- SLO 1: EXAMINE AND PRACTICE WEB PUBLISHING
- identify information dissemination situations that are suitable for online publishing on the Internet's World Wide Web.
- compare and contrast the goals, techniques and costs of web publishing with traditional print publishing.
- SLO 2: CREATE WEB DOCUMENTS USING CODE
- apply structured design principles to the creation of World Wide Web documents using HyperText Markup Language (HTML).
- demonstrate competence and facility with the software, hardware, and networking tools necessary for publishing documents on the World Wide Web.
- explain the World Wide Web's open standards process and the evolution of the Web as a international communication medium.
- SLO 3: PLAN, CONSTRUCT AND EVALUATE A WEB SITE PROJECT
- participate in realistic web design projects individually and as a member of a team.
- identify the information dissemination needs of a client, design an appropriate WWW solution, implement it, present the solution to the client, and revise a necessary.
- evaluate existing World Wide Web sites for style, structure, and usability.
- develop strategies for expanding, maintaining and improving WWW sites once they have been created.
CISW 304 Cascading Style Sheets
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:CISW 300 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This course continues the study of technical aspects of standards-based Web design for experienced students and Web professionals. Topics include the separation of content from presentation, dynamic user interaction and designing for alternative devices, using Cascading Style Sheets (CSS) in combination with Extensible Hypertext Markup Language (XHTML).
Upon completion of this course, the student will be able to:
- SLO 1: EXAMINE AND PRACTICE USING CSS
- describe the differences among versions of Cascading Style Sheets (CSS), including issues of cross-platform compatibility.
- utilize proper CSS syntax for developing internal and external style sheets.
- differentiate between a class and id, determine which should be used for a specific situation, and apply it appropriately.
- SLO 2: CREATE WEB DOCUMENTS USING CSS
- combine selectors to refine style definitions for a group of elements, and/or contextually to one or more elements when used together.
- demonstrate proficiency in Cascading Style Sheets Positioning (CSS-P), including positioning and layering of objects on multiple web pages.
CISW 308 Mobile Web Development
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:CISW 300 with a grade of "C" or better
- Advisory:CISW 304
- Transferable:CSU
- Catalog Date:January 1, 2025
In this course, students will learn to create websites that are responsive: sites that adapt their layout to the client device being used, whether it be a smartphone, tablet computer, or desktop computer/laptop.
Students will learn to use CSS media queries, mobile-friendly HTML5 features, JavaScript enhancements, and various frameworks to build websites that are fluid and flexible.
Upon completion of this course, the student will be able to:
- SLO #1: ANALYZE WAYS A WEBSITE CAN RESPOND TO THE SPECIFIC NEEDS OF THE ENVIRONMENT ON WHICH IT IS BEING VIEWED.
- Learn how a website can present a layout that is equally - and differently - appropriate for mobile, tablet, and desktop devices.
- SLO #2: EXAMINE WAYS TO LEVERAGE THE CAPABILITIES OF HTML5 TO PRESENT MOBILE-FRIENDLY SITES.
- Understand the varying levels of support for HTML5 features among different devices.
- SLO #3: INVESTIGATE HOW TO USE CSS MEDIA QUERIES.
- Experiment and demonstrate how to use CSS Media Queries to display content modified to fit the client device.
- Integrate video and other media appropriately for mobile devices.
- SLO# 4: USE MOBILE FRAMEWORKS
- Learn how to use the jQuery Mobile and/or other similar frameworks to add support for touch and other gestures.
- Learn about and how to create grid-based layouts.
CISW 310 Advanced Web Publishing
- Units:4
- Hours:72 hours LEC
- Prerequisite:CISW 300 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This course builds upon previous web publishing concepts and study. The primary focus of this course is the systematic development of interactive web sites. Topics include cascading style sheets, dynamic HTML, forms, client-side programming with JavaScript, CGI scripting with Perl, and web-database interactivity.
Upon completion of this course, the student will be able to:
- SLO 1: EXAMINE AND PRACTICE WEB PUBLISHING.
- identify information dissemination situations that are suitable for online publishing on the Internet’s World Wide Web.
