Order By Display Density

Security

XCSS 1010 - Security+ Review and Test Prep

This 5-day course provides a review of topics and exam preparation for the CompTIA Security+ Exam. The Security+ exam validates knowledge and understanding of foundation level security standards. It is an international vendor-neutral security certification widely used to demonstrate both compliance and competence in the security industry. The course reviews all areas of the Security+ exam including systems security, network infrastructure, access control, assessments and audits, cryptography and organizational security In addition, the application and testing process as well as key test topics and practice questions. Current exam preparation is for Security+ SYO-401. Class textbook and exam voucher included in course fee. Textbooks distributed in first course meeting. Prerequisite: Information Security Essentials, Security Architecture and Design and Introduction to Hacking, Defense and Response or comparable knowledge.

CEU Hours: 3.5

Contact Hours: 35

• Introduction
   o Security+ Application Process
   o Security+ Testing Process
   o Security+ Preparation
• Networking Basics and Terminology
• Introduction to Security Terminology
• Security Policies and Standards
• Types of Attacks
• System Security Threats
•  Mitigating Security Threats
• Implementing System Security
• Securing the Network Infrastructure
• Wireless Networking and Security
• Authentication
• Access Control
• Introduction to Cryptography
• Managing a Public Key Infrastructure
• Physical Security
• Risk Analysis
• Disaster Recovery and Business Continuity
• Introduction to Computer Forensics
• Security Assessment and Audits
• Understanding Monitoring and Auditing
 
CRN Days Time Date Location Instructor Seats Open
23504 001 MTWRF-- 08:00-03:59 PM 10/10/16-10/14/16 RC 234 Faculty 14 of 14

XCSS 1011 - Information Security Essentials

This 2-day course is a comprehensive overview of Information Security covering the most relevant practices in information security today. In this class, students explore the techniques and methodologies used to configure, build, deliver, and troubleshoot network security. Topics include the role of information security in the enterprise, formal data classification, enterprise identity management, the components of comprehensive and layered security architecture, and the threat of viruses, worms, Trojans and improper configurations. This class can be taken as part of the Cyber Security Certificate. Class textbook included in course fee. Textbooks distributed in first course meeting. Prerequisites: There are no prerequisites for this class.

CEU Hours: 1.4

Contact Hours: 14

1. Security concerns and Terminology
2. Current IT Security Certifications
3. System Threats and Risks
4. Information Classification, Value and Analysis
5. Online Vulnerabilities
6. Infrastructure Basics
7. Cryptography Basics
8. Organization Security and Controls
 
CRN Days Time Date Location Instructor Seats Open
23505 001 ---RF-- 08:00-03:59 PM 09/08/16-09/09/16 RC 234 Faculty 14 of 14

XCSS 1012 - Security Architecture and Design

This 2-day course provides a comprehensive overview of cyber-security control technologies. The course starts with a discussion of security policies and perimeter security fundamentals and then moves to a discussion on how to design network borders for maximum security and how to monitor them for unauthorized activity. Then after an introduction to firewalls, packet filtering, and access lists, the course discusses how to set up routers, special-purpose firewalls, and general-purpose hosts with security in mind. Much of the class centers on security-conscious design, both for green field projects and existing networks that need expansion or improvement. This class can be taken as part of the Cyber Security Certificate. Class textbook included in course fee. Textbooks distributed in first course meeting. Prerequisites: Information Security Essentials or comparable knowledge.

CEU Hours: 1.4

Contact Hours: 14

1. Part One: Perimeter Fundamentals
   a. Perimeter Security Fundamentals
   b. Packet Filtering
   c. Stateful Firewalls
   d. Proxy Firewalls
   e. Security Policy
2. Part Two: Extending the Perimeter
   a. The Role of a Router
   b. Network Intrusion Detection
   c. Virtual Private Networks
   d. Host Hardening
   e. Host Defense Components
3. Part Three: Perimeter Design
   a. Design Fundamentals
   b. Separating Resources
   c. Software Architecture
   d. VPN Integration
   e. Tuning the Design for Performance
   f. Sample Designs
4. Part Four: Perimeter Assessment
   a. Maintaining a Security Perimeter
   b. Network Log Analysis
   c. Troubleshooting Defense Components
   d. Assessment Techniques
   e. Design Under Fire
   f. Importance of Defense in Depth

