Apr 25, 2024  
2019-2020 Course Catalog 
    
2019-2020 Course Catalog [ARCHIVED CATALOG]

Course Descriptions and Outlines


  

  

MnTC Course List  

 

Cosmetology

  
  • COS 1082 - Salon Operations II

    Credits: 2
    Hours/Week: Lecture None Lab 4
    Course Description: This course gives students additional clinical experience to complete the required services and/or hours for licensure, including students desiring Wisconsin licensure. Emphasis will be placed on speed, accuracy, and proper selection of chemicals and services to prepare students for the salon. Students must be able to perform physical tasks to complete course requirements. This course requires a minimum of 1350 hours in Cosmetology or 250 hours in Nail technology.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Chemical relax.
    2. Hair color.
    3. Hair cutting.
    4. Hazardous waste.
    5. Minnesota or Wisconsin laws and rules.
    6. Nail care services.
    7. Permanent wave.
    8. Safety and sanitation.
    9. Skin care services.

    Learning Outcomes
    At the end of this course students will be able to:

    1. complete hours or services needed for licensure.
    2. demonstrate an increase in speed and accuracy of skills for the job market.
    3. demonstrate professionalism in client relationships and performance on the job.
    4. demonstrate decision making skills regarding selection and application of product for clients.
    5. demonstrate safe handling, storage, and disposal of hazardous waste.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • COS 1083 - Salon Operations III

    Credits: 3
    Hours/Week: Lecture None Lab 6
    Course Description: This course gives students additional clinical experience to complete the required services and/or hours for licensure, including students desiring Wisconsin licensure. Emphasis will be placed on speed, accuracy, and proper selection of chemicals and services to prepare students for the salon. Students must be able to perform physical tasks to complete course requirements. This course requires a minimum of 1350 hours in Cosmetology or 250 hours in Nail technology.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Chemical relax.
    2. Hair color.
    3. Hair cutting.
    4. Hazardous waste.
    5. Minnesota or Wisconsin laws and rules.
    6. Nail care services.
    7. Permanent wave.
    8. Safety and sanitation.
    9. Skin care services.

    Learning Outcomes
    At the end of this course students will be able to:

    1. complete hours or services needed for licensure.
    2. demonstrate an increase in speed and accuracy of skills for the job market.
    3. demonstrate professionalism in client relationships and performance on the job.
    4. demonstrate decision making skills regarding selection and application of product for clients.
    5. demonstrate safe handling, storage, and disposal of hazardous waste.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • COS 1084 - Salon Operations IV

    Credits: 4
    Hours/Week: Lecture None Lab 8
    Course Description: This course gives students additional clinical experience to complete the required services and/or hours for licensure, including students desiring Wisconsin licensure. Emphasis will be placed on speed, accuracy, and proper selection of chemicals and services to prepare students for the salon. Students must be able to perform physical tasks to complete course requirements. This course requires a minimum of 1350 hours in Cosmetology or 250 hours in Nail technology.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Chemical relax.
    2. Hair color.
    3. Hair cutting.
    4. Hazardous waste.
    5. Minnesota or Wisconsin laws and rules.
    6. Nail care services.
    7. Permanent wave.
    8. Safety and sanitation.
    9. Skin care services.

    Learning Outcomes
    At the end of this course students will be able to:

    1. complete hours or services needed for licensure.
    2. demonstrate an increase in speed and accuracy of skills for the job market.
    3. demonstrate professionalism in client relationships and performance on the job.
    4. demonstrate decision making skills regarding selection and application of product for clients.
    5. demonstrate safe handling, storage, and disposal of hazardous waste.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • COS 1085 - Salon Operations V

    Credits: 5
    Hours/Week: Lecture None Lab 10
    Course Description: This course gives students additional clinical experience to complete the required services and/or hours for licensure, including students desiring Wisconsin licensure. Emphasis will be placed on speed, accuracy, and proper selection of chemicals and services to prepare students for the salon. Students must be able to perform physical tasks to complete course requirements. This course requires a minimum of 1350 hours in Cosmetology or 250 hours in Nail Technology.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Chemical relax
    2. Hair color
    3. Hair cutting
    4. Hazardous waste
    5. Minnesota or Wisconsin laws and rules
    6. Nail care services
    7. Permanent wave
    8. Safety and sanitation
    9. Skin care services

    Learning Outcomes
    At the end of this course students will be able to:

    1. complete hours or services needed for licensure.
    2. demonstrate an increase in speed and accuracy of skills for the job market.
    3. demonstrate professionalism in client relationships and performance on the job.
    4. demonstrate decision making skills regarding selection and application of product for clients.
    5. demonstrate safe handling, storage, and disposal of hazardous waste.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • COS 1086 - Salon Operations VI

    Credits: 6
    Hours/Week: Lecture None Lab 12
    Course Description: This course gives students additional clinical experience to complete the required services and/or hours for licensure, including students desiring Wisconsin licensure. Emphasis will be placed on speed, accuracy, and proper selection of chemicals and services to prepare students for the salon. Students must be able to perform physical tasks to complete course requirements. This course requires a  minimum of 1350 hours in Cosmetology or 250 hours in Nail Technology.
     
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Chemical relax
    2. Hair color
    3. Hair cutting
    4. Hazardous waste
    5. Minnesota or Wisconsin laws and rules
    6. Nail care services
    7. Permanent wave
    8. Safety and sanitation
    9. Skin care services

    Learning Outcomes
    At the end of this course students will be able to:

    1. complete hours or services needed for licensure.
    2. demonstrate an increase in speed and accuracy of skills for the job market.
    3. demonstrate professionalism in client relationships and performance on the job.
    4. demonstrate decision making skills regarding selection and application of product for clients.
    5. demonstrate safe handling, storage, and disposal of hazardous waste.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration


Criminal Justice Science

  
  • CJS 1020 - Careers in Criminal Justice

    Credits: 2
    Hours/Week: Lecture 2 Lab None
    Course Description: This course, recommended as the first course for students interested in the criminal justice field, provides an overview of the varied professional roles available within the criminal justice system. Topics include traditional careers in law enforcement, courts, and corrections,, as well as unfamiliar roles. Students explore their own professional goals, skills, and desires, using course content to develop appropriate career strategies, resumes, and professional social media profiles that they can use with transfer institutions or potential employers.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Criminal justice education pathways
    2. Exploration of criminal justice careers
    3. Components of the criminal justice majors
    4. Resume, cover letter, professional social media profile creation
    5. Current research and literature related to criminal justice

    Learning Outcomes
    At the end of this course students will be able to:

    1. identify career options in the field of criminal justice.
    2. identify the roles and responsibilities of a professional in the criminal justice field, including ethics and code of conduct.
    3. demonstrate the ability to search and evaluate different occupations in the criminal justice field.
    4. describe trends in criminal justice, including the areas of technology and accreditation, to assist in identifying future challenges within the field.
    5. develop career pathway (minimum 3-year)
    6. develop a professional resume and cover letter.
    7. develop a professional social media profile/account.
    8. prepare effective responses to interview questions.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 1024 - Introduction to Law Enforcement Principles

    Credits: 2
    Hours/Week: Lecture 2 Lab None
    Course Description: This course introduces students to basic principles and practices of law enforcement.  In the first third of the course, students are introduced to principles and hypothetical situations. In the second third, students move to ENGL 1024  to gain appropriate writing skills. In the final third, students demonstrate proficiency by applying, especially in writing, the principles in simulated law enforcement situations.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): ENGL 1024  
    Recommendation: None

    Major Content
    1. Key terms, concepts, and content of police reports
    2. Elements of the crime: definition and application
    3. Role of documentation in law enforcement functions
    4. Application of definitions and concepts through documentation of law enforcement situations
    5. Interview techniques
    6. Proper courtroom attire, procedure, and preparation

    Learning Outcomes
    At the end of this course, students will be able to:

    1. describe how perception, sympathy, empathy, compassion and respect affect peace officer communication. (1.1.1)
    2. discuss barriers to clear communication, e.g. language, stress, bias, lack of common cultural understanding. (1.1.2)
    3. use and interpret verbal and non-verbal cues to enhance interpersonal communications. (1.1.3)
    4. describe and demonstrate active listening skills including paraphrasing, reflecting meaning, and summarizing understanding to obtain and clarify information. (1.1.4)
    5. demonstrate reading comprehension skills necessary in law enforcement including: the ability to differentiate between facts, opinions and propaganda, understanding sequencing of events, and recognizing cause and effect. (1.1.5)
    6. compose documents that demonstrate competent writing skills, including:
      1. -writing from the first person viewpoint
      2. -differentiating between facts, inferences and opinions,
      3. -correctly structuring sentences and paragraphs, and
      4. -using correct grammar, spelling, punctuation and capitalization. (1.1.6)
    7. discuss discretion and how it differs from selective enforcement. (1.2.5)
    8. applying reason and evidence to formulate logical inferences and draw logical conclusions. (1.3.3)
    9. use critical thinking, logical reasoning and problem-solving strategies to formulate ideas, make proposals, and suggest solutions to a variety of law enforcement related problems or concerns (Minn.Stat. 626.8455) (1.3.5)
    10. apply critical thinking strategies during team discussions. (1.3.6)
    11. based on written scenarios involving law enforcement:
      1. -describe decisions officers must make,
      2. -suggest appropriate actions, and
      3. -defend those decisions and actions (1.4.4)
    12. discuss how recognizing and valuing diversity, cultural differences and varied perspectives, promotes community unity, facilitates information gathering, and contributes to officer safety. (1.6.3)
    13. describe characteristic of professional behavior and the Minnesota Standards of Conduct for licensing Minnesota peace officers. (1.7.1)
    14. describe the repercussions for a finding of a violation of the State’s peace officers’ standards of conduct. (1.7.2)
    15. identify the value of cooperation and collaboration in problem-solving. (1.7.3)
    16. demonstrate effective and legible field-note taking including collecting crime scene intelligence from witnesses, victims, and suspects. (3.1.1)
    17. solicit information and gather and organize facts needed for a police report. (3.1.2)
    18. given a variety of law enforcement scenarios prepare reports that:
      1. -are written from the first person viewpoint,
      2. -differentiate between facts, inferences and opinions,
      3. -demonstrate correct use of grammar, spelling, punctuation, capitalization, sentence and paragraph structure
      4. -are clear, complete, concise and accurate, and
      5. -include all relevant details (3.1.3)
    19. discuss interview techniques used to:
      1. -build rapport,
      2. -encourage full meaningful answers and discourage suggestability,
      3. -clarify and corroborate statements,
      4. -enhance memory,
      5. -detect deception, and
      6. -obtain information from reluctant witness (3.2.1)
    20. conduct interviews using procedures that:
      1. -are appropriate to the situation,
      2. -ensure the protection of individual rights,
      3. -effectively gather information,
      4. -encourage cooperation, and
      5. -enhance memory
    21. describe the relationship between good report writing and testimony. (3.3.1)
    22. demonstrate proper courtroom dress and decorum. (3.3.2)
    23. practice preparing for and presenting true and factual testimony in legal proceedings in accordance with courtroom procedure. (3.3.3)

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 1790 - Criminal Justice Independent Study

    Credits: 1-5
    Hours/Week: Lecture 1-5 Lab None
    Course Description: This course provides the opportunity for students to enhance their learning experiences beyond the scope of the Professional Peace Officer Objectives (PPOE) through an independent study project.  Project work plans will be developed cooperatively between the students and the instructor in order to help the student pursue specific areas of interest and/or specific areas needing to be addressed within the required PPOE learning objectives.
    MnTC Goals
    None

    Prerequisite(s): Instructor and dean consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. To be determined by the student and instructor on an individual basis

    Learning Outcomes
    At the end of this course, students will be able to:

    1. demonstrate advanced knowledge of the subject area identified in the independent learning plan.
    2. explain results of the independent study in a formal presentation or report to the instructor and/or stakeholders.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2010 - Foundations of Intelligence & Crime Analysis

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: Students in law enforcement, criminal justice, and other public safety areas will study the history of the intelligence cycle and the processes and functions of an analysis unit. Students will study implementation of the intelligence cycle within an agency and community in order to develop information to support stakeholders and decision-makers. Students will study core analytical and statistical skills using data sources commonly found in public government.
    MnTC Goals
    None

    Prerequisite(s): Course placement into college-level English and Reading OR completion of ENGL 0950  with a grade of C or higher OR completion of RDNG 0940  with a grade of C or higher and qualifying English Placement Exam OR completion of RDNG 0950  with a grade of C or higher and ENGL 0090  with a grade of C or higher OR completion of ESOL 0051  with a grade of C or higher and ESOL 0052  with a grade of C or higher and placement into MATH 0070  or above or completion of MATH 0030  or MATH 0060  with a grade of C or higher.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Intelligence Cycle Historical perspective How to determine who is doing what – uses of analysis How to develop a program/unit – roles and functions How to collect data How to collate data How to analyze data How to disseminate data
    2. Calculator use and functions
    3. How to develop processes and products to support an agency
    4. How to organize and present data
    5. Relationships among local, state and federal agencies
    6. Use of statistics within the analysis process

    Learning Outcomes
    At the end of this course students will be able to:

    1. explain the intelligence cycle as it relates to the role of an analyst in the criminal justice and public safety fields.
    2. describe the role and function of an analyst in the criminal justice and public safety fields.
    3. define types, functions, and processes of analysis.
    4. determine the validity, reliability, and credibility of verbal, written, numeric and graphic information encountered during the analysis process.
    5. identify the difference between tactical, strategic, and administrative analysis.
    6. describe the relationship between criminal justice and public safety systems at a local, state and federal level.
    7. organize and present data effectively.
    8. perform web-based and database searches common to industry.
    9. use types of statistics such as mean, mode, median, standard deviation, etc.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2011 - Intelligence and Crime Analysis Methods I

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: Students in law enforcement, criminal justice and other public safety areas will study critical thinking methodologies and how to apply them to case studies. Topics include how to conduct basic and advanced research through open sources while discussing the use of closed sources of information. Students will be asked to demonstrate effective oral and written communication based on the methodologies and research techniques learned during the course.
    MnTC Goals
    None

    Prerequisite(s): CJS 2010  or instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Critical Thinking Methodologies Brainstorming Key Assumption Check Red Cell Analysis Outside-In Analysis Devil’s Advocate Analysis
    2. Basic and advance open source internet and database searches Credibility Validity
    3. Closed source access Clearance levels Access Options
    4. Closed sources of information Federal agency databases Commercial databases
    5. How to develop effective oral and written communication in an analysis context

    Learning Outcomes
    At the end of this course students will be able to:

    1. identify practical critical thinking methodologies
    2. apply appropriate critical thinking methodology to case studies
    3. demonstrate effective written and oral communication.
    4. conduct basic open source internet research.
    5. identify other sources of information and who has access to them.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2012 - Intelligence and Crime Analysis Methods II

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: Students in law enforcement, criminal justice, and other public safety areas will study how to apply critical thinking and analytical skills to case studies to conduct a critical review of real events. Topics will include the processes and structures of an organization and/or investigation to address deficiencies or gaps and how to address the deficiencies or gaps. The student will present a written and oral brief that demonstrates the mastery of the critical thinking and analytical skills.
    MnTC Goals
    None

    Prerequisite(s): CJS 2011  or instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Critical analysis of 9/11 Commission Report
    2. Critical review process Trend identification Link analysis Research/develop prevention strategies Actionable information Stakeholder identification

    Learning Outcomes
    At the end of this course students will be able to:

    1. demonstrate the ability to conduct effective data mining.
    2. apply critical thinking and analytical skills to case studies.
    3. identify gaps that exist within the process and/or structure.
    4. identify processes and structures of an organization and/or investigation to address deficiencies.
    5. perform critical reviews of real events.
    6. present a written and oral brief that demonstrates mastery of critical thinking skills.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2013 - Portfolio of Intelligence and Crime Analysis

    Credits: 1
    Hours/Week: Lecture 1 Lab None
    Course Description: This course will give students an opportunity to review analysis courses successfully completed in the certificate program. Students will reflect on how these courses have enhanced their current level of knowledge and skills. In addition, students will work with the course instructor to explore future career and academic goals as related to intelligence and crime analysis.
    MnTC Goals
    None

    Prerequisite(s): CJS 2012  or instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Overview of eFolio requirements
    2. Common degree options for further Criminal Justice careers
    3. Review code of ethics common to discipline and profession
    4. Review employment resources
    5. Synthesis and reflection of intelligence and crime analysis courses
    6. eFolio Development Design elements Content components Effective use

    Learning Outcomes
    At the end of this course students will be able to:

    1. demonstrate ability to work independently.
    2. evaluate their development in the field of intelligence and crime analysis.
    3. synthesize information from their intelligence and crime analysis courses for personal, professional, or academic purposes.
    4. evaluate available employment and degree opportunities.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2014 - Intelligence and Crime Analysis Internship

    Credits: 1-6
    Hours/Week: Lecture None Lab None
    Course Description: The internship experience provides an opportunity for students to work with intelligence and crime analyst professionals in the field and apply what they learned throughout the certificate program to the real world. Students may intern with their current employer if course objectives are met. Students may also work as interns or volunteers for organizations they wish to explore.
    MnTC Goals
    None

    Prerequisite(s): CJS 2012  and instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    With initial input from the instructor, the student will:

    1. obtain a position relevant to job skills and instructional program.
    2. negotiate and document a program-related work agreement with the worksite supervisor
    3. write an accurate job description to outline the terms of the work to be performed under the internship agreement
    4. perform assigned tasks to company standards (outlined during intern’s orientation)
    5. identify an employer’s corporate vision, mission, goals, and business strategies
    6. describe his or her contributions to achieving them (in writing prior to the summative interview).
    7. analyze an employer’s ongoing intelligence and crime analysis activities
    8. compare or contrast the organization’s analytical activities to his or her college coursework
    9. verify hours worked (50 hours/credit)
    10. submit required performance evaluation documents signed by the worksite supervisor
    11. submit a written journal of work experiences
    12. submit assigned topical research and/or reaction papers
    13. deliver a PowerPoint presentation to instructor and/or class
    14. participate in a summative interview with Criminal Justice instructor

    Learning Outcomes
    At the end of this course students will be able to:

    1. describe the scope of their internship positions, assigned tasks, and responsibilities.
    2. perform tasks/work to employer-defined standards.
    3. describe the employing organization’s vision, mission, and goal statements.
    4. explain how vision, mission, and goals are reflected in the organization’s strategies.
    5. describe the employing organization’s culture and working climate
    6. reflect on their own personal contributions to the internship organization’s strategic activities.
    7. compare or contrast the organization’s actual analytical activities to classroom theory.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2070 - Private Sector Security and Investigations

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This course covers the historical development of private sector security and investigations in American society. It considers the legal ramifications of privatization and its growing presence in the area of social control and emerging technologies. Topics include the role of private security in the private industry, retail, the judicial system, homeland security, and public safety.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: 15 college credits with a grade of C or higher in each course prior to taking this course. Course placement into college-level English and Reading OR completion of ENGL 0950  with a grade of C or higher OR completion of RDNG 0940  with a grade of C or higher and qualifying English Placement Exam OR completion of RDNG 0950  with a grade of C or higher and ENGL 0090  with a grade of C or higher OR completion of ESOL 0051  with a grade of C or higher and ESOL 0052  with a grade of C or higher.

    Major Content
    1. Evolution of private sector security
    2. Changing role of technology in private sector security
    3. Commercial and institutional security
    4. Enhancing security through physical and procedural controls
    5. Ethical conduct
    6. Future of private sector security in homeland security
    7. Industrial and retail security
    8. Legal liability for private sector security and investigations
    9. Loss prevention through risk management
    10. Obtaining information and evidence related to legal liability
    11. Preventing and dealing with violence in the workplace
    12. Preventing losses from accidents, emergencies and criminal actions
    13. Private sector security as a profession
    14. Public/private sector security interface and legal authority
    15. Testifying in court
    16. The investigative function in arson, accidents, sexual harassment
    17. The role of security personnel in public relations

    Learning Outcomes
    At the end of this course students will be able to:

    1. Discuss the difference between private sector security and public security
    2. Demonstrate an understanding of the importance of private sector security functions to Homeland Security.
    3. Explain the underlying principles of risk assessment and risk management.
    4. Apply knowledge of private investigative functions relative to legal liability.
    5. Analyze the needs for different types of security.
    6. Explore the various aspects of court testimony.
    7. Analyze ethical issues in private sector security using various case problem scenarios.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2081 - Police and the Community

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This course provides a practical overview of key issues, questions, and concepts related to police interaction with communities. Topic areas include ethics, leadership, diversity, problem-solving, and communication.  There is a 40-hour each service learning requirement in both CJS 2081 and CJS 2085  for a total of 80 hours. Students are advised not to enroll in both courses during the same semester.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: Course placement into college-level English and Reading OR completion of ENGL 0950  with a grade of C or higher OR completion of RDNG 0940  with a grade of C or higher and qualifying English Placement Exam OR completion of RDNG 0950  with a grade of C or higher and ENGL 0090  with a grade of C or higher OR completion of ESOL 0051  with a grade of C or higher and ESOL 0052  with a grade of C or higher.