- inventory the software, hardware, and networking tools necessary for publishing interactive web sites on the World Wide Web.
- SLO 2: CREATE WEB DOCUMENTS USING CODE.
- SLO 3: STUDY AND PRACTICE USING MULTIPLE LANGUAGES AND/OR METHODS FOR CREATING WEB PAGES.
- apply structured design and programming principles to the creation of interactive World Wide Web sites using HyperText MarkUp language (HTML), JavaScript, Perl, and Structured Query Language (SQL).
- SLO 4: PLAN, CONSTRUCT AND EVALUATE WEB SITES.
- construct interactive web sites individually and as a member of a team.
- assess the web programming needs of a client.
- formulate and prepare an appropriate web programming solution for a client.
CISW 321 Web Site Development using Dreamweaver
- Units:3
- Hours:54 hours LEC
- Prerequisite:None.
- Advisory:CISC 305
- Transferable:CSU
- Catalog Date:January 1, 2025
This course covers the use of Dreamweaver, a visual Web-authoring tool, to develop and implement Web sites. The topics covered include creating Web pages that contain text, images, links, tables, frames, forms, Cascading Style Sheets and image maps, as well as enhancing Web pages Flash elements and built-in scripting. Additional topics include developing effective Web site structures, using Web site management tools, Web site documentation, making global updates to a Web site, and extending Dreamweaver. Students will work individually and as a member of a team to plan, implement, test, and evaluate Web sites.
Upon completion of this course, the student will be able to:
- SLO 1: UTILIZE WEB AUTHORING SOFTWARE TO CREATE, MANAGE AND MAINTAIN WEB SITES.
- Utilize built-in code editing features to modify and repair web pages.
- Utilize built-in scripting language to implement appropriate web page enhancements.
- SLO 2: DEVELOP AND MANAGE EFFECTIVE WEB SITES.
- Develop and manage effective web site file structures.
- Design and create web sites that have effective information design and site navigation.
- Plan and construct web sites, working individually and as a member of a team.
- SLO 3: DEVELOP STANDARDS FOR WEB SITE CONSISTENCY.
- SLO 4: CREATE DOCUMENTATION FOR WEB PAGES AND WEB SITES.
CISW 326 Intermediate Web Site Development using Dreamweaver
- Units:3
- Hours:54 hours LEC
- Prerequisite:CISW 321 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This course will reinforce and deepen many Dreamweaver topics covered in the beginning course CISW 321 by providing a more in-depth approach. In addition the course will introduce the other Adobe components such as Flash, Flash Script, and content management using Contribute software. Other topics covered include the following: advanced page formatting using style sheets, web site behaviors, work flow enhancement, templates, libraries, dynamic data, search functions, shopping cart functions, site security, user authentication, and other web services.
Upon completion of this course, the student will be able to:
- SLO 1: CREATE AND MAINTAIN WEBSITES UTILIZING ADVANCED FEATURES OF A WEB AUTHORING TOOL
- demonstrate the use and purpose of style sheets, frames and framesets, forms and form elements, and behaviors in a web site.
- SLO 2: DEVELOP PROFESSIONAL WEB SITES IN A REAL-WORLD ENVIRONMENT
- develop a fully functional web site through team collaboration and task automation.
- demonstrate how to build a dynamic Web site which include the topics of server-side technologies, databases, and the language used to extract, insert, delete, and update data with databases such as Structured Query Language (SQL).
- SLO 3: PRACTICE UTILIZING WEB ANIMATION
- develop, edit and maintain rich media content in a web site using Adobe's Flash software.
CISW 350 Imaging for the Web
- Units:1
- Hours:18 hours LEC
- Prerequisite:None.
- Advisory:CISC 306 and CISW 300
- Transferable:CSU
- Catalog Date:January 1, 2025
This course takes a look at designing graphics for the web. Using industry standard graphic software, students will manipulate images and create original graphics. Through lecture, demonstration and hands-on methods as well as class/instructor critiques, students will learn and practice designing graphics for use on the World Wide Web. Topics include developing graphic elements for a web site using a visual theme, creating buttons and intuitive navigational elements, making background textures and images, understanding web file formats, scanning, and creating animation.
