I have taken a variety of different courses as I have pursued my degrees, and the most current are listed here.

Fall 2012

CSC 540B - Graduate Research Seminar

Students will investigate research and writing techniques in the field of computer science. Students must produce a formal document that demonstrates they have attained an appropriate understanding of professional ethics and research skills required of IT professionals. CSC 540 serves as the master's closure exercise and must be taken for a letter grade.

CSC 470C - Topics in Computer Systems
Topic:  Digital Forensics

This course is designed for students who want to learn about electronic evidence, including what types of evidence exist and where it may be found, and computer forensics methods available to examine the evidence. It is intended for those with basic knowledge of computers and networks. It is appropriate for students interested in a career in information security, criminal justice, accounting, law enforcement, and federal investigations, as well as computer forensics.

Spring 2012

CSC 470B - Topics in Computer Science
Topic:  Bio Metric Authentication

This course covers the theories and practice behind the use of biometrics as a means of identification and verification. Students will be exposed to a wide array of biometric markers, and their advantages and disadvantages for use in a biometric authentication system. System errors inherent with biometrics will be covered, and the potential security vulnerabilities of biometric systems will be discussed. There will also be discussions of the ethics and social issues involved with using biometrics for authentication.

CSC 570D - Advanced Topics in Computer Systems
Topic:  Information Security Policies

The course includes a discussion on security policies that can be used to help protect and maintain a network, such as password policy, e-mail policy and Internet policy. The issues include organizational behavior and crisis management. The course will also include a discussion of regulatory compliance as it relates to Information Security Policies.

Fall 2011

CSC 433 - Intrusion Detection

Intrusion Detections Systems (IDS) are an integral element in Information System Security designs. IDS require continuing development in both the manual and automated network traffic analysis techniques used to create signatures for identifying malicious traffic. This course discusses an overview of current network protocols and how misuse of these protocols can be systematically identified. This course also discusses tools to aid in the capture and analysis of network traffic (Windump/Wireshark), tools used to test an IDS (NMAP), as well as a popular open-source IDS (Snort).

CSC 570H - Advanced Topics in Computer Science
Topic:  Threat / Management

Recent world events have brought to the forefront the challenge to discover situations that may threaten an organization’s future, and to prepare for the eventuality of computer system disruptions. Today’s threats require the creation of an on-going process to access and deal with Risks and Threats and plan for the protection or replacement of computer system assets. This course will examine overall risk assessment methodologies to identify risks and the decision process involved in choosing to avoid, transfer, mitigate, or accept those risks to computer systems. Of course all risks cannot be reduced to zero, so it important that an organization have a plan to deal with the inevitable minor disruptions and the rare major disasters that might occur. That is where a comprehensive process described as threat management, contingency planning, and disaster recovery is important. The course will examine the various techniques and tools to maximize the likelihood of continued business operation in the case of either a minor computer system disruption or a major disaster.

Summer 2011

CSC 570A - Advanced Topics in Computer Systems
Topic:  Computer Viruses / Worms

Course Overview

The purpose of this course is to demonstrate the current state of the art of computer virus/worm development and to teach the methodology of virus/worm analysis and protection. Students will learn malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more. Previous programming experience is not required.

 Course objectives

The goal of this course is to give the students theoretical knowledge of computer viruses and worms, specifically, how they function and how they can be prevented. The course begins with a short introduction, followed by more in-depth coverage of different virus and worm types. Upon completion of the course, students should be able to demonstrate knowledge of the technologies behind viruses and worms; and should be able to analyze and evaluate protection measures.

Spring 2011

CSC 570E - Advanced Topics in Computer Systems

Linux Implementation & Administration Practicum

Students will learn the skills necessary to install, customize and administer the Linux operation system. Emphasis will be placed on learning the professional and technical knowledge base required to implement and administer the Linux operating system in networked environments ranging from a small office to a large distributed enterprise architecture.

This is the the first graduate level course that I'm taking as a candidate for an MS in Computer Science.

CSC 315 - ECCE: RoboEthics

An overview across time, continents and disciplines of robots and cyborgs, which are challenging the definition of “person”. Students will read contemporary literature in computer science, philosophy and science fiction, creating original works that explore policies/perspectives on potential communities that include humans and robots. Course Information: This course fulfills an Engaged Citizenship Common Experience requirement at UIS in the areas of Global Awareness or ECCE Elective. 

Fall 2010

CSC 438 - Systems Security and Information Assurance Capstone

This is the capstone design course for the Systems Security and Information Assurance concentration in the Computer Science Bachelor's Degree. This course will emphasize a group approach to information assurance system design and data collection. Students will be given case studies to design and implement a total IT security system.