     

    Major Content

    1. Introduction to the historical development of policing in society
    2. Development of American police in relation to local and national security
    3. Professional reports  and influence of police research
    4. Role of psychological and job testing
    5. Knowledge of field training officer (FTO)  training aspects
    6. Police discretionary behavior
    7. Police hierarchy and career development
    8. Corruption and abuse of power
    9. Fostering integrity in American policing
    10. Civic and ethical responsibility and evaluation citizens’ complaints
    11. Ethnic, racial, and female presence on the force
    12. Community policing and crime prevention
    13. Deadly force and hot pursuit driving, legal standards of liability
    14. Coping with occupational stress and agendas for change in American policing
    15. Police role in court and correctional process 
    16. Diversity and respect in community collaboration and problem-solving
    17. Application of Constitutional amendments and State statutes

    Learning Outcomes
    At the end of this course students will be able to:

    1. describe how perception, sympathy, empathy, compassion and respect affect peace officer communication.(1.1.1.)
    2. discuss barriers to clear communication, e.g. language, stress, bias, lack of common cultural understanding. (1.1.2.)
    3. use and interpret verbal and non-verbal cues to enhance interpersonal communications. (1.1.3.)
    4. describe and demonstrate active listening skills including paraphrasing, reflecting meaning, and summarizing understanding to obtain and clarify information.(1.1.4.)
    5. demonstrate reading comprehension skills necessary in law enforcement including: the ability to differentiate between facts, opinions and propaganda, understanding sequencing of events, and recognizing cause and effect.(1.1.5.)
    6. discuss the inter-relationship between core beliefs, integrity and ethical reasoning.(1.2.1.)
    7. identify ethical issues in a variety of law enforcement related situations and apply ethical reasoning to decision making processes.(1.2.2.)
    8. evaluate and apply strategies for responding to unethical or illegal actions that may arise within law enforcement and public safety. (1.2.3.)
    9. model behaviors that demonstrate commitment to ethical and professional behavior.(1.2.4.)
    10. discuss discretion and how it differs from selective enforcement.(1.2.5.)
    11. identify some of the causes and ramifications of public distrust of law enforcement and strategies to enhance the public trust.(1.2.6.)
    12. discuss ethical and responsible use of computers and databases by law enforcement.(1.2.7.)
    13. define and describe models of the conscious processes of critical thinking, logical reasoning and problem solving.(1.3.1.)
    14. use structured problem-solving methods to develop creative and innovative solutions to a variety of problems.(1.3.2.)
    15. applying reason and evidence to formulate logical inferences and draw logical conclusions.(1.3.3.)
    16. analyze and evaluate ideas, proposals, and solutions to problems using basic forms of logic and techniques designed to encourage sound reasoning.(1.3.4.)
    17. use critical thinking, logical reasoning and problem solving strategies to formulate ideas, make proposals and suggest solutions a variety of law enforcement related problems or concerns (Minn. Stat. 626.8455).(1.3.5.)
    18. apply critical thinking strategies during team discussions.(1.3.6.)
    19. describe decision-making processes and models. (1.4.1.)
    20. define the term discretion and discuss when and why peace officers use their best judgment in the administration of justice and when discretion is not allowed.(1.4.2.)
    21. discuss factors that influence police officer use of discretion.(1.4.3.)
    22. based on written scenarios involving law enforcement:
      1. describe decisions officers must make,
      2. suggest appropriate actions, and
      3. defend those decisions and actions.(1.4.4.)
    23. practice making decisions in real time based on scenarios of peace officers situations.(1.4.5.)
    24. discuss how and why the police function is much broader than law enforcement and why reliance on criminal law enforcement to solve problems is not always the best course of action.(1.5.1)
    25. explain philosophies and concepts of community policing.(1.5.2.)
    26. discuss how community partnerships with law enforcement foster unity and cooperation and how community alienation may lead to higher risk to officers.(1.5.3.)
    27. identify community policing strategies that build rapport, reduce fear and foster community trust in law enforcement.(1.5.3.)
    28. identify techniques for organizing community members so that they are involved and trained in community policing activities, relating to diverse communities, and relating to individuals with physical or mental limitations (Minn. Stat. 626.8455, Subd. 1, 2-4).(1.5.4.)
    29. identify methods and strategies used by law enforcement to promote crime reduction and loss prevention in a community.(1.5.5.)
    30. explain how collaboration with each of the following groups may reduce crime:  local citizens, community businesses, and service agencies, i.e. crisis intervention teams, social services, school personnel, and community youth groups.(1.5.6.)
    31. explain how law enforcement management of status offenses and local ordinance violations can positively impact a community.(1.5.7.)
    32. describe and give examples of proactive policing versus responsive policing.(1.5.8.)
    33. describe problem oriented or problem targeting policing strategies.(1.5.10.)
    34. explain how various patrol strategies impact crime, community security and community perceptions of law enforcement.(1.5.11.)
    35. explain how intolerance, prejudice, and stereotyping impact human behavior.(1.6.1.)
    36. discuss the risks and problems associated with intolerance, insensitivity, partiality, marginalizing and unjust application of the law for both law enforcement and community members.(1.6.2.)
    37. discuss how recognizing and valuing diversity, cultural differences and varied perspectives, promotes community unity, facilitates information gathering, and contributes to officer safety.(1.6.3.)
    38. discuss ways officers can promote positive relationships with community members of varying races, ethnicities, national origins, immigration statuses, genders, ages, economic classes, disabilities and/or sexual orientations. (Minn. Stat. 626.8455)(1.6.4.)
    39. discuss how family dynamics and communication methods, both verbal and non-verbal, vary between cultures and how recognition of these variances can benefit officers and communities.(1.6.5.)
    40. discuss how impartiality and social cooperation affect community perception of law enforcement.(1.6.6.)
    41. discuss culturally responsive approaches to dealing with victims and perpetrators of violence. (Minn. Stat. 626.8451., Subp. 1.a. (4))(1.6.7.)
    42. research and discuss the relationship between crime and being underprivileged.(1.6.8.)
    43. discuss the diverse groups that make-up Minnesota’s communities and some of the traits unique to communities that could impact law enforcement response.(1.6.9.)
    44. describe characteristics of professional behavior and the Minnesota Standards of Conduct for licensing Minnesota peace officers.(1.7.1.)
    45. describe the repercussions for a finding of a violation of the State’s peace officer standards of conduct.(1.7.2.)
    46. identify the value of cooperation and collaboration in solving problems.(1.7.3.)
    47. demonstrate skills which promote consensus building, show respect for the opinion of others, and encourage cooperation, adaptability, and conflict resolution. (1.7.6.)
    48. describe traits of and skills for effective leadership including compassion, courage, service, listening, coaching, mission focus, and team development.(1.7.7.)
    49. demonstrate ethical leadership in the accomplishment of goals and objectives. (1.7.8.)
    50. identify the physiological, psychological and emotional effects of stress.(1.8.2.)
    51. explain the importance of balancing peace officer roles and responsibilities and other life roles, interests and responsibilities.(1.8.8.)
    52. explain why physical fitness attributes including cardiovascular fitness, flexibility, agility, strength, speed, and endurance are important to peace officer health, well-being and competence.(1.8.9.)
    53. explain the importance of and strategies for physical conditioning, good nutrition and healthy eating habits for peace officers.(1.8.10.)
    54. explain what constitutes an arrest and the differences between a contact, a detention and an arrest.(2.4.1.)
    55. state the requirements of the Fourth Amendment on the law of arrest.(2.4.2.)
    56. discuss protocols and terms associated with arrest including “reasonable suspicion” and “probable cause”.(2.4.3.)
    57. describe the stop and frisk standard as found in “Terry vs. Ohio” and subsequent cases.(2.4.4.)
    58. explain the legal requirements of, the exceptions to, and the need for an arrest warrant and how one is obtained.(2.4.5.)
    59. describe when and how a citizen can make an arrest.(2.4.6.)
    60. explain the Supreme Court decision Miranda vs. Arizona and the four components of the Miranda warning.(2.4.7.)
    61. explain the difference between custodial and noncustodial interview or interrogation.(2.6.4.)
    62. explain Minnesota statutes and relevant case law related to the application force by peace officers.(2.8.1.)
    63. explain the following terms: objectively reasonable, totality of circumstances, situational factors, pre-assaultive indicators, and, escalation and de-escalation as related to peace officer use of force.(2.8.2.)
    64. discuss the term reasonable as it related to use of force.(2.8.3.)
    65. state how department policies regarding use of force including deadly force may and may not vary. (2.8.4.)
    66. given scenarios, recognize when force is or is not authorized and give and defend reasonable choices for the application of various types of force depending on the circumstances of the scenario. (2.8.5.)
    67. give Supreme Court case examples authorizing the use of deadly force.(2.8.6.)
    68. analyze a variety of situations where force may or may not be authorized and demonstrate an understanding of the concept of reasonable use of force.(2.8.7.)
    69. explain the Minnesota Statute that requires officers be trained in the use of those weapons and equipment the officer is issued or authorized to carry (Minn. Stat. 626.8452).(2.8.8.)
    70. explain when force may be used to make an arrest.(2.8.9.)
    71. discuss liabilities associated with the application of force by peace officers.(2.8.10.)
    72. discuss peace officer rights, obligations and liabilities under state and federal law including requirements placed on law enforcement agencies to defend and indemnify peace officers for good faith action in the course and scope of employment.(2.9.1.)
    73. explain the role of internal affairs.(2.9.2.)
    74. explain the concept of racially based profiling (Minn. Stat. 262.8471) and other profiling that is based on false assumptions about groups of people and discuss:
      1.  the impact of the Whren v. United States decision
      2. the importance of impartial policing,
      3. the difference between the terms pretextual stop and racial profiling and the problems associated with racial profiling by law enforcement, 
      4. how racial profiling impacts law enforcement credibility and community trust,
      5. how to handle the perception of unfair or biased treatment of members of the public by law enforcement, and
      6.  the importance of an officer’s ability to articulate valid reasons for vehicle stops.
    75. define and explain the impact of hate crimes including:
      1. the motivations behind hate crimes,
      2. the impact of hate crimes on victims and on communities,
      3. the special needs of hate crime victims, and
      4.  crime characteristics which may indicate a crime was motivated by the victim’s race, national origin, sex, age, disability, or sexual orientation (Minn. Stat. 626.8451, Subd. 1).
    76. explain special reporting requirements related to bias motivated/hate crimes as required by Minn. Stat.626.5531. (Officers must report to their agencies, agencies to the BCA.)(2.12.3.)
    77. explain the Data Practices Act as it pertains to the gathering and release of information by law enforcement.(2.22.1.)
    78. discuss balancing the public’s right to know with public safety needs and privacy issues with regard to data accessed by peace officers including:
    79. what and when information can be shared with the media or the public and by whom, and the repercussions of violating data practices.(2.22.2.)
    80. discuss the need for protection of data related to on-going investigations, crime victims, and juveniles.(2.22.3.)
    81. discuss ethical and responsible use of computers and databases by peace officers and the ramifications of misuse or unethical release of data.(2.22.4.)
    82. discuss the difference between responsive and intelligence-led policing.(2.24.1.)
    83. discuss the increase in use of intelligence, surveillance, pattern recognition and informants to combat crime.(2.24.2.)
    84. describe the steps in the intelligence cycle including planning, collection, evaluation, analysis, dissemination and feedback.(2.24.3.)
    85. discuss the importance of intelligence sharing within law enforcement for effective use in combatting crime, identifying threats and developing effective responses.(2.24.4.)
    86. explain how intelligence collection and analysis can resulting in strategic planning to reduce crime, manage traffic concerns, identify high crime areas and focus limited resources within an agency.(2.24.5.)

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2083 - Introduction to Corrections

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This course will use the criminal justice perspective to explore analysis of corrections and correctional policy within the criminal and juvenile justice system in American society. Systematic organization of punishment and incarceration will be studied according to institutional and community-based programs with regard to recurrent and chronic issues for management and officers. This course is a requirement for the criminal justice program and the investigative sciences program for criminal justice.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: Students should have completed 15 college credits prior to taking this course. Course placement into college-level English and Reading OR completion of ENGL 0950  with a grade of C or higher OR completion of RDNG 0940  with a grade of C or higher and qualifying English Placement Exam OR completion of RDNG 0950  with a grade of C or higher and ENGL 0090  with a grade of C or higher OR completion of ESOL 0051  with a grade of C or higher and ESOL 0052  with a grade of C or higher.

    Major Content
    1. The history and evolution of corrections
    2. Correctional systems/ parole and community-based
    3. Correctional systems/ privatization of jails and prisons
    4. Correctional systems/ state and federal
    5. Diversion and standard and intensive supervised probation programs
    6. Juvenile corrections
    7. Law and the legal process
    8. Rights of the sentenced offender
    9. Role of the professional - personnel
    10. Sentencing and sentencing issues
    11. The correctional client - classification typology
    12. The correctional process/ community-based
    13. The correctional process/ jails and prisons
    14. The philosophy and goals of corrections
    15. Women and corrections
    16. Future for corrections related to innovation and technology

    Learning Outcomes
    At the end of this course students will be able to:

    1. Discuss the philosophy of punishment, rehabilitation, deterrence, and restorative justice for sentencing policy related to the correctional system.
    2. Demonstrate an understanding of the different levels of security in correctional systems.
    3. Demonstrate familiarity with changing institutional and cross-cultural issues for corrections and society.
    4. Discuss correctional policies with relation to justice and order in society.
    5. Discuss the relationship between issues for corrections and families.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2084 - Community Corrections

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This course introduces alternatives to traditional incarceration for convicted criminals and people on probation and parole. Topics include the history of community corrections and alternatives available, the legal framework for community corrections, the growth potential of the field, and the role of the corrections professional. This course applies to students interested in the criminal justice, law enforcement, human services, emergency medical services (EMS), and public safety fields.
    MnTC Goals
    None

    Prerequisite(s): Course placement into college-level English and Reading OR completion of ENGL 0950  with a grade of C or higher OR completion of RDNG 0940  with a grade of C or higher and qualifying English Placement Exam OR completion of RDNG 0950  with a grade of C or higher and ENGL 0090  with a grade of C or higher OR completion of ESOL 0051  with a grade of C or higher and ESOL 0052  with a grade of C or higher; CJS 2083  with a grade of C or better or instructor consent.
    Corequisite(s): None
    Recommendation: Completion of or concurrently enrolled in CJS 2095 .

    Major Content
    1. Criminal Justice System Components: Locating Probation and Parole
    2. An Overview of Community Corrections: Types, Goals, Functions and Suitability of Offenders for Community Corrections Placement.
    3. Early Release, Parole Programs, and Parole Revocation
    4. Evaluating Programs: Balancing Service Delivery and Recidivism Considerations
    5. Jails and Prisons
    6. Offender Supervision: Types of Offenders and Special Supervisory Considerations. The utilization of the latest technology, (ie: GPS) in the Supervision of High Risk offenders Juvenile Probation and Parole
    7. Parole and Parolees
    8. Probation and Parole Professionals
    9. Probation and Probationers: History, Philosophy, Goals, and Functions
    10. Probation/Parole Organization and Operations: Recruitment, Training, and Officer-Client Relations
    11. Programs for Probationers
    12. Sentencing and the Presentence Investigation Report: Background, Preparation, and Functions
    13. Theories of Offender Treatment

    Learning Outcomes
    At the end of this course students will be able to:

    1. discuss the basic concepts of community corrections.
    2. describe how to work effectively with individuals from a wide variety of criminal backgrounds.
    3. discuss how work effectively with individuals from a wide variety of cultural backgrounds.
    4. describe what stressors offenders face during the re-integrate process.
    5. describe a motivational approach to working with “institutionalized” offenders.
    6. write offender Treatment/ Program Plans and Pre-Sentence Reports.
    7. discuss substance abuse and mental health treatment programs.
    8. describe how to utilize local and county funding for substance abuse assessments and treatment.
    9. describe the “Reentry” services available to make the transition for offenders more effective.
    10. describe the traditional role of jails and prisons
    11. interpret the differences between a traditional “correctional” approach to crime and public safety and a “community corrections” approach
    12. assess effectively an offender’s suitability for placement into a community corrections based program in lieu of incarceration.
    13. discuss the legal and financial benefits to community-based corrections and treatment programming.
    14. describe the “Restorative Justice” approach as a pre-sentencing option for the Court.
    15. discuss the use of half-way houses as a Pre-Trial and Post-Sentencing option by Correctional Professionals.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2085 - Juvenile Justice and Delinquency

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This course emphasizes the origin, development, organization, functions, and jurisdiction of the Juvenile Justice System in America, with emphasis on the MN Juvenile Justice System. Topic areas include: processes and detention of juveniles; constitutional protections extended to juveniles; case disposition, juvenile statutes and court procedures relative to juvenile offenders, laws and procedures regarding child abuse, child neglect, juvenile records and juvenile court process.  There is a 40-hour each service learning requirement in both CJS 2081  and CJS 2085 for a total of 80 hours.  Students are advised not to enroll in both courses during the same semester.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: Fifteen college credits. Course placement into college-level English and Reading OR completion of ENGL 0950  with a grade of C or higher OR completion of RDNG 0940  with a grade of C or higher and qualifying English Placement Exam OR completion of RDNG 0950  with a grade of C or higher and ENGL 0090  with a grade of C or higher OR completion of ESOL 0051  with a grade of C or higher and ESOL 0052  with a grade of C or higher.

    Major Content
    1. The historical development of delinquency and the juvenile justice system
    2. Juvenile crime: measurement and analysis
    3. Theoretical explanations for juvenile offending
    4. Female delinquency
    5. Schools, school crimes and student rights
    6. Classification of delinquency
    7. Victimization of juveniles
    8. The juvenile justice process
    9. Juveniles and the police
    10. Juvenile court structure and process: intake, diversion, and restorative justice
    11. Legal rights for juveniles: adjudication, disposition and appeal
    12. Juvenile correctional process and institutions
    13. Juvenile parole, group homes, and adoption
    14. Delinquency prevention and treatment for juveniles
    15. Juvenile punishment versus rehabilitation
    16. Child custody: parents versus the state

    Learning Outcomes
    At the end of this course students will be able to:

    1. explain how law enforcement management of status offenses and local ordinance violations can positively impact a community.(1.5.7.)
    2. explain the history of and philosophy behind an independent juvenile justice system.(2.7.1.)
    3. define status offense, give examples of status offenses that can only be committed by a juvenile and discuss the limits of peace officer authority in relationship to status offenses.(2.7.2.)
    4. explain the key elements of the juvenile justice system including:
      1. the levels of juvenile offenses,
      2. criminal conviction versus adjudicated delinquent, and adult versus juvenile offense charges,
      3. the juvenile court system and dispositions available to youthful offenders, and
      4. the impact of juvenile case law on peace officers including:  In Re Gault, In Re Winship, McKiever vs. Pennsylvania, Fare vs. Michael C., and New Jersey vs. T.L.O. (2.7.3.)
    5. discuss the law enforcement officer’s responsibility for working as a team member with juvenile protective-services professionals. (2.7.4.)
    6. identify and discuss actions that are required when processing juveniles including:
      1. when photos may be taken, when they are required and when they must be forwarded to the Minnesota Bureau of Criminal Apprehension,
      2. when juveniles can and cannot be used in a photo line-up,
      3. the services provided by the intake officer/counselor,
      4. the laws that apply to legally interviewing a juvenile,
      5. parental notification requirements,
      6. the setting and procedures for holding conferences with juveniles and their parents,
      7. the criteria needed for obtaining secure and non-secure custody orders,
      8. factors to consider when making emergency placement of children, and
      9. legal detentions of juveniles. (2.7.5.)
    7. discuss juvenile prostitution including:
      1. the cycle of recruitment, breaking in, grooming and turning out,
      2. the makeup of typical users of prostitutes,
      3. how prostitutes are marketed,
      4. resources for victims of human trafficking and barriers to getting help
      5. the consequences of juvenile prostitution and the significance of intervention on victims and society. (2.7.8.)
    8. explain the legal definitions and significant aspects of Minnesota statutes related to child and vulnerable adult assault, abuse and neglect. (2.15.1.)
    9. identify physical and behavioral indicators that aid officers in determining the likelihood of physical, psychological, emotional or sexual abuse, or neglect of a child or vulnerable adult has occurred. (2.15.2.)
    10. research the personal and situational characteristics of parents who abuse their children in order to gain insight into the individual and family dynamics that produce abusive behavior. (2.15.3.)
    11. describe community resources and supportive services for individuals and families involved in abusive situations. (2.15.4.)
    12. define the term in loco parentis and describe the role of a guardian ad litem. (2.15.5.)
    13. explain child development issues that may enable officers to respond appropriately to perceived child protection situations (Minn. Stat. 626.8455) and discuss law enforcement related scenarios where officers need to consider the psychological development of children on scene. (2.15.6.)
    14. explain officer reporting requirements relative to incidents of maltreatment neglect, or physical or sexual abuse of minors and vulnerable adults and prenatal exposure to controlled substances (Minn. Stat. 626.556, Subd. 3. and Minn. Stat. 626.557). (2.15.7.)
    15. describe who is mandated to report suspected child and vulnerable adult abuse and the ramifications of not reporting. (2.15.8.)
    16. discuss resources law enforcement may partner with to assess and investigate incidents of maltreatment or to provide services to child or vulnerable adult victims. (2.15.9.)
    17. compare and contrast familial, acquaintance and stranger types of child abductions. (2.15.10.)
    18. explain the term “Drug Endangered Children”, the immediate and future risks related to children living in drug related environments and the impact (2.15.11.)
    19. discuss the need for protection of data related to on-going investigations, crime victims, and juveniles. (2.22.3.)
    20. discuss the appeal of gang membership, how gangs recruit members, and prevention and intervention methods. (2.26.2.)
    21. discuss interview considerations and techniques for interviewing children, vulnerable adults and traumatized victims. (3.2.2.)
    22. discuss how and why interviewing techniques must vary depending on the interviewee and the circumstances, i.e., when interviewing children, traumatized victims. (3.2.3.)
    23. identify mandatory reporters of suspected abuse and discuss where to report, what must be reported, the confidentiality of reports, and the legal ramifications for not reporting. (3.14.5.)
    24. discuss the collaborative child abuse team approach in investigating child abuse. (3.14.6.)
    25. discuss special interview consideration when dealing with children including the terms suggestibility and child centered interviewing. (3.14.7.)
    26. explain child welfare holds that allow officers to remove children from at-risk situations. (3.14.8.)
    27. explain or demonstrate law enforcement procedures for responding to situations and crime scenes involving juveniles as victims and/or offenders including:
      1. enforcing status offense laws,
      2. apply laws applicable to interviewing a juvenile,
      3.  explaining the 72 hour hold rule governing shelter placements, the 36 hour hold rule governing detention hold, parent or guardian notification requirements regarding placements and detentions, and custody and liability issues,
      4. applying appropriate data practices rules governing incidents involving juveniles including who may request and receive juvenile data, and
      5. explaining to whom a juvenile may be released (3.14.48.)
    28. describe the role the Minnesota Bureau of Criminal Apprehension plays as a resource in missing person investigations, missing and endangered children and child abductions. (3.14.51.)
    29. describe important information to gather relative to a report of a missing child or an endangered person. (3.14.52.)
    30. describe data systems and resources available to Minnesota law enforcement in the investigation of missing children and endangered persons. (3.14.53.)

