Bellevue university online degrees and programs




















View regular hours and contact information for technical assistance. Are you ready to earn your degree online in a flexible, supportive learning environment? Contact one of our professional enrollment counselors today or call 1. Want to learn more about Bellevue University? Our admissions team is here to support you and get your questions answered. Fill out the form to receive detailed program information, learn how your credits transfer, and discover scholarship and financial aid options.

Help Login. Site Search Apply Request Information. Request Information Login Need Help? Online Learning Earn a respected degree - online. Learn Today, Use Tomorrow Immediately apply newly learned skills to a current job, while becoming a more attractive candidate for other opportunities.

Weeks Not Years Depending on the certificate program, you can earn your certificate in 24 to 36 weeks. Apply Credits to a Degree If you decide to enter a degree program in the future, your credit hours will transfer. Strong Student-Faculty Relationships We keep class sizes small, so that you have quality time with your professor whenever you need it.

Faculty from the Real World Our faculty have experience and expertise solving real-world challenges in their fields, as well as in the classroom.

STEP 3 of 3. Help Login. Site Search Apply Request Information. Request Information Login Need Help? Make your degree work. Online, on your schedule. Education as real as your aspirations.

That's what you'll get. Ready to go after your goals? Classes start soon. What type of program do you want to pursue? Arts and Humanities Develop your communication skills or launch your career in media or graphic design.

Business, Management, and Leadership Choose from more than 30 specialized degrees to become a leader in your field. Topics that comprise this course include security structure, leading security projects, policy management, human factors of security, and physical security methods. This course explores secure base operating systems on server, desktop, virtual, and mobile platforms. Topics include the practical application of security tools, utilities, and configurations for protecting computer operating systems at both the user and corporate level.

Course subject is also related to protecting stand-alone and virtualized servers, cloud computing security, and the protection of mobile platforms such as smart phones, tablets and handheld computers. This course explores securing core technologies that support Internet applications and commerce. Processes for creating and administering Internet web sites to ensure proper protections are introduced. The course also addresses securing applications on Internet websites and mobile platforms, and introduces basic methods for secure development.

This course introduces the concepts of relational and non-relational database structures from a software developer perspective. Students will prepare a small application using a relational database management system. This course examines basic methods of investigation, information acquisition, and management of Internet and computer forensic cases. Topics include record-searching, note taking and report writing, and using scientific methodology in Cyber investigations.

Coverage also includes basic tools and techniques for forensic analysis of computers, networks systems, and mobile devices. This course provides an introduction to penetration testing and incident response tactics, techniques, and procedures. Topics include ethical and legal implications of penetration testing, network information gathering, system vulnerability analysis, common tools and techniques used in penetration testing, traffic analysis, incident response, and related defensive measures.

This course provides students with the knowledge and skills related to detecting and analyzing vulnerabilities and threats and taking steps to mitigate associated risks. Topics include incident response plans, managing cybersecurity incidents, log file analysis, anomaly detection, network security monitoring, host based and network based intrusion detection and prevention, malware analysis and threat intelligence.

Topics include threat hunting and advanced threat intelligence, security automation, playbooks, machine learning for detection and response, log aggregation and correlation, incident response in the cloud, threat emulation, writing custom intrusion detection system rules and advanced malware analysis.

This course provides an introduction to the fundamental components of encryption. Topics include the history of cryptography, public key and private key systems, hashing, and digital signatures. A project-based course which focuses on the use of tools and methodologies applied to structured system analysis and design.

Emphasis is placed on traditional approaches including enterprise analysis, workflow analysis, data flow analysis, affinity diagram construction and use, system flowcharting and entity relationship diagramming.

Students will complete a feasibility analysis, risk analysis, design specifications and a project implementation plan for a simulated business system. This course provides students with an introduction to project management as it relates to Information Technology. Students develop formal project plans based on actual problems. Emphasis is placed on the knowledge areas of project management. Team-based and discovery-based learning methods are stressed. This course discusses ethical issues inherent in the field of information technology.

Topics covered focus on the balance between the individual and society, including privacy and surveillance, free speech and censorship, fair use and intellectual property, and security and computer crime. The course also discusses professional responsibility netiquette.

This course is designed to introduce the concepts of structured programming. How programs and programming languages work, and the purposes and practices of structured programming are discussed. This course provides an in-depth study of basic Linux administrative tools and practices. It is based on the curriculum recommended by the Linux Professional Institute for certification at the LPIC-1 level, and can be used to prepare for certification exams and Topics covered in this course include Linux commands, shell scripts, file systems, networking, security, and troubleshooting.

This course consists of an advanced study of Linux servers, networking, administrative tools and practices. It is based on the curriculum recommended by the Linux Professional Institute for certification at the LPIC-2 level, and can be used to prepare for certification exams and Topics covered in this course include resource utilization, compiling the kernel, Linux Web, DNS, DHCP, email, file, print, and database servers, enterprise networking, shell scripts, file systems, networking, security, and troubleshooting.

Students will explore the concept of Accounting Information Systems AIS and the implications of a computerized AIS, as well as issues involved in converting from a manual system to a computerized AIS, as well as issues involved in converting from a manual system to a computer-based system database.

Students will also become knowledgeable of computer technology, IT terminology, commonly used software applications, and computer-based control issues. Emphasis is placed on internal control and security.

Prerequisites: AC and BA This course introduces students to national security as a concept, strategy, goal, and challenge. It examines the dangers and threats that exist domestically and internationally and analyzes how the United States attempts to deal with those challenges using strategies that range from diplomacy to military force. This course introduces students to intelligence and counterintelligence as concepts, processes, and careers.

The process of intelligence collection, analysis, research dissemination, consumption, and feedback is examined. Students are exposed to the diverse ICcommunity and the responsibilities of its various members. This course introduces and engages elements of theoretical and ethical analysis to empirical topics and subject matter.

Some of the issues covered will include war, weapons of mass destruction, humanitarian intervention, globalization, and spying. This course explores the deeper underlying philosophical issues within national security. This course provides a monitored structure for application of the skills and knowledge acquired throughout the Cybersecurity program.

Emphasis is placed on the use of real-world security problems, issues, and situations.



0コメント

  • 1000 / 1000