 
CRN Days Time Date Location Instructor Seats Open
23506 001 MT----- 08:00-03:59 PM 09/19/16-09/20/16 RC 232 Faculty 14 of 14

XCSS 1013 - Introduction to Hacking, Defense and Response

This 2-day course provides a comprehensive overview of hacking and cyber security defense and response tools and techniques. It incorporates several hands-on exercises utilizing the same attack methods used by hackers and cyber security professionals. The course starts with a discussion of why people hack and how they hack. It then focuses on the methods used, including the initial foot printing of the target, scanning the network and finally enumerating target host machines. The second day focuses on the measures necessary to protect your network from the threat. Topics include understanding your network traffic, firewalls, host hardening, intrusion detection systems and network design. Tools used for this class include: Nessus, Nmap, SuperScan, Snort, Fport, John the Ripper, and many others. This class can be taken as part of the Cyber Security Certificate. Class textbook included in course fee. Textbooks distributed in first course meeting. Prerequisites: Security Architecture and Design or comparable knowledge.

CEU Hours: 1.4

Contact Hours: 14

1.	Hackers
a. Why do they hack?
2.	Casing the Establishment
a. Footprinting Target Acquisition
b. Scanning
c. Enumerating
d. Hands-On Lab
3.	System Hacking
a. Hacking Windows XP
b. Hacking Windows 2000/2003
c. Hacking Unix/Linux
d. Novell NetWare Hacking
4.	Network Hacking
a. Dial-Up and VPN Hacking
b. Network Devices
c. Firewalls
d. Denial of Service (DoS)
5.	Software Hacking
a. Remote Control Insecurities
b. Advanced Techniques
c. Web Hacking
d. Hacking the Internet User
6.	Protecting Your Network
a. Know Thy Self
   1. Monitor Network Usage
   2. Perform Vulnerability Analysis
   3. Perform Penetration Tests
7.	Defense in Depth
a. Firewalls
b. Host Hardening
c. Intrusion Detection/Prevention
d. Secure Design Elements
 
CRN Days Time Date Location Instructor Seats Open
23507 001 MT----- 08:00-03:59 PM 10/03/16-10/04/16 RC 250 Faculty 14 of 14

XCSS 1014 - EC-Council Certified Ethical Hacker (CEH) Review and Test Prep

This 5-day course provides a review of topics and exam preparation for the Certified Ethical Hacker (CEH) exam. The Certified Ethical Hacker (CEH) certification is a vendor neutral certification in the network security discipline of Ethical Hacking. It covers the standards and language involved in attempting to penetrate a network or computer system. The Ethical Hacker is a technical professional who uses the same knowledge and tools as a hacker to look for the weaknesses in target systems and to help prevent unauthorized penetration. This knowledge or certification applies to security officers, auditors, security professionals, site administrators, and really anyone who is concerned about the integrity of the network infrastructure. In this course students prepare for the CEH exam by studying security risks through lectures and hands-on lab exercises. Students discuss and learn how to look for the weaknesses and vulnerabilities in a target. In addition, the application and testing process for the CEH as well as key topics on the exam are covered. Current exam preparation is for CEH v9. Class textbooks included in course fee. Textbooks distributed in first course meeting. Prerequisite: Information Security Essentials, Security Architecture and Design and Introduction to Hacking, Defense and Response or comparable knowledge.

CEU Hours: 3.5

Contact Hours: 35

CEHv9 consists of 20 core modules designed to facilitate a comprehensive ethical hacking and penetration testing training.
1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. System Hacking
6. Trojans and Backdoors
7. Viruses and Worms
8. Sniffing
9. Social Engineering
10. Denial of Service
11. Session Hijacking
12. Hacking Webservers
13. Hacking Web Applications
14. SQL Injection
15. Hacking Wireless Networks
16. Hacking Mobile Platforms
17. Evading IDS, Firewalls and Honeypots
18. Buffer Overflows
19. Cryptography
20. Penetration Testing
 
CRN Days Time Date Location Instructor Seats Open
23508 001 MTWRF-- 08:00-03:59 PM 12/05/16-12/09/16 RC 232 Faculty 14 of 14

XCSS 1015 - Certified Information Systems Security Professional (CISSP) Review and Test Prep

