Thread Rating:
  • 3 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Free College Credit from TEEX!
#91
Yes I totally agree with you! Let me know what happens because I will need another 3 credits in CIS if they don't categorize it as computers. I'm in AAS so any type of computer will count. Please let me know. Good luck.
TESC BSBA Computer Information Systems - ~TBD~ (currently working toward)
TESC AAS Applied Computer Studies - September 2013 (finished in June 2013)

GENERAL EDUCATION
SL English Comp I/II ~Intro to Sociology
ALEKS ~Intermedia Algebra~College Algebra
CLEP Spanish 12cr (72)

COMPUTER career track
B&M 9 credits (computer classes)
CompTIA N+ A+ 4cr (core)
TEEX Cyber security courses 4cr (core)
DSST Intro to Computers 3cr (435)
PENN FOSTER Computer Applications 3cr

BUSINESS
TEEX Cyber security course 2cr (MAN-299)

ELECTIVES
FEMA 18cr
(PDS certificate)
Reply
#92
Brucet3 here is some back up for your argument from sanatone.
Cmp-344
Cap-385
check out his post on this thread. These might be better transfers.
TESC BSBA Computer Information Systems - ~TBD~ (currently working toward)
TESC AAS Applied Computer Studies - September 2013 (finished in June 2013)

GENERAL EDUCATION
SL English Comp I/II ~Intro to Sociology
ALEKS ~Intermedia Algebra~College Algebra
CLEP Spanish 12cr (72)

COMPUTER career track
B&M 9 credits (computer classes)
CompTIA N+ A+ 4cr (core)
TEEX Cyber security courses 4cr (core)
DSST Intro to Computers 3cr (435)
PENN FOSTER Computer Applications 3cr

BUSINESS
TEEX Cyber security course 2cr (MAN-299)

ELECTIVES
FEMA 18cr
(PDS certificate)
Reply
#93
Thanks for the info on this. Was really hoping they would get transferred as something a bit more "useful"

Please keep us posted on the challenge... and not to get this thread off topic, but if you are one credit short, have you completed any of the free online NFA courses? Unlike FEMA, some have had success getting a few of these outside of FREE ELECTIVES.

I'm enrolled at TESC in BSBA CIS and have completed the following electronically ACE approved NFA courses:

Fire Service Supervision: Self Study
National Emergency Training Center (NFA) = ACE Course# NNFA-0145

Hydraulic Calculations for Water-Based Fire Protection Systems Plan Review
National Emergency Training Center (NFA) = ACE Course# NNFA-0203

Self-Study Course for Community Safey Educators
National Emergency Training Center (NFA) = ACE Course# NNFA-0149

Without any challenge, they evaluated these for me right now as:
HRM-331 Human Resources Manageme. (1.00) [Business Electives]
FIS-241 Fire Service Hydraulics (1.00)
FIS-391 Intro Fire Safety Educat (1.00)

HTH
Reply
#94
Thanks Mike, but I'm in need of a CIS or computer science credit. ��
DONE!!!! :hurray:hilarious:hurray: 120 out of 120 Complete. BSBA in CIS at Thomas Edison State College

TESC - 9 C/H
Strategic Bus Management (BUS 425) - A
Sys Analysis and Design - A
Network Tech TECEP (CMP-311) - Pass

CLEP - 15 C/H
College Comp - 56
Prin of Management - 62
Prin of Marketing - 61
Business Law - 59

DSST - 9 C/H
Introduction to Comp - 476
M.I.S. - 464

South Suburban Com Col - 18 C/H
Phil 101 & 107, 16 credits in Music Study/diction/composition

Microsoft MCSA - 3 credit hours in BSBA CIS Area of Study

ALEKS-Straighterline-Penn Foster-FEMA-TEEX - 12-39-6-6-= 66 CR Hours
Interm/ Algebra, Col. Algebra, PreCalculus, Intro to Stats - Managerial Acc, Intro Bio, Business Ethics, Org. Behavior, US History I & II, Intro Psych, Macro, Microeconomics, Bus Comm., Intro to Business, Acc I & II - Intro to Prog, Fin. Management - TEEX IS Security Courses
Reply
#95
My transcript is a bit of a mess, due to so many transfer credits... but I have numerous "exceptions" listed. Over in one area, under in another etc...

Are you sure if you go one sh over on business electives with HRM-331, they won't create an exception for 1 sh short in your required area? Might be worth a shot to ask, or even try to plan the credit in regardless. All the NFAs are really quick.
Reply
#96
I think Post #2 on this thread is a much better fit after actually taking the tests.

