Skip to main content

Math Requirement

Please complete 804-134 Mathematical Reasoning or 804-115 College Technical Math 1. This is for informational purposes only. Once you register for your course, you can delete this block from your timeline.

IBM Enterprise Systems Concepts

System i Concepts will provide an overview of the i5 Operating System functions and capabilities. Emphasis will be placed upon utilities intrinsic to the operating system and provide a prelude to the programming environment. Some of the features discussed are file structures, library organization, application development tools, control language commands, and structured query. The course will demonstrate business applications without the use of formal programming languages. The labs will focus on data collection, processing, and reporting.

IT in Business

This course is a basic introduction to Information Technology (IT) and how it impacts our lives. It will focus on how IT professionals implement industry tools and applications throughout businesses. Students will learn proper terminology as well as industry trends and concepts.

Gateway to Success

In this course, students explore the Gateway Technical College community. They examine college resources and services, investigate skills that lead to academic success, and identify strategies for achieving educational and personal goals.

SOC: Monitor/Secure the Infrastructure

Learners will monitor, administer, manage, and control one or more networks. The overall function is to maintain optimal network operations across a variety of platforms, mediums and communications channels. Problems will be introduced into the networks and students will be required to work as a team to troubleshoot and fix the systems in a timely manner. Upon completion of this course, the student should be able to recognize and troubleshoot network issues while maintaining availability.

Cybersecurity: Attack & Defend

In this course, learners examine various techniques used by security personnel and hackers to analyze system vulnerabilities. Leaners explore techniques to defend systems, investigate system configurations, and examine methods to infiltrate and/or block potential breaches. Upon completion of the course, learners will be able to explain the tools and techniques commonly used for detecting cyber threats and document and report findings using an industry-standard format.

Computer Security/ Penetration Test

In this course, students examine network security topics through real-world examples. They explore how and why people attack computers and networks. Students investigate and apply tools and techniques commonly used for penetration testing. Upon completion of the course, students will be able to recognize areas of vulnerabilities in a network environment and provide security solutions for the organization.

Cloud Data Security

In this course, students examine key considerations in migrating to cloud computing. They investigate cloud deployment, service models, and cloud infrastructure. Students analyze technologies required to build classic (traditional), virtualized, and cloud data center environments. Upon completion of the course, students will be able to make informed decisions about migrating to the cloud infrastructure and choosing the best deployment model for an organization.

Speech

This course explores the fundamentals of effective oral presentation to small and large groups. Topic selection, audience analysis, methods of organization, research, structuring evidence and support, delivery techniques, and other essential elements of speaking successfully, including the listening process, form the basis of the course.