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2089 - Criminal Law

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This course offers students a foundation in the interpretation of criminal law. Examples of criminal cases will be used to illustrate and analyze the essence and interpretation of criminal law. Sociological theory and methods will be used to study the substantive nature and historical development of criminal law and its role in shaping society.
    MnTC Goals
    None

    Prerequisite(s): Course placement into college-level English and Reading OR completion of ENGL 0950  with a grade of C or higher OR completion of RDNG 0940  with a grade of C or higher and qualifying English Placement Exam OR completion of RDNG 0950  with a grade of C or higher and ENGL 0090  with a grade of C or higher OR completion of ESOL 0051  with a grade of C or higher and ESOL 0052  with a grade of C or higher.
    Corequisite(s): None
    Recommendation: Fifteen college credits prior to enrollment in this course. Any course in Criminal Justice Sciences should be among these credits.

    Major Content
    1. Substantive criminal law Issues and their procedural context
    2. Crimes against property
    3. Crimes against the habitation
    4. Defenses of self and related matters
    5. Defenses relating to capacity
    6. General principles of criminal liability: mens rea, the state of mind
    7. General principles of criminal liability: causation
    8. General principles of criminal liability: complicity
    9. General principles of criminal liability: introduction
    10. General principles of criminal liability: the requirement of action
    11. Homicide: grading the criminal causation of death
    12. Mistakes and defenses in general
    13. Other crimes against the person
    14. Other defenses
    15. Rape and related sex offenses
    16. The inchoate crimes, crimes against public order and morals

    Learning Outcomes
    At the end of this course students will be able to:

    1. Describe the general principle of criminal liability
    2. Demonstrate an understanding of the nature of criminal laws
    3. Apply criminal laws using case analysis
    4. Interpret the difference between individual rights and public order with relation to the procedural criminal law and the challenges that emerge from these differences to achieve justice
    5. Discuss legal issues

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2093 - Terrorist and Extremist Groups

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This course examines the social trend of terrorism. Social theory and methods within the criminal justice perspective are used to analyze group dynamics and social interaction. Group leadership, social influence, social networks, group cohesion, development, group performance, and motivation of terrorism will be studied. Groups that will be considered in course material will include extremist groups prone to violence, terrorism, and anti-government sentiment.
    MnTC Goals
    None

    Prerequisite(s): Fifteen college credits and course placement into college-level English and Reading OR completion of ENGL 0950  with a grade of C or higher OR completion of RDNG 0940  with a grade of C or higher and qualifying English Placement Exam OR completion of RDNG 0950  with a grade of C or higher and ENGL 0090  with a grade of C or higher OR completion of ESOL 0051  with a grade of C or higher and ESOL 0052  with a grade of C or higher.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Introduction of small group methods and theory
    2. Identity as an individual and group member
    3. Discussion of groups that have participated in terrorism, i.e. ELF, KKK. Aryan Nation, Al-Qaeda, domestic militias, etc.
    4. Extremism and ideology related to group process
    5. Group process of motivation, performance and belief systems
    6. Group process of social influence
    7. Group processes of formation and development
    8. Group processes of structure and leadership
    9. Introduction of conflict as a social process
    10. Legal Issues for terrorism in the criminal justice system
    11. Patterns for change and effects of terrorist activity
    12. Patterns of domestic and international group involvement in terrorism
    13. Policy and training Issues for terrorism related to Homeland Security
    14. Social networks in group analysis
    15. Social production of group symbols and identification

    Learning Outcomes
    At the end of this course students will be able to:

    1. demonstrate knowledge of the development of terrorism in society and its current issues.
    2. describe the ethical considerations for the study of high profile groups
    3. apply knowledge related to risk indicators and threat assessment
    4. apply knowledge of the history of social dynamics of extremist and terrorist groups.
    5. demonstrate knowledge of methods for studying groups
    6. demonstrate an understanding of the theoretical explanations of group processes
    7. evaluate important research findings on terrorist and extremist groups
    8. analyze the dynamics of an observed group
    9. code social behavior

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2094 - Fundamentals of Criminal Investigations

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This course will explore the fundamental principles and procedures employed in the criminal investigation process. Students will examine the various methods and techniques utilized by law enforcement to solve a variety of crimes. Areas of study will include the preliminary and follow-up investigation, crime scene analysis, evidence collection and processing, report writing and preparing a case for prosecution.
    MnTC Goals
    None

    Prerequisite(s): Course placement into college-level English and Reading OR completion of ENGL 0950  with a grade of C or higher OR completion of RDNG 0940  with a grade of C or higher and qualifying English Placement Exam OR completion of RDNG 0950  with a grade of C or higher and ENGL 0090  with a grade of C or higher OR completion of ESOL 0051  with a grade of C or higher and ESOL 0052  with a grade of C or higher.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Arson, Bombs and Explosives
    2. Assault, Domestic Violence, Stalking and Elder Abuse
    3. Burglary
    4. Computer Crime
    5. Crimes Against Children
    6. Death Investigations
    7. Documenting the Crime Scene: Note Taking, Photographing and Sketching
    8. Forensics/Physical Evidence
    9. Gang-Related Crime
    10. Identifying and Arresting Suspects
    11. Illegal Drugs and Terrorism
    12. Larceny/Theft, Fraud, and White Collar Crime
    13. Motor Vehicle Theft
    14. Obtaining Information
    15. Organized Crime and Hate Crimes
    16. Robbery
    17. Searches
    18. Sex Offenses
    19. The Role of Investigations in the Criminal Justice System
    20. Writing Reports, Preparing for and Presenting Cases in Court

    Learning Outcomes
    At the end of this course students will be able to:

    1. list the characteristics of an effective investigator.
    2. describe the process involved in preparing a case for prosecution.
    3. differentiate between a preliminary and follow-up investigation
    4. describe the methods used in processing a crime scene.
    5. describe the requirements and process of an effective search.
    6. describe the collection and processing of physical evidence.
    7. identify information gathering, note-taking and report writing techniques.
    8. describe the investigative techniques and technology used in violent crimes.
    9. define the investigative techniques and technology used in property crimes.
    10. examine the investigative techniques and technology used in white collar crimes.
    11. describe the investigative techniques and technology used in organized crime.
    12. define the investigative techniques and technology used in counter-terrorism.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2095 - Interview, Interrogation, and Investigation

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This course examines oral and nonverbal communication and collection of verbal information using criminal justice theory and methods. Students will practice the skills of interviewing and interrogation. Students will learn various methods and legal guidelines for interviewing, interrogation, and investigation.
    MnTC Goals
    None

    Prerequisite(s): Fifteen completed college credits. Course placement into college-level English and Reading OR completion of ENGL 0950  with a grade of C or higher OR completion of RDNG 0940  with a grade of C or higher and qualifying English Placement Exam OR completion of RDNG 0950  with a grade of C or higher and ENGL 0090  with a grade of C or higher OR completion of ESOL 0051  with a grade of C or higher and ESOL 0052  with a grade of C or higher.
    Corequisite(s): None
    Recommendation: Six college credits in criminal justice sciences before enrolling in this class.

    Major Content
    1. Environmental settings for gathering verbal information
    2. Ethical and legal considerations for policy of individuals and organizations
    3. Evaluation and use of findings in investigation procedure
    4. Interviewing behavior: handling denials, passivity
    5. Interviewing children and the mentally challenged
    6. Nonverbal behavioral assessment
    7. Pre-employment interviews
    8. Preparation for the interview/interrogation
    9. Projective analysis of unwritten verbal clue
    10. Psycho-physiological basis for the forensic assessment
    11. Question formulation: irrelevant, relevant, comparison, and alternative questions
    12. The history of interviewing, interrogation, and investigation application and methods
    13. Theoretical frameworks for interviewing, interrogation and investigation
    14. Truth and deception
    15. Use of verbal coercion and persuasion
    16. Use of technology, related to interviewing and interrogation

    Learning Outcomes
    At the end of this course students will be able to:

    1. apply methods for memory development
    2. apply the legal framework for information-gathering and sharing
    3. follow chain of custody rules for information gathering and investigation
    4. demonstrate knowledge of the investigation process and its importance for interviewing and interrogation
    5. show knowledge of methods of content analysis and categorization of words
    6. apply the concepts of polygraph and voice stress analysis technology and techniques
    7. apply knowledge of verbal threat and behavioral escalation analysis
    8. demonstrate knowledge of pattern recognition techniques
    9. become knowledgeable in trigger word recognition techniques
    10. participate in interview and interrogation process
    11. apply videotaping technology for taping interviews and interrogations

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2096 - Crime Scene Investigations

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This course will provide students with an in-depth look into of the topic of crime scene investigations. Students will study the search process, collection of physical evidence, and processing of evidence in the crime lab. Students will examine the equipment and methods used in the collection and processing of specific categories of physical evidence. Students will also explore the legal and ethical issues involved in collecting and processing evidence.
    MnTC Goals
    None

    Prerequisite(s): Course placement into college-level English and Reading OR completion of ENGL 0950  with a grade of C or higher OR completion of RDNG 0940  with a grade of C or higher and qualifying English Placement Exam OR completion of RDNG 0950  with a grade of C or higher and ENGL 0090  with a grade of C or higher OR completion of ESOL 0051  with a grade of C or higher and ESOL 0052  with a grade of C or higher; CJS 2094  with a grade of C or better or instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Biological Stain Analysis: DNA
    2. Bloodstain Pattern Analysis
    3. Collection of Crime Scene Evidence
    4. Computer Forensics
    5. Crime Scene Reconstruction
    6. Document Examination
    7. Drugs
    8. Fingerprints
    9. Firearms, Toolmarks, and Other Impressions
    10. Forensic Aspects of Fire Investigation
    11. Forensic Investigation of Explosions
    12. Forensic Science and the Internet
    13. Forensic Toxicology
    14. Introduction
    15. Legal and Ethical Issues in Processing the Crime Scene
    16. Physical Evidence
    17. Recording the Crime Scene
    18. Role of the Crime Laboratory in Processing Physical Evidence
    19. Securing and Searching the Crime Scene
    20. Trace Evidence I: Hairs and Fibers
    21. Trace Evidence II: Paint, Glass, and Soil

    Learning Outcomes
    At the end of this course students will be able to:

    1. describe the process of properly documenting a crime scene
    2. identify legal and ethical issues involved in processing a crime scene.
    3. describe the functions of the crime laboratory and its role in processing physical evidence.
    4. describe the role of the crime scene investigator.
    5. identify equipment used for collection and preservation of evidence at a crime scene.
    6. demonstrate the methods used for collection and preservation of evidence at a crime scene
    7. list the various types of evidence typically found at a crime scene
    8. describe crime scene search methods and techniques.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2097 - Homeland Defense

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This course explores the concept of national defense with attention to changing issues for the criminal justice system. Students will employ scientific theories and methods to analyze the changing roles of police and military involvement in defense. Topics will include terrorism, weapons of mass destruction (WMDs), civil rights and constitutional issues related to defense.
    MnTC Goals
    None

    Prerequisite(s): Course placement into college-level English and Reading OR completion of ENGL 0950  with a grade of C or higher OR completion of RDNG 0940  with a grade of C or higher and qualifying English Placement Exam OR completion of RDNG 0950  with a grade of C or higher and ENGL 0090  with a grade of C or higher OR completion of ESOL 0051  with a grade of C or higher and ESOL 0052  with a grade of C or higher.
    Corequisite(s): None
    Recommendation: It is recommended that students have at least 15 college credits with a grade of C or higher in each course.

    Major Content
    1. Bureaucracy issues: re-conceptualizing the police role
    2. Changing nature of conflict: science and art
    3. Civil liberties: executive powers under the constitution
    4. Defensive role of law enforcement
    5. Ethical Issues for defense systems and operation
    6. Future trends for law enforcement and security in domestic and international terrorism
    7. Homeland defense and Homeland Security
    8. Homeland security: constitutional and criminal justice issues
    9. Incident Command System (ICS) and National Incident Management System (NIMS)
    10. Infrastructure of homeland security
    11. Law enforcement dilemma: the Patriot Act and the Fourth Amendment
    12. Military intelligence vs. police intelligence
    13. Offensive operation and information sharing
    14. Responding to threat: weapons of mass destruction (WMDS)
    15. Terrorist culture and counterterrorism
    16. Training issues for security and coordination within various agencies: fire, emergency services, bio-security, HAZMAT (hazardous materials)

    Learning Outcomes
    At the end of this course students will be able to:

    1. Identify structure and functions of an Incident Command System and how law enforcement operates within it.
    2. Differentiate among sources of intelligence at the international, Federal, State, and local levels.
    3. Identify examples of offensive operations, information gathering, and communications for homeland defense.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2099 - Criminal Justice Capstone

    Credits: 2
    Hours/Week: Lecture 2 Lab None
    Course Description: This capstone course is the culmination of the criminal justice student’s academic experience. It serves to synthesize the knowledge gained from each course taken within the criminal justice curriculum and better prepare the graduate to continue on to upper-division studies in the discipline or for entry-level career positions in the criminal justice system. In this course, students will identify and discuss current issues and trends in criminal justice and develop a research project based on their interests in the field. Students will prepare a written report and present their project to the class. This course requires fifteen completed credits in criminal justice or sociology with a grade of C or higher in each course.
    MnTC Goals
    None

    Prerequisite(s): CJS 1020  and CJS 2089  and instructor consent.
    Corequisite(s): None
    Recommendation: The capstone course is designed to integrate the students learning experiences across his/her entire criminal justice studies. In order to gain the most from this class it is recommended the student take this class at or near the end of his/her program of study.

    Major Content
    1. Research designs appropriate for criminal justice
    2. Research ethics and professionalism
    3. Criminal justice research topics
    4. Writing a criminal justice research paper
    5. Presentation of criminal justice research paper
    6. Current issues and trends in criminal justice
    7. Educational and career pathways and strategies for success in criminal justice
    8. History and future of the criminal justice system
    9. Literature review of criminal justice sources
    10. Report writing for different criminal justice audiences

    Learning Outcomes
    At the end of this course students will be able to:

    1. demonstrate fluency with the current literature and trends in criminal justice theory, research, and practice.
    2. discuss the history, currency and future of the criminal justice system.
    3. examine academic and professional career pathways in criminal justice.
    4. identify and discuss current issues and trends in criminal justice.
    5. research topics regarding the criminal justice system.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2101 - Public Safety Response to Crisis Calls

    Credits: 1
    Hours/Week: Lecture 1 Lab None
    Course Description: This course builds on prior content and skills and is intended for students interested in law enforcement and other first-responder careers with direct contact with people who may have mental health issues.  It provides a brief review of behavioral health issues that peace officers and other first responders are often confronted with along with communication techniques and interventions that promote safety for clients, patients, caregivers and professionals.  It focuses on scene safety as well as alternative strategies for responding to crises based on analyzing resources available in various communities. Students practice de-escalation through reality-based role-playing scenarios.
    MnTC Goals
    None

    Prerequisite(s): CJS 2081  with a grade of C or higher.  Course placement into ENGL 0950  and RDNG 0950  or above OR completion of RDNG 0940  with a grade of C or higher OR course placement into ESOL 0051  and ESOL 0052  and ESOL 1033  OR completion of ESOL 0041  with a grade of C or higher and ESOL 0042  with a grade of C or higher and ESOL 0043  with a grade of C or higher.
    Corequisite(s): None
    Recommendation: Concurrently enrolled HSCI 1100  or completion of HSCI 1100 .

    Major Content
    1. Effective communication traits
    2. Barriers to effective communication
    3. Bias impact to public safety response
    4. Minnesota Crisis Intervention Teams and other available resources
    5. De-escalation strategies
    6. Excited Delirium
    7. Veteran reintegration challenges
    8. Signs and symptoms of mental illnesses
    9. Community crisis response resources in Minnesota

    Learning Outcomes
    At the end of this course, students will be able to:

    1. Describe how perception, sympathy, empathy, compassion and respect affect peace officer communication. (1.1.1)
    2. Identify barriers to clear communication, e.g. language, stress, bias, lack of common cultural understanding.  (1.1.2)
    3. Use and interpret verbal and non-verbal cues to enhance interpersonal communications. (1.1.3)
    4. Describe and demonstrate active listening skills including paraphrasing, reflecting meaning, and summarizing understanding to obtain and clarify (1.1.4)
    5. Differentiate between discretion and selective enforcement. (1.2.5)
    6. Describe the rights of people who have disabilities to the same service law enforcement provides to anyone else and stereotypes and biases some people may have toward people with disabilities. (2.19.2)
    7. Identify special communications issues peace officers may encounter and discuss reasonable and appropriate actions officers may take to improve communication with individuals:
      1. coping with communication disorders including hearing impairment,
      2. whose mobility impairment restricts communication, and
      3. coping with autism spectrum disorders, dementia, Alzheimer’s disease or intellectual disabilities. (2.19.4)
    8. Identify emergency and non-emergency law enforcement situations involving people who have mobility disabilities, mental illnesses, intellectual disabilities, epilepsy or seizure disorders, speech disabilities, deafness or hard of hearing, and blindness or low vision and appropriate law enforcement response to those situations including making modifications or providing accommodations when appropriate. (2.19.6)
    9. Describe the major and severe forms of mental illness. (2.20.1)
    10. Describe the symptoms of major mental illnesses and how they manifest in adults and children, i.e., those associated with antisocial personality disorders, autism spectrum disorders, bipolar disorder and manic behavior disorders, depression, dis-associative disorders, post-traumatic stress disorder (PTSD), schizoaffective disorder, schizophrenia, and Tourette’s syndrome.(2.20.2)
    11. Identify signs and characteristics that may be indicative of suicidal individuals. (2.20.3)
    12. Identify signs and symptoms of excited delirium and its relationship to mental illness, drugs and sudden death. (2.20.4)
    13. Explain how bias that comes from the stigma of mental illness and the rights of individuals dealing with mental illness to the same fair treatment and police protection as anyone else. (2.20.5)
    14. Describe the Minnesota Crisis Intervention Team (MNCIT) model. (2.20.6)
    15. Describe how substance abuse can mimic or contribute to mental illness. (2.20.7)
    16. Explain how medications may influence behaviors of individuals dealing with mental illness and why people don’t always take their medications. (2.20.8)
    17. Describe problems military veterans may have reintegrating into society, how these problems may involve law enforcement and special considerations for dealing with veterans in crisis. (2.20.9)
    18.  Describe the role of peace officers in managing and de-escalating
    19. hostile situations, including how the attitude and expectations of an officer influences responses in crisis situations. (2.21.1)
    20. Describe anger/conflict management strategies useful to officers in resolving problems that arise in law enforcement settings. (2.21.2)
    21. Identify strategies and de-escalation techniques officers may use to manage conflict, reduce anger, and improve communication and cooperation and de-escalate volatile or hostile situations. (2.21.3)
    22. Distinguish between characteristics of passive, aggressive, and assertive behavior. (2.21.4)
    23. Identify body language behaviors that signal potential conflict escalation. (2.21.5)
    24. Explain various communication techniques that may be effective in a crisis situation and how techniques may vary depending on whether the situation involves mental illness, substance induced behavior, or other causes. (2.21.8)
    25. Identify common crisis response resources in Minnesota communities

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2120 - Public Safety in a Multicultural Society

    Credits: 1
    Hours/Week: Lecture 1 Lab None
    Course Description: Multicultural knowledge is vital for all first responders, especially in the areas of diversity, bias, cultural competency, and respect for the lived experiences of all people. This course provides opportunities for intentional self-reflection about implicit and explicit biases, including how to continuously improve, as well as how to manage one¿s biases while performing public safety tasks. The course also addresses the negative effects related to a lack of cultural competency.
    MnTC Goals
    None

    Prerequisite(s): CJS 2081  and ENGL 1020  with a grade of C or higher or ENGL 1021  with a grade of C or higher.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Assessment of individual cultural competence
    2. Scenario-based problem-solving
    3. Community-based collaboration
    4. Racially-based profiling
    5. Hate crimes
    6. Challenges created by intolerance and marginalizing

    Learning Outcomes
    At the end of this course, students will be able to:

    1. Apply results of a cultural self-assessment.
    2. Describe barriers to clear communication, e.g. language, stress, bias, lack of common cultural understanding.  (Category 1.1)
    3. Identify ethical issues in a variety of law enforcement related situations and apply ethical reasoning to decision making processes. (Category 1.2)
    4. Use critical thinking, logical reasoning and problem solving strategies to formulate ideas, make proposals and suggest solutions to a variety of law enforcement related problems or concerns (Minn. Stat. 626.8455). (Category 1.3)
    5. Define the term discretion and discuss when and why peace officers use their best judgment in the administration of justice and when discretion is not allowed. (Category 1.4)
    6. Identify techniques for organizing community members, so that they are involved and trained in community policing activities, relating to diverse communities, and relating to individuals with physical or mental limitations (Minn. Stat. 626.8455, Subd. 1, 2-4). (Category 1.5)
    7. Discuss the risks and problems associated with intolerance, insensitivity, partiality, marginalizing and unjust application of the law for both law enforcement and community members. (Category 1.6)
    8. Discuss ways officers can promote positive relationships with community members of varying races, ethnicities, national origins, immigration statuses, genders, ages, economic classes, disabilities and/or sexual orientations. (Minn. Stat. 626.8455) (Category 1.6)
    9. Explain the concept of racially based profiling (Minn. Stat. 626.8471) and other profiling that is based on false assumptions about groups of people and discuss:
      1. the impact of the Whren v. United States decision
      2. the importance of impartial policing,
      3. the difference between the terms pretextual stop and racial profiling and the problems associated with racial profiling by law enforcement, 
      4. how racial profiling impacts law enforcement credibility and community trust,
      5. how to handle the perception of unfair or biased treatment of members of the public by law enforcement, and
      6. the importance of an officer’s ability to articulate valid reasons for vehicle stops. (Category 2.12)
    10. Define and explain the impact of hate crimes including:
      1. the motivations behind hate crimes,
      2. the impact of hate crimes on victims and on communities,
      3. the special needs of hate crime victims, and
      4. crime characteristics which may indicate a crime was motivated by the victim’s race, national origin, sex, age, disability, or sexual orientation (Minn. Stat. 626.8451, Subd. 1). (Category 2.12)

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2225 - Criminal Investigations

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: Knowledge of investigative procedures and practices is central to the role of a law enforcement officer.  This course focuses on reporting and investigative techniques as well as the processes and procedures required in crime scene investigations. Special attention is paid to accurate documentation and evidence handling and preservation.  This course requires completion of CJS 2081 , CJS 2085 , SOC 1033 , SOC 1080 , and SOC 2051  with grades of C or higher and CJS 1024  and ENGL 1024  with a grade of C or higher or be concurrently enrolled.
    MnTC Goals
    None

    Prerequisite(s): Instructor consent
    Corequisite(s): None
    Recommendation: None

    Major Content

    1. Crime scenes
    2. Interrogation and interview
    3. Persons and property crimes
    4. Report writing
    5. Search protocol and procedure
    6. Criminal charge process
    7. Fire scenes
    8. Chain of custody

    Learning Outcomes
    At the end of this course, students will be able to:

    1. state the requirements of the Fourth Amendment on the law of arrest. (2.2.7)
    2. explain how constitutional rights in the Fifth, Sixth, and Fourteenth amendments affect police interrogations. (2.2.8)
    3. summarize the rights of individuals being interrogated under the fifth and Sixth Amendments and the importance of adhering to procedures that protect those rights including:
      1. -The prohibition against forced or coerced self-incrimination
      2. -The Sixth Amendment right to counsel and correlating Minnesota Statute (Minn, Stat, 481.10) (2.2.9)  
    4. evaluate mock crime situations and determine if evidence is admissible under the Fourth Amendment. (2.2.10)
    5. explain types of evidence and the differences between them, i.e., direct and circumstantial evidence. (2.2.11)
    6. describe the exclusionary rule and risks associated with contaminated evidence and loss chain of custody of evidence. (2.2.12)
    7. describe the following suspect identification methods: line-up, photo line-up, and field identification. (2.2.13)
    8. explain and demonstrate search warrant preparation including establishing a factual basis for probable cause and identifying items to be searched for and seized. (2.3.2)
    9. identify the legal requirements governing preparation and execution of the search warrant of a suspect’s home or dwelling, vehicle, or person. (2.3.3)
    10. explain the scope and limitation of a lawful warrant-less seizure during a consent search of persons. (2.3.4)
    11. explain the scope and limitation of a lawful warrantless search of a premise and warrantless search of a vehicle. (2.3.5)
    12. explain the scope and limitation of a lawful warrant-less search during a search based on exigent circumstances. (2.3.6)
    13. explain the scope of a lawful warrant-less search during a plain view search. (2.3.7)
    14. discuss how telephonic search warrant and search warrant templates can speed up the search warrant application process. (2.3.8)
    15. given a scenario, explain how to complete a valid return of a summons. (2.3.9)
    16. explain the Supreme Court decision Miranda vs. Arizona and the four components of the Miranda Warning.  (2.6.1)
    17. explain a criminal defendant’s Sixths Amendment right to an attorney in all criminal prosecutions including interviews and interrogations. (2.6.2)
    18. describe legal interviewing and interrogation techniques peace officers may use and the difference between a voluntary and coerced statement. (2.6.3)
    19. explain the difference between custodial and noncustodial interview or interrogation. (2.6.4)
    20. describe consideration for videotaping and recording interviews and interrogations and explain when interrogations must be recorded (State v. Scales. 518 N.W.2d 587 (Minn. 1994) (2.6.5)
    21. explain when admissions and confessions are legally admissible in court. (2.6.6)
    22. explain the purpose of an interrogation and how results of interrogation can be used in trials. (2.6.7)
    23. explain the conditions under which confessions may or may not be used in court. (2.6.8)
    24. discuss interview techniques used to:
      1. -Build rapport
      2. -encourage full meaningful answers and discourage suggestibility
      3. -clarify and corroborate statements
      4. -enhance memory
      5. -detect deception
      6. -obtain information from a reluctant witness  (3.2.1)
    25. discuss interview considerations and techniques for interviewing children, vulnerable adults and traumatized victims. (3.2.2)

    26. discuss how and why interviewing techniques must vary depending on the interviewee and the circumstances, i.e., when interviewing children, traumatized victims. (3.2.3)

    27. conduct interviews using procedures that:
      1. -are appropriate to the situations
      2. -ensure the protection of individual rights
      3. -effectively gather information
      4. -encourage cooperation
      5. -enhance memory. (3.2.4)
    28. conduct interrogations of suspects using appropriate techniques to gather information, detect deception, and gain and admission or confession depending on the circumstances. (3.2.5)
    29. explain and/or participate in procedure for identifying suspects, i.e., line-up, photo line-up, and field identification. (3.2.6)
    30. describe appropriate protective gear that may be needed when collecting g and processing evidence.  (3.5.1)
    31. identify various types of evidence, i.e., blood and biological weapons, explosives and arson related evidence, hair and fiber, impressions, fingerprints, documents, clothing. (3.5.2)
    32. describe risks associated with contamination of evidence. (3.5.3)
    33. demonstrate proper preservation, collection, processing, storage and chain of custody procedures for a variety of types of evidence, i.e., fingerprints, DNA, shoe/tire impressions, blood spatter. (3.5.4)
    34. demonstrate proper evidence documenting techniques, i.e. note taking field sketching and/or photographing/videotaping. (3.5.5)
    35. discuss the impact of new or emerging technologies on crime scene evidence collection and investigation. (3.5.6)
    36. recognize, secure and protect technical evidence at a crime scene, i.e. computers, phones cameras surveillance equipment.  (3.5.7)
    37. explain the impact of the Electronic Communication Privacy Act and other pertinent case law on the collection of technological evidence. (3.5.8)
    38. discuss the importance of information obtained from electronic devices in crimes including: pornography, economic fraud, e-mail threats, extortion, gambling, identity theft, narcotics, prostitution, software piracy, and telecommunications fraud. (3.5.9)
    39. practice responding to a variety of requests for service including:
      1. -receiving and comprehending information to and from dispatcher
      2. -demonstrating safe vehicle positioning where applicable based on type of call and information available
      3. -observing and conducting initial assessment upon arrival at the scene for safety concerns and useful information
      4. -using active listening and clear oral communication skills
      5. -identifying victims, witnesses, and suspects
      6. -taking statements and conducting initial interviews
      7. -making reasonable decisions based on a reasonable interpretation of observations and circumstances
      8. -Determining what additional services might be called in, e.g., EMS, Social Services (3.6.1)
    40. demonstrate how to safely and properly secure and protect a crime scene (3.6.2)
    41. given a crime scene, determine if there is enough evidence to provide probable cause for a search or arrest warrant and fill out the appropriate forms(s) to obtain the warrant. (3.6.3)
    42. request search or arrest warrants where appropriate. (3.6.4)
    43. discuss investigation and evidence collection techniques specifically related to homicide, suicide, accidental and natural death scenes. (3.14.12)
    44. describe dangers associated with handling drugs and with drug production laboratories and related precautionary measures. (3.14.22)
    45. explain the terms flashover and backdraft and the risks associated with flames, head, smoke, toxic gasses and explosions at fire scenes. (3.14.36)
    46. describe the crime of arson, the common evidence used in differentiating between arson caused fire and other causes, and the importance of securing and protecting evidence at fire scenes. (3.14.37)
    47. discuss responsibilities and safety concerns relative to peace officer response to fire scenes and the different roles and responsibilities of officers, fire fighters and representatives of the fire marshal’s office. (3.14.38)
    48. explain how to use a fire extinguisher on various types of fires. (3.14.39)

     
    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2230 - Legal Issues

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: Knowledge of legal matters is central to the role of a law enforcement official. This course introduces students to the principles of criminal procedures and the law. Topics include case law from the Supreme Court relating to stop and frisk, search and arrest, suspect identification and interrogation, and other legal procedures involved in law enforcement. Additional topics include the Minnesota State Constitution; application of the 4th, 5th, and 6th Amendments of the United States Constitution; and procedural requirements for police.This course requires completion of CJS 2081 , CJS 2085 , SOC 1033 , SOC 1080 , and SOC 2051  with grades of C or higher and CJS 1024  and ENGL 1024  with a grade of C or higher or be concurrently enrolled.  
    MnTC Goals
    None

    Prerequisite(s): Instructor consent
    Corequisite(s): None
    Recommendation: None

    Major Content

    1. Search and seizure requirements
    2. Arrest procedures
    3. Force continuum
    4. Due process
    5. Cultural diversity
    6. Detention
    7. Terrorism
    8. Incident command

    Learning Outcomes
    At the end of this course, students will be able to:

    1. describe the sources of laws in the U.S. including federal law, state law, case law, and administrative regulatory law and process by which laws, statues and ordinances are enacted. (2.2.1)
    2. explain provisions of the constitution and Bill of rights that impact or restrict law enforcement including the First, Second, Fourth, Fifth, Sixth, Eighth and fourteenth amendments. (2.2.2)
    3. explain how the separation of Powers Doctrine works. (2.2.3)
    4. distinguish between criminal law and criminal procedure and explain the difference between substantive and procedural law. (2.2.4)
    5. summarize the forms of individual protection related to search and seizure granted by the US Constitution. (2.2.5)
    6. explain the meaning of the good faith doctrine, the fruit and of the poisonous tree doctrine and the inevitable discovery doctrine as they pertain to Fourth Amendment rights. (2.2.6)
    7. state the requirements of the Fourth Amendment on the law of arrest. (2.2.7)
    8. explain how constitutional right in the Fifth, Sixth, and Fourteenth Amendments affect police interrogations. (2.2.8)
    9. summarize the rights of individuals being interrogated under the Fifth and Sixth Amendments and the importance of adhering to procedures that protect those rights including:
      1. -the prohibition again forced or coerced self-incrimination
      2. -the Sixth Amendment right to counsel and correlating Minnesota Statute (Minn. Stat. 481.10) (2.2.9)evaluate mock crime situations and determine if evidence is admissible under the Fourth Amendment. (2.2.10)
    10. explain types of evidence and the differences between them, i.e., direct and circumstantial evidence. (2.2.11)
    11. describe the exclusionary rule and risks associated with contaminated evidence and loss of chain of custody of evidence. (2.2.12)
    12. describe the following suspect identification methods:
    13. Line-up, photo line-up, and field identification. (2.2.13)
    14. describe proceedings before a trial including the roles of the law enforcement, the defense attorney and prosecutors. (2.2.14)
    15. summarize the rights and processes related to a fair and speedy trial and the right to a jury. (2.2.15)
    16. explain the general provisions for sentencing in the Minnesota Criminal Code and Minnesota Sentencing Guidelines. (2.2.16)
    17. describe crime classifications misdemeanor through felony. (2.2.17)
    18. discuss enhancements that may be applied to repeat offenders, and career offenders. (2.2.18)
    19. explain the following terms: concurrent and consecutive sentences, imposition and execution of sentence, determinate and indeterminate sentencing. (2.2.19)
    20. list the five constitutional amendments involving equality rights. (2.2.20)
    21. explain the impact of the Fourteenth Amendment as it relates to due process and equal protection under the law including:
    22. -the difference between Fifth and Fourteenth amendments in terms of due process
    23. -the differences between substantive and procedural due process
    24. -how Fourteenth Amendment rights constrain law enforcement authority in interrogations. (2.2.21)
    25. discuss limits placed on interrogation procedures in order to ensure protection of rights for U.S. citizens and non-citizens. (2.2.22)
    26. identify the criminal and civil consequences an officer may face by violating a citizen’s constitutional right. (2.2.23)
    27. compare and contrast characteristics of the civil and criminal justice systems. (2.2.24
    28. define the following terms: search warrant, arrest warrant, subpoena, order for protection (OFP), ex-parte order for protection, qualified domestic violence-related order (QDVRO), harassment restraining order (HRO), no-contact orders, night-capped warrant, no-knock warrant, and curtilage. (2.3.1)
    29. explain and demonstrate search warrant preparation including establishing a factual basis for probable cause and identifying items to be searched for and seized. (2.3.2)
    30. identify the legal requirements governing preparation and execution of the search warrant of a suspect’s home or dwelling, vehicle, or person. (2.3.3)
    31. explain the scope and limitation of a lawful warrant-less seizure during a consent search of persons. (2.3.4)
    32. explain the scope and limitation of a lawful warrantless search of a premise and warrantless search of a vehicle. (2.3.5)
    33. explain the scopes and limitation of a lawful warrant-less search during a searched based on exigent circumstances. (2.3.6)
    34. explain the scope of a lawful warrant-less search during a plain view search. (2.3.7)
    35. discuss how telephonic search warrants and search warrant templates can sleep up the search warrant application process. (2.3.8)
    36. given a scenario, explain how to complete a valid return of a summons. (2.3.9)
    37. explaining each of the following types of orders: domestic violence protective orders, order of on contact, and orders to pick up children. (2.3.10)
    38. explain what constitutes an arrest and the differences between a contact a detention and an arrest. (2.4.1)
    39. state the requirements of the Fourth Amendments on the law of arrest. (2.4.2)
    40. discuss protocols and terms associated with arrest including “reasonable suspicion” and “probable cause”. (2.4.3)
    41. describe the stop and frisk standard as found in “Terry vs. Ohio” and subsequent cases. (2.4.4)
    42. explain the legal requirements of, the exceptions to, and the need for an arrest warrant and how one is obtained. (2.4.5)
    43. describe when how a citizen can make an arrest. (2.4.6)
    44. explain the requirements for private citizens to assist law enforcement officials I preventing escapes or effecting arrests. (2.4.7)
    45. explain the Supreme Court decision Miranda vs. Arizona and the four components of the Miranda warning. (2.6.1)
    46. explain a criminal defendant’s Sixth Amendment right to an attorney in all criminal prosecutions including interviews and interrogations. (2.6.2)
    47. describe legal interviewing and interrogation techniques peace officers may use and the differences between a voluntary and a coerced statement. (2.6.3)
    48. explain the difference between custodial and noncustodial interview or interrogation. (2.6.4)
    49. describe considerations for videotaping and recording interviews and interrogations and explain when interrogations must be recorded (state v. Scales, 518 N.W.2d 587 (Minn. 1994). (2.6.5)
    50. explain when admissions and confessions are legally admissible in court. (2.6.6)
    51. explain the purpose of an interrogation and how results of interrogation can be used in trials. (2.6.7)
    52. explain the condition under which confessions may or may not be used in court. (2.6.8)
    53. explain Minnesota statutes and relevant case law related to the application forced by peace officers. (2.8.1)
    54. explain the following terms: objectively reasonable, totality of circumstances, situations factors, pre-assaultive indicators, and, escalation and de-escalation as related to peach officer use of force. (2.8.2)
    55. discuss the term reasonable as it related to use of force. (2.8.3)
    56. state how department policies regarding use of force including deadly force may and may not vary. (2.8.4)
    57. given scenarios, recognize when force is or is not authorized and given and defend reasonable choices for the application of various types of force depending on the circumstances of the scenario. (2.8.5)
    58. give Supreme Court case examples authorizing the use of deadly force. (2.8.6)
    59. explain the Minnesota Statute that requires officers be trained in the use of those weapons and equipment the officer is issued or authorized to carry (Minn Stat. 626.8452) (2.8.8)
    60. explain when force may be used to make an arrest. (2.8.9)
    61. discuss liabilities associated with the application of force by peace officers. (2.8.10)
    62. explain the concept of racially based profiling (Minn, Stat. 262.87471) and other profiling that is based on false assumptions about groups of people and discuss:
      1. -the impact of the Whren. United States decision
      2. -the importance of impartial policing
      3. -the difference between the terms pretextual stop and racial profiling and the problems associated with racial profiling by law enforcement
      4. -how racial profiling impacts law enforcement credibility and community trust
      5. -how to handle the perception of unfair or biased treatment of members of the public by law enforcement, and
      6. -the importance of an officer’s ability to articulate valid reasons for vehicle stops. (2.12.1)
    63. define and explain the impact of hate crimes including:
      1. -the motivations behind hate crimes
      2. -the impact of hate crimes on victims and on communities
      3. -the special needs of hate crime victims
      4. -crime characteristics which may indicate a crime was motivated by the victims race, national orgin, sex, age, disability, or sexual orientation (Minn. Stat. 626.8451, subd. 1) (2.12.2) 
    64. explain special reporting requirements related to bias motivated/hate crimes as required by Minn. Stat. 626.5531 (officers must report to their agencies, agencies to the BCA) (2.12.3)
    65. describe and demonstrate how to make contacts, detentions and arrests including:
      1. -reading Miranda rights and verifying understanding
      2. -selecting applying and removing types of restraints, i.e. handcuffs, flex-cuffs, leg restraints
      3. -conducting a search incident to arrest
      4. -describing procedures for conducting a strip search  (3.7.1)
    66. demonstrate strategies and techniques for safely taking a person into custody in a variety of locations when:
      1. -the subject is non-compliant or combative
      2. -there are multiple subjects to be arrested
      3. -the subject(s) are larger and stronger than the officer. (3.7.2)
    67. describe and demonstrate protocols and procedures designed to safely transport a person in custody. (3.7.3)
    68. define the term positional asphyxia and describe its relationship to custody. (3.7.4)
    69. define the terms booking, arraignment, bail and personal recognizance. (3.7.5)
    70. demonstrate how to book an arrested person. (3.7.6)
    71. identify officer survival/safety issues related to searches of a person, a vehicle, and a building. (3.8.1)
    72. conduct searches and seizures in accordance with state statues and criminal code and demonstrate conscious application of the concepts of reasonable suspicion and probable cause including:
    73. -a legal consensual search of a person
    74. -a custodial search
    75. -a searching and inventorying of a vehicle including explaining when a vehicle may be impounded
    76. - a building search  (3.8.2)
    77. demonstrate proper procedures for serving summons, warrants, subpoenas, eviction notices and other papers. (3.13.1)
    78. discuss officer safety issues relevant to serving warrants and special procedures to follow when serving potentially high risk warrants. (3.13.2)
    79. explain the process for return of a warrant to the court. (3.13.3)
    80. discuss the role of peace officers in a variety of disaster and large scale emergencies including:
      1. -the importance of initial on-scene assessment for immediate action and resources needed and for on-going threats and safety concerns, i.e., gas leaks, downed power lines, lookers, fires, etc.,
      2. -the importance of interagency communications and cooperative interaction between law enforcement agencies, utility companies, and other resources
      3. -large scare traffic and crowd management. (3.14.13) 
    81. given a scenario, explain or demonstrate an initial scene assessment. (3.14.14)

    82. summarize the elements of the incident command system (ICS) including:
      1. -the overall objectives and primary functions of ICS
      2. -the typical agencies that are involved in ICS
      3. -the roles of emergency/first responder in preparedness and response systems during and after disaster situations
      4. -the typical hierarchical chain of command structure
      5. -the role of the FBI if the disaster is related to foreign or domestic terrorism.  (3.14.15)
    83. summarize characteristics of system involved in preparing for the managing large scale disasters including:
      1. -the elements of the national preparedness system and the national response plan
      2. -the purpose key concepts and principles of the national incident management system (NIMS) (3.14.16) 
    84. explain law enforcement functions aimed at protecting critical infrastructure and potential targets from terrorism and/or natural disasters. (3.14.17)


    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2231 - Minnesota Criminal and Traffic Codes

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: Knowledge of traffic and criminal codes is central to the role of a Minnesota law enforcement officer. This course focuses on the Minnesota Traffic and Criminal Code, including how to apply the laws in a variety of situations.  Critical thinking through practical application is a major component of this course. This course requires completion of CJS 2081 , CJS 2085 , SOC 1033 , SOC 1080 , and SOC 2051  with grades of C or higher and CJS 1024  and ENGL 1024  with a grade of C or higher or be concurrently enrolled.
    MnTC Goals
    None

    Prerequisite(s): Instructor consent
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Minnesota Criminal Code
    2. Minnesota Traffic Code
    3. Enforcement factors
    4. Mandatory reporters
    5. Missing persons
    6. Application of code
    7. Use of proper discretion
    8. Roles and ethical responsibilities

    Learning Outcomes
    At the end of this course, students will be able to:

    1. demonstrate reading comprehension skills necessary in law enforcement including: the ability to differentiate between facts, opinions and propaganda, understanding sequencing of events, and recognizing cause and effect. (1.1.5)
    2. compose documents that demonstrate competent writing skills, including:  
    3. writing from the first person viewpoint,
    4. differentiating between facts, inferences and opinions,
    5. correctly structuring sentences and paragraphs, and
    6. using correct grammar, spelling, punctuation and capitalization. (1.1.6)
    7. define and describe models of the conscious processes of critical thinking, logical reasoning and problem solving. (1.3.1)
    8. use structured problem-solving methods to develop creative and innovative solutions to a variety of problems. (1.3.2)
    9. apply reason and evidence to formulate logical inferences and draw logical conclusions. (1.3.3.)
    10. analyze and evaluate ideas, proposals, and solutions to problems using basic forms of logic and techniques designed to encourage sound reasoning. (1.3.4)
    11. use critical thinking, logical reasoning and problem solving strategies to formulate ideas, make proposals and suggest solutions a variety of law enforcement related problems or concerns (Minn. Stat. 626.8455). (1.3.5)
    12. identify techniques for: organizing community members so that they are involved and trained in community policing activities, relating to diverse communities, and relating to individuals with physical or mental limitations (Minn. Stat. 626.8455, Subd. 1, 2-4). (1.5.5)
    13. discuss ways officers can promote positive relationships with community members of varying races, ethnicities, national origins, immigration statuses, genders, ages, economic classes, disabilities and/or sexual orientations. (Minn. Stat. 626.8455) (1.6.4)
    14. discuss culturally responsive approaches to dealing with victims and perpetrators of violence. (Minn. Stat. 626.8451., Subp. 1.a. (4)) (1.6.7)
    15. describe characteristics of professional behavior and the Minnesota Standards of Conduct for licensing Minnesota peace officers. (1.7.1)
    16. describe the repercussions for a finding of a violation of the State’s peace officer standards of conduct. (1.7.2)
    17. identify the meaning of criminal justice system terms, e.g.: custody, arraignment, circumstantial evidence, double jeopardy, entrapment, exigent circumstances, conviction, bodily harm, substantial bodily harm, great bodily harm, assault, probation, qualified domestic violence related offense (Minn. Stat. 609.02), forfeiture, “good faith” exception, exclusionary rule, indictment, inevitable discovery, probable cause, Miranda warning, reasonable suspicion, warrant, probation, and parole. (2.1.10)
    18. summarize the rights of individuals being interrogated under the Fifth and Sixth Amendments and the importance of adhering to procedures that protect those rights including:
      1. the prohibition against forced or coerced self-incrimination,  
      2. the Sixth Amendment right to counsel and correlating Minnesota Statute (Minn. Stat. 481.10).(2.2.9)
    19. explain the general provisions for sentencing in the Minnesota Criminal Code and the Minnesota Sentencing Guidelines. (2.2.16)
    20. describe crime classifications misdemeanor through felony. (2.2.17)
    21. discuss enhancements that may be applied to repeat offenders, patterned offenders, and career offenders. (2.2.18)
    22. explain the following terms:  concurrent and consecutive sentences, imposition and execution of sentence, determinate and indeterminate sentencing.  (2.2.19)
    23. define the following terms: search warrant, arrest warrant, subpoena, order for protection (OFP), ex-parte order for protection, qualified domestic violence-related order (QDVRO), Harassment Restraining Order (HRO), no-contact orders, night-capped warrant, no-knock warrant, and curtilage. (2.3.1)
    24. explain each of the following types of orders: Domestic Violence Protective Orders, Order of No Contact, and Orders to Pick Up Children. (2.3.10)
    25. explain the legal requirements of, the exceptions to, and the need for an arrest warrant and how one is obtained.  (2.4.5)
    26. describe when and how a citizen can make an arrest. (2.4.6)
    27. describe the basic organization, purpose, and definitions and principles of the Minnesota Criminal Code. (2.5.1)
    28. explain the classifications of crimes including felony, misdemeanor, gross misdemeanor and the meaning of the term petty misdemeanor. (2.5.2)
    29. explain what is meant by elements of a crime and describe the connection between criminal conduct and criminal intent (mens rea). (2.5.3)
    30. explain why it is important for officers to be able to identify and document elements of crimes when responding to and investigating crime scenes. (2.5.4)
    31. given a variety of scenarios, identify indications a particular crime has been committed and identify the elements of that crime. (2.5.5)
    32. identify and explain Minnesota Statutes relating to weapons, chemical agents, electronic control weapons and interference with public property. (2.5.6)
    33. explain special Minnesota peace officer duties associated with specific statutes including:
      1. informing crime victims of their rights and assisting victims of violent crime including domestic assault,
      2. restraining orders and orders for protection,
      3. data collection on battered women cases,
      4. interviewing child abuse victims,
      5. officer responsibilities regarding missing children, and
      6. mandated reporter for child abuse and vulnerable adults. (2.5.7) 
    34. explain Minnesota statutes and relevant case law related to the application of force by peace officers. (2.8.1)
    35. explain the Minnesota Statute that requires officers be trained in the use of those weapons and equipment the officer is issued or authorized to carry (Minn. Stat. 626.8452). (2.8.8)
    36. discuss peace officer rights, obligations and liabilities under state and federal law including requirements placed on law enforcement agencies to defend and indemnify peace officers for good faith action in the course and scope of employment. (2.9.1)
    37. describe the basic organization, purpose and principles of the Minnesota Criminal Code and its implications for law enforcement including (list is not comprehensive):
    38. understanding key traffic related terms (Minn. Stat. 169.011) as well as the terms reckless or careless driving,
    39. describing violations of driving rules, parking and stopping violations, and vehicle equipment violations,
    40. how and when traffic laws apply to authorized emergency vehicles, and laws regarding driving while impaired. (2.10.1)
    41. discuss non-enforcement deterrents to traffic violations, i.e., police presence/visibility, speed bumps. (2.10.2)
    42. explain vehicle registration and insurance requirements in Minnesota. (2.10.3)
    43. distinguish between different classes and type of licenses, endorsements and permits and explain the circumstances under which an individual is exempt from licensing requirements.(2.10.4)
    44. explain the concept of racially based profiling (Minn. Stat. 262.8471) and other profiling that is based on false assumptions about groups of people and discuss:
    45. the impact of the Whren v. United States decision
    46. the importance of impartial policing,
    47. the difference between the terms pretextual stop and racial profiling and the problems associated with racial profiling by law enforcement,  
    48. how racial profiling impacts law enforcement credibility and community trust,
    49. how to handle the perception of unfair or biased treatment of members of the public by law enforcement, and
    50. the importance of an officer’s ability to articulate valid reasons for vehicle stops. (2.12.1)
    51. define and explain the impact of hate crimes including:
      1. the motivations behind hate crimes,
      2. the impact of hate crimes on victims and on communities,
      3. the special needs of hate crime victims, and
      4. crime characteristics which may indicate a crime was motivated by the victim’s race, national origin, sex, age, disability, or sexual orientation (Minn. Stat. 626.8451, Subd. 1). (2.12.2)
    52. explain special reporting requirements related to bias motivated/hate crimes as required by Minn. Stat. 626.5531. (Officers must report to their agencies, agencies to the BCA.) (2.12.3)
    53. define the term predatory offender and describe Minnesota’s predatory offender registration system including risk levels that may be assigned to offenders. (2.13.1)
    54. describe when law enforcement agencies are required to provide community notifications regarding predatory offenders and who to contact for assistance with community notifications. (2.13.2)
    55. explain roles peace officers may take in helping predatory offenders understand and complete the Bureau of Criminal Apprehension’s predatory offender registration form and in conducting compliance checks on registered predatory offenders. (2.13.3)
    56. define the terms crime and crimes of violence as found in Minnesota Statute. (2.14.1)
    57. discuss the extent, causes and impact of crimes of violence including physical and sexual abuse, physical violence, harassment and stalking, and neglect. (Minn. Stat. 626.8451., Subd. 1a.) (2.14.2)
    58. explain the legal definitions and significant aspects of Minnesota statutes related to child and vulnerable adult assault, abuse and neglect. (2.15.1)
    59. explain child development issues that may enable officers to respond appropriately to perceived child protection situations (Minn. Stat. 626.8455) and discuss law enforcement related scenarios where officers need to consider the psychological development of children on scene. (2.15.6)
    60. explain officer reporting requirements relative to incidents of maltreatment neglect, or physical or sexual abuse of minors and vulnerable adults and prenatal exposure to controlled substances (Minn. Stat. 626.556, Subd. 3. and Minn. Stat. 626.557). (2.15.7)
    61. describe who is mandated to report suspected child and vulnerable adult abuse and the ramifications of not reporting. (2.15.8)
    62. explain what legally constitutes domestic abuse and assault. (2.16.1)
    63. define the following terms outlined in Minnesota Statute:  domestic abuse, family or household member, qualified domestic violence-related offense (QDRO), order for protection, exparte order, domestic abuse no contact order, harassment restraining order, harassment, and stalking. (2.16.5)
    64. identify significant aspects of Minn. Stat. related to domestic abuse (Minn. Stat. 629.341 and 518.B01, 609.749, 609.2242) including what legally constitutes domestic assault, elements of various levels of domestic assault, and enhancement for prior domestic violence related offense convictions. (2.16.6)
    65. explain the peace officer’s role in providing victim’s rights information to victims of domestic assault. (2.16.9)
    66. explain the requirements for making an arrest and reporting in domestic assault situations. (2.16.10)
    67. discuss when warrantless arrests may be made and when enhancements for previous assaults may be considered. (2.16.11)
    68. define sexual assault as described in Minn. Stat. 611A.211 which includes criminal sexual conduct in the first, second, third, fourth or fifth degree or criminal sexual predatory conduct. (2.17.1)
    69. explain the following terms: date rape, sex trafficking, sexual harassment, and female genital mutilation. (2.17.2)
    70. describe the current state of victim’s rights in the criminal justice system. (Minn. Stat. 611A) (2.18.2)
    71. explain the intent of the Americans with Disabilities Act. (2.19.1)
    72. discuss the rights of people who have disabilities to the same service law enforcement provides to anyone else and stereotypes and biases some people may have toward people with disabilities. (2.19.2)
    73. discuss methods for communicating with, assisting, or intervening in circumstances involving individuals who demonstrate indications of a variety of physical disabilities or mental impairments. (Minn. Stat. 626.8455) (2.19.5)
    74. explain the Data Practices Act as it pertains to the gathering and release of information by law enforcement. (2.22.1)
    75. discuss balancing the public’s right to know with public safety needs and privacy issues with regard to data accessed by peace officers including:
      1. - what and when information can be shared with the media or the public and by whom, and
      2. - the repercussions of violating data practices. (2.22.2)
    76. discuss the need for protection of data related to on-going investigations, crime victims, and juveniles. (2.22.3)
    77. discuss ethical and responsible use of computers and databases by peace officers and the ramifications of misuse or unethical release of data. (2.22.4)
    78. explain what a criminal gang is as it is defined in Minnesota Statute 609.229 and the penalties for crimes committed for the benefit of a gang. (2.26.1)
    79. explain the terms organized crime and racketeering and discuss how organized crime affects Minnesota law enforcement. (2.26.3)
    80. recognize the term RICO Act as meaning the Racketeer Influenced and Corrupt Organizations Act and be able to describe the overall intent of the Act. (2.26.4)
    81. define the term vice crime and describe the attributes of various vice crimes including illegal gambling, prostitution, solicitation and pornography. (2.26.5)
    82. explain the implications of the Good Samaritan Law (Minn. Stat. 604.05) as it relates to peace officers and citizens. (3.10.2)
    83. demonstrate awareness of Minn. Stat. 169.752 & 753 Medical Equipment which states: “Every patrol motor vehicle shall be equipped with and carry first aid equipment” and “Law enforcement officers operating patrol motor vehicles shall be trained in the use and application of first aid equipment.” (3.10.4)
    84. identify the following elements of driving conduct as they relate to Minnesota Motor Vehicle and Traffic Laws: speed, local authority, right of way, traffic crashes, railroad crossings, school buses, stopping, standing and parking, reckless and careless driving, open bottle, criminal vehicular operation and fleeing a peace officer, signs and signals, and turning. (3.12.2)
    85. identify the equipment necessary to operate a vehicle in proper working condition including:  lighting, brakes, seat belts and child restraints, mufflers, windshields, bumpers; and, identify the exemption from equipment restrictions. (3.12.3)
    86. discuss how traffic law applies to bicycles and pedestrians. (3.12.4)
    87. identify a variety of driver’s licenses including international driver’s license and out of state licenses, various types of Minnesota drivers licenses, and various license statuses including current, expired, canceled, CONAX, suspended, and revoked. (3.12.6)
    88. explain how diplomatic immunity may impact issuance of a traffic citation. (3.12.7)
    89. explain how traffic citations are processed for juvenile offenders. (3.12.9)
    90. discuss the use and application of speed estimates including:
      1. the radar standards implications of the 1971 case of Minnesota vs. Gerdes, and
      2. Minnesota Statute standards for running RADAR (Minn. Stat. 169.14, Subp. 9 and 10). (3.12.10)
    91. identify mandatory reporters of suspected abuse and discuss where to report, what must be reported, the confidentiality of reports, and the legal ramifications for not reporting. (3.14.5)
    92. explain when an arrest is warranted, when an arrest is mandatory and the time period in which an arrest can be made in domestic violence related situations. (3.14.9)
    93. explain why law enforcement enforces alcohol and beverage control laws and laws related to driving under the influence including;
      1. the effects of alcohol on the body and driving, and
      2. the relationship between DWI violations and crashes. (3.14.28)
    94. describe the terms Driving While Impaired (DWI) and Driving Under the Influence (DUI). (3.14.29)
    95. demonstrate familiarity with Minnesota’s missing persons related laws (Minn. Stat. 626.8454, Minn. Stat. 299C.51-299C.5655, 390.25) and the definitions included therein. (3.14.49)
    96. explain peace officers response and reporting responsibilities relative to missing persons. (3.14.50)
    97. given situations involving individuals demonstrating signs and/or characteristics of mental illness, behavioral disorder or suicidal intentions  requiring intervention, demonstrate appropriate intervention techniques that are likely to be beneficial in managing the situations (Minn. Stat. 626.8455) including:
      1. modeling behavior that shows the importance of putting safety first, staying alert and the danger of complacency or taking anything for granted when dealing with an individual experiencing a mental health crisis,
      2. unless situation appears immediately dangerous/critical, avoiding challenging or violating personal space,
      3. trying to eliminate noise and distractions,
      4. having one officer take lead and open communication from a safe distance,
      5. using communication techniques designed to de-escalate volatile situations including:
      6. being patient, calm, honest and compassionate,
      7. using active listening skills while not encouraging or agreeing with delusions,
      8. using a calming voice, and
      9. avoiding challenging questions and allowing for venting.(3.14.56)
    98. define the terms white collar crime and identity theft and describe the importance of evidence protection in investigation of financial fraud, white collar crime and identify theft. (3.14.59)

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CJS 2241 - Police Response and Human Behavior

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This course integrates the academic and applied aspects of the basic patrol function for a patrol officer.  Course topics include an in-depth examination of the knowledge, skills, and abilities required to fulfill a patrol officer’s duties, functions, and responsibilities.  Students explore vehicle stops, traffic enforcement, pedestrian checks, officer safety issues, and other duties as they relate to the basic function of a patrol officer. This course requires completion of CJS 2081 , CJS 2085 , SOC 1033 , SOC 1080 , and SOC 2051  with grades of C or higher and CJS 1024  and ENGL 1024  with a grade of C or higher or be concurrently enrolled.
    MnTC Goals
    None

    Prerequisite(s): Instructor consent
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Drug laws
    2. Predatory offenders
    3. Domestic abuse
    4. Victims’ rights
    5. People with disabilities
    6. Crisis response
    7. Computer forensics
    8. Terrorism

    Learning Outcomes
    At the end of this course, students will be able to:

    1. explain special Minnesota peace officer duties associated with specific statutes including:
    2. informing crime victims of their rights and assisting victims of violent crime including domestic assault,
    3. restraining orders and orders for protection,
    4. data collection on battered women cases,
    5. interviewing child abuse victims,
    6. officer responsibilities regarding missing children, and
    7. mandated reporter for child abuse and vulnerable adults. (2.5.7)
    8. describe current and emerging drug trends in prescription drug abuse and abuse of controlled substances and narcotics. (2.11.1)
    9. describe the relationship between drug abuse and crime. (2.11.2)
    10. explain the impact of evolving drug laws on law enforcement including the legalization of medicinal marijuana and the legalization of recreational marijuana in some states. (2.11.3)
    11. define the term predatory offender and describe Minnesota’s predatory offender registration system including risk levels that may be assigned to offenders. (2.13.1)
    12. describe when law enforcement agencies are required to provide community notifications regarding predatory offenders and who to contact for assistance with community notifications. (2.13.2)
    13. explain roles peace officers may take in helping predatory offenders understand and complete the Bureau of Criminal Apprehension’s predatory offender registration form and in conducting compliance checks on registered predatory offenders. (2.13.3)
    14. define the terms crime and crimes of violence as found in Minnesota Statute. (2.14.1)
    15. define the terms crime and crimes of violence as found in Minnesota Statute. (2.14.2)
    16. discuss how anger, intimidation, isolation, restriction of freedom, economic abuse, emotional abuse, threats and psychological abuse, physical abuse and sexual abuse are methods of exerting power and control. (2.14.3)
    17. describe stalking and how it has changed with technological advances. (2.14.4)
    18. describe community resources and supportive services for individuals and families involved in abusive situations. (2.15.4)
    19. describe who is mandated to report suspected child and vulnerable adult abuse and the ramifications of not reporting. (2.15.8)
    20. explain what legally constitutes domestic abuse and assault. (2.16.1)
    21. discuss the dynamics of domestic violence including the phases of abusive behavior, the progression of violence, the use of power to attain control of a relationship, the effects of abuse, and the societal forces that may perpetuate an atmosphere conducive to abuse.  (2.16.2)
    22. discuss types of abuse including physical, emotional, psychological, sexual, and economic. (2.16.3)
    23. discuss characteristics of batterers and victims and the effects of domestic violence including:
      1. how fear and social stigma related to domestic violence affect victim behavior, and
      2. issues related to children as victims and witnesses at domestic violence scenes. (2.16.4)
    24. define the following terms outlined in Minnesota Statute:  domestic abuse, family or household member, qualified domestic violence-related offense (QDRO), order for protection, exparte order, domestic abuse no contact order, harassment restraining order, harassment, and stalking. (2.16.5)
    25. identify significant aspects of Minn. Stat. related to domestic abuse (Minn. Stat. 629.341 and 518.B01, 609.749, 609.2242) including what legally constitutes domestic assault, elements of various levels of domestic assault, and enhancement for prior domestic violence related offense convictions. (2.16.6)
    26. discuss family violence prevention techniques and common resources and referral agencies for victims of family violence. (2.16.7)
    27. explain investigative procedures in domestic violence situations related to:
      1. interpreting the law when making arrest decisions in domestic violence cases, including when arrest is mandatory and identifying the primary aggressor,
      2. the role of protective orders,
      3. when to complete the short form for the order for protection,
      4. communication techniques that may be effective in volatile situations, and
      5. why victims may be reluctant to press charges or testify.  (2.16.8)
    28. explain the peace officer’s role in providing victim’s rights information to victims of domestic assault. (2.16.9)
    29. explain the requirements for making an arrest and reporting in domestic assault situations. (2.16.10)
    30. discuss when warrantless arrests may be made and when enhancements for previous assaults may be considered. (2.16.11)
    31. identify and describe the dynamics associated with the victim experience and myths surrounding trauma and victimization.  (2.18.1)
    32. describe the current state of victim’s rights in the criminal justice system. (Minn. Stat. 611A) (2.18.2)
    33. explain the peace officer’s role in advising victims regarding shelter and assistance and the importance of demonstrating compassion and concern for victims. (2.18.3)
    34. discuss the importance of confidentiality of a victim’s address/location, and connecting victims with victim crisis services. (2.18.4)
    35. discuss culturally responsive approaches to dealing with victims of violent crimes. (2.18.5)
    36. explain the use of the crime victim notification form. (2.18.6)
    37. explain peace officer duties relative to obtaining assistance with non-English speaking victims or victims with communications disabilities. (2.18.7)
    38. explain the intent of the Americans with Disabilities Act. (2.19.1)
    39. discuss the rights of people who have disabilities to the same service law enforcement provides to anyone else and stereotypes and biases some people may have toward people with disabilities. (2.19.2)
    40. describe major areas of physical and mental disabilities requiring public section accommodations. (2.19.3)
    41. identify special communications issues peace officers may encounter and discuss reasonable and appropriate actions officers may take to improve communication with individuals:
      1. coping with communication disorders including hearing impairment,
      2. whose mobility impairment restricts communication, and
      3. coping with autism spectrum disorders, dementia, Alzheimer’s disease or intellectual disabilities. (2.19.4)
    42. discuss methods for communicating with, assisting, or intervening in circumstances involving individuals who demonstrate indications of a variety of physical disabilities or mental impairments. (Minn. Stat. 626.8455) (2.19.5)
    43. discuss emergency and non-emergency law enforcement situations involving people who have mobility disabilities, mental illnesses, intellectual disabilities, epilepsy or seizure disorders, speech disabilities, deafness or hard of hearing, and blindness or low vision and appropriate law enforcement response to those situations including making modifications or providing accommodations when appropriate. (2.19.6)
    44. given scenarios that involve people with a variety of physical or mental conditions that limits their movement, senses, or activities, in roles of crime suspects, victims or witnesses, discuss what appropriate and reasonable actions peace officers may need to take depending on the circumstances and abilities of the individuals involved. (2.19.7)
    45. discuss how peace officers may provide respectful, appropriate and reasonable assistance when it is needed to people with physical or mental conditions that limit their movement, senses or activities. (2.19.8)
    46. describe the major and severe forms of mental illness. (2.20.1)
    47. describe the symptoms of major mental illnesses and how they manifest in adults and children, i.e., those associated with antisocial personality disorders, autism spectrum disorders, bipolar disorder and manic behavior disorders, depression, dis-associative disorders, post-traumatic stress disorder (PTSD), schizoaffective disorder, schizophrenia, and Tourette’s syndrome. (2.20.2)
    48. identify signs and characteristics that may be indicative of suicidal individuals. (2.20.3)
    49. discuss signs and symptoms of excited delirium and its relationship to mental illness, drugs and sudden death. (2.20.4)
    50. discuss bias that comes from the stigma of mental illness and the rights of individuals dealing with mental illness to the same fair treatment and police protection as anyone else. (2.20.5)
    51. discuss the Minnesota Crisis Intervention Team (MNCIT) model. (2.20.6)
    52. discuss how substance abuse can mimic or contribute to mental illness. (2.20.7)
    53. explain how medications may influence behaviors of individuals dealing with mental illness and why people don’t always take their medications. (2.20.8)
    54. discuss problems military veterans may have reintegrating into society, how these problems may involve law enforcement and special considerations for dealing with veteran in crisis. (2.20.9)
    55. discuss the role of peace officers in managing and de-escalating hostile
    56. Situations including how the attitude and expectations of an officer
    57. Influences responses.  (2.21.1)
    58. describe anger/conflict management strategies useful to officers in resolving problems that arise in law enforcement settings. (2.21.2)
    59. identify strategies and de-escalation techniques officers may use to manage conflict, reduce anger, and improve communication and cooperation and de-escalate volatile or hostile situations. (2.21.3)
    60. distinguish between characteristics of passive, aggressive, and assertive behavior. (2.21.4)
    61. discuss body language behaviors that signal potential conflict escalation. (2.21.5)
    62. explain the principles of crisis intervention/negotiations. (2.21.6)
    63. demonstrate basic knowledge of abnormal psychology. (2.21.7)
    64. explain various communications techniques that may be effective in a crisis situation and how techniques may vary depending on whether the situation involves mental illness, substance induced behavior, or other causes. (2.21.8)
    65. explain when to yield crisis management to other authorities. (2.21.9)
    66. explain strategies that may be employed when hostages are involved in a crisis situation. (2.21.10)
    67. describe computer forensics and summarize the role of computer forensics in evidence discovery and in solving and preventing crimes. (2.23.1)
    68. identify and discuss crimes commonly described as cyber-crime or internet crime. (2.23.2)
    69. define terms terrorism (domestic and foreign), critical infrastructure, homeland security and militia movement. (2.25.1)
    70. discuss the challenges in balancing national security concerns and civil rights including the impact of the USA Patriot Act. (2.25.2)
    71. identify risks that may be associated with violent, anti-government extremist groups. (2.25.3)
    72. discuss types of terrorism, weapons of terrorism, counterterrorism, basic interdiction strategies, terrorism target awareness and the role of law enforcement related to terrorism. (2.25.4)
    73. explain what a criminal gang is as it is defined in Minnesota Statute 609.229 and the penalties for crimes committed for the benefit of a gang. (2.26.1)
    74. discuss the appeal of gang membership, how gangs recruit members, and prevention and intervention methods. (2.26.2)
    75. explain the terms organized crime and racketeering and discuss how organized crime affects Minnesota law enforcement. (2.26.3)
    76. recognize the term RICO Act as meaning the Racketeer Influenced and Corrupt Organizations Act and be able to describe the overall intent of the Act. (2.26.4)
    77. define the term vice crime and describe the attributes of various vice crimes including illegal gambling, prostitution, solicitation and pornography. (2.26.5)
    78. discuss officer safety concerns and ethical decision-making matters related to vice crime investigations including risks associated with working undercover and ethics related to working with confidential informants. (2.26.6)
    79. discuss the historic need for rules to control human conduct, enforce societal directives and empower authoritative enforcement of those rules. (2.1.1)
    80. incorporate an understanding of the history of criminal justice and the contemporary system of criminal justice in the U.S. into a perspective about current peace officer duties, responsibilities, and actions. (2.1.2)
    81. explain the need for a balance between public safety and personal rights in a free society. (2.1.4)
    82. identify and discuss the significance of historic and contemporary events, customs, and social mores that have influenced the current system of justice in the U.S. (2.1.5)
    83. describe the history and impact of including women and diverse community representation in law enforcement. (2.1.6)
    84. explain the roles of law enforcement, the courts and corrections. (2.1.7)
    85. explain the functions and jurisdictions of law enforcement agencies including federal, state, county, municipal, tribal, and international. (2.1.8)
    86. identify the meaning of criminal justice system terms, e.g.: custody, arraignment, circumstantial evidence, double jeopardy, entrapment, exigent circumstances, conviction, bodily harm, substantial bodily harm, great bodily harm, assault, probation, qualified domestic violence related offense (Minn. Stat. 609.02), forfeiture, “good faith” exception, exclusionary rule, indictment, inevitable discovery, probable cause, Miranda warning, reasonable suspicion, warrant, probation, and parole. (2.1.10)
    87. list the five constitutional amendments involving equality and rights. (2.2.20)

