Computer Information Science
Computer Information Science - Applications (CISA) Courses
CISA 126 Outlook: Basics
- Same As:BUSTEC 126
- Units:1
- Hours:18 hours LEC
- Prerequisite:None.
- Advisory:BUSTEC 300.1
- Catalog Date:August 1, 2024
This course introduces Microsoft Outlook, the industry-leading personal information management software. Topics include understanding and navigating the Outlook environment, creating and sending email, using email special features, managing Outlook contacts, using an electronic calendar, and creating tasks and to-do items. Completion of BUSTEC 126/CISA 126 and BUSTEC 127/CISA 127 prepares students to pass the Microsoft Office Specialist (MOS) certification for the Microsoft Outlook application. This course is not open to students who have completed BUSTEC 126.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- send and receive email utilizing the special features of Outlook.
- create and modify contacts in an address book.
- create and organize Outlook calendar items.
- create and modify contacts in an address book.
- create and organize Outlook calendar items.
- incorporate tasks and to-do items into the personal information management software.
- distinguish between Outlook in an Exchange environment and a stand-alone environment.
- identify potential risks associated with the use of email.
CISA 127 Outlook: Tools
- Same As:BUSTEC 127
- Units:1
- Hours:18 hours LEC
- Prerequisite:BUSTEC 126 or CISA 126 with a grade of "C" or better
- Advisory:BUSTEC 300.1 with a grade of "C" or better
- Catalog Date:August 1, 2024
This course presents the advanced personal information management tools in Outlook. Topics include working with multiple email accounts, using rules and folders, incorporating advanced calendar and contact features, collaborating using sharing and delegate features, and customizing the Outlook user interface. In addition, the course covers the integration of Outlook with other applications in the Microsoft Office suite. Completion of BUSTEC 126/CISA 126 and BUSTEC 127/CISA 127 prepares students to pass the Microsoft Office Specialist (MOS) certification for the Microsoft Outlook application. This course is not open to students who have completed BUSTEC 127.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- incorporate multiple email accounts into Outlook.
- integrate rules and folders into communication management.
- apply Outlook features to find, manage, and archive information.
- collaborate with other Outlook users by using sharing and delegates.
- customize contacts and calendars using advanced Outlook features.
- revise the Outlook user environment.
CISA 160 Project Management Techniques and Software
- Same As:MGMT 142
- Units:3
- Hours:54 hours LEC
- Prerequisite:None.
- Advisory:ENGWR 102 or 103, and ENGRD 116; OR ESLR 320 and ESLW 320; CISC 300
- Catalog Date:August 1, 2024
This introductory course covers the responsibilities of a project manager. It includes the knowledge needed to manage a project, control costs, and schedule resources. It also introduces the use of project management software to track project resources, tasks, and milestones. This course is not open to students who have taken MGMT 142.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- construct a basic plan of action utilizing project management software.
- compare and contrast various theories of leadership and motivation.
- explain the principles of project management with regard to case studies.
- demonstrate the ability to formulate a project plan, given specific scenarios.
- assess the inherent advantages and shortcomings in various software packages.
CISA 299 Experimental Offering in Computer Information Science - Applications
- Units:0.5 - 4
- Prerequisite:None.
- Catalog Date:August 1, 2024
This is the experimental courses description.
CISA 305 Beginning Word Processing
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISC 300
- Transferable:CSU
- General Education:AA/AS Area II(b)
- Catalog Date:August 1, 2024
This course introduces professional word processing skills and techniques that are essential to the entire document production process and global information sharing. Topics include basic skills such as creating, editing, and formatting word documents; as well as higher-level features such as creating tables, working with themes and graphics, and merging multiple documents.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- create documents with Word to include understanding word processing software, starting a document, selecting text, formatting text using the Mini toolbar, navigating a document, and saving a document.
- edit documents to include checking spelling and grammar, changing line spacing and indents, inserting page numbers and page breaks, adding headers and footers, and applying styles to text.
- format documents to include modifying character spacing, working with indents, inserting section and column breaks, and adding a cover page to a Word document.
- format text and graphics to include working with tabs, using Format Painter, adding borders and shading, inserting online pictures, and adding borders and shading.
- work with styles and themes to include formatting with themes, modifying page margins, adding hyperlinks, using templates, and working with PDF files.
- format tables to include inserting a table, modifying a table, sorting table data, splitting and merging cells, and performing calculations in a table.
- merge Word documents to include understanding the mail merge process, designing a data source, creating a main document, merging data, sorting records, and creating labels.
- illustrate documents with graphics to include using the Office Clipboard, creating SmartArt graphics and WordArt, cropping and rotating pictures, and inserting a Word file.
- develop multi-page documents to include building a document in Outline view, navigating a document, find and replace options, finalizing a multipage document.
CISA 306 Intermediate Word Processing
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:CISA 305 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course builds upon previous instruction in the use of a word processing application with an emphasis on advanced information documents and reports. It includes creating a business letter and flyer, editing an academic document according to MLA style, writing a business report, enhancing page layout and design in a newsletter.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- create a business letter based on determining the most efficient page layout and format for a multi-column document that also includes graphics.
- create a single page professional flyer that includes entering text, checking for errors and proofreading, adjusting paragraph and line spacing, applying text effect, font colors, and online graphics.
- format an academic document according to MLA style to include working with general styles, reviewing the MLA style, applying the MLA style, indenting paragraphs, creating footnotes, citations and a bibliography.
- plan and create online forms and tables for efficient data display and input data into customized forms.
- write a professional business report to include inserting a cover page, formatting a document into sections, adding headers and footnotes, working with themes, and reviewing a document in read mode.
- create a newsletter to include using section breaks, text in columns, working with objects, inserting Drop Caps, formatting text with WordArt, and saving a document as a PDF file.
- prepare an information sheet that includes collaborating with others and integrating data, tracking changes in a document, comparing and combining documents, embedding and linking objects from other programs, and optimizing a document for online viewing.
- automating a Word document to include applying advanced text formatting, translating text, creating a watermark, compressing pictures, and working with file properties.
- create online forms to include planning and designing a form, applying content controls, restricting document editing, and filling in the online form.
- manage long documents to include creating a master document, working in outline view, linking a subdocument, creating cross-references and inserting endnotes.
CISA 315 Introduction to Electronic Spreadsheets
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISC 100 or 300
- Transferable:CSU
- General Education:AA/AS Area II(b)
- Catalog Date:August 1, 2024
This course introduces professional electronic spreadsheet skills that cover the entire spreadsheet production process. Topics include basic skills such as creating a worksheet, entering data, adding formulas and functions, formatting the worksheet, and checking for errors. This course also introduces similar skills essential to creating professional charts from a worksheet. These skills include planning and creating a chart, formatting a chart, summarizing data with sparklines, and identifying data trends.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- navigate to and from storage locations, create a new spreadsheet, open an existing spreadsheet, plus properly close and save a spreadsheet.
- understand spreadsheet software, identify spreadsheet window components, and enter labels, values, and simple formulas into a spreadsheet.
- revise cell and worksheet entries, choose worksheet views, and use the auto-summation feature
- create complex formulas and functions, and round a value with a function
- define relative cell reference and absolute cell reference, copy formulas and functions with relative and absolute cell references, and revise relative and absolute cell references formulas and functions
- format all or portions of a worksheet using standard layouts, formats, styles, alignments, and themes
- apply colors, patterns, borders, special number formats, and conditional formatting; as well as rename and move worksheets
- format data using text functions, consolidate data using a formula, and identify and revise errors within formulas and functions
- apply logical formulas such as the IF, OR and AND functions, as well as calculate payments with the PMT function
- plan, design, create, and revise embedded as well as stand-alone charts based on commonly used standards
- perform basic chart tasks such as selecting labels and values, choosing a chart type, and moving and resizing a chart
- perform basic chart formatting tasks such as changing a chart's design, annotating and drawing on a chart, and inserting images and objects within a chart
CISA 316 Intermediate Electronic Spreadsheets
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:CISA 315 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course is a continuation of CISA 315 (Introduction to Electronic Spreadsheets) with an emphasis on worksheet automation and summarization, pivot tables, data management, analysis tools, and higher-level formulas and functions.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- compile, arrange, and protect worksheets and workbooks, add a worksheet background, group worksheets, and insert hyperlinks.
- use absolute and mixed cell references in a formula, use the if function to perform a logical test, use goal seek to answer what-if questions, freeze and unfreeze rows and columns, and use smart lookup.
- plan, create, and format a table, add and sort table data, use a formula in a table, and
- create one-input and two-input data tables, add a pointer to a data table, create an amortization schedule table, create look-up tables
- use the PMT, FV, and PV financial functions, protect and unprotect worksheet cells, hide and unhide worksheets and workbooks, use formula checking.
- format a consolidated worksheet, apply a custom format code, add data to multiple worksheets at the same time, and consolidate data by linking separate workbooks
- create and use a template, import a text file, an access database, a webpage, and a word document, use text functions, convert text to columns, and insert and modify a SmartArt graphic.
- create a PivotTable report, format a PivotTable report, apply filters to a PivotTable report, create calculated fields, and analyze worksheet data using a trendline.
- create a PivotChart report, format a PivotChart report, apply filters to a PivotChart report, create a Box and Whisker Chart, and examine other statistical and process charts.
- use formula auditing techniques to analyze a worksheet, trace precedents and dependents, use error checking, and add data validation rules to cells
- use Solver to solve a complex problem, use Scenario Manager, create a Scenario Summary report, create a Scenario Summary PivotTable.
CISA 320 Introduction to Database Management
- Units:1
- Hours:9 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:BUSTEC 300.1 and CISC 300
- Transferable:CSU
- General Education:AA/AS Area II(b)
- Catalog Date:August 1, 2024
This course introduces the use of database management programs on the microcomputer. It includes designing a database; storing, searching, and updating files; and designing and producing printed reports.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- describe basic database functions, such as developing a query, and sorting, searching, filtering, and calculating data
- create database structures, and import and export data
- design and create database tables, queries, joins, forms, and reports
- use database functions, such as filing, retrieving, updating, and calculating
CISA 322 Design and Development of Desktop Database Applications
- Units:3
- Hours:36 hours LEC; 54 hours LAB
- Prerequisite:CISA 320 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course covers strategies for the design and development of desktop database applications. Topics include database objects, data types, data integrity, relational tables, joins, relationships, domain constraints, complex queries, forms, reports, sharing data with other applications, and data maintenance.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- analyze needs and determine appropriate data structures and solutions.
- create tables, queries, forms, and reports.
- formulate multiple table queries with complex criteria.
- design forms for data entry and data views.
- interpret data with crosstab queries, pivot tables, and reports.
- build tables by importing delimited data and exporting data to spreadsheet applications.
- design and implement multiple table data management systems involving custom forms, reports, and labels.
- manage, backup, and repair database objects.
CISA 330 Desktop Publishing
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:BUSTEC 100.1 and CISC 300
- Transferable:CSU
- Catalog Date:August 1, 2024
This course provides an overview of desktop publishing (DTP) and a major desktop publishing application program. It includes page layout skills needed to produce newsletters, brochures, flyers, reports, and other marketing material. Additionally, it covers importing and placing graphics and text, using layers, master pages, frames, creating graphics using the pen tool, and working with color both digitally and in print.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- develop settings and preferences to create single and multi-page documents.
- apply the vocabulary and tools associated with navigating the desktop publishing work area.
- define the proper use of text tools, such as leading, tracking, and kerning.
- create and apply styles to format text.
- assemble, import, and arrange text and graphics working with frames and layers.
- create, set up, apply, and modify master pages.
- prioritize layers, and stack, align, and distribute frames/objects on a page.
- apply colors to objects and text.
- create graphics using the Pen tool.
- originate commonly used printed marketing documents using desktop publishing software.
- analyze the potential for desktop publishing use in business and organizational communications.
CISA 331 Intermediate Desktop Publishing
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:CISA 330 with a grade of "C" or better
- Advisory:BUS 100
- Transferable:CSU
- Catalog Date:August 1, 2024
This course builds upon previous desktop publishing software concepts and study. Topics include working with effects and advanced techniques, applying styles, importing and linking graphics, tabs and tables, and working with transparency effects. It also covers producing long documents and book features, output and exporting to PDF format, and creating interactive documents for online use.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- assemble text using formatting styles and grids.
- apply styles, tabs, and rules to paragraphs and long text.
- create complicated printed documents.
- create or import, modify, and enhance tables.
- apply opacity, effects, color blends, and object styles to visually enhance documents.
- create book files, table of contents, and indexes.
- combine multiple documents into a book file.
- export and generate an Adobe PDF file.
- convert a print document for online use.
