Order By Display Density

Health Care Independent Study

XNH 7011 - Auto Immune Diseases: Faulty Homeland Security

Autoimmunity is the loss of self-tolerance. Clonal deletion during fetal development ensures self-tolerance and should be maintained life-long. However, many people suffer from autoimmune diseases that develop during their adulthood, or are inherited as genetic diseases. This program will update your knowledge on the immune system, how immunity is supposed to protect us, and what happens when our immune system fails to do so. Discussion will include disorders such as reactions related to the Human Leukocyte Antigen (HLA) Complex, Celiac disease, diabetes mellitus type 1, systemic lupus erythematosus (SLE), Hashimoto's thyroiditis, Graves' disease, idiopathic thrombocytopenic purpura, Addison's Disease, rheumatoid arthritis (RA), and others. RNs, LPNs, APRNs, social workers, registered dieticians, LPCs and LCPCs will earn 4 contact hours. ACHAs will earn 4 (RC).

CEU Hours: .4

Contact Hours: 4

1. Describe the role of the immune system.
2. Discuss the different types of autoimmune diseases.
3. Discuss the potential causes of autoimmune diseases.
4. Understand the treatment, prevention and control of autoimmunity.
 
CRN Days Time Date Location Instructor Seats Open
23720 560 ONLNE MTWRFS- - 08/21/16-12/31/16 Online Mulcahy E 100 of 100

Health Care Independent Study

XNH 7011 - Auto Immune Diseases: Faulty Homeland Security

Autoimmunity is the loss of self-tolerance. Clonal deletion during fetal development ensures self-tolerance and should be maintained life-long. However, many people suffer from autoimmune diseases that develop during their adulthood, or are inherited as genetic diseases. This program will update your knowledge on the immune system, how immunity is supposed to protect us, and what happens when our immune system fails to do so. Discussion will include disorders such as reactions related to the Human Leukocyte Antigen (HLA) Complex, Celiac disease, diabetes mellitus type 1, systemic lupus erythematosus (SLE), Hashimoto's thyroiditis, Graves' disease, idiopathic thrombocytopenic purpura, Addison's Disease, rheumatoid arthritis (RA), and others. RNs, LPNs, APRNs, social workers, registered dieticians, LPCs and LCPCs will earn 4 contact hours. ACHAs will earn 4 (RC).

CEU Hours: .4

Contact Hours: 4

1. Describe the role of the immune system.
2. Discuss the different types of autoimmune diseases.
3. Discuss the potential causes of autoimmune diseases.
4. Understand the treatment, prevention and control of autoimmunity.
 
CRN Days Time Date Location Instructor Seats Open
50433 560 ONLNE ------- - 01/03/17-12/22/17 Online Mulcahy E 100 of 100

Money Management

XPM 1042 - Social Security - What Couples Need to Know

A representative from the Social Security Administration will provide information necessary for couples to make informed decisions about filing for retirement, and survivor, and other family benefits. There is NO FEE for this class but registration is required. There will be no walk-ins allowed.

CEU Hours: .2

Contact Hours: 2

 
CRN Days Time Date Location Instructor Seats Open
50195 001 --W---- 02:00-03:59 PM 02/22/17-02/22/17 RC 175 Faculty 19 of 24

XPM 1043 - Social Security - What Every Woman Should Know

A representative from the Social Security Administration will provide the tools necessary for women to make informed decisions about filing for retirement, and spouse, or survivor benefits. There is NO FEE for this class but registration is required. There will be no walk-ins allowed.

CEU Hours: .2

Contact Hours: 2

 
CRN Days Time Date Location Instructor Seats Open
50194 001 --W---- 02:00-03:59 PM 02/15/17-02/15/17 RC 175 Faculty 24 of 24

XPM 1044 - Social Security - Disability

A representative from the Social Security Administration will provide you with the tools necessary to make informed decisions about filing for, and receiving disability benefits. There is NO FEE for this class but registration is required. There will be no walk-ins allowed into this class.

CEU Hours: .2

Contact Hours: 2

 
CRN Days Time Date Location Instructor Seats Open
50193 001 --W---- 02:00-03:59 PM 02/08/17-02/08/17 RC 145 Faculty 22 of 24

XPM 1045 - Social Security - Retirement

A representative from the Social Security Administration will provide you with the tools necessary to make informed decisions about filing for retirement, survivor, auxiliary, or spouse benefits. There is NO FEE for this class but registration is required. There will be no walk-ins allowed.