Hopefully we can get them changed. I haven't gotten my evaluation done yet so I will let you know if its the same as Brucet3
TESC BSBA Computer Information Systems - ~TBD~ (currently working toward)
TESC AAS Applied Computer Studies - September 2013 (finished in June 2013)

GENERAL EDUCATION
SL English Comp I/II ~Intro to Sociology
ALEKS ~Intermedia Algebra~College Algebra
CLEP Spanish 12cr (72)

COMPUTER career track
B&M 9 credits (computer classes)
CompTIA N+ A+ 4cr (core)
TEEX Cyber security courses 4cr (core)
DSST Intro to Computers 3cr (435)
PENN FOSTER Computer Applications 3cr

BUSINESS
TEEX Cyber security course 2cr (MAN-299)

ELECTIVES
FEMA 18cr
(PDS certificate)
Reply
#97
How did I miss these updates? CIS 344 might be considered a natural science since 5 other CIS courses offered by TESC are considered natural sciences. At least I sort of got one right: Computer Security; but, it's not for the course I thought it would be for. The non-technical track is only 1/3 law, so I'm not really getting that evaluation. I think the business track more aligns with Computer Security since it talks about risk management and business continuity. The technical track is closer to Network Security. Send them an email that looks something like this:

ACE description for Computer Security for IT Professionals
Quote:Upon completion of the course the student will be able to summarize commonly utilized means of securing organization's networks, including firewalls, intrusion detection systems, and intrusion prevention systems; examine tools and utilities that can be used to monitor and observe a network; summarize policies and best practices that can be used to monitor and observe a network; review computer technologies before introducing the associated challenges and advantages of these technologies to computer forensics; describe forensics and discuss the specific role of digital forensics in forensic science; explain digital forensics by discussing methods of presenting question answers to a variety of audiences; review basic terms found in a full discussion of information security; describe the study of confidentiality, integrity and access control and an introduction to several access control models; discuss layered architecture model used in the design and study of the Transmission Control Protocol/Internet Protocol (TCP/IP); summarize the common offensive techniques used by attackers targeting IT networks; identify vulnerabilities unique to operating systems and some solutions and best practices to guard against the exploitation of such vulnerabilities; review of the general concepts of cryptography, different types of cryptographic algorithms and the pros and cons of these different types; describe the fundamental concepts of developing secure software; review concepts in secure software design and testing and emphasize how these techniques are used to create more robust and reliable software; summarize commonly used software development methodologies; and introduce a secure software development methodology for an in depth look at how a secure process typically occurs.

TESC description for Network Security
Quote:Network Security (CAP-385) 1.00 s.h.
Design a secure network based on business, management, and network factors; implement user and group policies to tighten security, secure computers and plan a network for internet access; plan, deploy, manage and monitor servers; encryption and secure sites.

ACE description of Computer Security for Business Professionals
Quote:Upon completion of the course, the student will be able to summarize concepts for cyber incident management, as well as an overview of the cyber incident management process; describe preparation phase of cyber security incident management; know reactive cyber incident management activities; identify protecting and restoring systems that have been compromised by cyber security incidents including incident containment, identification, eradication, and recovery; specify cyber incident proactive and post services, legal issues, and human resource issues; summarize the practice of Business Information Continuity; describes continuity plans; review training that should be given to employees, and teaches how to derive maximum productivity from current and new staff; describe the technical side of Business Information Continuity; recognize threats to Business Information Continuity; review inventory, personnel, and the previous continuity plan; summarize risk management, the application of risk management practices to information systems, and how information systems risk management relates to Business Information Continuity; explain information technology components found in most organizations and an evaluation of their relative importance; summarize risk identification and common hazards; apply risk and hazard frameworks to common cyber threats; define risk quantification, including quantitative and qualitative methods; discuss risk control which involves risk detection, risk limitation, risk recovery, and risk plan monitoring; and discuss organizational security policies, how to apply them to an organization's practices, and how to successfully comply with industry standards such as COBIT, FISMA, PCI, and others.

TESC description for Computer Security
Quote:Computer Security (CIS-344) 3.00 s.h.
This course covers knowledge and understanding associated with the usage of systems security theory, techniques, and practice. The course focus is on applying knowledge to dealing with real-world security issues. Areas covered: RISK Assessment--organization, systems & data asset evaluation, threat characteristics, risk assessment, and dealing with risk. RECOVERING FROM INFORMATION SERVICE INTERRRUPTION--Recoverable storage management, business continuity planning, disaster management. INFORMATION AND SYSTEM SECURITY--telecommunications, database security, cryptography, operating systems, microcomputers and local area net- works, and physical security. SECURITY IN SYSTEM DESIGN--system security objectives and functions, data integrity assurance, life-cycle approach. SECURITY MANAGEMENT--policy setting, implementation, & administration, security awareness, information ethics, personnel issues, etc.