CISA 340 Presentation Graphics
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISC 300
- Transferable:CSU
- Catalog Date:August 1, 2024
This course introduces the basic concepts and applications of a presentation program that is used to present information in the form of a slide show. Topics include elements of good presentation design, slide organization, transition and animation effects, the integration of various software applications and media, plus the production of slide show presentations. In addition, the course introduces techniques for creating informational slides that can be printed, displayed on a monitor, shared in real time on the web, or saved as a video for others to watch.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- demonstrate effective design principles and concepts when preparing presentations.
- apply audience analysis techniques to establish criteria for the presentation approach.
- evaluate visual presentations by utilizing standard guidelines, tools, and techniques used in today's business world.
- integrate graphics, word processing and spreadsheet information, and sound in the development of a presentation.
- create visual appeal through custom animation, transitions, and motion paths.
- create hyperlinks, and also embed and link objects and files.
- create and edit tables, charts, diagrams, templates, and custom photo album presentations.
- plan and publish presentations for the Web.
CISA 345 Technical Marketing Applications
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISC 305
- Transferable:CSU
- Catalog Date:August 1, 2024
This course provides an overview of online marketing applications. It includes creating websites using cloud based software, building media-rich content for blogs, and developing marketing strategies using Search Engine Optimization (SEO) tools such as Google Analytics. It also covers email marketing software to create and manage mailing lists, newsletters, and automated campaigns. Additionally, it covers audience building with other cloud based marketing tools such as podcasts, ebooks, webinars, and more. All software used in this course is free, cloud based, and mobile.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- develop a website using online template tools
- create a blog and connect it with a website
- evaluate and prepare Search Engine Optimization (SEO) and Inbound Marketing tactics
- create SEO content types (content marketing) to include text, images, video, graphics, and presentations
- assess and set up webmaster tool applications and measurement techniques used to evaluate digital marketing (analytics)
- examine paid search marketing pay-per-click (PPC)
- utilize an online application to set up an email marketing campaign
- research other internet marketing platforms such as podcasts, ebooks, and webinars
CISA 346 Social Media Applications
- Units:1
- Hours:18 hours LEC; 18 hours LAB
- Prerequisite:None.
- Advisory:CISC 305
- Transferable:CSU
- Catalog Date:August 1, 2024
This course introduces a variety of social media applications and content platforms for marketing both small and large businesses. It includes popular applications for online social networking services (Facebook Pages for business), microblogging (Twitter), visual bookmark boards (Pinterest), video-sharing websites and YouTube channels, Internet based photo and video sharing apps (Instagram and Snapchat), and image editing mobile apps specifically for marketing. It also includes tracking social media, apps and integration, link building, and monetization.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- analyze various forms of social media technology used in marketing
- create a business platform using online social networking services
- set up and use a microblogging application
- create and add content to a visual bookmark board application
- create and use Internet based photo and video sharing applications
- edit, compress, and create graphics using online photo editing and graphic marketing design applications
- originate, edit, and post video for marketing purposes using online video editing and hosting sites
- combine and set up links for all media to connect and promote for business
- critique social media for marketing using analytic tools and applications
CISA 348 Exploring Presentation Graphics
- Units:1
- Hours:18 hours LEC
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:August 1, 2024
This course provides students with sufficient knowledge and skills to prepare presentations in a variety of courses. Topics include planning, designing, and preparing presentations; enhancing presentations with media; creating posters, tables, and statistical charts; interactivity, advanced animation, and hyperlinks; customizing a slide show; and collaborating, securing, and sharing a presentation.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- plan, design, and prepare a presentation.
- incorporate media into a digital presentation.
- create posters, tables, and statistical charts with presentation graphics software.
- incorporate interactivity, advanced animation, and hyperlinks into a digital presentation.
- adapt a digital slide show.
- develop a digital presentation collaboratively.
- construct, secure, and share a digital presentation.
CISA 499 Experimental Offering in Computer Information Science - Applications
- Units:0.5 - 4
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:August 1, 2024
This is the experimental courses description.
Computer Information Science - Core (CISC) Courses
CISC 100 Computer Fundamentals with Hands-on Lab
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:None.
- Catalog Date:August 1, 2024
This introductory course develops basic computer skills needed for college-level courses, workplace productivity, and personal enrichment. It provides individuals who are new to computing or who have very little computing experience with slower paced, general, non-technical information as well as in-class hands-on instruction reinforcement. This course introduces common computer terminology and concepts, file management, electronic mail, online course management, productivity application software, and the Internet.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- identify and name the most common digital computing devices
- identify and name basic operating system commands, tasks, and primary user interface components
- identify and name the basic components of a desktop computer system including most common interactive devices
- identify and name differences and similarities between system software and application software
- manage files and documents using file management system procedures
- use contemporary business productivity software
- use Internet and educational technologies
- use an electronic mail system
- define common computer terms
CISC 294 Topics in Computer Information Science - Core
- Units:0.5 - 5
- Hours:9 - 72 hours LEC
- Prerequisite:None.
- Catalog Date:August 1, 2024
Current topics in computer science and information systems not covered by regular catalog offerings are examined. Topics and locations vary, including advanced subjects related to computer science, networking, programming, database, applications, PC support, security, communications, and web development and publishing. Field trips may be required.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- evaluate current issues and emerging technologies in computer science and information technology.
- apply hands-on experience using current techniques of computer science and information technology.
- examine computer science and information technology issues that affect daily lives.
CISC 295 Independent Studies in Computer Information Science - Core
- Units:1 - 3
- Hours:54 - 162 hours LAB
- Prerequisite:None.
- Catalog Date:August 1, 2024
Independent Study is an opportunity for the student to extend classroom experience in this subject, while working independently of a formal classroom situation. Independent study is an extension of work offered in a specific class in the college catalog. To be eligible for independent study, students must have completed the basic regular catalog course at American River College. They must also discuss the study with a professor in this subject and secure approval. Only one independent study for each catalog course will be allowed.
CISC 299 Experimental Offering in Computer Information Science - Core
- Units:0.5 - 4
- Prerequisite:None.
- Catalog Date:August 1, 2024
This is the experimental courses description.
CISC 300 Computer Familiarization
- Units:1
- Hours:18 hours LEC
- Prerequisite:None.
- Advisory:ENGRD 116 and the ability to touch type.
- Transferable:CSU
- General Education:AA/AS Area II(b); AA/AS Area III(b)
- Catalog Date:August 1, 2024
This course introduces fundamental and basic computer skills necessary for college-level courses, workplace productivity, and personal enrichment. Fundamental skills include computer terminology and concepts, online learning, and the Internet. Basic skills include word processing, electronic spreadsheets, database management, and presentation software.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- identify and name the most common digital computing devices.
- identify and name basic operating system commands, tasks, and primary user interface components.
- employ the mouse as a navigational tool to select ribbon tabs, icons, text, and screen options.
- manage stored files using file management procedures.
- create, save, and print word processing documents using basic editing and formatting techniques.
- create, preview, save, and print spreadsheets using basic data entry, editing, and formatting techniques.
- employ Internet and educational technologies.
- employ an electronic mail system.
- define common computer terms.
CISC 305 Introduction to the Internet
- Units:1
- Hours:18 hours LEC; 18 hours LAB
- Prerequisite:None.
- Advisory:CISC 300 and 320
- Transferable:CSU
- Catalog Date:August 1, 2024
This course introduces how the Internet works and how to effectively use basic Internet services. Topics include browser basics, search engines and search techniques, e-mail, the World Wide Web, Internet security, Internet resources, the Cloud, social networking, and building basic web pages using Hypertext Markup Language (HTML).
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- describe the structure of the Internet, the World Wide Web, the Internet browser, and a web page.
- evaluate and critique various types of information sources on the Internet.
- apply and effectively use the World Wide Web and a web browser to search for and locate specific information on the Internet.
- research how technology can help with life skills, including local and world news, finding health services, educational resources, travel, and banking online.
- create professional email accounts, including using address and mailing lists, attaching files, learning email etiquette, and identifying security risks.
- analyze Internet security risks and explain how to protect a PC from viruses, trojans, spam, spyware, rootkits, and keyloggers.
- define different types of cloud computing and explain the benefits and security risks.
- utilize social networking sites such as Facebook, Twitter, LinkedIn, photoshare, and other popular sites. Explain the marketing value and the risks with each.
- construct a basic web page using plain HTML code.
CISC 306 Introduction to Web Page Creation
- Units:1
- Hours:18 hours LEC; 18 hours LAB
- Prerequisite:None.
- Advisory:CISC 305
- Transferable:CSU
- Catalog Date:August 1, 2024
This course covers the production of web pages, including design, layout, construction, and presentation. A web authoring tool is used to format a web page and Extensible Hypertext Markup Language (XHTML) is introduced.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- evaluate content needs for a web page.
- design a web page.
- create and format web pages using a web authoring tool.
- publish web pages to a web server.
- apply industry standard web design techniques.
CISC 310 Introduction to Computer Information Science
- Units:3
- Hours:54 hours LEC
- Prerequisite:None.
- Transferable:CSU; UC
- C-ID:C-ID BUS 140; C-ID ITIS 120
- Catalog Date:August 1, 2024
This course examines information technology and its role in solving business problems. Topics include information systems, database management systems, networking, e-commerce, ethics and security, and computer systems hardware and software components. These concepts and related methods are applied through hands-on projects to develop computer-based solutions to business problems.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- explain how a computer system works.
- identify the hardware and software components of a computer network.
- differentiate between the hardware components of a computer system.
- describe the relationship between system software and application software.
- compare the pros and cons of the most commonly used computer operating systems.
- explain the basic operation of networks.
- label the types of computer networks.
- demonstrate the secure utilization of Internet resources.
- propose methods for ensuring the security of business information systems.
- discuss and relate the different phases of the system development cycle.
- demonstrate an understanding of the development and use of information systems in business.
- recommend methods of assessing business information systems.
- solve common business problems using appropriate information technologies.
- manipulate databases using database management software.
- build software solutions to business problems using Internet technologies.
- evaluate the impact of information and computer technology on organizations and society including e-commerce, ethics, copyright, privacy, and security.
CISC 320 Operating Systems
- Units:1
- Hours:18 hours LEC; 18 hours LAB
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:August 1, 2024
This course introduces the basic features of the Windows operating system for the PC. Topics include managing files, folders, and libraries, operating system services, program management, maintenance of disks and storage media, Windows desktop, browser basics, and the Windows help system. A brief introduction to security and the command prompt is also covered.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- analyze proper file naming conventions and explain file extensions and program associations.
- apply built-in file management utilities to create, organize, copy, move, rename, and delete files, folders, shortcuts, and libraries on storage devices or media.
- explain the purpose of and use the Windows Task Manager.
- explain the purpose of and use the Windows Print manager. describe the properties of Windows objects: desktop, icons, menu structure, tool-bars, windows, dialog boxes, controls, settings, and views.
- utilize the Control Panel to configure and/or customize the properties of the desktop, taskbar, display, keyboard, mouse, and other peripheral devices.
- utilize the various types of help available by using menus, keywords, or the Internet.
- apply basic Windows maintenance utilities.
- apply basic security including anti-virus use.
- use commands at the command prompt.
- use accessory and utility programs that are installed with Windows to accomplish tasks such as write memos, edit clip art, check disk drives, play audio and video files, and burn CDs or DVDs.
- describe the properties of Windows objects: desktop, icons, menu structure, tool-bars, windows, dialog boxes, controls, settings, and views.
CISC 323 Linux Operating System
- Units:1
- Hours:18 hours LEC; 18 hours LAB
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:August 1, 2024
This course introduces the Linux operating system for microcomputers. Concepts include the kernel, file structures, daemons, graphical user interfaces (GUI), open source, file security and permissions. It also covers procedures for installing software, basic system administration and utilities, the Bourne again shell (BASH), command line interface utilities, and introduction to scripting topics.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- analyze the relationship of the operating system kernel, shell interface, windowing system, applications programs and the user to each other.
- utilize a command line interface (CLI) and GUI text editor to create and edit files in the Linux file system.
- employ the use of basic Linux GUI applets and CLI commands in file, disk, video and printer management.
- formulate CLI commands with correct syntax.
- compare Linux with other operating systems.
- utilize the Linux file system and apply industry standard file security.
- explain and define open-source theory, jargon, practice, and licensing.
- utilize a GUI and/or CLI to complete basic system administration and day-to-day tasks on the computer.
CISC 324 Intermediate Linux Operating System
- Units:1
- Hours:18 hours LEC; 18 hours LAB
- Prerequisite:CISC 323 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course is a continuation of CISC 323. Topics include boot loaders, Linux devices, and command line interface (CLI) system management utilities. It also covers advanced Bourne Again Shell (BASH) shell scripting, including looping and decision making logic structures. Alternatives to the BASH shell and regular expressions and text stream editors are introduced.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- set up a Linux and Microsoft Windows dual booting system.