CEU Hours: .2

Contact Hours: 2

 
CRN Days Time Date Location Instructor Seats Open
50192 001 --W---- 02:00-03:59 PM 02/01/17-02/01/17 RC 175 Faculty 22 of 24

Security

XCSS 1010 - Security+ Review and Test Prep

This 5-day course provides a review of topics and exam preparation for the CompTIA Security+ Exam. The Security+ exam validates knowledge and understanding of foundation level security standards. It is an international vendor-neutral security certification widely used to demonstrate both compliance and competence in the security industry. The course reviews all areas of the Security+ exam including systems security, network infrastructure, access control, assessments and audits, cryptography and organizational security In addition, the application and testing process as well as key test topics and practice questions. Current exam preparation is for Security+ SYO-401. Class textbook and exam voucher included in course fee. Textbooks distributed in first course meeting. Prerequisite: Information Security Essentials, Security Architecture and Design and Introduction to Hacking, Defense and Response or comparable knowledge.

CEU Hours: 3.5

Contact Hours: 35

• Introduction
   o Security+ Application Process
   o Security+ Testing Process
   o Security+ Preparation
• Networking Basics and Terminology
• Introduction to Security Terminology
• Security Policies and Standards
• Types of Attacks
• System Security Threats
•  Mitigating Security Threats
• Implementing System Security
• Securing the Network Infrastructure
• Wireless Networking and Security
• Authentication
• Access Control
• Introduction to Cryptography
• Managing a Public Key Infrastructure
• Physical Security
• Risk Analysis
• Disaster Recovery and Business Continuity
• Introduction to Computer Forensics
• Security Assessment and Audits
• Understanding Monitoring and Auditing
 
CRN Days Time Date Location Instructor Seats Open
50282 001 -----S- 08:00-03:59 PM 04/15/17-05/13/17 RC 234 Faculty 14 of 14
50283 002 MTWRF-- 08:00-03:59 PM 04/17/17-04/21/17 RC 232 Faculty 14 of 14

XCSS 1011 - Information Security Essentials

This 2-day course is a comprehensive overview of Information Security covering the most relevant practices in information security today. In this class, students explore the techniques and methodologies used to configure, build, deliver, and troubleshoot network security. Topics include the role of information security in the enterprise, formal data classification, enterprise identity management, the components of comprehensive and layered security architecture, and the threat of viruses, worms, Trojans and improper configurations. This class can be taken as part of the Cyber Security Certificate. Class textbook included in course fee. Textbooks distributed in first course meeting. Prerequisites: There are no prerequisites for this class.

CEU Hours: 1.4

Contact Hours: 14

•	Network Security
•	Compliance and Operational Security
•	Threats and Vulnerabilities
•	Application, Data, and Host Security
•	Access Control and Identity Management
•	Cryptography
 
CRN Days Time Date Location Instructor Seats Open
50284 001 ---RF-- 08:00-03:59 PM 01/19/17-01/20/17 RC 234 Faculty 14 of 14

XCSS 1012 - Security Architecture and Design

This 2-day course provides a comprehensive overview of cyber-security control technologies. The course starts with a discussion of security policies and perimeter security fundamentals and then moves to a discussion on how to design network borders for maximum security and how to monitor them for unauthorized activity. Then after an introduction to firewalls, packet filtering, and access lists, the course discusses how to set up routers, special-purpose firewalls, and general-purpose hosts with security in mind. Much of the class centers on security-conscious design, both for green field projects and existing networks that need expansion or improvement. This class can be taken as part of the Cyber Security Certificate. Class textbook included in course fee. Textbooks distributed in first course meeting. Prerequisites: Information Security Essentials or comparable knowledge.

CEU Hours: 1.4

Contact Hours: 14

•	The Essentials of Network Perimeter Security
•	Fortifying the Security Perimeter
•	Designing a Secure Network Perimeter
•	Maintaining and Monitoring Perimeter Security
 
CRN Days Time Date Location Instructor Seats Open
50285 001 MT----- 08:00-03:59 PM 01/30/17-01/31/17 RC 232 Faculty 14 of 14

XCSS 1013 - Introduction to Hacking, Defense and Response

This 2-day course provides a comprehensive overview of hacking and cyber security defense and response tools and techniques. It incorporates several hands-on exercises utilizing the same attack methods used by hackers and cyber security professionals. The course starts with a discussion of why people hack and how they hack. It then focuses on the methods used, including the initial foot printing of the target, scanning the network and finally enumerating target host machines. The second day focuses on the measures necessary to protect your network from the threat. Topics include understanding your network traffic, firewalls, host hardening, intrusion detection systems and network design. Tools used for this class include: Nessus, Nmap, SuperScan, Snort, Fport, John the Ripper, and many others. This class can be taken as part of the Cyber Security Certificate. Class textbook included in course fee. Textbooks distributed in first course meeting. Prerequisites: Security Architecture and Design or comparable knowledge.

