Course Offerings
No description provided.
The Texas Cybersecurity Clinic is a two-semester sequence that first equips students with the technical and business skills of an entry-level cybersecurity analyst (semester 1) and then partners them in (supervised) teams with a small local business, municipal government, nonprofit to render pro bono cybersecurity services (semester 2). During the first semester, students will learn key cybersecurity defense concepts and skills, such as vulnerability assessment, network configuration and security, access controls, authorization techniques, responding to a cyberattack, business planning, and penetration testing. Students will also learn how to form an effective cybersecurity operations team and communicate with organization and business leaders and employees about essential cybersecurity controls and functions. By the conclusion of this course, students will be prepared to work within their assigned teams to assess, design, and render a cybersecurity improvement project plan for their client organization next semester.
The Texas Cybersecurity Clinic is a two-semester sequence that first equips students with the technical and business skills of an entry-level cybersecurity analyst (semester 1) and then partners them in (supervised) teams with a Central Texas-based small business, municipal government, or nonprofit to render pro bono cybersecurity services (semester 2). During the first semester, students will learn key cybersecurity defense concepts and skills, such as vulnerability assessment, network configuration and security, access controls, authorization techniques, responding to a cyberattack, business planning, and penetration testing. Students will also learn how to form an effective cybersecurity operations team and communicate with organization leaders and employees about essential cybersecurity controls and functions. During the second semester, students work within their assigned teams to assess, design, and render a cybersecurity improvement project plan for their designated client organization, building cybersecurity capacity and bolstering the client organization’s ability to recover from a cyber incident long-term.
In this class, students will first learn some fundamentals of cultural heritage informatics and be introduced to the major kinds of institutions in this space: galleries, libraries, archives, and museums. Students will also see case studies of how fundamental concepts like access or metadata get used in contemporary examples.
This course we will explore the concepts and values of open knowledge and knowledge equity and how they intersect with the ongoing evolution of digital environments. Open knowledge can be described as information that is freely available to the public to use and redistribute. Knowledge equity extends beyond information access and use to also include what is valued as knowledge, whom that knowledge represents, and who creates it.
Engage in modern ethical dilemmas within archives, libraries, and museums, considering issues of collections management and preservation within changing cultural frameworks. This I 320C topic carries the Cultural Diversity in the United States flag. The purpose of the Cultural Diversity in the United States Flag is for students to explore in-depth the shared practices and beliefs of one or more underrepresented cultural groups subject to persistent marginalization. In addition to learning about these diverse groups in relation to their specific contexts, you’ll also reflect on your own cultural experiences.
This course introduces digital archival collections that can be accessed and used as data for research and inquiry. Topics will focus on the transformation, analysis, and interpretation of digital cultural heritage in archival contexts, including digitization, web archiving, software emulation, and data archiving. From text messages, Spotify playlists, to the President's tweets--how are digital traces collected, preserved and managed by archives? What are the ethics of managing digital archives and making them accessible to researchers, the public, and machines?