- set up, configure, and troubleshoot a boot loader.
- utilize advanced BASH CLI utilities to inspect and maintain the system and its hardware.
- compare C shell, K shell, and BASH.
- create BASH script files utilizing looping structures: do, while, until.
- create BASH script files implementing decision making logic using: if, for, case and nesting.
- describe the use of text stream editor and filters such as awk and sed.
- compose a regular expression for use by the grep utility.
CISC 330 z System Familiarization
- Units:4.5
- Hours:81 hours LEC
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:August 1, 2024
This course introduces the IBM z System's software and hardware. It covers the following IBM skills: Introduction to the z/OS (z Operating System) environment, fundamental system skills in z/OS, and z/OS Job Control Language (JCL) and utilities.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- explain mainframe terminology and basic concepts.
- describe mainframe hardware components and the structured nature of the mainframe input/output architecture.
- apply access method concepts in Multiple Virtual Storage (MVS) and the structure and design of Virtual Storage Access Method (VSAM) files.
- associate software and system components that comprise a z System, their purpose, and how they interact.
- operate facilities of Time Share Option (TSO) and IBM's Interactive System Productivity Facility (ISPF), including the editors.
- describe the structure of Integrated Catalog Facility (ICF) catalogs and the related Volume Table of Contents (VTOC) and index VTOC.
- outline hierarchical and relational Database Management System (DBMS).
- describe the concepts, functions and facilities of Customer Information Control System (CICS).
- specify how security is implemented on the mainframe.
- operate file transfer tools.
- utilize the additional utilities/facilities/program products widely utilized within an enterprise mainframe environment.
- analyze what can go wrong in a mainframe environment.
- synthesize job control statements with sound syntax to execute mainframe programs and access datasets following best practices and standards.
CISC 331 z/OS Facilities
- Units:2
- Hours:36 hours LEC
- Prerequisite:CISC 330 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course introduces the base elements, optional features, and servers that are provided in z/OS. It focuses on the system service facilities that are provided by the z/OS Base Control Program (BCP). Topics include the functions of major software base elements in the management of jobs, tasks, storage, data, and problems. This course also addresses how these functions can be affected by the system programmer.
It also covers the services provided by the servers which execute in the z/OS environments, such as the Communications Server and the Security Server. Installation packaging options and steps to install the z/OS environments also are introduced.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- describe the system initialization process of the z/OS operating systems.
- state the differences between an address space, data space, and hyperspace.
- describe the process of translating a virtual address to a real address.
- explain the difference between paging and swapping.
- define a z/OS task.
- describe dispatching, interrupt processing, supervisor calls, cross memory services, and serialization.
- describe the purpose of the Job Entry Subsystem (JES).
- illustrate the flow of a job through the z/OS environment.
- describe the allocation process for data sets in the z/OS environments.
- illustrate how an I/O request is processed in a z/OS environment.
- describe how workload management is accomplished in a z/OS environment.
- explain the z/OS recovery processes and list available Problem Determination Tools.
- describe z/OS storage management concepts.
- describe the UNIX System Services functions provided in the z/OS environments.
- explain the network topologies and protocol support provided in z/OS.
- describe system security and network security for a z/OS environment.
- create a high-level plan for the installation and configuration of a z/OS environment.
CISC 332 z/OS System Services Structure
- Units:2
- Hours:36 hours LEC
- Prerequisite:CISC 331 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course presents the structure and control blocks of the z/OS BCP (base control program) and system services. It prepares the new z/OS system programmer to identify potential bottlenecks and performance problems, perform initial error symptom gathering, and identify opportunities and requirements for tailoring a z/OS system. This course also provides prerequisite information needed for further training in specialized areas such as system measurement and tuning and system problem determination.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- explain the MVS (multiple virtual storage) functions and control blocks necessary to support a task in a multitasking and multiprocessing environment.
- describe the software and hardware functions that allow a program to interact with programs running in other address spaces, use data in other address spaces, and use data in data spaces.
- trace the flow of an I/O (input/output) operation from the initial request in the application program through the completion of data transfer.
- identify the control blocks that describe the current status of an I/O request.
- describe the functions of the z/OS BCP Virtual, Real, and Auxiliary Storage Managers.
- describe the functions performed by the Recovery Termination Manager and recovery management components to minimize failure impact and enhance error correction.
- select the appropriate IBM publication to provide further technical information (SRLs, Technical Bulletins, Self-study and other z/OS courses).
- describe the services provided by cross system extended services (XES).
- identify and explain the purpose of the cache, list, and lock structures.
- plan the implementation of the global resource serialization STAR environment.
CISC 333 SMP/E (System Modification Program Extended) for z/OS
- Units:2
- Hours:36 hours LEC
- Prerequisite:CISC 330 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course covers the SMP/E skills needed in the installation and maintenance of optional features and maintenance in the z/OS operating environment. Topics include the SMP/E database and invoke SMP/E to add, modify, or replace system elements.
This course also covers the SMP/E tasks involved in installing a z/OS product. It emphasizes interpreting results of SMP/E processing. Additional SMP/E concepts include modification control statements, the consolidated software inventory, zone structure, and error analysis. SMP/E commands such as RECEIVE, APPLY, ACCEPT, RESTORE, REPORT, and LIST are discussed.
More advanced topics include automated SMP/E delivery of z/OS and product maintenance over the Internet with an automated SMP/E process that downloads and installs IBM preventive and corrective service over the Internet.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- describe how SMP/E is used as a tool for system maintenance.
- interpret modification control statements in a sample SYSMOD.
- create a consolidated software inventory database to support installation and maintenance requirements.
- use the SMP/E dialogs to install a product and its related service.
- manage exception SYSMOD data.
- describe the use of the primary and secondary data sets required by SMP/E.
- analyze output from SMP/E processing and resolve commonly encountered problems.
- describe the use of the REPORT command to determine software dependencies between zones.
- use the BUILDMCS process to create a function SYSMOD from an installed product and its service.
- use the new SMP/E functions to install software service automatically over the Internet.
- implement support for communication server FTP client.
- use the new RECEIVE ORDER command to order and install z/OS maintenance automatically over the Internet.
CISC 350 Introduction to Data Communications
- Units:1
- Hours:18 hours LEC
- Prerequisite:None.
- Advisory:CISC 100
- Transferable:CSU
- Catalog Date:August 1, 2024
This course introduces business data communication concepts, systems, technology, protocols, theory, and basic terminology. Specific topics include analog and digital data encoding and transmission; media; interfaces; packet, circuit, and broadcast networks; and data multiplexing.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- explain the evolution of data communications and the impact of technology on communication methods in business and the home.
- define data communications terminology.
- analyze the hardware and software needed to communicate using a standalone computer or a local area network.
- evaluate different methods used for data communications applications.
- select the equipment specifications for a small home or office network.
- explain the primary differences between various types of data communication technologies.
CISC 351 Introduction to Local Area Networks
- Units:1
- Hours:18 hours LEC; 18 hours LAB
- Prerequisite:None.
- Advisory:CISC 320 and 350
- Transferable:CSU
- Catalog Date:August 1, 2024
This course introduces local area networks (LAN) and provides hands-on training in LAN applications and network administration. Topics include planning, installing, and maintaining a LAN, responsibilities of the system administrator, and basic network security principles.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- describe the functions of a LAN and the devices that may reside on a LAN.
- examine the advantages and disadvantages of peer-to-peer LANs vs. domain-based LANs.
- explain LAN topologies, types of cabling, standards, media and access methods.
- perform the basic functions required for day-to-day LAN administration, such as: creating a directory structure and network shares, creating users and groups, defining user rights, setting access permissions, and configuring user profiles.
- analyze the advantages and disadvantages of resource sharing on a LAN and the factors to be considered when planning and implementing a LAN.
- analyze the security implications of peer-to-peer vs. centralized LAN administration.
- evaluate the security implications of a user being a member of multiple groups and the potential impacts on the effective permissions for the user.
- analyze best practices for sharing file resources and configure the Microsoft New Technology File System (NTFS) permissions for group and user needs.
- evaluate LAN security and configure shares, permissions and authentication security in accordance with best practices.
- create a plan to combat viruses, Trojans, network worms, spyware and adware as it relates to LAN security and file integrity.
CISC 361 Information Technology Fundamentals
- Units:3
- Hours:54 hours LEC
- Prerequisite:None.
- Advisory:CISC 310, 320, and 350
- Transferable:CSU
- Catalog Date:August 1, 2024
This course aligns with the Computer Technology Industry Association (CompTIA) A+ core 1 certification objectives. This course covers information technology topics related to mobile devices, networking, computer hardware, virtualization, and cloud computing.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- install and configure laptop hardware and components.
- compare and contrast the display components of mobile devices.
- set up and configure accessories and ports of mobile devices.
- configure basic mobile-device network connectivity and application support.
- compare and contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes.
- compare and contrast common networking hardware.
- compare and contrast protocols for wireless networking.
- summarize services provided by networked hosts.
- install and configure basic wired/wireless small office/home office (SOHO) networks.
- compare and contrast common network configuration concepts.
- compare and contrast Internet connection types, network types, and their features.
- apply networking tools.
- explain basic cable types and their connectors, features, and purposes.
- install RAM to a computer.
- select and install storage devices.
- install and configure motherboards, Central Processing Units (CPU), and add-on cards.
- install or replace power supply in a computer.
- deploy and configure multifunction devices/printers and settings.
- install and replace printer consumables.
- summarize cloud-computing concepts.
- summarize aspects of client-side virtualization.
CISC 362 Microcomputer and Applications Support
- Units:2
- Hours:36 hours LEC
- Prerequisite:None.
- Advisory:CISC 361 and 363
- Transferable:CSU
- Catalog Date:August 1, 2024
This course is an in-depth investigation of the technical, business, soft, and self-management skills technicians need to provide effective customer service and support in an information technology (IT) environment. It introduces customer service and
problem solving skills needed for success in a small- or
large-business environment.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- demonstrate proficiency in customer service skills in the areas of active listening, and written and oral communication.
- diagnose, document, and communicate microcomputer problems and solutions using acceptable terminology.
- analyze and troubleshoot hardware and software problems in a variety of multi-user computer lab environments.
- apply business and team building skills for technical professionals.
- identify the causes of stress in computer support and apply stress reduction coping skills.
CISC 363 Microcomputer Support Technical - Preparation for A+ Certification
- Units:3
- Hours:42 hours LEC; 36 hours LAB
- Prerequisite:CISC 361 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course is the second of two courses providing a foundation in personal computer (PC) support. Hands-on skills include advanced component installation and configuration, troubleshooting component hardware, and configuring and troubleshooting major operating systems and networking hardware. This course along with CISC 361 prepares students for the Computing Technology Industry Association (CompTIA) A+ Certification exam.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- Set up, demonstrate, and troubleshoot the three most commonly used PC operating systems.
- Assemble, administer, and troubleshoot a basic networking system.
- Demonstrate the installation, configuration, and troubleshooting of advanced computer devices.
- Differentiate types of physical network architectures.
- Explain disaster recovery procedures.
- Support, upgrade, and add peripheral devices to notebook computers.
- Identify and recover from viruses.
- Identify the fundamental principles of security.
CISC 495 Independent Studies in Computer Information Science - Core
- Units:1 - 3
- Hours:54 - 162 hours LAB
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:August 1, 2024
Independent Study is an opportunity for the student to extend classroom experience in this subject, while working independently of a formal classroom situation. Independent study is an extension of work offered in a specific class in the college catalog. To be eligible for independent study, students must have completed the basic regular catalog course at American River College. They must also discuss the study with a professor in this subject and secure approval. Only one independent study for each catalog course will be allowed.
CISC 498 Work Experience in Computer Information Science - Core
- Units:0.5 - 4
- Hours:27 - 216 hours LAB
- Prerequisite:None.
- Enrollment Limitation:Students must be in a paid or unpaid internship, volunteer position, or job related to computer information science with a cooperating site supervisor. Students are advised to consult with the Computer Information Science Department faculty to review specific certificate and degree work experience requirements.
- Advisory:Eligible for ENGWR 300 or ESLW 340.
- Transferable:CSU
- General Education:AA/AS Area III(b)
- Catalog Date:August 1, 2024
This course provides students with opportunities to develop marketable skills in preparation for employment or advancement within the field of computer information science. It is designed for students interested in work experience and/or internships in transfer-level degree occupational programs. Course content includes understanding the application of education to the workforce, completion of Title 5 required forms which document the student's progress and hours spent at an approved work site, and developing workplace skills and competencies.
