This course will emphasize basic security concepts (authentication, confidentiality, accounting and integrity), …
This course will emphasize basic security concepts (authentication, confidentiality, accounting and integrity), apply these concepts to computer networks, and amplify the theory with hands-on aspects of configuring and using secure networks. Topics include: review of networking concepts, general security concepts, user authentication and authorization, encryption, network attacks (including hacking, viruses, worms and denial of service) and network protection. Defense tools including firewalls, Virtual Private Networks (VPNs), and filters will be discussed in depth, as they relate to effective and safe e-commerce and other applications in the real world. Case studies along with projects will be assigned and performed.
This course is designed to familiarize students with basic computer architecture and …
This course is designed to familiarize students with basic computer architecture and operating systems and the relationships between hardware and operating systems will be explored. A student who successfully completes this course will also be able to gain strong foundation in the core fundamentals of digital technology. Basic concepts are reinforced by exercises, and hand-on applications. Students will also program and run simple macros in Linux shell. Employability skills, such as Problem solving, Teamwork, Communications and Critical Thinking are integrated into the course work. 4 hours’ lecture. All course content created by Syeda Ferdous Arar Begum. Content added to OER Commons by Joanna Gray.
The Data Renaissance delves into the complexities of data's role in various …
The Data Renaissance delves into the complexities of data's role in various industries and its broader impact on society. It highlights the challenges in investigating data practices, citing examples like TikTok, where algorithms and data handling are closely guarded secrets. The content, contributed by students under the guidance of an expert, covers a wide range of topics, including the ethical aspects of generative AI in education and the workplace, and case studies reflecting real-world experiences. This evolving text, intended to be updated with each class, serves as a dynamic resource for educators and students alike, offering insights and discussion guides for an in-depth understanding of the ever-changing landscape of data in our digital age.
Electronic commerce (e-commerce) and electronic business (e-business) are vital to business. E-commerce …
Electronic commerce (e-commerce) and electronic business (e-business) are vital to business. E-commerce is one of the core courses in the management information systems (MIS) curriculum. It explains the business practices in the information technology era. The course also introduces the tools that can be applied to e-commerce project development. Information technology has become a commodity, and the e-commerce course has become a widely accepted business elective course forall business majors.The objective of this textbook is to help business students understand the concept of e-commerce and e-business and develop practical skills of e-commerce project development. Upon completion of the course, students will understand e-commerce and e-business, and be able to develop an e-commerce project. This resource was supported by funding from the OER Creator Program at UMass Dartmouth.
Ethical Hacking is a course in our IT Cyber Security Program created …
Ethical Hacking is a course in our IT Cyber Security Program created by Syeda Ferdous Ara Begum. This course teaches students how to properly secure a network by introducing them to various methodologies and techniques of attacking and disabling a network. Students will receive a hands-on practical approach in penetration testing measures and ethical hacking. Coursework is supplemented by hands-on exercises of attacking and disabling a network, and the use of appropriate tools for defense and countermeasures, with emphasis on teaching students to use what they learn ethically and legally. Students will be required to sign the White Hat Oath. All course content created by Syeda Ferdous Ara Begum. Content added to OER Commons by Jordana Shaw.
This is a project based course to introduce students to a Linux/Unix …
This is a project based course to introduce students to a Linux/Unix type environment. This course will cover system navigation, file manipulation, text processing utilities and shell scripting. This course will primarily be done using a CLI, with a focus on Bash.
Learning Objectives: Organize and manage files within the system Comfortable using basic commands from the command line Edit files using editors such as VI and/or Emacs Usefully combine tools and features such as filters, pipes, appends and redirection Know how to do some basic shell scripting, and successfully read, write and debug basic bash scripts Know how to use resources online and off to find additional information about the commands and system
This is an advanced course in system administration with a heavy focus …
This is an advanced course in system administration with a heavy focus on Linux. The course utilizes hands-on labs for topics such as software configuration and installation. Students will build and maintain a small network of virtualized Linux servers from the ground up employing best practices for all aspects of backups, disaster recovery, planning, testing and troubleshooting. Students will read, utilize, and produce technical documentation.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.