English Comp I ID: ENG Credit Hours: 3 This is a college transfer course in which the following topics are presented: a study of composition in conjunction with appropriate literary selections, with frequent theme assignments to reinforce effective writing. Introduction to Logic ID: PHI Credit Hours: 3 This course is an introduction to the structure of argument, including symbolization, proofs, formal fallacies, deductions, and inductions.
Event-Driven Programming ID: CPT Credit Hours: 3 This course introduces the student to development of professional- looking, special purpose windows applications using the graphical user interface of windows.
General Psychology ID: PSY Credit Hours: 3 This course includes the following topics and concepts in the science of behavior: scientific method, biological bases for behavior, perception, motivation, learning memory, development, personality, abnormal behavior, therapeutic techniques, and social psychology.
Operating Systems ID: CPT Credit Hours: 3 This course examines the theory of operating systems and how the operating system theory is implemented in current operating systems. Part Time Schedule.
Careers Computer Technology Applications Developer. Average Annual Salary 83, Where Can I Work? Enter the Workforce Join a team of programmers and developers and testers to help design, write, test, deploy, and maintain programs.
Pursue a Bachelor's Degree in Computing Transfer to local colleges and universities to add more to your skills and theoretical background to qualify for an even broader range of jobs. Want more information? First Name.
Last Name. When are you planning to enroll? Are you a current student or a new student? Academic programs count as academic credit for a certificate, diploma or degree and may transfer toward future academic endeavors at four-year colleges and universities.
Training programs can be completed in a matter of weeks or months, are focused on career training, and provide credentials and certificates needed in the specific fields of study.
Coursework does not transfer. Not sure: Check out these resources to explore what fits your goals. Get Email Updates. Talk to Us. Do you want MTC to walk you through your options? What's the best time of day for us to call? If you requested a phone call, an admissions counselor will contact you within one business day. Meets with a live instructor and classmates on specific days, at specific times.
The course includes a hierarchical view of network resources and allows administrators, developers and end-users to gain access to those resources. This course is an introduction to firewalls and other network security components that can work together to create an in-depth defensive perimeter around a local area network LAN.
This course provides students with the knowledge and skills necessary to test network security using network vulnerability assessment tools and methods. Students will also learn how to improve network security based on the assessment results. This course provides a comprehensive foundation in both SQL and relational database design and implementation. Dynamic and embedded SQL programming techniques are emphasized.
Note: SQL Server is used. This course is a study of advanced database techniques. Topics will cover procedures, triggers, query optimization and user security. This course is the study of intro levels of security processes based on a security policy, emphasizing hands-on skills in the areas of secure perimeter, security connectivity, security management, identity services and intrusion detection. The course prepares students to manage network security.
This course is the study of advanced security processes based on a security policy, emphasizing hands-on skills in the areas of secure perimeter, security connectivity, security management, identity services and intrusion detection. This course introduces the basics of network security. Topics covered will include network vulnerabilities and threats, security planning, security technology, network security organization, as well as legal and ethical issues related to network security.
This course introduces methods for attacking a network. Concepts, principles, tools and techniques for attacking and disabling a network will be covered in the context of understanding how to properly secure a network as a network administrator.
This course is an introduction to features of Voice Over IP protocols, including VoIP hardware selection and network design considerations. Computer Technology Programs Courses. Offered Fall, Spring and Summer Semesters.
CPT Microcomputer Applications Offered Fall and Summer Semesters. Offered Fall and Spring Semesters. Contact Us Email Need Help? Locations: Conway. Contact: Admissions Computer Technology - Programming With the widespread use of computers around the world, there is an ongoing need for skilled computer specialists. Apply now Admissions 6 easy steps to enroll Registration info Class schedules. JAN Spring Semester Begins!
0コメント