This 5-day course provides a comprehensive review of security topics and exam preparation for the Certified Information Systems Security Professional (CISSP) certification. The CISSP is globally recognized as an objective measure of competence and achievement for information security professionals. In this course, students review the 8 domains of the information security practice or common body of knowledge (CBK). Some of the topics include security models, distributed access control methods, DBMS architectures, key cryptography algorithms, intrusion detection systems, and data network components and technologies. Other topics include the application and testing process as well as key test topics and practice questions. Current exam preparation is for April 2015 CISSP. For details about the CISSP certification visit www.isc2.org/cissp. Class textbooks included in course fee. Textbooks distributed in first course meeting. Prerequisite: Information Security Essentials, Security Architecture and Design and Introduction to Hacking, Defense and Response or comparable knowledge.

CEU Hours: 3.5

Contact Hours: 35

1.	Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity)
a. Confidentiality, integrity, and availability concepts 
b. Security governance principles
c. Compliance
d. Legal and regulatory issues
e. Professional ethic
f. Security policies, standards, procedures and guidelines
2.	Asset Security (Protecting Security of Assets)
a. Information and asset classification
b. Ownership (e.g. data owners, system owners)
c. Protect privacy
d. Appropriate retention
e. Data security controls
f. Handling requirements (e.g. markings, labels, storage)
3.	Security Engineering (Engineering and Management of Security)
a. Engineering processes using secure design principles
b. Security models fundamental concepts
c. Security evaluation models
d. Security capabilities of information systems
e. Security architectures, designs, and solution elements vulnerabilities
f. Web-based systems vulnerabilities
g. Mobile systems vulnerabilities
h. Embedded devices and cyber-physical systems vulnerabilities
i. Cryptography
j. Site and facility design secure principles
k. Physical security
4.	Communication and Network Security (Designing and Protecting Network Security)
a. Secure network architecture design (e.g. IP & non-IP protocols, segmentation)
b. Secure network components
c. Secure communication channels
d. Network attacks  
5.	Identity and Access Management (Controlling Access and Managing Identity)
a. Physical and logical assets control
b. Identification and authentication of people and devices
c. Identity as a service (e.g. cloud identity)
d. Third-party identity services (e.g. on-premise)
e. Access control attacks
f. Identity and access provisioning lifecycle (e.g. provisioning review)  
6.	Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
a. Assessment and test strategies
b. Security process data (e.g. management and operational controls)
c. Security control testing
d. Test outputs (e.g. automated, manual)
e. Security architectures vulnerabilities
7.	Security Operations (Foundational Concepts, Investigations, Incident Management, and Disaster Recovery)
a. Investigations support and requirements
b. Logging and monitoring activities
c. Provisioning of resources
d. Foundational security operations concepts
e. Resource protection techniques
f. Incident management
g. Preventative measures
h. Patch and vulnerability management
i. Change management processes
j. Recovery strategies
k. Disaster recovery processes and plans
l. Business continuity planning and exercises
m. Physical security
n. Personnel safety concerns
8.	Software Development Security (Understanding, Applying, and Enforcing Software Security)
a. Security in the software development lifecycle
b. Development environment security controls
c. Software security effectiveness
d. Acquired software security impact
 
CRN Days Time Date Location Instructor Seats Open
23509 001 MTWRF-- 08:00-03:59 PM 11/07/16-11/11/16 RC 252 Faculty 10 of 10

Special Interests

XPT 1258 - Social Security - Retirement

A representative from the Social Security Administration will provide you with the tools necessary to make informed decisions about filing for retirement, survivor, auxiliary, or spouse benefits. There is NO FEE for this class but registration is required. There will be no walk-ins allowed.

CEU Hours: .2

Contact Hours: 2

 
CRN Days Time Date Location Instructor Seats Open
20739 002 --W---- 02:00-03:59 PM 05/25/16-05/25/16 RC 157 Faculty 4 of 24
20740 003 --W---- 02:00-03:59 PM 09/07/16-09/07/16 RC 157 Faculty 30 of 30

XPT 1259 - Social Security - Disability

A representative from the Social Security Administration will provide you with the tools necessary to make informed decisions about filing for, and receiving disability benefits. There is NO FEE for this class but registration is required. There will be no walk-ins allowed into this class.

