JavaScript, jQuery, AJAX
Creation of interactive web pages using JavaScript, ECMAScript including properties, methods, objects, and event handlers of the Document Object Model (DOM). Introduction of jQuery and AJAX techniques in web pages.
Creation of interactive web pages using JavaScript, ECMAScript including properties, methods, objects, and event handlers of the Document Object Model (DOM). Introduction of jQuery and AJAX techniques in web pages.
Intermediate and advanced HTML and CSS, based on W3C latest standards, to create websites or web applications on the World Wide Web, including images, multimedia, tables, and forms. Cascading Style Sheets used to standardize the appearance of web pages. Introduction to JavaScript, XML and definition of server side technology.
Intermediate and advanced HTML and CSS, based on W3C latest standards, to create websites or web applications on the World Wide Web, including images, multimedia, tables, and forms. Cascading Style Sheets used to standardize the appearance of web pages. Introduction to JavaScript, XML and definition of server side technology.
This is a beginning course in the use of HTML and CSS. It will prepare students to build simple web pages using basic HTML and CSS according to the latest standards. Students will also learn how to upload the web page files to a web server.
Methods of using the Internet. History, design and protocol methods used on Internet including: electronic mail, connection to remote computers, file transfer, World Wide Web, basic web page creation and publishing using HTML and CSS. Additional topics include: computer security, copyright and electronic commerce, and basic Unix shell commands requisite to shell account use.
Methods of using the Internet. History, design and protocol methods used on Internet including: electronic mail, connection to remote computers, file transfer, World Wide Web, basic web page creation and publishing using HTML and CSS. Additional topics include: computer security, copyright and electronic commerce, and basic Unix shell commands requisite to shell account use.
Learn how hackers attack computers and networks, and how to protect Windows and Linux systems. Legal restrictions and ethical guidelines will be taught and enforced. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.
Fundamentals, techniques, and procedures to design an effective secure Internet connection using software or hardware firewalls. Discussion of types of firewalls, packet filtering, proxy servers, Intrusion Detection Systems, and Virtual Private Networks (VPNs).
Knowledge and skills - to recognize security vulnerabilities, implement security measures, analyze network environments for known security threats or risks, defend against attacks or viruses, ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security: access control, authorization, encryption, packet filters, firewalls and Virtual Private Networks (VPNs).
Knowledge and skills - to recognize security vulnerabilities, implement security measures, analyze network environments for known security threats or risks, defend against attacks or viruses, ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security: access control, authorization, encryption, packet filters, firewalls and Virtual Private Networks (VPNs).