I'll have to do this in two posts.
Graduate of Not VUL or ENEB
MS, MSS and Graduate Cert
AAS, AS, BA, and BS
CLEP
Intro Psych 70, US His I 64, Intro Soc 63, Intro Edu Psych 70, A&I Lit 64, Bio 68, Prin Man 69, Prin Mar 68
DSST
Life Dev Psych 62, Fund Coun 68, Intro Comp 469, Intro Astr 56, Env & Hum 70, HTYH 456, MIS 451, Prin Sup 453, HRM 62, Bus Eth 458
ALEKS
Int Alg, Coll Alg
TEEX
4 credits
TECEP
Fed Inc Tax, Sci of Nutr, Micro, Strat Man, Med Term, Pub Relations
CSU
Sys Analysis & Design, Programming, Cyber
SL
Intro to Comm, Microbio, Acc I
Uexcel
A&P
Davar
Macro, Intro to Fin, Man Acc
Reply
#98
Ace description for Computer Security for Everyone
Quote:Upon completion of this course, the student will be able to explain the legal issues behind Internet regulations, online contracting, consumer protection, employee privacy, online marketing, as well as the roles and involvement of such organizations as the Federal Trade Commission and the International Chamber of Commerce; identify laws that combat intellectual property cybercrimes such as copyright infringement, unauthorized access of data or systems, and cyber fraud; identify issues involving trademarks, domain names, and websites, including the domain name registration process, hyperlinking and copyright infringement, cybersquatting, trademark infringement, the role of The Internet Corporation for Assigned Names and Numbers (ICANN), and laws such as the Anti-Cybersquatting Consumer Protection Act and the Federal Trademark Dilution Act; describe Internet fraud issues such as identity theft, the prevention and avoidance of identity theft, and the Identity Theft and Assumption Deterrence Act; discuss electronic evidence and discovery, including the validity and discovery of electronic evidence in cybercrimes, The USA Patriot Act, search and seizure restrictions and how they affect search engines and Internet service providers, the production of confidential business information, the Federal Rule of Civil Procedure amendments, the protection of confidential data and trade secrets, as well as computer security, incident response, and legal liability; discuss topics, such as the involvement of free speech and child pornography, online gambling in the United States, hate speech on the Internet, anti-hacking and anti-spyware laws, and legal liability for cyber security, including laws such as the Communications Decency Act, the Children's Online Privacy Protection Act, the United States Unlawful Internet Gambling; identify fundamental concepts, terms, ideas required for an informed discussion on ethical topics, and an overview of ethical business practices; identify what privacy is, who has it, who is entitled to it, and what threatens it; identify differing electronic means commonly used to gather data and threaten personal privacy; Identify defensive techniques and federal laws that defend privacy and discuss consent and how industry self-regulation impacts privacy; define what an intellectual object is, how intellectual objects differ from traditional (physical) objects, and how those objects may be owned; discuss U.S. copyright law, how copyrights are obtained, under what circumstances a copyright may be applied to computer software, patents, trade secrets, and trademarks, explaining the differences between those protections and copyrights, and other intellectual property issues; discuss why professional codes of conduct are important for cyber security professionals, commonly used and invoked professional codes, employer/employee relationships and the impact those relationships have on the practice of 'whistle-blowing', responsibility, accountability, and liability as they relate to professional codes of conduct; review issues surrounding speech on the Internet and the associated legal concerns, cyber-squatting, spam, censorship, varying forms of speech that some argue are protected and defamation on the Internet; discuss hacking and the two main categories of hackers, 'black hat' hackers and their motivations and characteristics, 'white hat' hackers and an examination of the key differences between white hat and black hat hackers, "hacktivism", cyber crime, cyber-terrorism, and how those acts are similar and dissimilar; identify anti-virus software, personal firewalls, Operating System (OS) variants, and securing the OS on a new computer; discuss the varying types of malicious software that can be encountered on the Internet as well as general strategies for identifying and neutralizing these programs; discuss peer-to-peer (P2P) file sharing and the risks (technological and legal) that can come with the use of P2P software; identify encryption, and how to use encryption to successfully protect your data, even when your computer is stolen, as well as various strategies that can be used to ensure the physical security of your computer; identify the basics of networking, securely setting up and running small computer networks, firewalls, wired and wireless network configuration, wireless encryption standards, generating strong passwords/network keys, and typical attacks that might be launched against your network; summarize the use of encryption to secure data being transmitted over a computer network, as well as information security best practices and guidelines; discuss techniques for purging cookies and browser cache, as well as social engineering attacks and how to identify and defeat them; and identify safe browsing and the consequences that can result from failing to use safe browsing habits.

TESC description for Computer Security & Info Theory
Quote:Computer Security & Info Theory (CMP-401) 3.00 s.h.
Information and coding, measurement and transmission of information, redundancy, noise, data bank security in government and industry, computer network weaknesses, data encryption.

