More Info
We want to reassure the U of R community that we are far from the wildfires, and our air quality remains safe. The University continues to operate business as usual. Our hearts are with those impacted by the fires, including our colleagues at Woodbury University.
More Information

Computer Science

Designed to make students computer literate. Non-technical introduction to computers with particular focus on microcomputers and how they work. Students are introduced to the Windows operating system, word processing, spreadsheets, graphics programs, databases, programming, and ethical issues in computer use.

Learn about the tasks involved in various information technology (IT) job roles, and explore career opportunities in the IT industry. Explore Internet connection methods, Internet protocols, the Domain Name System (DNS), cloud computing, and mobile devices.

The Network Technology Associate course teaches essential networking technologies and skills, including TCP/IP, stable network creation, wireless networking, mobile devices, and network troubleshooting. Students learn to use various network components, and protocols that enable users to share data quickly and easily.

Learn to develop websites using Hypertext Markup Language version 5 (HTML 5) and Cascading Style Sheets (CSS), including writing code manually, as well as using graphical user interface (GUI) authoring tools. Also learn how to insert images, create hyperlinks, and add tables, forms, video, and audio to web pages.

Learn front-end and back-end web development, including the foundations of computer programming, using some of the latest web technologies in a fast-paced boot camp format. Topics include: HTML 5, CSS, Javascript, Bootstrap, ArcGIS, Node.js, MySQL, JSON APIs, responsive application design, version control and SCRUM project management.

Provides an introduction and conceptual overview to cybersecurity. This course will focus on risks to organizations inherent in the current cyber landscape. Identify notable threat actors and typical methods of attack. Review appropriate responses to a cyber-attack and assess vulnerabilities of an organization's critical business systems, networks, and data.

Introduces students to hands-on applications of Cybersecurity systems and technology. Students will identify appropriate technologies for protecting system, networks, and data. Given the major trends taking shape outside and inside organizations, information security professionals and key stakeholders may need to begin planning now for specific technology solutions and practices as well as deployment to be better positioned for success and a sustainable future. Topics include cloud vendor management, endpoint detection and response, multi factor authentication, and preserving data integrity.

Focuses on differentiated business strategies that informs decisions and actions centered around assessing the nature and extent of the impact of key technologies and practices. Participants will identify impactful risk strategies and use identified strategies to anticipate the impact of risk on organizational structure. Students will further develop and apply the identified risk strategy to their organization and explore the role of leadership in managing organizations' cyber risk.