During the semester, the student is required to complete 27 hours of related work experience for 0.5 unit. An additional 27 hours of related work experience is required for each additional 0.5 units. All students are required to attend the first course meeting, a mid-semester meeting, and a final meeting. Additionally, students who have not already successfully completed a Work Experience course will be required to attend weekly orientations while returning participants may meet individually with the instructor as needed. Students may take up to 16 units total across all Work Experience course offerings. This course may be taken up to four times when there are new or expanded learning objectives. Only one Work Experience course may be taken per semester.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- demonstrate application of industry knowledge and theoretical concepts in computer information science related to a transfer degree level career as written in the minimum three (3) learning objectives created by the student and their employer or work site supervisor at the start of the course.
- make effective decisions, use workforce information, and manage their personal career plans.
- behave professionally, ethically, and legally during work, consistent with applicable laws, regulations, and organizational norms.
- behave responsibly during work, exhibiting initiative and self-management in situations where it is needed.
- apply effective leadership styles during work, with consideration to group dynamics, team and individual decision making, and workforce diversity.
- communicate in oral, written, and other formats, as needed, in a variety of contexts during work.
- locate, organize, evaluate, and reference information during work.
- demonstrate originality and inventiveness during work by combining ideas or information in new ways, making connections between seemingly unrelated ideas, and reshaping goals in ways that reveal new possibilities using critical and creative thinking skills such as logical reasoning, analytical thinking, and problem-solving.
CISC 499 Experimental Offering in Computer Information Science - Core
- Units:0.5 - 4
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:August 1, 2024
This is the experimental courses description.
Computer Information Science - Data Science (CISD) Courses
CISD 299 Experimental Offering in Computer Information Science - Data Science
- Units:0.5 - 4
- Prerequisite:None.
- Catalog Date:August 1, 2024
This is the experimental courses description.
CISD 499 Experimental Offering in Computer Information Science - Data Science
- Units:0.5 - 4
- Prerequisite:None.
- Catalog Date:August 1, 2024
This is the experimental courses description.
Computer Information Science - Networking (CISN) Courses
CISN 110 Networking Technologies - Preparation for N+ Certification
- Units:2
- Hours:36 hours LEC
- Prerequisite:None.
- Advisory:CISC 361 and 363
- Catalog Date:August 1, 2024
This is an introductory course in networking software and hardware. Topics include communication protocols; local, wide area, and virtual networks; intra- and inter-networks; network architectures; topologies; cloud computing; security; and the Open Systems Interconnect (OSI) model. This course, along with CISN 111, provides preparation for the Computer Technology Industry Association N+ certification test.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- describe the function and responsibility of each of the seven layers of the OSI model.
- identify industry standards, types of applications, protocols, and network connection devices.
- describe the physical characteristics and Ethernet standards of coaxial cable, STP, UTP, and fiber-optic media.
- identify a variety of media types and their key characteristics, including cost, speed and capacity, resistance to interface, and ease of installation.
- explain basic data transmission concepts, including signaling, data modulation, multiplexing, bandwidth, baseband, and broadband.
- troubleshoot network devices and create a network map to be used for network troubleshooting.
- explain the purpose of ports and sockets, and identify the ports of several common network protocols.
- describe domain names and the name resolution process.
- identify and explain the functions of the core TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers.
- understand WLAN (wireless LAN) architecture. explore wireless security concerns and evaluate common problems experienced with wireless networks.
- demonstrate knowledge of network architectures, topology, hardware, and software.
- identify and test network cables and describe characteristics of NIC and Ethernet interfaces.
CISN 111 Intermediate Networking Technologies
- Units:2
- Hours:36 hours LEC
- Prerequisite:CISN 110 with a grade of "C" or better
- Catalog Date:August 1, 2024
This is an intermediate course in networking software and hardware. Topics include network operating systems setup, analyzing network performance, diagnosing and repairing of network problems, and network security techniques. This course, along with CISN 110, provides preparation for the Computer Technology Industry Association N+ certification test.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- identify and describe various types of wireless networking characteristics.
- describe and explain virtualization technologies - how they connect with a network and how infrastructure devices can be virtualized.
- identify the features and benefits of cloud computing.
- secure network connections using encryption protocols.
- explain the purposes of network segmentation.
- explain how virtual local area networks (VLANs) work and how they're used.
- discuss physical security methods that prevent and detect intrusions.
- describe the basic concepts of network management.
- explain the most common wireless wide area network (WAN) technologies.
- identify best practices for incident response and disaster recovery.
- identify the fundamental elements of WAN service options.
- secure and troubleshoot a wireless (Wi-Fi) network.
- configure various security measures on a wireless network.
- track the processes of authentication, authorization, and auditing on a network.
- describe cloud computing categories and models, and discuss concerns regarding cloud connectivity and security.
CISN 117 Wireshark TCP/IPv4 and 6 Network Analysis
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISC 350
- Catalog Date:August 1, 2024
This course introduces the Wireshark protocol analyzer for use in diagnosing and troubleshooting poor performance or security-related problems in IPv4 and IPv6 networks. It focuses on Wireshark functionality and analysis of captured IPv4 and IPv6 traffic streams such as Dynamic Host Configuration Protocol (DHCP), Domain Name Systems (DNS), and Hypertext Transfer Protocol (HTTP). This course begins preparation for the Wireshark Certified Network AnalystTM certification exam.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- Use and explain key functionality components of a protocol analyzer, such as packet capture, filtering, and export.
- Analyze captured traces of datalink, IPv4, IPv6, and TCP traffic to diagnose and troubleshoot poor network performance or security-related problems.
CISN 119 TCP/IP Protocols
- Units:3
- Hours:54 hours LEC
- Prerequisite:None.
- Advisory:CISC 350
- Catalog Date:August 1, 2024
This course covers the TCP/IP protocol suite for the Internet. Information to support and manage TCP/IP is provided. Additional topics include routing; tunneling; IP addressing and subnetting; IP version 4 and IP version 6;
virtual private networks; network address translation; ports and sockets; and many other individual protocols.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- compare the Open Systems Interconnection (OSI) model to the TCP/IP model
- construct valid IP addresses
- compare and contrast routing and tunneling
- demonstrate IP subnetting for IPv4
- compare IPv4/IPv6
- explain virtual private networks
- explain network address translation
- explain Requests for Comments (RFCs)
CISN 120 Red Hat Linux System Administration I (RH124)
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISC 323 and 324
- Catalog Date:August 1, 2024
This is the first of two courses covering the core system administration tasks needed to manage Red Hat Enterprise Linux servers and introducing key command-line concepts and enterprise-level tools. Topics covered also include essential Linux administration tasks, including installation, establishing network connectivity, managing physical storage, and basic security administration.
This course is based on Red Hat® Enterprise Linux 8. This is the first course in preparation for the Red Hat Certified System Administrator (RHCSA) and Engineer (RHCE) certification examinations. ARC is a Red Hat Academy academic partner.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- access the command line.
- manage files from the command line.
- manage physical storage.
- create, view, and edit text files.
- manage local users and groups.
- monitor and manage Linux processes.
- control services and daemons.
- control access to files with file system permissions.
- analyze, review and store log files and journals.
- configure and secure the OpenSSH service, and demonstrate use of the Web Console.
- install and update software packages.
- access Linux file systems.
- manage Linux networking.
- control firewall restrictions.
- troubleshoot problems and analyze systems with Red Hat Insights.
CISN 121 Red Hat Linux System Administration II (RH134)
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:CISN 120 with a grade of "C" or better
- Catalog Date:August 1, 2024
The is the second of two courses covering system administration tasks introducing more advanced administrative topics, such as storage management using LVM, SELinux management, and automated installation. This course goes deeper into enterprise Linux administration, including file systems and partitioning, logical volumes, SELinux, firewall configuration, and troubleshooting. This course is based on Red Hat® Enterprise Linux 8. This is the second course in preparation for the Red Hat Certified System Administrator (RHCSA) Engineer (RHCE) certification examinations. ARC is a Red Hat Academy academic partner.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- install Red Hat Enterprise Linux using scalable methods using Kickstart.
- access security files, file systems, and networks.
- manage scheduled jobs.
- execute shell scripting and automation techniques.
- manage storage devices, logical volumes, and file systems.
- access network file systems.
- manage security and system access using firewalls and SELinux.
- control the boot process and system services.
- perform troubleshooting tasks.
CISN 122 Red Hat Linux System Administration III (RH254): Data Center Services
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:CISN 120 with a grade of "C" or better
- Catalog Date:August 1, 2024
The course is focused on deploying and managing network servers running caching domain name service (DNS), MariaDB, Apache HyperText Transport Protocol Daemon (HTTPD), Postfix SMTP nullclients, network file sharing with network file system (NFS) and server message block (SMB), iSCSI initiators and targets, advanced networking and firewall configurations, and the use of bash shell scripting to help automate, configure, and troubleshoot the system. This course is based on Red Hat® Enterprise Linux 7. This is the third course in preparation for the Red Hat Certified Engineer (RHCE) certification examination. ARC is a Red Hat Academy academic partner.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- control services and daemons using systemctl
- manage networking.
- configure link aggregation, bridging, teaming, and bonding.
- configure filters with firewalls.
- permit and reject access to network services using SELinux.
- manage DNS servers.
- configure SMTP email delivery.
- provide iSCSI block storage.
- configure NFS and SAMBA file-based storage.
- configure MariaDB SQL database.
- configure Apache HTTPD with TLS-enabled virtual hosts.
- write simple bash automation scripts.
CISN 123 Red Hat Linux System Administration III (RH294): Automation with Ansible
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:CISN 121 with a grade of "C" or better
- Catalog Date:August 1, 2024
This course covers the use of Ansible® to automate system administration tasks such as provisioning, configuration, application deployment, and orchestration. Topics focus on how to install and configure Ansible® on a management workstation; prepare managed hosts for automation; write Ansible® Playbooks to automate tasks; and run playbooks to ensure servers are correctly deployed and configured. This course is based on Red Hat® Enterprise Linux 8 and Red Hat® Ansible® Engine 2.8. This is the third course in preparation for the Red Hat Certified Engineer (RHCE) certification examination. ARC is a Red Hat Academy academic partner.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- install and configure Ansible or Red Hat Ansible Engine on a control node.
- create and manage inventories of managed hosts, as well as prepare them for Ansible automation.
- run individual ad hoc automation tasks from the command line.
- write Ansible Playbooks to consistently automate multiple tasks and apply them to managed hosts.
- parameterize playbooks using variables and facts, and protect sensitive data with Ansible Vault.
- write and reuse existing Ansible roles to simplify playbook creation and reuse code.
- automate common Red Hat Enterprise Linux system administration tasks using Ansible.
CISN 299 Experimental Offering in Computer Information Science - Networking
- Units:0.5 - 4
- Prerequisite:None.
- Catalog Date:August 1, 2024
This is the experimental courses description.
CISN 300 Network Systems Administration
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISC 320, 350, and 351
- Transferable:CSU
- Catalog Date:August 1, 2024
This course covers the installation and configuration of a Windows server in a client/server network. Topics include: introduction to Active Directory, local storage, file and print services, Group Policy, and basic security. Additional topics include: implementing IPv4 and IPv6, Dynamic Host Configuration Protocol (DHCP), and Domain Name System (DNS) in Windows. It also introduces server virtualization using Hyper-V. This is one of three courses preparing students for the Microsoft Certified Solutions Associate MCSA: Windows Server certification exams.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- install and configure a Windows server.
- create, configure and implement a workgroup and a domain-based network using a Windows network operating system.
- examine and explain the administrative tools of a Windows server network operating system.
- describe and define the Windows Active Directory and its main features and uses.
- define and demonstrate the functions and configuration of Windows clients and servers in an Active Directory Domain environment.
- manage Active Directory Domain Services objects.
- configure automated Active Directory Domain Services administration.
- implement and configure IPv4 and IPv6 services.
- implement and configure Dynamic Host Configuration Protocol (DHCP).
- implement and configure Domain Name System (DNS).
- implement and configure local storage.
- implement and configure resource sharing including file and print services.
- analyze and construct user accounts and groups using best practices for security.
- implement Group Policy and secure Windows servers by using Group Policy Objects (GPOs).
- implement basic server virtualization by using Hyper-V.
- analyze and explain network resource utilization using Windows performance monitor, including performance counters and their implications.
- research and identify good Internet resources for obtaining answers to common problems, network anomalies and Windows server problems.
CISN 302 Intermediate Network Systems Administration
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:CISN 300 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course covers intermediate system administration in a Windows client/server network. Topics include core services such as user and group management, network access, and data security. Additional topics include patch management, file services, system monitoring and auditing, Active Directory and Domain Name System, and Network Policy and Group Policy. This is one of three courses preparing students for the Microsoft Certified Solutions Associate MCSA: Windows Server 2019 certification exams.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- deploy and maintain Windows Server images.
- manage and implement system updates and patches.
- configure and implement file services such as Distributed File System (DFS) and File Server Resource Manager (FSRM).