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration


Cybersecurity, Virtualization, and Forensics

  
  • CVF 1065 - Introduction to Cybersecurity, Virtualization and Forensics

    Credits: 3
    Hours/Week: Lecture 2 Lab 2
    Course Description: This introductory course presents information and methods to properly conduct a computer forensics investigation including ethics, tools, procedures, and analysis. This course also includes introduction to Cybersecurity, and Virtualization Technology.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Becoming an expert witness
    2. Computer forensics and investigations as a profession
    3. Computing forensic analysis
    4. Current computer forensics tools and procedures
    5. Data acquisition
    6. Digital evidence controls
    7. E-mail investigations
    8. Ethics of computer forensics investigation
    9. Introduction to Cybersecurity
    10. Introduction to VMware Virtualization
    11. Macintosh and Linux boot processes and disk structures
    12. Processing crime and incident scenes
    13. Recovering image files
    14. The investigators office and laboratory
    15. Understanding the parameters of computer investigations
    16. Working with Windows and DOS Systems
    17. Written investigative reports

    Learning Outcomes
    At the end of this course students will be able to:

    1. employ chain of evidence protocols during the investigative process
    2. implement computer security policies and electronic investigation procedures
    3. identify the need for a computer forensics investigation
    4. initiate a computer forensics investigation
    5. evaluate information contained in investigative reports
    6. interpret and process incident scenes
    7. explain the basic interactions of computer operating systems, hardware components and architecture, digital communications and networks
    8. apply appropriate cyber activity regulations, national and international digital transaction standards, and computer and information laws during the investigative process
    9. apply various technological tools to collect and capture digital data

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 1071 - Introduction to Big Data Analytics and Security

    Credits: 4
    Hours/Week: Lecture 3 Lab 1
    Course Description: This course provides a fundamental and introductory-level overview of the field of Big Data and related security topics to enable effective participation in Big Data and other analytics projects as a practitioner. It provides students with an opportunity to search, navigate, tag, build alerts, and create simple reports and dashboards with Splunk.  The course begins with an introduction to Big Data and the data analytics lifecycle to address business challenges that leverage Big Data. It also provides grounding in basic analytic methods and an introduction to Big Data analytics technology and tools, including MapReduce, Splunk, and Hadoop. This course employs both “open source technology” (Hadoop) and “commercial technology” (Splunk).  This course is for those new to the Big Data field as well as the security threat landscape. No prior programming experience or statistics background is required. An EMCDSA (Big Data industry) certification exam is part of this course.
    MnTC Goals
    None

    Prerequisite(s): Course placement into college-level English and Reading OR completion of ENGL 0950  with a grade of C or higher OR completion of RDNG 0940  with a grade of C or higher and qualifying English Placement Exam OR completion of RDNG 0950  with a grade of C or higher and ENGL 0090  with a grade of C or higher OR completion of ESOL 0051  with a grade of C or higher and ESOL 0052  with a grade of C or higher.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Introduction to Big Data Analytics
      1. Big Data Overview
      2. State of the Practice in Analytics
      3. The Data Scientist
      4. Big Data Analytics in Industry Verticals 
    2. Data Analytics Lifecycle
      1. Discovery
      2. Data Preparation
      3. Model Planning
      4. Model Building
      5. Communicating Results
      6. Operationalizing
    3. Review of Basic Data Analytic Methods Using R
      1. Using R to Look at Data - Introduction to R
      2. Analyzing and Exploring the Data
      3. Statistics for Model Building and Evaluation 
    4. Analytics - Theory And Methods
      1. K Means Clustering
      2. Association Rules
      3. Linear Regression
      4. Logistic Regression
      5. Naïve Bayesian Classifier
      6. Decision Trees
      7. Time Series Analysis
      8. Text Analysis
    5. Analytics - Technologies and Tools
      1. Analytics for Unstructured Data - MapReduce and Hadoop
      2. The Hadoop Ecosystem
    6. Big Data Threat
      1. Mapping Threats to Big Data Assets
      2. Incorrect designs / inadequate planning
      3. Identity theft
      4. Malicious activity / software
      5. Legal
      6. Organization
    7. Gap Analysis
      1. Gaps in data protection
      2. Use of cryptography in applications and back-end services
      3. Gaps on computing and storage models
      4. Gaps on roles (administrators, data scientist, and final users)
    8. The Endgame, or Putting it All Together
      1. Introduction to Splunk and the Search app
      2. Running basic searches with Splunk
      3. Search results
      4. Search job control
      5. Time range of a search
    9. Saving Results and Searches
      1. Search results
      2. Saving and sharing search results
      3. Searches  Scheduling
    10. Using Fields
      1. Fields
      2. Fields in searches
      3. Fields sidebar
    11. Tags and Event Types
      1. Tags
      2. Creating tags and using tags in a search
      3. Event types and their uses
      4. Creating and using event types in a search
    12. Creating Alerts
      1. Alerts
      2. Creating an alert
      3. Fired alerts
    13. Creating Reports
      1. Reports and charts
      2. Creating dashboards and adding reports
      3. Editing dashboards

    Learning Outcomes
    At the end of this course, students will be able to:

    1. employ the Data Analytics Lifecycle to address Big Data analytics projects.
    2. explain how to structure data analysis and get values out of Big Data.
    3. describe the landscape of Big Data Analytics by exploring several examples of real world problems.
    4. explain the impact of Big Data on data collection, data analysis, data reporting, data monitoring, and data storage.
    5. apply appropriate Splunk’s analytic techniques and tools to analyze Big Data.
    6. identify the possible problems that are associated with Big Data.
    7. reorganize the possible problems that are associated with Big Data as data science questions.
    8. install and run programs by using tools such as R and RStudio, MapReduce/Hadoop.
    9. build alerts and create simple reports and dashboards with Splunk.
    10. identify the threats affecting Big Data.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 1072 - Machine Learning with Big Data Technology

    Credits: 4
    Hours/Week: Lecture 3 Lab 1
    Course Description: This course is for students who want to attain Operational Intelligence level 4, (business insights) and covers implementing analytics and Big Data projects using Splunk’s statistics, machine learning, and built-in and custom visualization capabilities.   The course introduces students to the theory and methods of analytics and statistical modeling by exploring and operationalizing an analytics project using data visualization techniques.  Student will have the opportunity to apply all the concepts learned in this class by using Splunk Big Data technology to solve hands-on scenario-based examples and hands-on challenges throughout the course.  The Data Science Associate (EMCDSA) certification exam is part of this course.
    MnTC Goals
    None

    Prerequisite(s): CVF 1071  and CVF 1205  or CSCI 1060  with grades of C or higher OR instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Analytics Framework
    2. Exploratory Data Analysis
    3. Overview of Machine Learning
    4. Market Segmentation
    5. Transactional Analysis
    6. Anomaly Detection
    7. Estimation and Prediction
    8. Classification
    9. Data Visualization
    10. Splunk IT Service Intelligence Advanced Analytics
    11. Splunk User Behavior Analytics
    12. Custom Machine Learning with Splunk
    13. Modeling Use Cases with Splunk

    Learning Outcomes
    At the end of this course, students will be able to:

    1. define terms related to analytics and data science.
    2. describe the framework for multi-departmental analytics projects.
    3. identify analytics project best practices.
    4. identify common use cases.
    5. define exploratory data analysis.
    6. identify exploratory data analysis use cases.
    7. describe Splunk exploratory data analysis solutions.
    8. define fundamental concepts and terms associated with machine learning.
    9. model data using machine learning.
    10. split data for training and testing models.
    11. define market segmentation.
    12. identify market segmentation use cases.
    13. describe Splunk market segmentation solutions.
    14. define Transactional Analysis.
    15. identify Transactional Analysis use cases.
    16. describe Transactional Analysis solutions.
    17. define anomaly detection.
    18. identify anomaly detection use cases.
    19. describe Splunk anomaly detection solutions.
    20. define estimation and prediction.
    21. identify estimation and prediction use cases.
    22. describe Splunk estimation and prediction
    23. solutions.
    24. describe why classification is key to analytics.
    25. define key classification terms.
    26. evaluate classifier results.
    27. describe why data visualization is key to analytics.
    28. optimize Splunk visualizations for specific data and personas.
    29. enrich machine data with structured business data.
    30. prep data for advanced analytics using Splunk.
    31. leverage packaged machine learning (Splunk) to identify root cause of service disruptions.
    32. deploy machine learning using Splunk IT Service Intelligence.
    33. detect insider threats using Splunk User Behavior Analytics with built-in machine learning .
    34. establish baseline for normal operational patterns and use statistical measurements to determine threshold variability patterns.
    35. dynamically adapt thresholds to changing behavior and highlight anomalous activity.
    36. combine event data with advanced analytics to reduce event clutter, false positives, and extensive rules maintenance.
    37. implement automated detection of insider threats and external attacks.
    38. identify deviations across multiple entities-users, devices, and applications-by comparing them against an entity’s baseline and its dynamically generated peer groups.
    39. provide visualization of statistical aggregates across multiple entities along with enriched kill-chain visualization of a threat vector.
    40. administer model building, validation, and deployment.
    41. provide interactive examples for typical IT, security, business process, and IoT (Internet of Things) use cases
    42. build models using any of the 300+ algorithms accessible through the ML Toolkit.
    43. Use Splunk to automatically detect anomalies and patterns in data to help investigators identify and resolve incidents.
    44. identify normal data patterns in varying levels of detail in order to alert only on abnormal conditions for a specific set of circumstances.
    45. identify patterns of activity to anticipate and react to circumstances that might otherwise disrupt operations or revenues such as proactive maintenance.
    46. apply machine learning analysis to historical data and models to forecast demand, manage inventory, optimize operations, and react to changing conditions.​

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 1073 - Identity Security and Access Management I

    Credits: 3
    Hours/Week:
    Course Description: This course provides a fundamental and medium-level overview of the field of “Identity Security and Access Management (IAM)” and related security components to enable effective design and implementation of a secured IAM architecture.
    Hands-on lab activities include demonstration or use of Advanced Threat Analytics (ATA), Identity as a service (IDaaS), SaaS-based IAM offerings, SSO using SAML or OIDC, Identity Access Governance (IGA), LDAP in *nix/Windows/Mac, Intelligence: Intelligence: Identity access log monitoring and reporting, User behaviors analytics.
    MnTC Goals
    None

    Prerequisite(s): CVF 1083  with a grade of C or higher OR instructor consent.
    Corequisite(s): None
    Recommendation: CVF 1071   with a grade of C or higher.

    Major Content
    1. Managing Identities in a Digital WorldIdentity

    1. Identity and its theft
      1. Eliminating vulnerabilities in identification and authentication processes
      2. Compromising multiple identities
      3. Exploiting Object ID OID identities
    2. Ensuring strong authentication
      1. Enforcing authentication with biometrics
      2. Requiring multifactor authentication with smart cards
      3. Migrating to virtual smart cards and Trusted Platform Module TPM
    3. Implementing Single Sign-On (SSO)
      1. Interoperating via open industry standards, federated logon and claims
      2. Applying Kerberos identities in a domain
    4. Surveying IdM solutions
      1. Making identities portable with Secure Tokens
      2. On-premises and cloud-based identity management

    2. Synchronizing Identities

    1. Discovering identity stores
      1. Exploring identities in Kerberos tickets and AD attributes
      2. Identifying identities in SQL databases
    2. Demystifying MIM 2016
      1. Importing identities from Connected Data Source CDS into Connector Space CS
      2. Synchronizing identities into Metaverse MV
      3. Managing identities and rules with the SharePoint MIM Portal

    3. Implementing Identities in a PKI

    1. Inside PKI X.509 v3 certificates
      1. Expiring identities with certificate lifetimes
      2. Verifying identities with Subject Alternative Name
      3. Binding identities to certificates
    2. Establishing trust via certificates
      1. Validating trust with digital signatures
      2. Creating entity trust by importing a root CA
      3. Distributing trust to subordinate CAs
      4. Flowing trust with domain Group Policy Object GPO

    Learning Outcomes
    At the end of this course, students will be able to:

    1. explain various challenges associated with identity security and access management.
    2. discuss the fundamental concepts and the importance of Authorization, Authentication, Administration and Audit to Identity Security and Access Management.
    3. explain importance of single sign on and various technology and protocols needed to support Access Management.
    4. design, Install and Configure PKI solutions to manage trust between Relying Parties (RPs) and Identity Providers (IdPs).
    5. explain Microsoft Identity Manager (MIM).
    6. synchronize identities store among disparate authentication stores with 3rd party.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 1081 - Advanced Windows Forensics

    Credits: 3
    Hours/Week: Lecture 2 Lab 2
    Course Description: This course provides an in-depth examination of the forensic evidence left on Windows-based file systems using a variety of methods and tools to investigate any event for the workplace. It covers Windows methods that ensure maximum evidence capture without poisoning key evidence residing in disk space and memory. This course aligns with the objectives of the EnCase Certified Examiner (ENCE) certification.
    MnTC Goals
    None

    Prerequisite(s): CVF 1065  with a grade of C or higher or instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Guidance Software EnCase
      1. EnCase Overview
      2. EnCase Interface
      3. Basic Data Analysis
      4. Creating a Case
      5. Narrowing/Filtering data
      6. Reporting
      7. Keyword/Pattern Searching
    2. Cryptography Understand the fundamentals of encryption Understand decryption technologies Identify and recover encrypted data Perform decryption on various files
    3. Email Analysis Microsoft Outlook Microsoft Mail Web-based email Email headers
    4. Examining Windows Artifacts (XP, Vista, 7) Directory Structure Recycle Bin Thumbs.db Shortcut/Link (LNK) Files Prefetch Restore Points File metadata Volume Shadow Copy Log files
    5. Live Analysis & Incident Response Understand requirements for live response Perform analysis on a live system Employ automated toolkits to collect information from Windows-based systems Understand and implement Incident Response technologies Perform imaging and analysis of Windows-based systems
    6. Memory Analysis Issues in collecting Windows memory Image and analyze Windows memory Identify registry data in memory Identify process information in memory Identify passwords in memory
    7. Web Browser Analysis (Internet Explorer, Firefox, Chrome) Internet history Cookies Cached files Recovering deleted history Private browsing
    8. Windows Registry Analysis Identify the structure of the Windows registry identify and understand Windows registry artifacts Locate and examine deleted Windows registry data Perform testing of applications in the Windows registry Perform analysis of the Windows registry

    Learning Outcomes
    At the end of this course students will be able to:

    1. employ automated toolkits to collect information from Windows-based systems
    2. perform analysis of the Windows registry
    3. identify and recover encrypted and hidden data
    4. implement Incident Response Technologies
    5. perform imaging and analysis of Windows-based systems
    6. perform analysis on a live system

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 1083 - System Security and Network Auditing

    Credits: 3
    Hours/Week: Lecture 2 Lab 2
    Course Description: This course provides a technical focus on the numerous security controls and settings available on a Windows operating system, particularly in terms of compliance management and auditing. The material provides updated information on current Windows 2000, XP and .NET security issues. Additional topics include a variety of Microsoft utilities available to secure the Microsoft Windows OS, including HFNETCHK, MBSA, URLSCAN, and IIS Lockdown.
    MnTC Goals
    None

    Prerequisite(s): CVF 1085  with a grade of C or higher or instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Auditing and Automation Windows log files Windows scripting tools Scheduling automated tasks Windows auditing tools
    2. Permissions and User Rights NTFS permissions Network file sharing Anonymous access Encrypting file system (EFS) Network printer sharing Active directory permissions
    3. Securing Network Services Securing network services Auditing network services Host based firewalls Internet information service (IIS) Terminal services
    4. Security Policies and Templates Microsoft security policies Group policy management Security templates Security configuration & analysis
    5. Service Packs, Patches and Backups Service packs /hotfixes Deployment lifecycle Windows update Software update services (SUS) Systems management Server (SMS)
    6. The Windows Infrastructure Microsoft operating systems Workgroups & local accounts Active directory Forests, domains, and trusts Domain users & groups

    Learning Outcomes
    At the end of this course students will be able to:

    1. implement computer security policies in a network environment
    2. explain user rights and the need for documented permission
    3. evaluate information contained in network and Windows log files
    4. implement security policies from templates and other security tools from Windows
    5. configure Windows software management applications such as SUS, SMS, and Windows Update to ensure security compliance across the network
    6. explain the basic windows infrastructure
    7. interpret firewall and IIS log files
    8. utilize Windows scripting, auditing, and scheduling tools

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 1085 - Network Traffic Analysis: Tools & Technology

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This course explores the use of TCPDUMP and Wireshark to perform network analyses for communications troubleshooting and forensics investigations. Course topics include both the fundamentals of and advanced topics in TCPIP, the live capture and offline analysis of hundreds of protocols, and troubleshooting, optimizing and securing a network based on the evidence found in captured network traffic. Students will have the opportunity to engage in hands-on lab exercises using real-world scenarios that will help students put theory into practice. Certification as a Wireshark Network Analyst is part of this course.
    MnTC Goals
    None