Upon completion of this course, the student will be able to:
- SLO 1: CREATE IMAGES FOR WEB PAGES.
- create buttons, bars and navigation icons for Web pages.
- develop appropriate background images and textures.
- SLO 2: DEDUCE THE DIFFERENCE BETWEEN VARIOUS GRAPHIC FILE FORMATS.
- compare and contrast the various graphic file formats and determine when it is appropriate to use each format.
- develop simple animated graphics.
- SLO 3: DEMONSTRATE AND PRACTICE SCANNING PROCESSES.
- demonstrate an understanding of the scanning process and technology.
- compare scanning techniques.
- transform and enhance existing graphics with transparency and special effects.
- create graphics which can be downloaded quickly.
- SLO 4: DISCOVER HOW TO CREATE IMAGE MAPS AND ROLLOVERS.
- design and create image maps.
- create multiple-state image rollovers using copy and paste script code.
CISW 355 Web Imaging Projects
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:CISW 350 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This course is a continuation of CISW 350. Projects and simulations developing graphics for the web are created for the purpose of marketing and advertising on the Web. The steps, procedures, and common problems encountered when producing quality graphics for professional Web sites are discussed and practiced. Real and simulated projects will include the following: compressing and uploading times, cropping and resizing, digital camera imaging, retouching and fixing photographs, photographic special effects and filters, rasterizing text, implementing backgrounds, buttons, themes, image maps, slicing, and simple animations.
Upon completion of this course, the student will be able to:
- SLO 1: CREATE IMAGES FOR WEB PAGES
- Generate and manipulate graphics from a variety of graphics software
- Appraise and implement graphics for client and client base
- SLO 2: EXAMINE AND COMPARE DIFFERENT IMAGE EDITING TOOLS AND TECHNIQUES
- Compare different technologies that can be used to capture and acquire digital images.
- Examine how color and image resolution affect image quality.
- List and differentiate Web graphic file formats and when to use them.
- SLO 3: PLAN, CONSTRUCT, AND EVALUATE A WEB SITE PROJECT
- Analyze web site concepts and marketing techniques.
- Evaluate user's short-term and long-term goals
- Plan how to get information/photos/existing logos, etc. from users in a non-technical environment
CISW 375 Security for Web Development
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISW 410 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:January 1, 2025
This course provides an overview of web security and vulnerabilities. It examines current tools, methods, and strategies used by web developers for combating cyber security threats.
Upon completion of this course, the student will be able to:
- SLO 1: EXAMINE AND DESCRIBE WEB SECURITY THREATS
- list and understand basic threats and vulnerabilities on the web facing users, developers, and system administrators.
- SLO 2: DESCRIBE THREAT MITIGATION METHODS
- describe multiple strategies and methods used by web developers for threat mitigation.
- SLO 3: RESEARCH INJECTION ATTACKS
- understand Injection attacks and how to mitigate this threat.
- SLO 4: RESEARCH CROSS-SITE SCRIPTING ATTACKS
- understand Cross-site scripting attacks and how to mitigate this threat.
- SLO 5: EXAMINE AND DESCRIBE WEB ENCRYPTION
- describe the role of Encryption for web security.
- SLO 6: EXAMINE AND EVALUATE AUTHENTICATION METHODS
- categorize and evaluate different types of Authentication.
CISW 400 Client-side Web Scripting
- Units:4
- Hours:72 hours LEC
- Prerequisite:CISW 300 with a grade of "C" or better
- Advisory:CISP 300
- Transferable:CSU
- Catalog Date:January 1, 2025
This course emphasizes the creation of dynamic and interactive web sites using a client-side scripting language such as JavaScript. Topics include the Document Object Model of web pages, core features of the client-side scripting language, event handling, control of windows and frames, functions, and form validation.
Upon completion of this course, the student will be able to:
- SLO 1: EXAMINE AND PRACTICE CLIENT-SIDE SCRIPTING.