- optimize File Services.
- implement file/disk encryption.
- configure monitoring and advanced auditing.
- configure and troubleshoot Windows Domain Name System (DNS).
- configure, implement, and troubleshoot remote access including Windows Virtual Private Networking (VPN).
- install, configure, and troubleshoot Network Policy Server.
- implement Network Access Protection (NAP).
- maintain Active Directory domain services.
- manage user and service accounts.
- plan and implement Group Policy Infrastructure.
- manage user desktops using Group Policy.
CISN 306 Advanced Network Systems Administration
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:CISN 302 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course covers advanced server services and system administration in a Windows client/server network. Topics include advanced configuration tasks necessary to deploy, manage, and maintain a Windows Server infrastructure. It also covers advanced network and file services, Dynamic Access Control (DAC), fault tolerance, network load balancing, failover clustering, disaster recovery, Active Directory Certificate Services (AD CS), and Federation Services (AD FS). This is one of three courses preparing students for the Microsoft Certified Solutions Associate (MCSA): Windows Server 2012 certification exams.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- configure advanced features for Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), and configure IP Address Management (IPAM) with Windows Server.
- configure and manage Internet Small Computer Systems Interface (iSCSI), BranchCache, and File Server Resource Manager (FSRM).
- configure Dynamic Access Control (DAC) to manage and audit access to shared files.
- plan and implement an Active Directory Domain Services (AD DS) deployment that includes multiple domains and forests.
- plan and implement an AD DS deployment that includes locations.
- implement and configure an Active Directory Certificate Services (AD CS) deployment.
- implement an Active Directory Rights Management Services (AD RMS) deployment.
- implement an Active Directory Federated Services (AD FS) deployment.
- provide high availability and load balancing for web-based applications by implementing Network Load Balancing (NLB).
- implement and validate high availability and load balancing for web-based applications by implementing NLB.
- provide high availability for network services and applications by implementing failover clustering.
- implement a failover cluster, and configure and validate a highly available network service.
- deploy and manage Hyper-V virtual machines in a failover cluster.
- implement a backup and disaster recovery solution based on business and technical requirements.
CISN 307 Windows Active Directory Services
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:CISN 302 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course covers how to install, configure, and administer Microsoft Windows Active Directory services. It also focuses on implementing Group Policy and understanding the Group Policy tasks required to manage users and computers. Group Policies are used to configure and manage the user desktop environment, configure and manage software, and implement and manage security settings. Installation and configuration of Domain Naming System (DNS) and Windows Internet Naming System (WINS) are covered, as well as publishing, replication and the backup of the directory services database.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- design network architecture, topology, interdependence, and constraints in relation to an Active Directory domain.
- evaluate,install, configure, and administer an Active Directory domain controller.
- analyze, install, configure, administer, and evaluate Group Policy in an Active Directory environment.
- design Active Directory forests, trees, domains, and operational units.
- explain, install, configure, and administer Windows Internet Naming System (WINS) services and settings.
- describe, install, configure, and administer Domain Naming System (DNS) services and settings.
- publish, backup, and replicate the Active Directory database.
CISN 308 Internetworking with TCP/IP
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:CISN 302 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course covers how to install, configure, manage, and support a network infrastructure using the Microsoft Windows Server products. It focuses on TCP/IP and related services, including Dynamic Host Configuration Protocol (DHCP), Domain Naming System (DNS), Windows Internet Naming Service (WINS), Internet Information Server (IIS), Public Key Infrastructure (PKI) and certificate service, Internet protocol security (IPSec), Network Address Translation (NAT), and remote access. It also covers configuring Windows as a network router, Virtual Private Network (VPN) connectivity and managing a Windows deployment using Remote Installation Services (RIS).
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- design an overall integration plan for implementing a network services infrastructure using TCP/IP, with connectivity to Netware, Macintosh and UNIX systems.
- evaluate workstation and server deployment using remote installation services.
- deploy the DHCP server service.
- analyze the DNS and WINS server services.
- explain network security using IPSec, PKI and certificate server services.
- describe Internet connectivity using NAT and Windows router.
- design the IIS server service.
- deploy a Virtual Private Network.
CISN 320 Designing Windows Directory Services
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:CISN 302 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course covers how to design and administer Microsoft Windows Active Directory services, including Group Policy. Group Policies are used to configure and manage the user desktop environment, configure and manage software, and implement and manage security settings. Additional topics include virtual machine management, Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), Web Proxy, Virtual Private Network (VPN), and Branch Office infrastructure. This is one of two courses preparing students for the Microsoft Certified Solutions Expert (MCSE): Windows Server 2012 certification exams.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- plan server upgrade and migration.
- plan and implement a server deployment strategy.
- plan and deploy servers by using System Center 2012 R2 Virtual Machine Manager (VMM).
- design and maintain an (IP) Internet Protocol configuration and address management solution.
- design and implement name resolution.
- design and implement an Active Directory Domain Services (AD DS) forest and domain infrastructure.
- design and implement an AD DS organizational unit (OU) infrastructure.
- design and implement a Group Policy Object (GPO) strategy.
- design and implement an AD DS physical topology.
- plan and implement storage and file services.
- design and implement network protection.
- design and implement remote access services.
CISN 325 Windows Server Infrastructure: High Availability and Virtualization
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:CISN 302 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course covers the design, implementation, and maintenance of a Windows Server infrastructure in an enterprise scaled, highly virtualized environment. Topics include monitoring, failover, high availability, virtualization using Hyper-V, and certificate infrastructure. This is one of two courses preparing students for the Microsoft Certified Solutions Expert (MCSE): Windows Server 2019 certification exams.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- describe an enterprise data center.
- plan and implement a server monitoring strategy using the Windows Server 2019 tools and using Microsoft System Center 2019 - Operations Manager.
- plan and implement an application and a file services infrastructure that is highly available.
- plan and implement a highly available server infrastructure by using the failover clustering features in Windows Server 2019.
- plan and implement a business continuity strategy in a Windows Server 2019 environment.
- plan and implement a server virtualization strategy using System Center 2019.
- plan and implement the network and storage infrastructure required to deploy a virtualized server infrastructure.
- plan and deploy virtual machines on Windows Hyper-V.
- plan and implement a virtualization administration solution by using System Center 2019.
- plan and implement a public key infrastructure (PKI) deployment, and plan and implement a certificate management solution.
- plan and implement an Active Directory Federation Services (AD FS) server deployment and claims aware application access.
- plan and implement Dynamic Access Control, Workplace Join, and Work Folders.
- plan and implement an Active Directory Rights Management Services (AD RMS) deployment, plan and manage AD RMS templates and access, and plan and implement external access to AD RMS services.
CISN 340 Cisco Networking Academy CCNA: Introduction to Networks
- Units:3.5
- Hours:54 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISC 350, CISC 361, or CISN 110
- Transferable:CSU
- Catalog Date:August 1, 2024
This course introduces data communication and networking fundamentals. It covers networking addressing, which includes calculations and conversions between binary, decimal, and hexadecimal numbering systems. It also surveys data communication hardware and software components and basic networking concepts. Topics include data communication, the Open Systems Interconnection (OSI) and Transmission Control Protocol and the Internet Protocol (TCP/IP) models, IP addressing and subnetting, routing concepts, LAN media, network configuration, troubleshooting, management, and analyses. This is the first course in preparation for the Cisco Certified Network Associate (CCNA) certification examination. American River College (ARC) is a certified Cisco Networking Academy and all courses are taught by Cisco Certified Academy Instructors (CCAI).
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- compare different types of networks.
- utilize the Cisco Internetworking Operating System (IOS).
- clarify the Open Systems Interconnection (OSI) reference model and the Transmission Control Protocol and Internet Protocol (TCP/IP) communication suite.
- identify the lowest layer of the OSI model and the physical medium.
- compare the differences between decimal, binary, and hexadecimal number systems and the essentials of IPv4, IPv6, and Ethernet MAC addressing.
- explain the data link layer that prepares network layer packets for transmission, controls access to the physical media, and transports data across various media.
- explore Ethernet functions, including how devices use Ethernet MAC addresses to communicate in a multiaccess network that has MAC address tables and forward Ethernet frames.
- exhibit the function of the network layer, routing, and the basic device that performs in the router that performs static and dynamic routing, packet forwarding, path determination, and data packets for both IPv4 and IPv6.
- differentiate the Ethernet MAC address and the ARP protocol for IPv4 address resolution and the Neighbor Discovery Protocol for IPv6.
- explain how to configure a Cisco router including IPv4 and IPv6 addresses on an interface.
- describe how to calculate and use subnet masks to determine the number of subnetworks and hosts in a network and examine how to improve network performance by optimally dividing the IPv4 address space based on network requirements.
- review IPv6 network addressing including representation, types, and structure.
- demonstrate Internet Control Message Protocol (ICMP) tools such as ping and trace.
- illustrate Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) including segmentation, the three-way handshake, expectational acknowledgments, and data delivery.
- inspect protocols of the TCP/IP application layer related to the top three layers of the OSI model including communicating across data networks and key protocols and services including HTTP, HTTPS, DNS, DHCP, SMTP/POP, and FTP.
- explain network security threats and vulnerabilities such as network attacks, and mitigation techniques.
- reexamine the various components in a small network including network growth, configuration, troubleshooting issues, and troubleshooting methodologies.
CISN 341 Cisco Networking Academy CCNA: Switching, Routing, and Wireless Essentials
- Units:3.5
- Hours:54 hours LEC; 27 hours LAB
- Prerequisite:CISN 340 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This is the second course in preparation for the Cisco Certified Network Associate (CCNA) certification examination. This course covers networking theory and routing technologies, including OSI Model, beginning router configurations, and routed and routing protocols. It continues and expands the study of binary, decimal, and hexadecimal numbering systems to change variable length subnet addressing. Students will perform basic network configuration and troubleshooting, identify and mitigate LAN security threats, and configure and secure a basic WLAN. American River College (ARC) is a certified Cisco Networking Academy, and all courses are taught by Cisco Certified Academy Instructors (CCAI).
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- demonstrate a knowledge of the underlying technologies utilized in modern networking.
- utilize various protocols across an Internet composed of different topologies.
- share devices and information on a network.
- perform calculations to combine network numbering blocks to develop a functional super networking address system.
CISN 342 Cisco Networking Academy CCNA: Enterprise Networking, Security, and Automation
- Units:3.5
- Hours:54 hours LEC; 27 hours LAB
- Prerequisite:CISN 141 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This is the third course in preparation for the Cisco Certified Network Associate (CCNA) certification examination. It provides advanced routing and switching technologies. Topics include advanced router configurations, network management, network design, WANs concepts, and network security. American River College (ARC) is a certified Cisco Networking Academy, and all courses are taught by Cisco Certified Academy Instructors (CCAI).
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- configure a wide area network.
- install and maintain a multi-protocol routed network.
- implement network security concepts.
- explain how networking devices implement QoS.
- design, implement, configure, and troubleshoot enterprise networks.
- explain the purpose and characteristics of network virtualization.
CISN 499 Experimental Offering in Computer Information Science - Networking
- Units:0.5 - 4
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:August 1, 2024
This is the experimental courses description.
Computer Information Science - Programming (CISP) Courses
CISP 299 Experimental Offering in Computer Information Science - Programming
- Units:0.5 - 4
- Prerequisite:None.
- Catalog Date:August 1, 2024
This is the experimental courses description.
CISP 300 Algorithm Design/Problem Solving
- Units:3
- Hours:54 hours LEC
- Prerequisite:None.
- Advisory:CISC 310
- Transferable:CSU; UC
- General Education:AA/AS Area II(b)
- Catalog Date:August 1, 2024
This course introduces methods for solving typical computer problems through algorithm design. Topics include assessing and analyzing computer problems in a top-down, divide-and-conquer approach that leads to a programming solution. It also covers programming plans and detailed design documents from which source code versions of programs are created.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- define operators, including arithmetic, comparison, and logical operators.
- differentiate control structures, including branches (conditional statements) and loops (pre-checking and post-checking loops).
- deduce post-condition from pre-condition for control structures, including assignment statements, branches, and loops.
- construct a trace table to emulate the execution of a program that utilizes variables, various control structures, data organizations, subroutines, and parameters.
- contrast the lifespan limits and behaviors of local variables, by-value parameters, and by-reference parameters.
- compare the two methods of passing results: by-reference parameters and return value.
- compare in-line copy-and-paste coding with structured subroutines in terms of maintainability, defect containment, testability, and other metrics.
- create a subroutine to abstract one or more similar blocks of in-line code using local variables, parameters, and return values.
- differentiate roles involved in software development, including developers, analysts, and test engineers.
