Free Online

CNIT - City College of San Francisco Courses

Show filters

Level

Duration

Subject

Language

CNIT 160: Cybersecurity Responsibilities

CNIT 160: Cybersecurity Responsibilities

0

Explores security technology, risks, countermeasures, and consequences, to help decision-makers protect those who rely on them. Includes hands-on activities such as packet analysis, exploiting vulnerable systems, and password cracking, and also research, presentations, and debates about current controversies, laws, and policies. Addresses topics such as surveillance, cyberwar, and computer crime.Upon completion of this course, a student will be able to:Compare security technologies including encryption, storage, and transmission methodsEvaluate social and political arguments relating to information security and privacyEngage in healthy and constructive debates that include both technical and political issues around security

Independent
16 weeks long
ongoing
view all
CNIT 125: Information Security Professional (CISSP Preparation)

CNIT 125: Information Security Professional (CISSP Preparation)

0

Covers information security in depth, including access control, application security, business continuity, cryptography, risk management, legal issues, physical security, and telecommunications and network security. This class helps to prepare students for the Certified Information Systems Security Professional (CISSP) credential, which is essential for high-level information security professionals.Advisory: Students should have taken CNIT 123, or hold the Certified Ethical Hacker credential, or have equivalent knowledge of basic security.After successful completion of this course, students will be able to:Explain security and risk managementProtect the security of assetsManage security of engineering and software development processesControl access to resources and manage identity, communications and network securityPerform security assessment, testing, incident response, and disaster recovery

Independent
16 weeks long
ongoing
view all
CNIT 126: Practical Malware Analysis

CNIT 126: Practical Malware Analysis

0

Learn how to analyze malware, including computer viruses, trojans, and rootkits, using disassemblers, debuggers, static and dynamic analysis, using IDA Pro, OllyDbg and other tools.Upon successful completion of this course, the student will be able to:Describe types of malware, including rootkits, Trojans, and viruses.Perform basic static analysis with antivirus scanning and stringsPerform basic dynamic analysis with a sandboxPerform advanced static analysis with IDA ProPerform advanced dynamic analysis with a debuggerOperate a kernel debuggerExplain malware behavior, including launching, encoding, and network signaturesUnderstand anti-reverse-engineering techniques that impede the use of disassemblers, debuggers, and virtual machinesRecognize comTue packers and how to unpack them

Independent
16 weeks long
selfpaced
view all
CNIT 129S: Securing Web Applications

CNIT 129S: Securing Web Applications

0

Industry advisors have repeatedly asked us to teach this class, because every modern business needs a web presence and there are far too few workers qualified to protect them from hackers. There are many jobs available for students who learn how to protect our healthcare, financial, and other confidential data from criminals, spies, and pranksters.Techniques used by attackers to breach Web applications, and how to protect them. How to secure authentication, access, databases, and back-end components. How to protect users from each other. How to find common vulnerabilities in compiled code and source code.Upon successful completion of this course, the student will be able to:Explain the current state of Web application securityAnalyze basic application functionalitySecure data stores and back-end componentsProtect users from other usersDemonstrate common exploits and patch their root causesImplement servers and firewalls effectively

Independent
16 weeks long
ongoing
view all
CNIT 128: Hacking Mobile Devices

CNIT 128: Hacking Mobile Devices

0

Mobile devices such as smartphones and tablets are now used for making purchases, emails, social networking, and many other risky activities. These devices run specialized operating systems have many security problems. This class will cover how mobile operating systems and apps work, how to find and exploit vulnerabilities in them, and how to defend them. Topics will include phone call, voicemail, and SMS intrusion, jailbreaking, rooting, NFC attacks, malware, browser exploitation, and application vulnerabilities. Hands-on projects will include as many of these activities as are practical and legal.Upon successful completion of this course, the student will be able to:Assess the risks of using mobile devices for common activities such as making phone calls, emailing, and shoppingPerform jailbreaks for iOS devices and analyze the Android security model and rootingDifferentiate and describe types of mobile malware and anti-mal ware optionsEvaluate Web browser services and attacks on mobile platforms and recommend countermeasuresConfigure, deploy, and defeat locking, remote location and wiping services. Outcome 6: Prioritize common mobile app risks and determine how and when to appropriately install and use them.

Independent
16 weeks long
selfpaced
view all
Load more

Level

Duration

Language