The College is seeking full-time or part-time professors to join a dynamic team to teach one or more of the following courses within the Computer Science (420) discipline in the Winter 2025 semester.
420-H40-HR Web Programming IV
(2 hours of theory, 3 hours of labs, and 5 hours of availability per week)
Students work with web servers and web server security. Using PHP and other tools students explore web application vulnerabilities and how to prevent them. They create web applications and prepare website security plans for the applications and harden the web server and applications against malicious attacks.
420-H50-HR Web Programming V
(3 hours of theory, 3 hours of labs, and 6 hours of availability per week)
Students create dynamic web applications using the C#/.NET framework in Visual Studio. They use ASP.NET with MVC to develop a web application for a case study. They design and create applications with validation, to access a database and other data sources. They deploy .NET applications to a web server.
420-K10-HR Business in the Workplace
(3 hours of theory, 3 hours of labs x 2 groups, and 9 hours of availability per week)
Students are introduced to a broad, general overview of business operations in both the private and public sectors particularly with respect to business information systems. Students learn about IT careers and the ethical considerations of these careers. They learn technical writing practices including how to prepare resumes and cover letters. Students also learn and apply the principles of interpersonal communication to their professional and personal lives. They learn to effectively work and interact with others.
420-F30-HR IT Security
(2 hours of theory, 3 hours of labs, and 5 hours of availability per week)
Students are introduced to current trends and issues related to computer security.
Students are introduced to current trends and issues related to computer security. From personal to corporate level IT security, this course includes topics such as: analyzing potential security risks, recognizing and preventing threats, responding to attacks when they occur, restoring system integrity if a breach occurs, pen testing and ethical hacking.