CISP 310 Computer Architecture and Organization
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:CISP 360 or 480 with a grade of "C" or better
- Transferable:CSU; UC ((CISP 310 & 319 combined: maximum credit - one course))
- C-ID:C-ID COMP 142
- Catalog Date:August 1, 2024
This course covers the organization and behavior of real computer systems at the assembly-language level. Topics include the mapping of statements and constructs in a high-level language onto sequences of machine instructions, as well as the internal representation of simple data types and structures. Numerical computation is examined, noting the various data representation errors and potential procedural errors.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- write simple assembly language program segments.
- demonstrate how fundamental high-level programming constructs are implemented at the machine-language level.
- compare Reduced Instruction Set Computer (RISC) versus Complex Instruction Set Computer (CISC) architectures.
- diagnose assembly language programs with common and not-so-common defects.
- structure complex logic into well-defined assembly language instruction sequences and subroutines.
- evaluate common coding mistakes in C/C++ in the context of the underlying assembly language implementation.
- describe von Neumann architecture and how its components interact.
CISP 332 Introduction to REXX (REstructured Extended Executor) Programming
- Units:2
- Hours:36 hours LEC
- Prerequisite:CISC 330 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course is designed to teach the basic skills required to write programs using the REstructured eXtended eXecutor (REXX) language in z/OS. The course covers the Time Share Option (TSO) extensions to REXX and interaction with other environments such as the Multiple Virtual Storage (MVS) console, running REXX in batch jobs, and compiling REXX.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- write programs using the REXX programming language.
- utilize various data parsing techniques.
- create user-defined internal and external functions and subroutines.
- invoke host commands from REXX execs.
- develop programs that read and write data sets.
- utilize instructions and commands that manipulate the data stack.
- analyze program faults using REXX debugging tools.
- develop error-handling routines.
CISP 350 Database Programming
- Units:3
- Hours:36 hours LEC; 54 hours LAB
- Prerequisite:None.
- Advisory:CISA 320 and CISC 310
- Transferable:CSU
- General Education:AA/AS Area II(b)
- Catalog Date:August 1, 2024
This is an introductory course in Structured Query Language (SQL) database programming. Topics include database normalization, subqueries, joins, import/export, privileges, and Procedural Language (PL)/SQL programming.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- compare and contrast different database implementations.
- design databases conforming to normalization guidelines.
- create and maintain relational databases.
- construct subqueries and table joins.
- construct small programs using PL/SQL.
- import/export data.
CISP 360 Introduction to Structured Programming
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:CISP 300 or 370 with a grade of "C" or better
- Transferable:CSU; UC
- General Education:AA/AS Area II(b)
- C-ID:C-ID COMP 112
- Catalog Date:August 1, 2024
This course is an introduction to structured programming and objects. Topics include program design, documentation, testing, and debugging, as well as data representation, data types, variables, constants, and operators. It also includes control structures, functions, interactive and file input/output, standard libraries, arrays, pointers, structures, classes, and objects.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- develop efficient algorithms for the solution of problems using the control structures of structured programming.
- implement suitable data structures to support a given algorithm.
- formulate and implement algorithms to solve complex problems using a high-level language.
- use the top-down development approach to implement modular, maintainable programs.
- apply the software development life-cycle for program design, development, coding style, documentation, and testing.
- assess the efficiency of differing solutions to a problem.
- analyze an existing algorithm implementation for errors, then develop solution program code to correct the errors.
- design and use classes and objects.
- compare procedural and object-oriented approaches to problem solving.
CISP 370 Beginning Visual Basic
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:None.
- Advisory:CISC 310 and CISP 300
- Transferable:CSU; UC
- Catalog Date:August 1, 2024
This introductory programming course covers the development of Windows-based desktop applications using Visual Basic (VB). Topics include best practices for Graphical User Interface (GUI) design, use of the VB application development software, organizing code into procedures and functions, variable scope, structures, arrays, input data validation, calculation, file input and output, and multiple-window applications. This course is designed for those who want a strong foundation in basic programming and building GUI applications.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- design and implement a GUI application using single or multiple windows using the VB Integrated Development Environment.
- design and implement variables at the class level and the procedure level.
- design and implement data storage strategies for text files and databases.
- design and implement structure data types.
- design and implement programming logic using conditional execution structures and looping structures.
- design and implement programming logic using VB procedures and functions and developer defined procedures and functions, and correctly pass parameters to the procedures and functions both by value and by reference.
- design and implement input data validation and calculation.
- organize data in single dimension and multidimensional arrays.
- build, compile, execute, test, and debug applications.
CISP 400 Object Oriented Programming with C++
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:CISP 360 or 480 with a grade of "C" or better
- Advisory:CISC 323
- Transferable:CSU; UC
- General Education:AA/AS Area II(b)
- C-ID:C-ID COMP 122
- Catalog Date:August 1, 2024
This course is an introduction to the C++ programming language and object-oriented programming in the Linux/UNIX environment. Topics include a programming languages overview, program analysis and design, encapsulation, overloading, classes, inheritance, virtual functions, polymorphism, templates, exception handling, and the standard template library. In addition, it covers basic Linux/UNIX commands and make files are covered.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- summarize the evolution of programming paradigms and identify the characteristics of each style.
- choose Linux/UNIX commands to perform various tasks.
- create Linux/UNIX make files to automate the compilation and linking of multi-file C++ programs.
- differentiate between what is done by the preprocessor, the compiler, and the linker.
- design C++ classes that follow given specifications.
- evaluate different object-oriented solutions to programming problems.
- analyze programming problems.
- formulate object-oriented solutions to programming problems.
CISP 401 Object Oriented Programming with Java
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:CISP 360 with a grade of "C" or better
- Transferable:CSU; UC
- Catalog Date:August 1, 2024
This course introduces object-oriented programming using the Java programming language. Topics include objects, inheritance, polymorphism, interfaces, abstract classes, inner classes, error handling, graphical user interfaces (GUI), applets, threads, files, databases, and packages.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- manipulate Java language syntax.
- develop event driven programs for both applets and applications.
- compare the Java language to other programming languages.
- design software using object-oriented methods.
- develop programs using inheritance and polymorphism.
- write database applications using embedded Structured Query Language (SQL).
- develop multi-threaded applications.
- use Java to create graphical user interfaces.
CISP 430 Data Structures
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:CISP 400 or 401 with a grade of "C" or better
- Transferable:CSU; UC
- C-ID:C-ID COMP 132
- Catalog Date:August 1, 2024
This course applies object-oriented techniques for systematic problem analysis and the managing of program complexity using abstraction. Specification, design, coding, testing, and documentation of large multi-file programs are covered. It uses advanced language features such as classes, strings, non-text files, pointers, and recursion. Abstract data types such as stacks, queues, lists, binary trees, heaps/priority queues, hash tables, and graphs are examined. Various sorting and searching algorithms are presented and analyzed using Big-O notation.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- propose solutions to complex programming problems and create code to implement these solutions.
- implement singly linked lists, doubly linked lists, circular linked lists, stacks, queues, trees, and graphs.
- implement recursive modules.
- implement various sorting and searching techniques.
- estimate the efficiency of various sorting and searching algorithms using Big-O notation.
CISP 440 Discrete Structures for Computer Science
- Units:3
- Hours:54 hours LEC
- Prerequisite:CISP 360 and MATH 372 with grades of "C" or better
- Corequisite:CISP 430
- Transferable:CSU; UC
- General Education:AA/AS Area II(b); CSU Area B4
- C-ID:C-ID COMP 152
- Catalog Date:August 1, 2024
This course is an introduction to the discrete structures used in computer science with an emphasis on their applications. Topics include functions, relations, and sets; basic logic; proof techniques; basics of counting; graphs and trees; and discrete probability.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- analyze how formal tools of symbolic logic are used to model real-life situations, including those arising in computing contexts such as program correctness, database queries, and algorithms.
- compare mathematical induction as a proof technique to recursion and recursively defined structures as programming concepts.
- analyze a problem to create relevant recurrence equations.
- design different traversal methods for trees and graphs.
- choose between the binomial theorem for independent events and Bayes’ theorem for dependent events.
CISP 451 Introduction to Enterprise Software Development and Engineering
- Units:4.5
- Hours:81 hours LEC
- Prerequisite:CISP 300, 370, or 480 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This is the first of a series of two courses that prepares students for development and engineering software products in an enterprise environment. This course introduces agile practices, introductory level programming and web development concepts and basic DevOps philosophy.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- apply agile practices as a way to manage software development life cycle.
- identify key principles of enterprise design thinking.
- identify steps in the DevOps loop.
- derive general software code solutions in a programming language based on specifications and requirements.
- design web-based user-interacting applications in a programming language based on specifications and requirements.
- understand continuous integration and delivery practices.
- differentiate programming languages based on a list of criteria, including but not limited to efficiency, stability, longevity, support, availability of modules/libraries, syntax and market share.
CISP 455 Intermediate Enterprise Software Development and Engineering
- Units:4.5
- Hours:81 hours LEC
- Prerequisite:CISP 451 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This is the second in a series of two courses that focus on the development and engineering of software products in an enterprise environment. This course introduces DevOps practices, introductory level programming, web development, and design patterns.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- deliver code continuously to manage risk, improve feature delivery, and shorten defect corrections.
- decouple software features to contain code defects and enable more flexible implementation revisions.
- automate software delivery.
- recognize design patterns.
- scale enterprise software solutions.
- monitor, measure, and assess computation platforms.
- migrate legacy data from on-premise to cloud.
CISP 480 Honors Introduction to Structured Programming
- Units:5
- Hours:72 hours LEC; 54 hours LAB
- Prerequisite:Placement into ENGWR 480 through the assessment process.
- Advisory:CISC 310
- Transferable:CSU; UC
- General Education:AA/AS Area II(b)
- C-ID:C-ID COMP 112
- Catalog Date:August 1, 2024
This honors course combines the content of both CISP 300 and CISP 360 and presents it in an accelerated fashion emphasizing projects and collaborative work. It introduces methods for solving typical computer problems by assessing and analyzing computing problems, performing algorithm design using a top-down, divide and conquer approach, and continues with implementation, documentation, testing, and debugging. Topics include structured programming, data representation, data types, variables, constants, operators, and expression evaluation. It also includes control structures, functions, interactive and file input/output, standard libraries, arrays, pointers, structures, classes, and objects. Pseudocode and an object-oriented programming language are used to create program solutions. This course is not open to students who have completed CISP 300 or CISP 360.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- develop, implement, and evaluate expressions using the operators prevalent in most programming languages including arithmetic, comparison, and logical operators.
- develop and implement basic algorithms using sequence, selection, and repetition.
- deduce pre- and post-conditions for control structures and modules.
- construct a trace table to emulate the execution of a program that utilizes variables, various control structures, data organizations, modules, and parameters.
- differentiate roles involved in software development, including developers, analysts, and test engineers.
- develop efficient algorithms for the solution of problems using structured programming techniques.
- implement suitable data structures to support a given algorithm.
- formulate and implement algorithms to solve complex problems using a high-level language.
- use the top-down, divide and conquer development approach to implement modular, maintainable programs.
- assess the efficiency of differing solutions to a problem.
- analyze an existing algorithm implementation for errors, then develop solution program code to correct the errors.
- utilize standard libraries for common tasks such as file input/output and mathematical operations.
- design and use classes and objects.
- compare procedural and object-oriented approaches to problem solving.
- apply the software development life-cycle for program design, development, coding style, documentation, and testing.
CISP 499 Experimental Offering in Computer Information Science - Programming
- Units:0.5 - 4
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:August 1, 2024
This is the experimental courses description.
Computer Information Science - Security (CISS) Courses
CISS 300 Introduction to Information Systems Security
- Units:1
- Hours:18 hours LEC
- Prerequisite:None.
- Advisory:CISC 320, 350, and 351
- Transferable:CSU
- Catalog Date:August 1, 2024
This course provides an introduction to network-based and internet-based security applications and standards. Topics include encryption, security protocols, network security applications, digital signatures, protecting computers and the network from viruses, Trojans, spyware, unsolicited email, and public and private key exchange.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- identify the fundamental concepts of the cyber security discipline and use to provide system security.
- differentiate potential system attacks and the actors that might perform them.
- recommend cyber defense tools, methods and components, and apply cyber defense methods to prepare a system to repel attacks.
- plan appropriate measures to be taken in the event of a system compromise.
- analyze why each security principle is important and how it enables the development of security mechanisms that can implement desired security policies.
CISS 302 Essential Personal Computer and Device Security
- Units:1
- Hours:18 hours LEC; 18 hours LAB
- Prerequisite:None.
- Advisory:CISC 320 and 350
- Transferable:CSU
- Catalog Date:August 1, 2024
This course covers the knowledge and hands-on techniques needed to implement basic levels of computer security. Topics include configuring users, passwords, anti-malware, firewalls, updates, web browsers, email, backups, and networking for privacy and security.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- evaluate operating system security on a personal computer.
