Cybersecurity Faculty - Howard Community College
Howard Community College's Cyber Technology Department is hiring for adjunct faculty! HCC’s classes are a mix of fully online and in-person classes. In-person classes are typically held at the HCC main campus in Columbia MD or the Laurel College Center. Potential candidates (including those only interested in fully online classes) should be located in MD, VA, WV, PA or DC. The courses HCC is currently hiring for are listed below. along with their as well as their descriptions and objectives.
To apply for teaching CMSY-158/163/176/262, please use:
ange.com/jobofferdetails.jsp? JOBID=115335&CNTRNO=29&TSTMP=1 623949538826
Please direct questions about these classes to Joel Offenberg (email@example.com, 443-741-2391) and Patrick Valdivia (firstname.lastname@example.org, 443-542-7877)
To apply for teaching CFOR-200, please use:
ange.com/jobofferdetails.jsp? JOBID=90957&CNTRNO=26&TSTMP=16 23949538826
Please direct questions about these classes to Rose Volynskiy (email@example.com, 443-820-6340
0 and Charles Edwards (firstname.lastname@example.org, 202-528-8994)
CMSY-158 Fundamentals and Practice for the Network+ Exam:
This course is designed to give students the knowledge and experience to install and configure the TCP/IP client, and design, install, and configure computer networks. The course will introduce students to computer networking fundamentals helping them to understand how Cables, Connectors, Networking Devices, Ethernet, Clients, and Servers work together. Furthermore, it also equips students with the fundamentals of how Local Area Networks (LANs), Wireless Networks (WLANs), and Wide Area Networks (WANs) work. Students are taught how to setup and configure their own small networks and configure LANs with aspects of network security in place. Some troubleshooting techniques are also covered in the course. A fairly good understanding of computer operating system (OS) such as DOS is an advantage, but not a requirement.
1. Define the various types of computer networks and computer network topologies.
2. Identify the various components of a computer network.
3. Understand computer network architecture.
4. Understand network operations.
5. Define various network standards and various network protocols.
6. Understand the elements of network connectivity.
7. Design and install a computer network.
8. Identify network attacks and practices for ensuring network security.
9. Administer change in the network environment.
10. Troubleshoot a network.
CMSY-163 Introduction to Firewalls and VPNs
This course is designed to give students experience with firewall hardware and software. Different firewall systems will be illustrated, and students will be given the opportunity to install and configure them. The course is designed with a network administrator in mind.
1. Describe the characteristics of TCP and UDP packets.
2. Describe ingress and egress filtering and when to use each.
3. Describe what a packet filter is and how it functions.
4. Describe what a proxy is and how it functions.
5. Describe what stateful inspection is and how it functions.
6. Compare and contrast packet filters, proxies, and stateful inspection.
7. Identify the differences between normal and attacking traffic on a firewall.
8. Setup and configure a firewall for proper outgoing and incoming policies.
9. Determine the limitations of firewall technology and define when other security measures need to be in place.
10. Describe Virtual Private Networks (VPNs) and their role in securing networks.
11. Design and deploy VPN policy to secure remote connections and data transmissions.
CMSY-176 Cybersecurity Fundamentals and Practice
Previously CMSY 162. This course is designed to introduce students to the fundamentals of network security in preparation for advanced courses. It will give students a solid foundation for understanding different security technologies and how they function. Students will also be able to design a basic network with the proper network security structures in place. This course is designed as an entry-level Cybersecurity course, but it is highly recommended that students have a background in computer and network administration. After taking this course, students should be prepared to take the CompTIA Security+ exam. A good understanding of the Windows and Linux
operating systems, and TCP/IP protocol, or an extensive background in network administration is highly recommended.
1. Describe attacks, threat actors, information security, and its challenges.
2. Identify and illustrate the fundamental principles in protecting data.
3. Describe how security controls relate to TCP/IP and OSI models of network protocols.
4. Identify security vulnerabilities of TCP/IP protocols and countermeasures to protect networks.
5. Describe the different types of network, application, and system attacks.
6. Design a basic network, implement and manage with security structures properly in place.
7. Describe cryptography and cryptographic algorithms to secure information.
8. Explain wireless and mobile device security.
9. Describe authentication, authorization, and account management.
10. Explain vulnerability assessment and data security.
CMSY-262 Encryption and Secure Communications
This course will instruct students on how to leverage and apply the principals of encryption to protect data at rest and in transit over potentially insecure networks. The history and concepts of cryptography will be discussed as well as common tools/practices to encrypt data and store/transmit it securely. Concepts of Virtual Private Network (VPN) technologies and secure email will become an integral part of the students' skill set. This course is designed with a network administrator in mind.
1. Define the concepts of privileged access and restricted access to certain data.
2. Understand and identify encryption algorithms.
3. Demonstrate the use of a packet sniffer in order to determine whether data traversing a network is safe.
4. Employ the use of public key encryption and SSL for website assurance.
5. Identify the different tunneling protocols used for VPN connectivity.
6. Demonstrate the capability to establish a VPN and determine if the traffic is encrypted or not.
7. Identify specific needs for physical security to protect network systems.
CFOR-200 Computer Forensics II
This course is designed to cover advanced concepts in computer forensic analysis and the development of investigative thinking and awareness. This course covers basic criminal law concepts, related national electronic laws, and sources of electronic information as it applies to computer forensics. Study of data hiding techniques, encryption, and password recovery will also be covered. Students will have hands-on laboratory experience using various computer forensic tools, evidence-gathering, and documentation techniques.
1. Explore various career opportunities for computer forensic examiners.
2. Define identity theft.
3. Define subpoenas and search warrants.
4. Examine local and national laws affecting computer forensic examiners.
5. Identify sources of electronic information for computer forensic examiners.
6. Describe proper evidence handling and seizure techniques using case studies.
7. Prepare electronic evidence documentation reports.
8. Develop investigative thinking and awareness of electronic media.
9. Examine various data hiding techniques.
10. Define encryption terminology and hashing.
11. Compare and contrast electronic password cracking and password recovery tools.