CEU Hours: 1.4

Contact Hours: 14

•	Casing the Establishment
•	Endpoint and Server Hacking
•	Infrastructure Hacking
•	Application and Data Hacking
 
CRN Days Time Date Location Instructor Seats Open
50286 001 MT----- 08:00-03:59 PM 02/20/17-02/21/17 RC 232 Faculty 14 of 14

XCSS 1014 - EC-Council Certified Ethical Hacker (CEH) Review and Test Prep

This 5-day course provides a review of topics and exam preparation for the Certified Ethical Hacker (CEH) exam. The Certified Ethical Hacker (CEH) certification is a vendor neutral certification in the network security discipline of Ethical Hacking. It covers the standards and language involved in attempting to penetrate a network or computer system. The Ethical Hacker is a technical professional who uses the same knowledge and tools as a hacker to look for the weaknesses in target systems and to help prevent unauthorized penetration. This knowledge or certification applies to security officers, auditors, security professionals, site administrators, and really anyone who is concerned about the integrity of the network infrastructure. In this course students prepare for the CEH exam by studying security risks through lectures and hands-on lab exercises. Students discuss and learn how to look for the weaknesses and vulnerabilities in a target. In addition, the application and testing process for the CEH as well as key topics on the exam are covered. Current exam preparation is for CEH v9. Class textbooks included in course fee. Textbooks distributed in first course meeting. Prerequisite: Information Security Essentials, Security Architecture and Design and Introduction to Hacking, Defense and Response or comparable knowledge.

CEU Hours: 3.5

Contact Hours: 35

CEHv9 consists of 20 core modules designed to facilitate a comprehensive ethical hacking and penetration testing training.
1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. System Hacking
6. Trojans and Backdoors
7. Viruses and Worms
8. Sniffing
9. Social Engineering
10. Denial of Service
11. Session Hijacking
12. Hacking Webservers
13. Hacking Web Applications
14. SQL Injection
15. Hacking Wireless Networks
16. Hacking Mobile Platforms
17. Evading IDS, Firewalls and Honeypots
18. Buffer Overflows
19. Cryptography
20. Penetration Testing
 
CRN Days Time Date Location Instructor Seats Open
50287 001 MTWRF-- 08:00-03:59 PM 05/15/17-05/19/17 RC 252 Faculty 10 of 10

XCSS 1015 - Certified Information Systems Security Professional (CISSP) Review and Test Prep

This 5-day course provides a comprehensive review of security topics and exam preparation for the Certified Information Systems Security Professional (CISSP) certification. The CISSP is globally recognized as an objective measure of competence and achievement for information security professionals. In this course, students review the 8 domains of the information security practice or common body of knowledge (CBK). Some of the topics include security models, distributed access control methods, DBMS architectures, key cryptography algorithms, intrusion detection systems, and data network components and technologies. Other topics include the application and testing process as well as key test topics and practice questions. Current exam preparation is for April 2015 CISSP. For details about the CISSP certification visit www.isc2.org/cissp. Class textbooks included in course fee. Textbooks distributed in first course meeting. Prerequisite: Information Security Essentials, Security Architecture and Design and Introduction to Hacking, Defense and Response or comparable knowledge.