- explain the importance of configuring a system to protect user privacy.
- configure operating system security on a personal computer.
- evaluate application security on a personal computer.
- configure application security on a personal computer.
- explain the importance of safeguarding a system and its data.
CISS 310 Network Security Fundamentals
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISN 300 or 340
- Transferable:CSU
- Catalog Date:August 1, 2024
This course is an introduction to the fundamental principles and skills of Information Technology security and risk management at the organizational level. Topics include network security, compliance and operational security, threats and vulnerabilities, application and data security, host security, access control and identity management, and cryptography. It also covers the required content of the Computing Technology Industry Association (CompTIA) Security+.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- describe the fundamental concepts and principles of the cyber security discipline and use to provide system security.
- evaluate why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies.
- describe the hardware components of modern computing environments and their individual functions.
- identify the Federal, State and Local Cyber Defense partners/structures.
- explain the basic security implications of modern computing environments.
- analyze cyber defense tools, methods and components and apply cyber defense methods to prepare a system to repel attacks.
- identify appropriate measures to be taken should a system compromise occur.
- properly use the vocabulary associated with cyber security.
- analyze common security failures and identify specific design principles that have been violated.
- evaluate different types of attacks and their characteristics.
- identify the bad actors in cyberspace and compare and contrast their resources, capabilities/techniques, motivations and aversion to risk.
- given a specific scenario, identify the design principles involved or needed.
- understand the interaction between security and system usability and the importance for minimizing the effects of security mechanisms.
- compare and contrast different types of standards including: laws, regulations, policies, voluntary, and framework-based standards.
- assess the impact of legal/regulatory standards on a given system.
CISS 315 Ethical Hacking
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:None.
- Corequisite:CISS 310
- Advisory:CISC 300
- Transferable:CSU
- Catalog Date:August 1, 2024
This course introduces the network security specialist to the various methodologies for attacking a network. Topics include the concepts, principles, and techniques necessary to attack and disable a network within the context of properly securing a network. It emphasizes network attack techniques and methodologies, and appropriate defenses and countermeasures. Supplementary hardware and software may be required.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- examine how the internet is used for cybercrime, cyber-stalking, and other abusive behaviors.
- describe different types of attacks and their characteristics.
- examine the placement of security functions in a system and describe the strengths and weaknesses.
- identify the bad actors in cyberspace and compare and contrast their resources, capabilities/techniques, motivations and aversion to risk.
- examine how the internet is used for cybercrime, cyber-stalking, and other abusive behaviors.
- describe Federal and State laws and authorities: a. Computer Security Act b. Sarbanes – Oxley c. Gramm – Leach – Bliley d. Privacy (COPPA) HIPAA / FERPA e. USA Patriot Act f. Americans with Disabilities Act, Section 508 g. other Federal laws and regulations h. other California laws and regulations
- describe the role of cybersecurity in supporting and encouraging ethics, as well as where cybersecurity practices can cause ethical conflicts.
- examine diverse ethical dilemmas.
- explain how ethical foundations are applied to situations arising from the interconnected world.
- evaluate the effectiveness of applications of cybersecurity in preventing crime and abuse.
- describe what an ethical hacker can and cannot do legally.
- identify ports, protocols, and services.
- construct software configuration settings that will assist in protecting the PC.
- defend a computer and a LAN against a variety of different types of security attacks using a number of hands-on techniques.
- practice and use safe techniques on the Internet.
- identify the tools and methods a "hacker" uses to break into a computer or network.
- evaluate the effectiveness of applications of cybersecurity in preventing crime and abuse.
- plan, organize, and perform penetration testing on a simple network.
CISS 316 Cisco Networking Academy(R): CyberOps Associate
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISS 310 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC). It also covers topics to prepare for the Cisco Certified CyberOps Associate industry certification.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- implement and manage Cisco secure networks.
- evaluate risk, vulnerability, and threats for network devices.
- describe the key concepts in network defense (defense in depth, minimizing exposure, etc.).
- evaluate and apply the National Institute of Standards and Technology (NIST) Cybersecurity Framework.
- apply and manage cyber defense methods to prepare a system to repel attacks.
- evaluate how network operational procedures relate to network security.
- analyze how security policies are implemented on systems to protect a network.
CISS 321 Scripting for Cyber Security
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:CISN 340, CISS 310, or CISS 315 with a grade of "C" or better
- Transferable:CSU
- General Education:AA/AS Area II(b)
- Catalog Date:August 1, 2024
This course is designed to cover tools that are commonly used by Information Security Professionals. Modern Operating Systems and scripting languages will be discussed as well as utilities and technologies that enable them. Topics including securing, hardening systems, incident response, automating tasks, auditing, and vulnerability assessment will be covered.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- demonstrate proficiency in the use of scripting languages to write simple scripts (e.g., to automate system administration tasks).
- write simple linear and looping scripts.
- modify current security application scripts for a specific network environment.
- evaluate scripting languages for different tasks.
- write simple and compound conditions within a programming language or similar environment (e.g., scripts, macros, SQL).
- demonstrate proficiency in the use of a programming language to solve security problems.
CISS 330 Implementing Internet Security and Firewalls
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:CISS 310 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course covers network and Internet security and deployment of industry standard countermeasures, including configuring Virtual Private Network (VPN) connections. Topics include the evaluation, implementation, and management of secure remote-access technologies. Also covered is the configuration of network firewalls, and allowing access to key services while maintaining security. This course is not open to students who have completed CISS 325.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- analyze problems, recommend solutions, products, and technologies to meet business objectives.
- recommend best security practices to achieve stated business objectives based on risk assumptions.
- actively protect information technology assets and infrastructure from external and internal threats.
- monitor systems for anomalies, proper updating, and patching.
- evaluate and perform planning, testing, and implementation of software and hardware deployed.
- assist in incident responses for any breaches, intrusions, or theft.
- recommend best practices for effective configurations and maintenance of Virtual Private Networks (VPNs) and firewalls.
- explain how network defense tools (firewalls, IDS, etc.) are used to defend against attacks and mitigate vulnerabilities.
- implement Network Security Components (Data Loss Prevention, VPNs/firewalls).
CISS 341 Implementing Windows Operating System Security
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISC 320, CISC 351, and CISS 310
- Transferable:CSU
- Catalog Date:August 1, 2024
This course provides in-depth information on the Microsoft Windows desktop operating system security features, as well as step-by-step configuration for effective operating system security. The techniques needed in order to maintain the integrity, authenticity, availability, and privacy of the system and user data are covered.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- evaluate network security from the perspective of the Microsoft Windows client operating system.
- assess how to secure data using a Microsoft Windows operating system.
- demonstrate use of the tools required to configure client operating system services.
- examine and configure network services in accordance with best current security practices.
- differentiate, describe, and configure file sharing services and file system security permissions in accordance with best security practices.
- evaluate and describe the relationships between major network services.
- compare and contrast the roles of security, ethics, and privacy management issues regarding data storage.
- define and differentiate user rights and file permissions in terms of security.
- set up an appropriate file encryption method to optimize security on a multi-user workstation.
CISS 342 Implementing Linux Operating System Security
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:None.
- Advisory:CISC 323 and CISS 310
- Transferable:CSU
- Catalog Date:August 1, 2024
This course provides in-depth information on Linux/UNIX operating system security features, as well as step-by-step configuration for effective operating system security. The techniques needed in order to maintain the integrity, authenticity, availability, and privacy of the system and user data are covered.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- evaluate network security from the perspective of a Linux/UNIX client operating system.
- assess how to secure data using a Linux/UNIX operating system.
- demonstrate use of the tools required to configure client operating system services.
- examine and configure network services in accordance with best current security practices.
- differentiate and describe file sharing services and file system security permissions.
- configure file sharing services and file system security permissions in accordance with industry standard security practices.
- evaluate and describe the relationships between major network services.
- compare and contrast the roles of security, ethics, and privacy management issues regarding data storage.
- define and differentiate user rights and file permissions in terms of security.
- configure an appropriate file encryption method to optimize security on a multi-user workstation.
CISS 350 Disaster Recovery
- Units:3
- Hours:54 hours LEC
- Prerequisite:None.
- Advisory:CISS 310
- Transferable:CSU
- Catalog Date:August 1, 2024
This course provides methods for identifying vulnerabilities and implementing countermeasures to prevent and mitigate failure risks in the information technology infrastructure for the business enterprise. Topics include disaster recovery, development of a disaster recovery plan, risk assessment, and development and implementation of disaster recovery policies and procedures.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- compare and contrast different types of standards that impact information systems including: laws, regulations, policies, voluntary, and framework-based standards.
- list the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data.
- outline and explain the roles of personnel in planning and managing security, including: board of directors, senior management, Chief Information Security Officer (CISO), IT management (CIO, IT Director, etc,), functional area management, information security personnel, and end users.
- examine the placement of security functions in a system and describe the strengths and weaknesses.
- develop contingency plans for various size organizations to include: business continuity, disaster recovery, technology recovery, and incident response.
- develop system-specific plans for: the protection of intellectual property, the implementation of access controls, and patch and change management.
- describe responsibilities related to the handling of data as it pertains to legal, ethical, and/or agency auditing issues.
- develop a security program, identifying goals, objectives, and metrics.
- apply knowledge to effectively manage a security program.
- assess the effectiveness of a security program.
- describe how risk relates to a system security policy.
- describe various risk analysis methodologies.
- evaluate, categorize, and recommend appropriate responses to risks with respect to technology, individuals, and in the enterprise.
- compare the advantages and disadvantages of various risk assessment methodologies.
- select the optimal risk assessment methodology based on needs, advantages, and disadvantages.
CISS 352 Information Systems Governance and Auditing
- Units:3
- Hours:54 hours LEC
- Prerequisite:CISS 310 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course is an introduction to the fundamental principles and skills of providing and governing audit services in accordance with Information Systems (IS) audit standards to assist the organization in protecting and controlling information systems. The required content of the ISACA Certified Information Systems Auditor (CISA) is covered.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- describe the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data.
- outline and explain the roles of personnel in planning and managing security.
- assess the effectiveness of a security program.
- list the phases of a well-organized cyber operation and describe the goals and objectives of each phase.
- draw and describe a data and information lifecycle, identifying specific and general security issues at all stages.
- define and evaluate data and information quality, accessibility, and utility.
- examine how the origination, change, distribution, storage, and deletion of information is managed and secured.
- compare and contrast data and information ownership, stewardship, management, possession, and governance.
- outline the role of data and information classification in security.
- describe the components of the fraud triangle - a necessary condition for fraud.
- describe the cost and effectiveness of common fraud detection and prevention methods.
- analyze record keeping and management procedures for assets and to identify/correct weaknesses.
- compare and contrast voluntary and mandatory compliance requirements.
- compare and contrast privacy policies and laws of different jurisdictions.
- describe how standards may be applied and assessed for a sub-contractor or customer.
- list and describe key provisions of common standards.
- describe approaches individuals, organizations, and governments have taken to protect privacy.
- plan and conduct audits to determine compliance with policies, laws, regulations, and other standards.
CISS 354 Information Systems Risk Analysis and Security Controls Development
- Units:3
- Hours:54 hours LEC
- Prerequisite:CISS 310 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course is an introduction to the fundamental principles and skills of assessing risk to assist the organization in protecting and controlling information systems. The required content of the Information Systems Audit and Control Association (ISACA) Certified in Risk and Information Systems Control (CRISC) is covered. The Certified Information Systems Security Professional (CISSP) Security And Risk Management domain is also addressed.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- collect and review existing information regarding the organization’s business and IT environments.
- identify potential or realized impacts of IT risk to the organization’s business objectives and operations.
- identify threats and vulnerabilities to the organization’s people, processes, and technology.
- evaluate threats, vulnerabilities, and risk to identify IT risk scenarios.
- establish accountability by assigning and validating appropriate levels of risk and control ownership.
- establish and maintain the IT risk register and incorporate it into the enterprise-wide risk profile.
- facilitate the identification of risk appetite and risk tolerance by key stakeholders.
- promote a risk-aware culture by contributing to the development and implementation of security awareness training.
- conduct a risk assessment by analyzing IT risk scenarios and determining their likelihood and impact.
- identify the current state of existing controls and evaluate their effectiveness for IT risk mitigation.
- review the results of risk analysis and control analysis to assess any gaps between current and desired states of the IT risk environment.
- monitor and analyze key performance indicators (KPIs) and key control indicators (KCIs).
CISS 358 Information Systems Incident Response
- Units:3
- Hours:54 hours LEC
- Prerequisite:CISS 310 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course is an introduction to the fundamental principles and skills of incident response. The Certified Information Systems Security Professional (CISSP) Security Operations domain is addressed.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- identify fundamentals of incident management including the signs and costs of an incident.
