CS 51 | Visual C++ ProgrammingUnits: 3Transfer: UC, CSU
C++ handles large programs by packaging sections of interrelated code into discrete, independent parts named objects. Visual C++ adds the Microsoft Foundation Class library making it a powerful Windows programming tool. This course will cover Dynamic Link Libraries, advanced view handling, customizing status bars, operator overloading OLE containers and servers, the Microsoft Foundation class library, serialization, windows timers, graphics, metafiles, multiview programs, graphics display controls, and screen capture. Software included in course material. |
---|---|
CS 52 | C++ ProgrammingUnits: 3Transfer: UC, CSU
This course is a continuation of C language programming using the C++ superset of C. C++ offers the following enhancements to C: operator and function overloading, information hiding, inheritance, and virtual functions. C++ will be used in the context of both traditional and object-oriented programming. Software included in course material. This is an advanced programming course. It is strongly recommended that students take CS 50 prior to CS 52. |
CS 53A | iOS Development with SwiftUnits: 3Transfer: CSU
Swift is an object-oriented language designed for iOS, Apple’s advanced mobile platform. In this course, students will learn the syntax and semantics of Swift, be able to apply fundamental principles of top-down algorithmic design to solve computer problems, and learn how to code, test and debug programs in this language using the XCode, the Apple integrated development environment. Students will need access to Intel-based Mac computers, but do not need to have a mobile device such as an iPad or iPhone. Students will be provided XCode to download, if needed. |
CS 53B | iOS Mobile App DevelopmentUnits: 3Transfer: CSU
This course teaches how to design, develop, test and debug applications that run on Apple iOS, a software stack for Apple mobile devices that includes an operating system, middleware and key applications. Topics include the Cocoa Multi-Touch programming framework, the Model-View-Controller design paradigm, application structure, strings, graphics, user interfaces and storage. Students will need access to Intel-based Mac computers, but do not need to have a mobile device such as an iPad or IPhone. Students will be provided XCode to download, if needed. |
CS 54 | Object-Oriented Analysis and DesignUnits: 3Transfer: UC, CSU
This course covers the major object-oriented modeling methodologies: UML, OMT and BOOCH. The course explores the use of these methodologies in the context of designing and implementing object-oriented software application. Software included in course material. |
CS 55 | Java ProgrammingUnits: 3Transfer: UC, CSU C-ID: COMP 122.
Java is a general-purpose language for writing platform-independent, robust, secure programs. This course is intended for students who have completed a course in C programming. Students will learn how to develop Java applications and applets. Topics covered include the Java programming language, object-oriented programming (OOP), the Java applications programming interface (API), and graphical user interfaces (GUI’s). |
CS 56 | Advanced Java ProgrammingUnits: 3Transfer: UC, CSU
Java is a general-purpose language for writing platform-independent robust, secure programs. This course continues where CS 55 leaves off in developing mastery of the use of Java programming language and its extensive APIs. Topics covered include exceptions, multithreading, multimedia, Input/Output, Java Database Connectivity (JDBC), Servlets, Remote Method Invocation (RMI), and networking. |
CS 6 | Virtual Worlds and Game ProgrammingUnits: 3Transfer: CSU
Using Alice, an authoring tool, students will build interactive, animated 3-D virtual worlds. Virtual worlds are interactive, simulated environments that accept human input and provide output in the form of images, sounds, and forces. The software students create will enable them to move around in the virtual world and see it from different angles. Students will create interactive “virtual worlds,” games and simulations that can be viewed in a web page. By building these virtual worlds, students will learn the basics of Object-Oriented programming and basic programming logic. |
CS 60 | Database Concepts and ApplicationsUnits: 3Transfer: CSU
This course introduces modern database concepts while emphasizing the relational database model. Topics include design methodologies, normalization of tables to reduce redundancies, supertypes and subtypes to reduce nulls, data integrity, referential integrity, and using locks and other techniques for concurrency control in a multi-user database. Factors that should be balanced during the design of a database are described. To document databases, entity relationship diagrams, relational schemas, and data dictionaries are described. Principles are applied by performing exercises using MySQL or other database management system. SQL and other languages are used to create and fill tables, retrieve data, and manipulate it by stored programs. |
CS 61 | Microsoft SQL Server DatabaseUnits: 3Transfer: CSU
Microsoft SQL Server is a popular midrange relational database management system (DBMS) that is used in client/server systems and as a personal DBMS. It can be accessed through the Internet. Topics covered in this course include installing the software, principles of relational databases; creating databases, tables, indexes, and views; inserting, deleting, and updating raw data; updating transactions; and querying the database. With the Transact-SQL extensions, topics include creating functions, procedures, and triggers stored in the database. |
CS 65 | Oracle ProgrammingUnits: 3Transfer: CSU