The last one is a bit of a stretch, but the other ones are pretty close. I think that there is a good chance the CIS course will count as a natural science, but I'm not so sure about CMP and CAP. At least it would be better if we could get some UL computer credits out of these instead of unspecified, LL credits in law and management.
Graduate of Not VUL or ENEB
MS, MSS and Graduate Cert
AAS, AS, BA, and BS
CLEP
Intro Psych 70, US His I 64, Intro Soc 63, Intro Edu Psych 70, A&I Lit 64, Bio 68, Prin Man 69, Prin Mar 68
DSST
Life Dev Psych 62, Fund Coun 68, Intro Comp 469, Intro Astr 56, Env & Hum 70, HTYH 456, MIS 451, Prin Sup 453, HRM 62, Bus Eth 458
ALEKS
Int Alg, Coll Alg
TEEX
4 credits
TECEP
Fed Inc Tax, Sci of Nutr, Micro, Strat Man, Med Term, Pub Relations
CSU
Sys Analysis & Design, Programming, Cyber
SL
Intro to Comm, Microbio, Acc I
Uexcel
A&P
Davar
Macro, Intro to Fin, Man Acc
Reply
#99
Thanks Sanantone! I agree with your post 100% and hope TESC will agree.
TESC BSBA Computer Information Systems - ~TBD~ (currently working toward)
TESC AAS Applied Computer Studies - September 2013 (finished in June 2013)

GENERAL EDUCATION
SL English Comp I/II ~Intro to Sociology
ALEKS ~Intermedia Algebra~College Algebra
CLEP Spanish 12cr (72)

COMPUTER career track
B&M 9 credits (computer classes)
CompTIA N+ A+ 4cr (core)
TEEX Cyber security courses 4cr (core)
DSST Intro to Computers 3cr (435)
PENN FOSTER Computer Applications 3cr

BUSINESS
TEEX Cyber security course 2cr (MAN-299)

ELECTIVES
FEMA 18cr
(PDS certificate)
Reply
I'm not enrolled, but I sent TESC an email detailing the comparisons making sure I pointed similarities between the course descriptions. I'm currently admitted as a BSBA LDAS student, but I'm thinking about changing to BSBA CIS since they rejected my proposals.
Graduate of Not VUL or ENEB
MS, MSS and Graduate Cert
AAS, AS, BA, and BS
CLEP
Intro Psych 70, US His I 64, Intro Soc 63, Intro Edu Psych 70, A&I Lit 64, Bio 68, Prin Man 69, Prin Mar 68
DSST
Life Dev Psych 62, Fund Coun 68, Intro Comp 469, Intro Astr 56, Env & Hum 70, HTYH 456, MIS 451, Prin Sup 453, HRM 62, Bus Eth 458
ALEKS
Int Alg, Coll Alg
TEEX
4 credits
TECEP
Fed Inc Tax, Sci of Nutr, Micro, Strat Man, Med Term, Pub Relations
CSU
Sys Analysis & Design, Programming, Cyber
SL
Intro to Comm, Microbio, Acc I
Uexcel
A&P
Davar
Macro, Intro to Fin, Man Acc
Reply


Possibly Related Threads...
Thread Author Replies Views Last Post
  Free Course Jacksonville State University a_dblu 62 14,119 01-03-2025, 04:45 PM
Last Post: Znow
Lightbulb ASU to Launch a Free Global Initiative and enroll 100 million students MNomadic 217 44,103 12-28-2024, 02:39 PM
Last Post: 3ichael7ambert
  How to get into an internship if you don’t need school credit? Dori001 12 583 12-27-2024, 11:24 PM
Last Post: Dori001
  Christmas Courses (Free) MichaelGates 2 598 12-25-2024, 06:21 PM
Last Post: MichaelGates
  College Level Medical Courses defscarlett 10 580 12-17-2024, 02:56 PM
Last Post: bjcheung77
  JWU Launches First-in-the-Nation Three-Year (90 credit) In-Person Bachelor’s Degree portals 14 1,307 11-23-2024, 11:10 AM
Last Post: NotJoeBiden
  Piedmont Community College offering Taylor Swift course in 2024 LevelUP 11 2,189 11-12-2024, 03:58 PM
Last Post: Jonathan Whatley
  Has anyone done PLAR credit? ArshveerCheema 6 559 10-10-2024, 04:56 PM
Last Post: ArshveerCheema
  free certificates in China lilyuzimu 5 875 10-01-2024, 11:48 AM
Last Post: durain
  ACCUMULATING ACCOUNTING CREDITS for CPA - WHAT COLLEGE TO USE AND FROM WHOM? germ 9 3,351 09-27-2024, 06:03 PM
Last Post: turbotortuga

Forum Jump:


Users browsing this thread: 2 Guest(s)