- plan for and select the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents.
- develop and build an incident response process.
- incorporate the fundamentals of vulnerability management, threat assessment, risk management, and incident response automation and orchestration.
- initiate recovery and remediation following an incident.
- write incident security policies and procedures to ensure that the quality of services is maintained at the agreed levels.
- apply appropriate strategies to different types of cybersecurity threats, attack vectors, threat actors and their motives.
- develop the first response procedure including evidence collection, packaging, transportation, storing, data acquisition, volatile and static evidence collection, and evidence analysis
CISS 360 Computer Forensics and Investigation
- Units:3
- Hours:45 hours LEC; 27 hours LAB
- Prerequisite:None.
- Corequisite:CISS 310
- Advisory:CISC 324 and CISS 350
- Transferable:CSU
- Catalog Date:August 1, 2024
This course introduces the methods used to conduct a computer forensics investigation. Topics include an overview of computer forensics as a profession, the computer investigation process, operating systems' boot processes and disk structures, data acquisition and analysis, ethics, and a review of standard computer forensic tools. The course topics map to the objectives of the International Association of Computer Investigative Specialists (IACIS) certification.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- define computer forensics concepts as a profession.
- list the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data.
- discuss the rules, laws, policies, and procedures that affect digital forensics.
- identify how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it.
- describe their responsibilities related to the handling of data as it pertains to legal, ethical and/or agency auditing issues.
- assess and compare computer forensic tools used in investigations.
- construct and employ digital evidence controls to safeguard the results of the forensic investigation.
- describe the steps in performing digital forensics from the initial recognition of an incident through the steps of evidence gathering, preservation and analysis, through the completion of legal proceedings.
- evaluate methods for the acquisition/analysis of widespread, non-PC devices.
- critique a forensic analysis and prepare reports for private-sector management and/or law enforcement.
- prepare a report on email investigation methods for a forensic analysis.
- describe and compare graphic image recovery methods.
- compose forensic analysis reports using technical jargon and non-technical terms.
- use one or more common DF tools, such as EnCase, FTK, ProDiscover, Xways, SleuthKit.
CISS 362 Information Systems Privacy
- Units:3
- Hours:54 hours LEC
- Prerequisite:CISS 310 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course is an introduction to building and implementing privacy solutions aligned with organizational needs and goals. The required content of the Information Systems Audit and Control Association (ISACA) Certified Data Privacy Solutions Engineer (CDPSE) is covered. The Certified Information Systems Security Professional (CISSP) Security And Risk Management domain is also addressed.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- identify the internal and external requirements for the organization’s privacy programs and practices.
- participate in the evaluation of privacy policies, programs and policies for their alignment with legal requirements, regulatory requirements, and industry best practices.
- coordinate and/or perform privacy impact assessment (PIA) and other privacy-focused assessments.
- participate in the development of procedures that align with privacy policies and business needs.
- implement procedures that align with privacy policies.
- participate in the management and evaluation of contracts, service levels, and practices of vendors and other external parties.
- participate in the privacy incident management process.
- collaborate with cybersecurity personnel on the security risk assessment process to address privacy compliance and risk mitigation.
- collaborate with other practitioners to ensure that privacy programs and practices are followed during the design, development and implementation of systems, applications and infrastructure.
- evaluate the enterprise architecture and information architecture to ensure that it supports privacy by design principles and considerations.
- evaluate advancements in privacy-enhancing technologies and changes in the regulatory landscape.
- identify, validate and/or implement appropriate privacy and security controls according to data classification procedures.
- develop and/or implement a prioritization process for privacy practices.
- develop, monitor and/or report performance metrics and trends related to privacy practices.
- report on the status and outcomes of privacy programs and practices to relevant stakeholders.
Computer Information Science - Web (CISW) Courses
CISW 299 Experimental Offering in Computer Information Science - Web
- Units:0.5 - 4
- Prerequisite:None.
- Transferable:CSU
- Catalog Date:August 1, 2024
This is the experimental courses description.
CISW 300 Web Publishing
- Units:3
- Hours:36 hours LEC; 54 hours LAB
- Prerequisite:None.
- Advisory:CISC 300 and 305
- Transferable:CSU
- Catalog Date:August 1, 2024
This course is an introduction to publishing on the World Wide Web. Topics include creating web pages with Hyper Text Markup Language (HTML) and Cascading Style Sheets (CSS), organizing a series of pages into a website, and uploading web pages to a server. This course makes extensive use of the computer tools necessary to insert HTML tags, create images, and view web documents. It takes beginning web designers through the process of designing, building, and publishing a working website.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- develop web pages applying structured design principles using current standards of Hyper Text Markup Language (HTML).
- publish documents on the World Wide Web using File Transfer Protocol (FTP) software.
- build, maintain, and organize a working web account on a web server.
- develop website design concepts using Cascading Style Sheet (CSS) structures and table formatting.
- develop website navigation using lists, links, buttons, and menu options.
- create a responsive page layout for mobile-friendly design to include tablets and mobile phones.
- create web forms using standard HTML form tags.
- produce basic web graphics and incorporate them on a web page using HTML and CSS.
CISW 304 Cascading Style Sheets
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:CISW 300 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course continues the study of technical aspects of standards-based web design for experienced students and web professionals. Topics include the separation of content from presentation, dynamic user interaction, and designing for alternative devices using Cascading Style Sheets (CSS) in combination with Hypertext Markup Language (HTML).
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- describe the differences among versions of CSS, including issues of cross-platform compatibility.
- utilize proper CSS syntax for developing internal and external style sheets.
- differentiate between the class and id attributes, determine which should be used for a specific situation, and apply it using industry standards.
- combine selectors to refine style definitions for a group of elements and/or contextually to one or more elements when used together.
- apply CSS Positioning (CSS-P) to position and layer objects on multiple web pages.
CISW 310 Advanced Web Publishing
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:CISW 300 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course builds upon previous web publishing concepts and study. It focuses on learning the JavaScript language and the development of interactive web pages. Topics include jQuery libraries, cascading style sheets, HTML, forms, and client-side scripting with JavaScript.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- develop web pages using advanced design concepts with HTML and Cascading Style Sheets (CSS).
- apply the basic concepts and syntax of JavaScript.
- construct web pages with structured HTML that incorporate basic JavaScript functions such as mouse rollovers, window popups, slideshows, and form validation.
- develop web pages that are built dynamically with JavaScript functions.
- use JavaScript programming to create arrays, loops, and conditional statements.
CISW 321 Web Site Development using Dreamweaver
- Units:3
- Hours:36 hours LEC; 54 hours LAB
- Prerequisite:None.
- Advisory:CISC 305 and CISW 300
- Transferable:CSU
- Catalog Date:August 1, 2024
This course covers the use of Adobe Dreamweaver, a visual web-authoring tool, to develop and publish websites. Topics include creating responsive web pages that contain text, images, links, tables, forms, and multimedia. Additional topics include developing effective website design and layout, how to use templates, Search Engine Optimization (SEO) techniques, and using HTML/CSS with the Dreamweaver interface.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- utilize web authoring software to create, manage, and maintain websites.
- develop and manage effective website file structures.
- create websites that have effective design and site navigation using hyperlinks.
- create web pages containing text, lists, and tables.
- develop websites using linked Cascading Style Sheets (CSS) to format pages.
- insert images into web pages and make the images responsive to different devices and screen sizes.
- utilize existing Dreamweaver templates to make web pages.
- create a responsive page layout using Dreamweaver's tools and interface for mobile-friendly design.
- evaluate websites for marketing and Search Engine Optimization (SEO).
CISW 350 Imaging for the Web
- Units:1
- Hours:18 hours LEC; 18 hours LAB
- Prerequisite:None.
- Advisory:CISC 306 or CISW 300
- Transferable:CSU
- Catalog Date:August 1, 2024
This course covers, in depth, graphics for the Web. It uses industry standard graphic software to technically develop original graphics as well as to manipulate found imagery. Topics include a review of Web file formats, compressing graphics for use on the Web, photo corrections, editing and enhancing graphics, extracting elements, and using layers. This course also covers more advanced editing such as working with masks and channels and creating simple animation/video.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- identify the various graphics file formats and select when to use one format instead of the other.
- compress and optimize graphics for quick uploading on Web pages.
- edit and enhance photos using graphic software tools.
- select specific areas of an image to extract, copy, combine, or reposition.
- create, view, hide, arrange, and select layers.
- create masks and use channels to store an image's color information.
- compose simple compressed animations and videos for use in Web pages.
CISW 355 Web Imaging Projects
- Units:2
- Hours:27 hours LEC; 27 hours LAB
- Prerequisite:CISW 350 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course is a continuation of CISW 350. It covers the creation of graphics and videos for the Web for marketing and advertising, and it introduces the steps, procedures, and common problems encountered when producing quality graphics for professional websites and social media. Topics include compressing and upload times, cropping and resizing, digital camera imaging, retouching and fixing photographs, photographic special effects and filters, rasterizing text, image maps, and videos. Popular industry photo editing applications will be used to compose, edit, and save graphic images.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- generate and manipulate graphics from a variety of graphics software.
- appraise and implement graphics for simulated client based projects.
- compare different technologies that can be used to capture and acquire digital images and video.
- differentiate among Web graphic file formats and determine when to use them.
- analyze website concepts and marketing techniques using graphics and video.
- produce graphics and videos to use on social media sites.
- collect information, such as photos or existing logos, from users in a non-technical environment.
- explore photo and video editing cloud based applications.
- create professional graphics and videos to build a portfolio to present to potential clients.
CISW 370 Designing Accessible Websites
- Units:1
- Hours:18 hours LEC
- Prerequisite:CISW 300 with a grade of "C" or better
- Transferable:CSU
- Catalog Date:August 1, 2024
This course provides an overview of the methods that are used to design websites for people with disabilities. Current legal requirements for accessible websites, especially the Americans with Disabilities Act (ADA), are emphasized.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- describe the current legal requirements for designing websites for people with disabilities.
- compare various tools for the assessment of accessibility of web pages.
- formulate coding strategies for generating accessible websites.
- assess the accessibility levels of various types of websites.
- locate disability and web accessibility resources.
- test specialized browsers and other Internet software for people with disabilities.
CISW 400 Client-side Web Scripting
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:CISW 300 with a grade of "C" or better
- Advisory:CISP 300 and CISW 310
- Transferable:CSU
- Catalog Date:August 1, 2024
This course emphasizes the creation of dynamic and interactive web sites using a client-side scripting language such as JavaScript/Ajax. Topics include the Document Object Model of web pages, core features of the client-side scripting language, event handling, control of windows and frames, functions, and form validation.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- develop web pages using advanced design concepts with Cascading Style Sheets (CSS) and JavaScript.
- analyze the Document Object Model and the concepts behind asynchronous JavaScript and XML (Ajax).
- define the core structures, statements, and syntax of the JavaScript language.
- construct web pages with structured HTML that incorporates basic JavaScript functions such as mouse rollovers, window popups, slideshows, and form validation.
- develop web pages that use the Ajax Engine.
- produce scripts that integrate the Ajax Engine with server-side scripts written in Php or Perl.
- develop database tables using a web database software such as MySQL.
- integrate server-side scripts with Php or Perl using the Ajax Engine.
- write Ajax scripts that incorporate the canvas element and cookies.
CISW 410 Database-Driven Web Applications
- Units:4
- Hours:54 hours LEC; 54 hours LAB
- Prerequisite:<ul> <li>CISW 300 completed with a grade of 'C' or better, <b>and</b></li> <li>one of the following completed with a grade of 'C' or better</li> <ul> <li>CISP 300</li> <li>CISP 370</li> <li>CISP 480</li> </ul> </ul>
- Transferable:CSU
- Catalog Date:August 1, 2024
This course emphasizes the creation of interactive web sites using a server side scripting environment. Topics include core features of a scripting language, embedding server commands in HTML pages, control structures, functions, arrays, form validations, cookies, environmental variables, email applications, and database-driven web applications.
Student Learning Outcomes
Upon completion of this course, the student will be able to:
- compare server-side and client-side scripting languages for the web.
- apply the core structures, statements, and syntax of the middleware scripting language.
- write functions using the middleware scripting language.
- process form data using the middleware scripting language.
- develop web page navigation using the middleware scripting language.
- produce a web-server based database and apply the basic query structure and table joins.
- develop web pages that use session storage or session cookies.
- apply web page design concepts using the middleware scripting language.
CISW 499 Experimental Offering in Computer Information Science - Web
- Units:0.5 - 4
- Prerequisite:None.
- Catalog Date:August 1, 2024
This is the experimental courses description.
ARC Computer Information Science Department
Cybersecurity and Information Assurance
Find cybersecurity-related resources, including information about our instructors, programs, news, and events.