    Prerequisite(s): System administration experience on Microsoft Windows or Linux operating systems.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Analyze Address Resolution Protocol (ARP) Traffic
      1. Define the Purpose of ARP Traffic
      2. Analyze Normal ARP Requests/Responses
    2. Analyze Domain Name System (DNS) Traffic
      1. Define the Purpose of DNS
      2. Analyze Normal DNS Queries/Responses
      3. Analyze DNS Problems
    3. Analyze Dynamic Host Configuration Protocol (DHCP) Traffic
      1. Define the Purpose of DHCP
      2. Analyze Normal DHCP Traffic
      3. Analyze DHCP Problems
      4. Dissect the DHCP Packet Structure
    4. Analyze Email Traffic
      1. Define the Purpose of POP
      2. Analyze Normal POP Communications
      3. Analyze POP Problems
      4. Dissect the POP Packet Structure
    5. Analyze File Transfer Protocol (FTP) Traffic
      1. Define the Purpose of FTP
      2. Analyze Normal FTP Communications
      3. Analyze FTP Problems
    6. Analyze Hypertext Transfer Protocol (HTTP) Traffic
      1. Define the Purpose of HTTP
      2. Analyze Normal HTTP Communications
      3. Analyze HTTP Problems
      4. Dissect HTTP Packet Structures
      5. Filter on HTTP or HTTPS Traffic
    7. Analyze Internet Control Message Protocol (ICMP) Traffic
      1. Define the Purpose of ICMP
      2. Analyze Normal ICMP Traffic
      3. Analyze ICMP Problems
    8. Analyze Internet Protocol (IPv4) Traffic
      1. Define the Purpose of IPv4
      2. Analyze Normal IPv4 Traffic
      3. Analyze IPv4 Problems
    9. Analyze Suspect Traffic
      1. Describe Suspect Traffic
      2. Identify Vulnerabilities in the TCP/IP Resolution Processes
      3. Identify Unacceptable Traffic
      4. Find Maliciously Malformed Packets
    10. Analyze Transmission Control Protocol (TCP) Traffic
      1. Define the Purpose of TCP
      2. Analyze Normal TCP Communications
      3. Define the Establishment of TCP Connections
      4. Define How TCP-based Services are Refused
      5. Track TCP Packet Sequencing
    11. Analyze User Datagram Protocol (UDP) Traffic
      1. Define the Purpose of UDP
      2. Analyze Normal UDP Traffic
    12. Baseline “Normal” Traffic Patterns
      1. Define the Importance of Baselining
      2. Baseline Broadcast and Multicast Types and Rates
      3. Baseline Boot up Sequences
      4. Baseline Login/Logout Sequences
    13. Capture Traffic
      1. Know Where to Tap into the Network
      2. Know When to Run Wireshark Locally
      3. Capture Traffic on Switched Networks
      4. Use a Test Access Port (TAP) on Full Duplex Networks
    14. Colorize Traffic
      1. Use Colors to Separate Traffic
      2. Share and Manage Coloring Rules
      3. Identify Why a Packet is a Certain Color
    15. Create and Apply Capture Filters
      1. Describe the Purpose of Capture Filters
      2. Build Your Own Set of Capture Filters
      3. Filter by a Protocol
    16. Create and Apply Display Filters
      1. Define the Purpose of Display Filters
      2. Create Display Filters Using Auto Complete
      3. Apply Saved Display Filters
      4. Use the Expressions Filter System
      5. Make Display Filters Quickly Using Right-Click Filtering
    17. Customize Wireshark Profiles
      1. Define the Purpose of Wireshark Profiles
      2. Share Profiles
      3. Create a Corporate Profile
      4. Create a WLAN Profile
    18. Define Global and Personal Preferences
      1. Find Your Configuration Folders
      2. Set Global and Personal Configurations
      3. Customize Your User Interface Settings
    19. Define Time Values and Interpret Summaries
      1. Use Time to Identify Network Problems
      2. Define How Wireshark Measures Packet Time
      3. Choose the Ideal Time Display Format
    20. Detect Scanning and Discovery Processes
      1. Define the Purpose of Discovery and Reconnaissance
      2. Detect ARP Scans (aka ARP Sweeps)
      3. Detect ICMP Ping Sweeps
    21. Effective Use of Command-Line Tools
      1. Define the Purpose of Command-Line Tools
      2. Use Wireshark.exe (Command-Line Launch)
      3. Capture Traffic with Tshark
      4. List Trace File Details with Capinfos
    22. Find the Top Causes of Performance Problems
      1. Troubleshoot Performance Problems
      2. Identify High Latency Times
      3. Point to Slow Processing Times
      4. Find the Location of Packet Loss
    23. Follow Streams and Reassemble Data
      1. Follow and Reassemble UDP Conversations
      2. Follow and Reassemble TCP Conversations
      3. Identify Common File Types
      4. Follow and Reassemble SSL Conversations
    24. Graph IO Rates and TCP Trends
      1. Use Graphs to View Trends
      2. Generate Basic I/O Graphs
      3. Filter I/O Graphs
      4. Generate Advanced I/O Graphs
    25. Interpret Basic Trace File Statistics
      1. Launch Wireshark Statistics
      2. Identify Network Protocols and Applications
      3. Identify the Most Active Conversations
      4. List Endpoints and Map them on the Earth
      5. List Conversations or Endpoints for Specific Traffic Types
      6. Evaluate Packet Lengths
    26. Introduction to 802.11 (WLAN) Analysis
      1. Analyze Signal Strength and Interference
      2. Capture WLAN Traffic
      3. Compare Monitor Mode and Promiscuous Mode
      4. Set up WLAN Decryption
    27. Introduction to Wireshark
      1. Describe Wireshark’s Purpose
      2. Know How to Obtain the Latest Version of Wireshark
      3. Compare Wireshark Release and Development Versions
      4. Report a Wireshark Bug or Submit an Enhancement
    28. Network Analysis Overview
      1. Define the Purpose of Network Analysis
      2. List Troubleshooting Tasks for the Network Analyst
      3. List Security Tasks for the Network Analyst
      4. List Optimization Tasks for the Network Analyst
    29. Network Forensics Overview
      1. Compare Host Forensics to Network Forensics
      2. Gather Evidence
      3. Avoid Detection
    30. Save, Export and Print Packets
      1. Save Filtered, Marked and Ranges of Packets
      2. Export Packet Contents for Use in Other Programs
      3. Save Conversations, Endpoints, I/O Graphs and Flow Graph Information
    31. TCP/IP Analysis Overview
      1. Define Basic TCP/IP Functionality
      2. Define the Multistep Resolution Process
      3. Define Port Number Resolution
      4. Define Route Resolution for a Remote Target
      5. Define Local MAC Address Resolution for a Gateway
    32. Use Wireshark’s Expert System
      1. Launch Expert Info Quickly
      2. Colorize Expert Info Elements
      3. Filter on TCP Expert Information Elements
      4. Define TCP Expert Information
    33. Voice over IP (VoIP) Analysis Fundamentals
      1. Define VoIP Traffic Flows
      2. Analyze VoIP Problems
      3. Analyze SIP and RTP Traffic

    Learning Outcomes
    At the end of this course students will be able to:

    1. use Wireshark’s Expert System to understand various traffic problems.
    2. use time values to identify network performance problems.
    3. utilize tools to recognize traffic patterns associated with suspicious network behavior.
    4. capture packets on wired and wireless networks.
    5. create statistical charts and graphs to pinpoint performance issues.
    6. configure various open source tools for network forensics analysis.
    7. filter out traffic for more efficient troubleshooting and analysis.
    8. place the analyzer properly for traffic capture on a variety of network types.
    9. configure Wireshark for best performance and non-intrusive analysis.
    10. customize Wireshark coloring to focus on network problems faster.
    11. navigate through, split, and work with large traffic files.
    12. explain principles of network forensics analysis and how to apply them.
    13. analyze normal/abnormal: Address Resolution Protocol (ARP) traffic, Domain Name System (DNS) traffic, Hypertext Transport Protocol (HTTP/HTTPS) traffic, Internet Control Messaging Protocol (ICMP) traffic, Internet Protocol v4 (IPv4) traffic
    14. analyze normal/abnormal: Transmission Control Protocol (TCP) traffic, User Datagram Protocol (UDP) traffic
    15. recognize potential network security infrastructure misconfigurations.
    16. use the TCP/IP Resolution Flowchart to identify possible communication faults.
    17. reconstruct suspicious activities for detailed analysis and evidentiary purposes.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 1091 - Cloud Computing and Virtualization Forensics

    Credits: 3
    Hours/Week: Lecture 2 Lab 2
    Course Description: This course focuses on the issues surrounding cloud forensics, cloud deployment and service models, cloud infrastructure, and key considerations in migrating to cloud computing. Using the U.S. National Institute of Standards and Technology as a guide, the course addresses the technologies required to build and support classic (traditional), virtualized, and cloud data center environments. Students will explore the key considerations and steps involved in transitioning from the current model of physical data centers to the emerging cloud-computing environment. The hands-on focus of this class addresses the skills and processes involved in performing forensic investigation and analysis, migrating to a cloud-based infrastructure, and choosing the best deployment model for an organization. The EMCCIS Certification (CIS) exam is part of this course.
    MnTC Goals
    None

    Prerequisite(s): CVF 1065  with a grade of C or higher or instructor consent.
    Corequisite(s): None
    Recommendation: CVF 1065  with a grade of C or higher OR instructor consent.

    Major Content
    1. Introducing VMware vCloud
    2. Virtualized Data center–Networking
    3. Virtualized Data center–Desktop and Application
    4. Business Continuity in VDC
    5. Cloud Computing Primer
    6. Cloud Infrastructure and management
    7. Cloud Security and Forensics
    8. Cloud Migration Considerations
    9. IT Server Delivery
    10. Building a Private Cloud
    11. Cost Analysis and Reporting
    12. Virtualized Data center–Computer
    13. Virtualized Data center–Storage

    Learning Outcomes
    At the end of this course students will be able to:

    1. demonstrate in a lab environment how IT resources are delivered, consumed, metered, and secured in a vCloud environment.
    2. demonstrate the knowledge of how cloud computing benefits both IT departments and their end users
    3. describe the functionality and benefits of the vCloud solution.
    4. explain vSphere 5.0 storage, network, and virtualization concepts.
    5. perform forensics investigation using the VMware vSphere Client.
    6. use VMware vSphere Client to deploy and manage virtual machine.
    7. allocate CPU and memory resources hierarchically to specific business functions.
    8. configure ESXi clusters to automatically balance virtual machine workloads.
    9. perform data recovery in a simulated data ware house physical disaster.
    10. perform network penetration testing and vulnerability assessment of a standard network.
    11. use VMware vSphere vMotion to migrate live virtual machines.
    12. use vSphere Storage vMotion to migrate live virtual machine data.
    13. conduct a full IT audit as a forensics investigator.
    14. use vCenter Server alarms and performance graphs to actively monitor the data center environment.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 1092 - Information Storage Management and Security

    Credits: 3
    Hours/Week: Lecture 2 Lab 2
    Course Description: This course explores information on cyber-storage infrastructure, including virtual environments, from a digital forensics and network penetration perspective. Additional topics include the architectures, features, and benefits of Intelligent Storage Systems, such as FC-SAN, IP-SAN, NAS, object-based, and unified storage. The EMCISM Certification (ISM) exam is part of this course.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: CVF 1065  with a grade of C or higher OR instructor consent.

    Major Content
    1. Allocating Computer Resources to Business Functions
      1. CPU and memory resource management techniques used in ESXi
      2. Virtual machine resource controls to allocate CPU and memory resources
      3. Resources pools to hierarchically allocate CPU and memory resources
    2. Balancing Virtual Machine Workloads
      1. Operation and scalability benefits of vSphere Distributed Resource Scheduler (DRS)
      2. DRS cluster and resource pools
      3. Operation and scalability benefits of Storage DRS
      4. Storage DRS cluster
      5. Operation and cost benefits of vSphere Distributed Power Management
    3. Creating Virtual Machines
      1. Virtual machine virtual hardware components
      2. Templates to deploy virtual machines
      3. Functionality and benefits of installing VMware Tools on virtual machines
      4. Guest operating system customization
    4. Extending VMware vSphere Capabilities
      1. How different VMware products and features work together to reduce the costs and improve the efficiency, availability, flexibility, and manageability of your datacenter
    5. Forensics and Cloud computing
      1. Forensics imaging in the cloud
      2. Cloud computing and pen test
      3. Securing the storage Infrastructure
      4. Managing the Storage Infrastructure
    6. Forensics on Network Storage
      1. FC SAN
      2. IP SAN
      3. FCoE
      4. NAS
    7. High Availability and Fault Tolerance
      1. Operation and availability benefits of vSphere High Availability
      2. vSphere HA cluster
      3. Operation and availability benefits of VMware Fault Tolerance
      4. Virtual machine for fault tolerance
    8. Introduction to Business continuity
      1. Backup and Archive
      2. Local replication
      3. Remote Replication
    9. Introduction to Information Storage and Forensics
      1. Big data analytics
      2. Personal data management
      3. Data center environmental control parameters
      4. File system e. Memory virtualization
    10. Migrating Virtual Machines
      1. Operation and benefits of vMotion and Storage vMotion
      2. vMotion to migrate a live virtual machine
      3. Storage vMotion to migrate a live virtual machine’s data
    11. Monitoring the Virtual Datacenter
      1. vCenter Server monitoring capabilities, including performance graphs and alarms
      2. Performance graphs to monitor ESXi hosts
      3. ESXi host and virtual machine alarms
    12. Virtual Infrastructure Overview and Forensics
      1. Server virtualization concepts
      2. vSphere components, including vCenter Server, ESXi, and the vSphere Client
      3. Virtual network and storage components
      4. vSphere Client management interface

    Learning Outcomes
    At the end of this course students will be able to:

    1. describe how cloud computing benefits both IT departments and their end users.
    2. design and implement business continuity planning and determine optimum information availability strategies.
    3. demonstrate in a lab environment how IT resources are delivered, consumed, metered, and secured in a vCloud environment.
    4. explain storage, network, and virtualization concepts.
    5. implement the correct storage networking option and unified storage solutions that are crucial to meeting customer requirements.
    6. define the Business Continuity (BC) and Disaster Recovery (DR) objectives is critical for designing and implementing cost-effective BC/DR solutions.
    7. discuss benefits of, and deploy cloud computing models and service offerings.
    8. identify storage security threats and set appropriate mechanisms in place.
    9. conduct a full IT audit as a forensics investigator.
    10. describe the functionality and benefits of the Cloud solution.
    11. discuss backup, recovery, and archival requirements and solutions for business-critical data.
    12. allocate CPU and memory resources hierarchically to specific business functions.
    13. perform data recovery in a simulated data ware house physical disaster.
    14. perform forensics investigation using VMware vSphere Client.
    15. perform network penetration testing and vulnerability assessment of a standard network.
    16. recognize the critical role of ‘information’ infrastructure.
    17. set, monitor, and report key information storage management parameters, including storage tiering policies.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 1205 - Scripting and Python for Cybersecurity Professionals

    Credits: 3
    Hours/Week: Lecture 2 Lab 2
    Course Description: This course is designed to appeal to a wide variety of backgrounds ranging from students without any coding experience all the way up to skilled Python developers looking to increase their expertise and map their capabilities to penetration testing. This course includes several hands-on labs designed to teach students the skills required to develop Python programs and how to apply those skills in penetration testing engagements. Topics include introduction to Linux scripting, Windows scripting, basic concept of Python and progress to advanced topics and their applications.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: CVF 1085  with a grade of C or higher OR instructor consent. System administration experience on Microsoft Windows or Linux operating systems.

    Major Content
    1. Python Scripting - Language Essentials
      • Introduction to Interpreted Languages and Python
      • Data Types and variables
      • Operators and Expressions
      • Program Structure and Control
      • Functions and Functional Programming
      • Classes, Objects and other OOPS concepts
      • Modules, Packages and Distribution
      • Python in Linux and Unixes
      • Python in Windows
      • Python in Mobiles: iPhone and Androids
      • Python in Embedded Devices: Routers
      • Program Portability
      • Lab Exercises Module
    2. System Programming and Security
      • I/O in Python
      • File and Directory Access
      • Multithreading and Concurrency
      • Inter Process Communication (IPC)
      • Permissions and Controls
      • Case Studies
      • Lab Exercises Module
    3. Network Security Programming - Sniffers and Packet Injectors
      • Raw Socket basics
      • Socket Libraries and Functionality
      • Programming Servers and Clients
      • Programming Wired and Wireless Sniffers
      • Programming arbitrary packet injectors
      • PCAP file parsing and analysis
      • Case Studies
      • Lab Exercises Modeule
    4. Web Application Security
      • Web Servers and Client scripting
      • Web Application Fuzzers
      • Scraping Web Applications - HTML and XML file analysis
      • Web Browser Emulation
      • Attacking Web Services
      • Application Proxies and Data Mangling
      • Automation of attacks such as SQL Injection, XSS etc.
      • Case Studies
      • Lab Exercises Module
    5. Exploitation Techniques
      • Exploit Development techniques
      • Immunity Debuggers and Libs
      • Writing plugins in Python
      • Binary data analysis
      • Exploit analysis Automation
      • Case Studies
      • Lab Exercises Module
    6. Malware Analysis and Reverse Engineering
      • Process Debugging basics
      • Pydbg and its applications
      • Analyzing live applications
      • Setting breakpoints, reading memory etc.
      • In-memory modifications and patching
      • Case Studies
      • Lab Exercises Module
    7. Attack Task Automation
      • Task Automation with Python
      • Libraries and Applications
      • Case Studies
      • Lab Exercises Module
    8. Further Study and Roadmap
      • Course consolidation
      • Interesting project ideas to pursue Module
    9. Exam Pattern and Mock Exam
      • Exam format
      • Example Questions
      • Mock Exam

    Learning Outcomes
    At the end of this course students will be able to:

    1. use Python to launch Metasploit basics and framework organization.
    2. create server and client side exploitation using Python.
    3. launch Meterpreter - extensions and scripting using Python.
    4. write a script to launch database integration and automated exploitation.
    5. write Python script to create Post Exploitation Kung-Fu.
    6. create a token stealing and impersonation, backdoors and rootkits, pivoting and port forwarding using Python.
    7. use Python script to create Railgun and custom scripting, backdoor an executable.
    8. write Metasploit modules - auxiliary and exploit using batch and Python script.
    9. create exploit research with Metasploit- buffer overflows, SEH using Python.
    10. design Social Engineering Toolkit (SET) and Armitage with Python script.
    11. use Python and scripting solution to solve a scenario-based hacking using Metasploit.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2071 - Hadoop Administration

    Credits: 3
    Hours/Week: Lecture 2 Lab 1
    Course Description: This course builds on topics in CVF 1071  , Introduction to Big Data Analytics and Security.  It provides students with a comprehensive introduction to the steps necessary to install, configure, operate, and maintain Hadoop.  The course begins with an overview of the Big Data landscape and then dives into a system administration working view of running Hadoop.  Students will also have the opportunity to install Splunk on top of Hadoop and examine how to process and analyze the data using Splunk’s Search Processing Language (SPL) as an implementation of MapReduce function.  This course employs both “open source technology” (Hadoop) and “commercial technology” (Splunk).
    MnTC Goals
    None

    Prerequisite(s): CVF 1071   and CVF 1205  with grades of C or higher, or instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content

    1. Introduction to Hadoop
      1. History of Hadoop
      2. Core Components of Hadoop
      3. Fundamental Concepts of Hadoop

    2. Planning Hadoop Cluster

    1. Basic Planning Considerations
    2. Choosing Hardware
    3. Network Considerations
    4. Nodes Configuring
    5. Planning for Cluster Management

    3. Hadoop Distributed File System 

    1. HDFS Features
    2. Reading and Writing Files
    3. NameNode Considerations
    4. HDFS Security
    5. Namenode Web User Interface
    6. Hadoop File Shell

    4. Getting Data into HDFS

    1. Pulling data from External Sources with Flume
    2. Using Sqoop to import Data from Relational Databases
    3. Best Practices
    4. REST Interfaces

    5. MapReduce

    1. Architectural Overview
    2. MapReduce overview
    3. Features of MapReduce
    4. YARN MapReduce Version 2
    5. Failure Recovery
    6. The JobTracker Web User Interface

    6. Installation, Initialization, and Configuration of Hadoop

    1. Configuration and Deployment Types
    2. Installing Hadoop
    3. Specifying the Hadoop Configuration
    4. Initial HDFS and MapReduce Configuration
    5. Log Files

    7. Installing/Configuring

    1. Hive
    2. Impala
    3. Pig

    8. Hadoop Clients

    1. What is Hadoop Client?
    2. Installing and Configuring Hadoop Clients
    3. Installation and Configuration of Hue
    4. Authentication and Configuration of Hue

    9. Hadoop Advanced Cluster Configuration

    1. Advanced Configuration Parameters
    2. Configuring Hadoop Ports
    3. Configuring HDFS for Rack
    4. Awareness & HDFS High Availability
    5. Explicitly Including and Excluding Hosts

    10. Hadoop Security

    1. Importance of Hadoop Security
    2. Hadoop’s Security System Concepts
    3. What Kerberos Is and How it Works
    4. Using Kerberos to Secure a Hadoop Cluster

    11. Scheduling and Managing Jobs

    1. Scheduling Hadoop Jobs
    2. Managing Running Jobs
    3. Configuring the FairScheduler

    12. Cluster Maintenance

    1. Checking HDFS Status
    2. Copying Data Between Clusters
    3. Removing /Adding Cluster Nodes
    4. Rebalancing of Cluster
    5. NameNode Metadata Backup
    6. Cluster Upgrades

    13. Monitoring and Troubleshooting Cluster

    1. General System Monitoring
    2. Clusters Monitoring
    3. Managing Hadoop’s Log Files
    4. Common Troubleshooting Issues