This course is a practical, hands-on overview of the Oracle Database Management System to store, retrieve, and manipulate data. Oracle is a widely used database that runs on PC’s, minicomputers, and mainframes, and Oracle programmers and developers are very much in demand. Oracle’s SQL is used to create and alter tables with various constraints. Data is retrieved and manipulated by using SELECTS that can group data and retrieve data from several tables by joining them or by using set operations. Views are created. PL/SQL, with its variables, symbolic constants, IF statements, and loops is used to program stored functions, stored procedures, and triggers. Cursors and error handling (exceptions) are introduced. |
CS 66 | Advanced OracleUnits: 3Transfer: CSU
This course expands on topics covered in the basic Oracle course. The topics include SQL, SQL*Plus, Developer 2000, and DBA tasks. In addition, it will cover in detail the varied aspects of Designer 2000, a software suite instrumental in analyzing, designing, and building large scale Oracle applications. |
CS 68 | Oracle Database AdministratorUnits: 3Transfer: CSU
This course offers hands-on experience as a Database Administrator (DBA) using an Oracle server. Topics include a DBA’s responsibilities, Oracle architecture, installing Oracle software, configurational options, managing RAM and disk space, managing database changes, managing transactions, tuning and monitoring database resources such as space, transactions, memory, and file usage. |
CS 7 | Programming for Non-Computer Science MajorsUnits: 3Transfer: CSU This introductory course covers programming concepts and techniques applicable to those with no computer science background. The course is designed to assist those in non-computer science fields to develop small-scale projects. Topics covered include computer organization, data representation, variables, branching, loops, procedures, external access and the web. Tools used include HTML5, CSS3, Javascript, and JQuery. |
CS 70 | Network Fundamentals and ArchitectureUnits: 3Transfer: CSU
This course offers a broad introduction to networking concepts and analyzes different network architectures. Introductory topics include network topologies, media and signaling, protocols, addressing, and distributed networks. The varied ways to connect computers are explored as are the resulting architectures. The course explores subnetting, both physical and virtual and internetworks are constructed in the lab. Server programs are introduced to demonstrate their signature socket-API structure. Specific real-world services such as the apache web server, BIND name server, NFS and Samba file system servers, DHCP address server, and others are discussed. |
CS 71 | Introduction to Windows NT WorkstationUnits: 3Transfer: CSU
This course is an introduction to the Windows NT Operating System. Topics include installation and configuration of the Windows NT Workstation, files and directories, security structures, TCP/IP and NetWare connectivity, printing, performance tuning, and troubleshooting. |
CS 73A | Fundamentals of Computer SecurityUnits: 3Transfer: CSU C-ID: ITIS 160.
In this introductory course students will learn how to defend and protect critical computer assets from various security threats including computer worms and viruses. This course will describe fundamental techniques and principles for modeling and analyzing security. Students will learn how to express security requirements, translate requirements into policies, implement mechanisms that enforce policy, and ensure that these policies are effective. Current industry best practices for safeguarding computer resources will be discussed. Various case studies will outline the typical way that security failures get exploited by attackers and how these attacks can be discovered, understood, and countered. |
CS 73B | Computer Forensics FundamentalsUnits: 3Transfer: CSU C-ID: ITIS 165.
In this course, students will learn the principles and techniques of network forensics investigation and the use of available forensics tools in the list of the International Association of Computer Investigative Specialists (IACIS) certification. This course explores security incidents and intrusions, including identifying and categorizing incidents, responding to incidents, using log analysis, analyzing network traffic, applying various tools, and creating an incident response team. Students will also learn about ethical implications of computer forensics reporting and the laws regarding computer evidence. |
CS 73C | Cybersecurity and Ethical HackingUnits: 3Transfer: CSU C-ID: ITIS 164.
This course provides an in-depth understanding of how to protect IT infrastructure. The course combines ethical hacking methodologies with the hands-on application of security tools to secure computer and other digital systems. Students are introduced to common countermeasures that effectively reduce and/or mitigate attacks. In addition, the course covers what an ethical hacker is and how important it is to protect data from cyber attacks. Students will review TCP/IP concepts and practice footprinting, scanning, enumeration, exploitation, and social engineering. |
CS 73L | Cybersecurity LiteracyUnits: 3Transfer: CSU Technology, through the use of cellphones, tablets, desktops and embedded systems, surrounds us everywhere and is a part of our daily life. With the ubiquity of device use, and global-scale data transfers, users are vulnerable to the temptations of cyber-criminals. In this course, students learn how to use technology safely. The course also introduces basic concepts of cybersecurity and explores careers in this field. This course is intended for any non-major student who wants to be a savvy user in the world today. |