CEU Hours: 3.5

Contact Hours: 35

1.	Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity)
a. Confidentiality, integrity, and availability concepts 
b. Security governance principles
c. Compliance
d. Legal and regulatory issues
e. Professional ethic
f. Security policies, standards, procedures and guidelines
2.	Asset Security (Protecting Security of Assets)
a. Information and asset classification
b. Ownership (e.g. data owners, system owners)
c. Protect privacy
d. Appropriate retention
e. Data security controls
f. Handling requirements (e.g. markings, labels, storage)
3.	Security Engineering (Engineering and Management of Security)
a. Engineering processes using secure design principles
b. Security models fundamental concepts
c. Security evaluation models
d. Security capabilities of information systems
e. Security architectures, designs, and solution elements vulnerabilities
f. Web-based systems vulnerabilities
g. Mobile systems vulnerabilities
h. Embedded devices and cyber-physical systems vulnerabilities
i. Cryptography
j. Site and facility design secure principles
k. Physical security
4.	Communication and Network Security (Designing and Protecting Network Security)
a. Secure network architecture design (e.g. IP & non-IP protocols, segmentation)
b. Secure network components
c. Secure communication channels
d. Network attacks  
5.	Identity and Access Management (Controlling Access and Managing Identity)
a. Physical and logical assets control
b. Identification and authentication of people and devices
c. Identity as a service (e.g. cloud identity)
d. Third-party identity services (e.g. on-premise)
e. Access control attacks
f. Identity and access provisioning lifecycle (e.g. provisioning review)  
6.	Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
a. Assessment and test strategies
b. Security process data (e.g. management and operational controls)
c. Security control testing
d. Test outputs (e.g. automated, manual)
e. Security architectures vulnerabilities
7.	Security Operations (Foundational Concepts, Investigations, Incident Management, and Disaster Recovery)
a. Investigations support and requirements
b. Logging and monitoring activities
c. Provisioning of resources
d. Foundational security operations concepts
e. Resource protection techniques
f. Incident management
g. Preventative measures
h. Patch and vulnerability management
i. Change management processes
j. Recovery strategies
k. Disaster recovery processes and plans
l. Business continuity planning and exercises
m. Physical security
n. Personnel safety concerns
8.	Software Development Security (Understanding, Applying, and Enforcing Software Security)
a. Security in the software development lifecycle
b. Development environment security controls
c. Software security effectiveness
d. Acquired software security impact
 
CRN Days Time Date Location Instructor Seats Open
50288 001 MTWRF-- 08:00-03:59 PM 03/20/17-03/24/17 RC 252 Faculty 10 of 10
Clinic Courses (CLI) provide practical application and are offered on or off campus. Instructors supervise/direct student in a simulated or on-site setting.
Face-to-Face Courses (F2F) take place in a classroom. Based on JCCC's Statement of General Education. Students in all classes, including face-to-face classes, are expected to use technology appropriate to the course content and as needed to access web-based course materials. Face-to-face classes typically require access to computer equipment (either at home or in college labs provided for student use) and computing skills utilizing standard office, business and web browsing applications.
Hybrid Courses (HYB) combine face-to-face classroom instruction and the convenience of online web-based learning, resulting in a reduction of the amount of time spent in the face-to-face classroom and a significant increase of time spent studying online materials. Students registered in hybrid courses must attend class meetings as listed in the JCCC Schedule of Classes.
Internships (INT) provide experience to students for on-the-job training with cooperating businesses, agencies, and organizations. The number of hours for each internship varies.
Lab Courses (LAB) are face-to-face classes where students perform tasks as directed by faculty. Faculty members monitor the activity and provide individual and/or group instruction/assistance
Media Courses (MED) deliver all or a portion of instruction through either cable broadcast or pre-recorded video lessons. The videos are available in DVD format from the Billington Library.
Online Courses (ONLNE) use the Internet and a Learning Management System (D2L) to deliver course materials and to facilitate student-instructor, student-content, and student to student interaction. To participate in online courses, the student should have a good understanding of computer hardware and software applications and the Internet.
Continuing Education Online Courses (CEONL) and materials are delivered via the Internet. To participate in online courses, the student should have a good understanding of computer applications and Internet navigation. For more information about this course and other online learning options visit CE Online.
Private (PLV) lessons for credit are available from beginning to advanced in voice, piano, guitar, brass, woodwind and percussion. Lessons are scheduled by arrangement with private music instructors.
Self-Paced Courses (SEL) and Self-Paced Online (SPO) are offered on a schedule of study that allows students more flexible scheduling options. Course interaction is based upon a contract between student - instructor and in some cases can take up to one calendar year to complete. Some courses may use online delivery to facilitate the learning experience.
Self-Paced Courses (SEL) and Self-Paced Online (SPO) are offered on a schedule of study that allows students more flexible scheduling options. Course interaction is based upon a contract between student - instructor and in some cases can take up to one calendar year to complete. Some courses may use online delivery to facilitate the learning experience.
Travel Courses (TRV) may require in-class activities as well as traveling to a destination. Students will be responsible for the cost of the travel as well as the course costs.
Seats Open is an approximation of the number of seats available and may not represent the actual number of seats open at the time of registration.
This course is approved by the Kansas Board of Regents for guaranteed transfer among all Kansas public postsecondary institutions. Additional courses may also be eligible for transfer. Please visit the JCCC Registrar to learn more.