EXL 300 - General Applied Study Term

The Applied Study Term process emphasizes self-directed learning that provides opportunities for career exploration, integration of academic studies with practical experience, determination of additional learning needs, cultivation of independent learning skills, and development of increased awareness of community, diversity, and public affairs.

Spring 2010

CSC 368 - Systems Programming Languages

Design principles and implementation of systems programming languages. Topics include but not limited to syntax data types, control structures, storage management. Four systems programming software language tools will be studied: shell scripts, Perl, PHP, SQL.

CSC 431 - Network Security & Computer Ethics

This course focuses on network security while emphasizing how the technical decisions associated with network security interact with the values of individuals, organizations, and society. The course includes methods of avoiding, detecting, and analyzing intrusions. Students will examine tradeoffs inherent in security policies, behaviors, and protocols.

Fall 2009

CSC 389 - Introduction to Operating Systems

Assemblers, macro processing, loaders, time sharing operating system, process control, I/O, primary memory allocation, and virtual memory.

CSC 430 - Foundations of Network Security and Information Assurance

Students learn to identify system resources at risk to malicious attacks. Network tools designed to detect and prevent unauthorized access are covered. Demonstrations of tools used to assess and identify vulnerability including penetration analysis, scanners and probes are covered. Case studies and exploit scenarios give students hands-on practice reducing network security threats.

Summer 2009

CSC 484 - Introduction to Parallel Processing

Familiarizes students with the broad field of parallel computing and parallel algorithms, while giving hands-on experience with computing on a parallel architecture.

UNI 301 - ECCE: Speakers Series

Spring 2009

CSC 376 - Computer Organization

Introduction to elementary computer architecture and assembly/machine language. Emphasis on the fetch-execute cycle and CPU organization, binary information representations, combinational logic, and sequential circuits. An overview of the memory hierarchy and I/O interfaces included as time permits. 

CSC 442 - ECCE: Internet in American Life

With far-ranging influences on commerce, education, news, entertainment, information, and more, the Internet has had an enormous impact on American society over the past decade. This course examines that impact with an emphasis on planning and public policy. Course Information: This course fulfills an Engaged Citizenship Common Experience requirement at UIS in the areas of U.S. Communities or ECCE Elective. 

Fall 2008

CSC 385 - Data Structures and Algorithms

Object-oriented software design including sorting and searching algorithms. Implementation of trees, graphs, and other advanced data structures. Algorithm analysis of running times and storage requirements.

CSC 387 - Foundations of Computer Science

An overview of selected computer science topics: computers and society, software engineering, file structures, database structures, artificial intelligence, theory of computation, and human-computer interaction. Topics are selected to complement material in the core computer science curriculum.

Illinois State University

Coursework completed during my time at Illinois State University

Summer 2006

Information Technology 374 - Topics in Telecommunications

Dr. Tibor Gyires

Topic: Simulation and Analysis of Internet Application Performance

This project-oriented course covers performance prediction and simulation-modeling methods and techniques in the design and proactive management of Internet applications.

Proactive network management models a network using traffic traces to simulate current and future behavior of an Internet application and predict the impact of the addition of new applications on the network performance.

For an information system developer, it is important to know how an Internet-based application will perform for the user prior to being implemented. Network managers need to know the impact of an application on the underlying network performance. Using modeling and simulation tools, system developers and network managers can change a model by adding new network connections, workstations, servers, and applications and perform "what-if" scenarios before the implementation of the changes. Throughout the course, students will use simulation modeling packages, various traffic analyzers and troubleshooting tools.

Spring 2006

Information Technology 261 - Systems Development I

Dr. Barb Beccue

Fall 2005

Information Technology 352 - Multimedia Technology Applications

Steve Hilgenberg

For the 2005-2006 school year, I represented the Geography/Geology department as a member of the College of Arts and Sciences Curriculum Committee.

Spring 2005

Information Technology 275 - Java as a 2nd Language

Terry Plickebaum

Fall 2004

Geography 215 - United States Geography

Dr. Dan Hammel

My project was a regional geography of Colfax County, New Mexico

Geography 331 - Cultural Geography

Dr. Beth Schlemper

My project was a cultural geography of Mount Hope, Illinois

For the 2004-2005 school year, I represented the Geography/Geology department as a member of the College of Arts and Sciences Curriculum Committee.

Spring 2004

Geography 201 - Physical Geography II

Dr. James Carter

Introduction to geographic perspectives on the lithosphere and hydrosphere with emphasis on water balance.

Research Project: I researched Geography of the Sequatchie Valley in Tennessee.

We used the Lamont Doherty Earth Observation site to explore mapping elevations of the world.

Here are my LDEO interpretations of the world!

Parting Words (Copyright (c) 2009-2016 Scott G. Kuntzelman)