CEU Hours: .2

Contact Hours: 2

 
CRN Days Time Date Location Instructor Seats Open
20742 002 --W---- 02:00-03:59 PM 06/08/16-06/08/16 RC 157 Faculty 20 of 24
20743 003 --W---- 02:00-03:59 PM 09/21/16-09/21/16 RC 157 Faculty 23 of 24

XPT 1260 - Social Security - What Every Woman Should Know

A representative from the Social Security Administration will provide the tools necessary for women to make informed decisions about filing for retirement, and spouse, or survivor benefits. There is NO FEE for this class but registration is required. There will be no walk-ins allowed.

CEU Hours: .2

Contact Hours: 2

 
CRN Days Time Date Location Instructor Seats Open
20745 002 --W---- 02:00-03:59 PM 06/01/16-06/01/16 RC 157 Faculty 23 of 30
20746 003 --W---- 02:00-03:59 PM 09/14/16-09/14/16 RC 181 Faculty 30 of 30

XPT 1273 - Social Security - What Couples Need to Know

A representative from the Social Security Administration will provide information necessary for couples to make informed decisions about filing for retirement, and survivor, and other family benefits. There is NO FEE for this class but registration is required. There will be no walk-ins allowed.

CEU Hours: .2

Contact Hours: 2

 
CRN Days Time Date Location Instructor Seats Open
20748 002 --W---- 02:00-03:59 PM 06/15/16-06/15/16 RC 157 Faculty 22 of 30
20749 003 --W---- 02:00-03:59 PM 09/28/16-09/28/16 RC 175 Faculty 24 of 24
Clinic Courses (CLI) provide practical application and are offered on or off campus. Instructors supervise/direct student in a simulated or on-site setting.
Face-to-Face Courses (F2F) take place in a classroom. Based on JCCC's Statement of General Education. Students in all classes, including face-to-face classes, are expected to use technology appropriate to the course content and as needed to access web-based course materials. Face-to-face classes typically require access to computer equipment (either at home or in college labs provided for student use) and computing skills utilizing standard office, business and web browsing applications.
Hybrid Courses (HYB) combine face-to-face classroom instruction and the convenience of online web-based learning, resulting in a reduction of the amount of time spent in the face-to-face classroom and a significant increase of time spent studying online materials. Students registered in hybrid courses must attend class meetings as listed in the JCCC Schedule of Classes.
Internships (INT) provide experience to students for on-the-job training with cooperating businesses, agencies, and organizations. The number of hours for each internship varies.
Lab Courses (LAB) are face-to-face classes where students perform tasks as directed by faculty. Faculty members monitor the activity and provide individual and/or group instruction/assistance
Media Courses (MED) deliver all or a portion of instruction through either cable broadcast or pre-recorded video lessons. The videos are available in DVD format from the Billington Library.
Online Courses (ONLNE) use the Internet and a Learning Management System (D2L) to deliver course materials and to facilitate student-instructor, student-content, and student to student interaction. To participate in online courses, the student should have a good understanding of computer hardware and software applications and the Internet.
Continuing Education Online Courses (CEONL) and materials are delivered via the Internet. To participate in online courses, the student should have a good understanding of computer applications and Internet navigation. For more information about this course and other online learning options visit CE Online.
Private (PLV) lessons for credit are available from beginning to advanced in voice, piano, guitar, brass, woodwind and percussion. Lessons are scheduled by arrangement with private music instructors.
Self-Paced Courses (SEL) and Self-Paced Online (SPO) are offered on a schedule of study that allows students more flexible scheduling options. Course interaction is based upon a contract between student - instructor and in some cases can take up to one calendar year to complete. Some courses may use online delivery to facilitate the learning experience.
Self-Paced Courses (SEL) and Self-Paced Online (SPO) are offered on a schedule of study that allows students more flexible scheduling options. Course interaction is based upon a contract between student - instructor and in some cases can take up to one calendar year to complete. Some courses may use online delivery to facilitate the learning experience.
Travel Courses (TRV) may require in-class activities as well as traveling to a destination. Students will be responsible for the cost of the travel as well as the course costs.
Seats Open is an approximation of the number of seats available and may not represent the actual number of seats open at the time of registration.
This course is approved by the Kansas Board of Regents for guaranteed transfer among all Kansas public postsecondary institutions. Additional courses may also be eligible for transfer. Please visit the JCCC Registrar to learn more.