- identify dynamic and interactive web publishing situations appropriate for client-side scripting.
- recognize the various components of a web page as objects in the Document Object Model.
- analyze web publishing problems and situations and develop solutions using the client-side scripting language.
- SLO 2: CREATE SCRIPTS USING CODE.
- define the core structures, statements, and syntax of the client-side scripting language.
- write functions and event handlers in the client-side scripting language.
- SLO 3: CONSTRUCT DYNAMIC WEB APPLICATIONS.
- create dynamic and interactive web applications.
CISW 402 Intermediate JavaScript
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:CISW 400 with a grade of "C" or better
- Advisory:CISW 410
- Transferable:CSU
- Catalog Date:January 1, 2025
In this course, students will learn advanced JavaScript techniques and good standard coding conventions. Topics include advanced form validation, creating jump menus and cascading select menus, and learning to control CSS with JavaScript to manipulating the HTML DOM. Students will also learn about AJAX and practice using it to create interactive, asynchronous web pages. Finally, students will learn to use jQuery and other similar JavaScript frameworks.
Upon completion of this course, the student will be able to:
- SLO#1: EXAMINE JAVASCRIPT CODING CONVENTIONS AND THE DOM.
- Learn to use advanced techniques, such as anonymous function.
- Learn to create dynamic forms and menus with JavaScript.
- Learn to use regular expressions for advanced form validation.
- SLO #2: CREATE DYNAMIC WEB APPLICATIONS WITH JAVASCRIPT AND DYNAMIC HTML.
- Learn to create visual effects with Dynamic HTML.
- Learn to position elements dynamically.
- SLO #3: ANALYZE XML-HTTP-REQUEST AND AJAX.
- Learn to modify content on the fly.
- SLO #4: EXAMINE JQUERY.
- Learn how to use jQuery and/or similar Frameworks to manipulate the DOM.
- SLO #5: EXAMINE NEW AND UPCOMING JAVASCRIPT TOOLS AND APPLICATIONS.
CISW 410 Database-Driven Web Applications
- Units:4
- Hours:72 hours LEC
- Prerequisite:CISW 300 with a grade of "C" or better
- Advisory:CISP 300 or CISW 310
- Transferable:CSU
- Catalog Date:January 1, 2025
This course emphasizes the creation of dynamic and interactive web sites using a middleware scripting language such as PHP or ASP. Topics include core features of the middleware scripting language, embedding server commands in HTML pages, control structures, functions, arrays, form validations, cookies, environmental variables, email applications, and database-driven web applications.
Upon completion of this course, the student will be able to:
- SLO 1: EXAMINE AND PRACTICE MIDDLEWARE SCRIPTING.
- identify interactive web publishing situations appropriate for middleware web scripting.
- define the core structures, statements, and syntax of the middleware scripting language.
- analyze web publishing problems and situations and develop solutions in the middleware scripting environment.
- SLO 2: CREATE SCRIPTS USING CODE.
- write functions using the middleware scripting language.
- SLO 3: CONSTRUCT DYNAMIC WEB APPLICATIONS.
- create interactive web applications.
CISW 440 XML: Introduction to Extensible Markup Language
- Units:2
- Hours:36 hours LEC
- Prerequisite:CISW 300 with a grade of "C" or better
- Advisory:CISA 320 or CISP 350
- Transferable:CSU
- Catalog Date:January 1, 2025
XML is a universal method for representing information that is especially well suited for distribution over the Internet. This course will address the most fundamental XML questions - what XML is, why it is needed, and how it can be used. Students will learn the most current, practical XML technologies available at the present time.
Upon completion of this course, the student will be able to:
- SLO 1: EXAMINE AND PRACTICE USING EXTENSIBLE MARKUP LANGUAGE (XML).
- identify and utilize fundamental syntax of XML structure.
- utilize and employ XML applications.
- SLO 2: CREATE AND PRESENT XML DOCUMENTS.
- produce XML documents.
- design and present XML documents using style sheets.
CISW 499 Experimental Offering in Computer Information Science - Web
- Units:0.5 - 4
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:January 1, 2025
This is the experimental courses description.