Kiauna N's Projects
Starter repository
This course will allow students to implement and audit the Critical Security Controls as documented by the Council on Cybersecurity. These Critical Security Controls are rapidly becoming accepted as the highest priority list of what must be done and proven at nearly all organizations.
This course covers the business data analysis using spreadsheets and databases.
This course is an introduction to designing algorithms and implementing them as program
This course will expose students to the dynamics of an operating system.
This course will involve assessing target networks and hosts for security vulnerabilities.
This course builds on ethical hacking and penetration testing techniques learned in ISYS-470. Specific attention is paid on examining web application security.
This course will focus on digital forensic practices, tools, and exercises for the collection of electronic evidence on network, client, and mobile devices.
This course will discuss information security and policies in the private sector related to privacy, incident response, computer crime, intellectual property, and pending/recently decided cases.
This course introduces fundamental computer programming concepts including data types, variables, functional abstraction, control structures, and common data structures
Software design concepts will include object-oriented modeling, patterns, the evaluation and implementation of data structures, project structures, and error handling.
This course covers the foundational elements of modern web applications
This course investigates the utility of objects in more sophisticated application architectures
This course focuses on the design and implementation of user interfaces on the web, commonly known as front-end programming.
tabase tools, basic Structured Query Language, design trade-offs, middleware, database server architectures, web-enabled technologies, security issues and emerging database technologies.