     
    Learning Outcomes
    At the end of this course, students will be able to:

    1. describe history of Hadoop.
    2. describe the fundamental concepts of using Big Data.
    3. identify where Hadoop fits into a Big Data strategy.
    4. design a plan to create Hadoop cluster.
    5. explain HDFS features and NameNode.
    6. demonstrate how to get data into HDFS
    7. explain how to work with MapReduce
    8. implement installation and configuration of Hadoop.
    9. install and Configure Hadoop Clients.
    10. configure HDFS for Rack Awareness & HDFS High Availability
    11. administer cluster maintenance.
    12. schedule Hadoop’s job
    13. describe Hadoop cluster maintenance.
    14. monitor and troubleshoot Hadoop cluster
    15. identify common integration points.
    16. explain Hadoop Security.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2072 - Visualization and Reporting for Big Data

    Credits: 3
    Hours/Week: Lecture 2 Lab 1
    Course Description: This course builds on basic search and reporting skills to chart and visualize data. It focuses on more advanced search and reporting commands. It provides students with an opportunity to create reports as well as complex dashboards, forms, and visualizations.  Students are guided step-by-step through complex searches to produce multiple types of graphs and customized visualizations. This course employs both “open source technology” (Hadoop) and “commercial technology” (Splunk).
    MnTC Goals
    None

    Prerequisite(s): CVF 1071  with a grade of C or higher, or instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1.Beyond Search Fundamentals

    1. Proper case in searches
    2. Splunk’s search process
    3. Search inspector

    2. Using Sub-Searches

    1. Sub-searches - Matching values
    2. Sub-search - Non matching values

    3. Using Advanced Statistics

    1. Statistical functions
    2. Appendpipe command
    3. Streamstats and eventstats commands

    4. Using Data Manipulation, and Filtering

    1. Data manipulation functions:
      1. bin
      2. xyseries
      3. foreach
    2. Data filtering search commands:
      1. where functions: like, isnull
      2. eval functions: strftime, upper, case, replace

    5. Using Advanced Charting

    1. Advanced charting commands and functions:
    2. untable
    3. addtotals
    4. append and appendcols

    6. Using Advanced Transactions

    1. Events logged - Before
    2. Events logged - After
    3. Complete transactions
    4. Analyze transactions

    7. Sorting, Searching, and Reformatting Time

    1. Event searching - Custom time ranges
    2. Event searching - Window of time
    3. Event searching - Relative dates
    4. Return command

    8. Using Advanced Lookups

    1. Lookup table
    2. Baseline lookup table

    9. Introduction to Views

    1. Views - Definition
    2. Views - Best practices
    3. Common information model
    4.  Splunk CIM

    10. Adding Content

    1. Data structure requirements
    2. Primary transforming commands
    3. Dashboard performance
    4. Acceleration

    11. Editing XML

    1. Simple XML syntax
    2. Categories of panels
    3. Types of panel objects
    4. Post-process searches
    5. Charts

    12. Using Tokens

    1. Form inputs
    2. Tokens and filters
    3. Cascading menus
    4. Dynamic drilldowns

    13. Customizing Dashboards

    1. Simple XML extensions
    2. Search managers
    3. Custom visualizations
    4. Autodiscovery

    Learning Outcomes
    At the end of this course, students will be able to:

    1. use the proper case in searches.
    2. describe Splunk’s search process.
    3. use the search inspector to view search performance.
    4. use sub-searches to correlate data by finding events that match given criteria.
    5. display the array data model of an image with graphical representations.
    6. use statistical functions in Splunk: min, max, mean, median, and standard deviation.
    7. use the appendpipe, streamstats and eventstats commands.
    8. use eval, where, bin, xyseries, foreach, filtering commands and functions.
    9. use untable, addtotals, append, and appendcols charting commands and functions.
    10. find a suspicious event using the transaction function in Splunk.
    11. search for events using custom time ranges.
    12. use the return command to pass values up from a sub search.
    13. build a baseline lookup table and reference the baseline values in alerts.
    14. identify best practices for creating views.
    15. define the common information model.
    16. normalize data to the Splunk common information model.
    17. define data structure requirements.
    18. identify the primary transforming commands.
    19. describe methods to improve dashboard performance.
    20. define the simple XML syntax.
    21. name categories of panels.
    22. identify types of panel objects.
    23. identify types of form inputs.
    24. use tokens and filters.
    25. create cascading menus and dynamic drilldowns.
    26. use simple XML extensions to customize Splunk dashboard.
    27. identify types of search managers.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2073 - Identity Security and Access Management II

    Credits: 3
    Hours/Week:
    Course Description: This course builds on topics in CVF 1073, Identity Security & Access Management I. It provides students with comprehensive and advanced steps necessary to design, install, configure, operate, and maintain a secured IAM solution.
    Students will have the opportunity to design, install, configure, and operate during hands-on lab activities such as Advanced Threat Analytics (ATA), Identity as a service (IDaaS), SaaS-based IAM offerings, SSO using SAML or OIDC, Identity Access Governance (IGA), LDAP in *nix/Windows/Mac, Intelligence: Intelligence: Identity access log monitoring and reporting, User behaviors analytics.
    This course employs both “open source technology” (*nix) and “commercial technology” (Splunk), Cloudera, ATA, Tableau.
    MnTC Goals
    None

    Prerequisite(s): CVF 1073  with a grade of C or higher.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Implementing Identities in a PKI

    1. Inside PKI X.509 v3 certificates
      1. Expiring identities with certificate lifetimes
      2. Verifying identities with Subject Alternative Name
      3. Binding identities to certificates
    2. Establishing trust via certificates
      1. Validating trust with digital signatures
      2. Creating entity trust by importing a root CA
      3. Distributing trust to subordinate CAs
      4. Flowing trust with domain Group Policy Object GPO
    3. Building an enterprise trust hierarchy
      1. Publishing Certificate Revocation Lists (CRLs)
      2. Increasing security with an offline root CA
      3. Accessing directories with LDAP
      4. Configuring Online Certificate Status Protocol OCSP
    4. Trusting an external identity provider
      1. Forming a certificate chain
      2. Locating the CA Trust Anchor

    2. Expanding Trust with Federated Identity Management

    1. Federated management with Microsoft AD FS 3.0
      1. Authenticating with a trusted Identity Provider IdP
      2. Controlling access with claims
      3. Verifying SAML tokens with Relaying Party RP
      4. Striving for universally interoperable and portable identity
    2. Creating claims-aware applications
      1. Building claims-aware applications with Windows Identity Foundation WIF
      2. Abstracting SAML, WS-Trust and WS-Federation protocols
    3. Trusting external Identity Providers
      1. Extending ADFS externally with Web Application Proxy WAP
      2. Mapping external ADFS namespaces with DNS

    3. Delivering Identities to the Cloud

    1. Windows Azure federation
      1. Extending on-premises Active Directory (AD) to Azure AD
      2. Implementing SSO in Azure for Office 365 and SaaS applications
    2. Amazon AWS federation
      1. Authenticating with Amazon IAM roles
      2. Microsoft federated log-in to Amazon services using SAML tokens

    4. Mobile Identity Management with BYOD

    1. Enrolling mobile devices
      1. Joining devices with Workplace Join
      2. Enacting Device Registration Services DRS
    2. Planning a Federated Identity Roadmap
      1. Achieving the FICAM IdM vision
      2. Creating organizational identity management policy

    Learning Outcomes
    At the end of this course, students will be able to:

    1. implement identity/access management to control access to IT resources
    2. build a Public Key Infrastructure (PKI) to manage trust between Identity Providers (IdPs) and Relying Parties (RPs)
    3. streamline identity authentication for applications with claims
    4. seamlessly authenticate to the cloud with Federated
    5. explain Microsoft Identity Manager (MIM).
    6. synchronize identities store among disparate authentication stores with 3rd party.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2075 - Computer Investigative Law for Forensic Analysts

    Credits: 3
    Hours/Week: Lecture None Lab None
    Course Description: This course presents the essential legal foundation for computer professionals managing or working in incident handling teams. Topics include: the legal constraints of information sharing, rules for voluntary disclosure, and response to government requests for information as well as the use of honey-pots, hack-back, and trace-back procedures as investigative strategies within the legal limitations of the information technology industry. Emphasis is placed on preserving and maintaining chain of custody protocols for computer evidence.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Collecting evidence for trial chain of custody protocols
    2. Computer law - legal permissions and restrictions
    3. Defending computer networks
    4. Hacker law wiretapping and wireless networking
    5. International issues
    6. Internet service providers
    7. Investigative procedures using computers
    8. Law enforcement
    9. Minnesota law relating to information technology

    Learning Outcomes
    At the end of this course students will be able to:

    1. work legally with upstream and downstream providers
    2. use honeypots, hack-back, and trace-back procedures as investigative strategies within the legal limitations of the information technology industry.
    3. preserve evidence integrity by maintaining chain of custody of protocols for computer evidence
    4. interpret and apply hacker law relating to wiretapping and wireless networking
    5. operate within the legal constraints of information sharing, voluntary disclosure, and response to government requests for information

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2080 - Advanced Cyber Forensics

    Credits: 3
    Hours/Week: Lecture 2 Lab 2
    Course Description: This forensic course begins with file system fundamentals but moves rapidly to using advanced open source toolkits to perform a forensic audit of suspect computer systems. Forensic analysis is performed on gathered evidence contained in “disk images.” Using a disk image of a computer involved in an actual forensic case, students apply what they learn in class by investigating the incident in a hands-on setting.
    MnTC Goals
    None

    Prerequisite(s): CVF 1065  and CVF 1092  with grades of C or higher or instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Collecting Persistent Data FRGCF
    2. Advanced Linux and Forensic tools
    3. Collecting Volatile Data FRGCF
    4. Linux File system Concept
    5. Image File Utilization/Conversion (E01, Raw, AFF)
    6. Linux File system Data Structures
    7. Basic Linux and Forensics tools
    8. Course Introduction
    9. Analyzing and Mounting File System
    10. SLEUTHKIT
    11. Shadow Forensics & System Restore Points
    12. Reporting
    13. MACtime Analysis-Done
    14. Data Recovery
    15. Volatile Evidence Analysis
    16. File Sorting and Hash Comparisons
    17. Windows Artifacts Analysis
    18. Automated GUI Based Forensic Toolkits
    19. Network Analysis tools, Network Forensics Analysis
    20. Linux Media Analysis -Case Study
    21. Live Responses and Volatile Evidence Collection -Case Study
    22. Collecting & Analyzing Windows Artifact-Case Study
    23. Network Forensics -Case Study
    24. Windows Media Analysis -Case Study
    25. Discovering Malware on a Host -Case Study
    26. Malware & Root kit Analysis -Case study

    Learning Outcomes
    At the end of this course students will be able to:

    1. create MAC timeline.
    2. extract deleted partitions and recover data file.
    3. conduct/analyze file layers using file name
    4. analyze file system and data recovery using metadata information.
    5. follow forensic methodologies for analyzing a case end to end.
    6. analyze Linux file system.
    7. examine difference in VISTA/XP forensics.
    8. analyze and compare files.
    9. demonstrate competency using autopsy forensic browser to analyze a case
    10. mount/examine windows forensic images.
    11. perform VISA/Windows 7, Server 2008 shadow volume copy analysis.
    12. perform data analysis of file sorting using hash comparison.
    13. perform examination of file name layer.
    14. perform recovery of key windows file.
    15. perform super timeline analysis.
    16. perform windows XP restore point analysis.
    17. recover deleted registry keys and data.
    18. recover deleted windows key files.
    19. restore points, shadow copy and registry data.
    20. use forensic tools to extract/recover data using file headers.
    21. utilize GUI toolkit to follow forensic methodology.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2082 - EnCase Forensics

    Credits: 3
    Hours/Week: Lecture 2 Lab 2
    Course Description: This course provides an in-depth study of EnCase Forensic, a commonly used tool in both corporate and law enforcement environments. Additionally, this course reviews and solidifies important concepts in forensic methodology and forensic artifacts. This course aligns with the objectives of the EnCase Certified Examiner (EnCE) certification. Successful completion of the course requires passing the EnCE written certification exam.
    MnTC Goals
    None

    Prerequisite(s): CVF 1081  with a grade of C or higher OR instructor consent
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Acquisition of a hard disk -Write-blocking technologies -The basics of acquiring a forensically sound copy of data from a removable disk -Acquisition using a forensically sound Linux operating system -Drive-to-drive acquisition -Network crossover-cable acquisition -Previewing computer systems -Verification of an evidence file
    2. Analysis Techniques -File types -Creation of keywords and searching -Basic bookmarking -Signature analysis -Hash analysis -Installing external viewers -Detailed copy/UnErase options -Restoring evidence -Timeline view -Single files -Logical evidence files -Examination methods concerning flash cards & similar devices
    3. Compound files -Mounting and searching of compound files -Documenting data contained within these compound files -Pitfalls of not examining compound files properly
    4. Conditions and queries -Uses -Creating an index -Querying an index
    5. EnCase Forensic Concepts and Methodology -Creating an EnCase Forensic case file -Safeguarding and preserving evidential data -Archiving and reopening an archived case
    6. External processing -Using the EnCase Virtual File System (VFS) Module -Using the EnCase Physical Disk Emulator (PDE) Module -Virus scanning -Dynamic mounting of compound files -Running a target system within a virtual environment
    7. Principles of attempting to recover data lost through the partitioning or formatting process -Partition recovery -Folder recovery -Data carving (manually vs. EnScript)
    8. Reporting -Organizing data and creating reports -Report formats -Exporting metadata
    9. Review of Windows artifacts
    10. Review of file systems and disk partitioning
    11. Search techniques -Reviewing search hits and bookmarking -GREP searching
    12. Windows Registry -Elements of the Registry -Registry keys and values -Registry value types -Locating and mounting the Registry hive files -Examination of time zone settings with the Registry -Applying time zones within EnCase Forensic

    Learning Outcomes
    At the end of this course students will be able to:

    1. demonstrate EnCase forensic methodology
    2. perform imaging and analysis of Windows-based systems
    3. perform advanced searching and filtering techniques with EnCase
    4. perform external analysis in conjunction with EnCase

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2086 - Introduction to Ethical Hacking

    Credits: 3
    Hours/Week: Lecture 1 Lab 4
    Course Description: This course covers the three major phases of penetration testing (Reconnaissance, Vulnerability Analysis and Exploitation) in detail. This course includes how to prepare a final ethical hacking report, tailored to maximize the value of the test from both a management and technical perspective. The final portion of the class includes a comprehensive hands-on exercise, conducting a penetration test against a hypothetical target organization, following all of the steps. This course also describes the limitations of penetration testing techniques and other practices that can be used to augment penetration testing to find vulnerabilities in architecture, policies, and processes.
    MnTC Goals
    None

    Prerequisite(s): CVF 1083  with a grade of C or higher OR instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Ethics

    1.1 What is Ethical Hacking

    1.2 Scenarios

    1.3 Consequences of unethical hacking

    2. Phases of Ethical Hacking

    2.1 Purpose of Ethical Hacking

    2.2 Types of tests

    2.3 Reconnaissance

    2.4 Vulnerability Analysis

    2.5 Exploitation

    3. Reconnaissance         

    3.1 Open Source Intelligence

    3.2 Passive Information Gathering

    3.3 Active Information Gathering

    3.4 Banner Grabbing

    3.4 Service Enumeration

    4. Vulnerability Analysis         

    4.1 Default/Poor Configurations

    4.2 Version Fingerprinting

    4.3 Common Vulnerabilities and Exposures (CVEs)

    4.4 Automated Vulnerability Scanning

    5. Exploitation

    5.1 Metasploit Framework

    5.2 Buffer Overflows

    5.3 Brute Forcing

    5.4 Cracking Hashes

    5.5 Post Exploitation

    5.5 Exploit-DB

    6. Report Writing

    6.1 Executive Summaries

    6.2 Evidence

    6.3 Recommendations

    6.4 Walkthroughs
    Learning Outcomes
    At the end of this course students will be able to:

    1. explain what it means to ethically hack and the consequences of unethical hacking.
    2. describe the phases of ethical hacking.
    3. explain the use basic ethical hacking tools such as NMap and Metasploit.
    4. articulate ethical hacking findings in a professional report format.
    5. perform ethical hacking against a lab environment.
    6. identify vulnerabilities and weak systems on a lab network.
    7. articulate fixes/recommendations for identified vulnerabilities.
    8. explain the benefits of ethical hacking and how it can strengthen security programs.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2088 - Web Application Hacking

    Credits: 3
    Hours/Week: Lecture 1 Lab 2
    Course Description: This course builds on the topics covered in CVF 2086 , but focuses on web applications. The major phases of penetration testing (Reconnaissance, Vulnerability Analysis and Exploitation) remain the same, however, the tools and techniques for web applications vary greatly. The course will cover how to identify and exploit common web application flaws such as cross-site scripting, SQL injection, authentication flaws and more through hands on labs. The final portion of the class includes a comprehensive hands-on exercise, conducting a penetration test against a unique lab web application.
    MnTC Goals
    None

    Prerequisite(s): CVF 1085  and CVF 2086  with grades of C or higher OR instructor consent.
    Corequisite(s): None
    Recommendation: System administration experience on Microsoft Windows or Linux operating systems.

    Major Content
    1. Web Application Security

    1. Current State of Web Application Security
    2. Web Application Technologies

    2.  Web Application Enumeration

    1. Application Usage
    2. Spidering
    3. Nikto
    4. Error Messages

    3. Client Side Controls         

    1. Bypassing JavaScript
    2. Parameter Tampering

    4. Authentication and Session Management Flaws

    1. Failing Open
    2. Cookies
    3. Session Hijacking
    4. Authentication Design Flaws

    5. Cross-Site Scripting

    1. Identifying and Exploiting Cross-Site Scripting
    2. Automated Exploitation
    3. Bypassing Filters
    4. Escaping/Encoding User Input

    6.  SQL Injection

    1. DBMS Technologies
    2. Identifying SQL Injection
    3. Enumerating Information
    4. Gaining a Shell via SQL Injection

    7.  Web Application Exploitation

    1. Cross Site Request Forgery
    2. File Inclusion Attacks
    3. Click Jacking
    4. Server/Application Misconfigurations
    5. Sensitive Data Exposure
    6. OS Command Injection

    Learning Outcomes
    At the end of this course students will be able to:

    1. explain the different technologies making up web applications.
    2. discuss the phases of ethical hacking and how they relate to web applications.
    3. perform web application security testing in a lab environment.
    4. articulate ethical hacking findings in a professional report format.
    5. identify vulnerabilities on a lab web application.
    6. articulate fixes/recommendations for identified vulnerabilities.
    7. identify tools and resources needed to perform ethical hacking against web applications.
    8. explain the coding and logic flaws in source code that lead to exploitable weaknesses in web applications.
    9. identify cross-site scripting flaws.
    10. identify SQL injection flaws.
    11. identify file inclusion flaws.
    12. identify OS command injection flaws.
    13. identify authentication flaws.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2089 - Internet of Things Hacking

    Credits: 3
    Hours/Week: Lecture 2 Lab 2
    Course Description: This course builds on the topics covered in CVF 2086 and CVF 2088. This class will focus on how cybercriminals identify and abuse weaknesses found on Internet of Things (IoT) devices. IoT devices can include internet connected web cameras, refrigerators, sprinkler systems, beds, and much more. This course includes how cybercriminals identify and abuse issues in IoT devices to include API weaknesses, wireless attacks, mobile application attacks, finding sensitive data in the cloud, and escalating privileges on compromised devices. Hands on labs will be used to ensure students finish the course with practical skills to take to the work place.
    MnTC Goals
    None

    Prerequisite(s): CVF 2086  with grade of C or higher OR instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Internet of Things Discovery

    1. Port Scanning
    2. Open Source Intelligence
    3. Wireless Scanning

    2. Internet of Things Devices

    1. Printers
    2. Web Cameras
    3. Kiosks
    4. Miscellaneous

    3. Mobile Applications

    1. Source Code Analysis
    2. Local Sensitive Data Exposure
    3. Admin Abuse
    4. Data in Transit

    4. Wireless

    1. Wi-Fi Attacks
    2. ZigBee Attacks
    3. Bluetooth Attacks

    5. Application Programming Interfaces

    1. Finding Targets
    2. Common Weaknesses

    6. Cloud

    1. Authentication
    2. Public Data Exposure
    3. Multi-Factor Bypasses

    7. Local Device Attacks

    1. Breaking out of restricted shells
    2. Privilege Escalation
    3. Physical Attacks
    4. Pivoting

    Learning Outcomes
    At the end of this course, students will be able to:

    1. identify when an internet of things device or appliance is on the network.

    2. identify how a cybercriminal can abuse an internet of things device.

    3. articulate how to remediate critical vulnerabilities in internet of things devices.

    4. articulate security common measures that should be taken when deploying internet of things devices.

    5. explain the value of simulating and testing attacks against internet of things devices on a corporate network.

    6. identify tools and resources needed to simulate attacks against internet of things devices.

    7. create robust vulnerability/simulation documentation.

    8. identify security gaps in internet of things devices.

    9. identify and abuse flaws in printers.

    10. identify and abuse flaws in network connected web cameras.

    11. identify and abuse flaws in wireless protocols on internet of things devices.

    12. identify and abuse flaws in mobile applications.

    13. identify and abuse flaws in internet of things APIs.

    14. identify and abuse flaws in internet of things data stored in the cloud.

    15. identify and abuse flaws in internet of things devices after gaining access.
    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2090 - Mobile Device Forensic Analysis

    Credits: 3
    Hours/Week: Lecture 2 Lab 2
    Course Description: This course provides an introduction to forensic analysis of mobile devices (i.e. cell phones, tablets, smart phones). With the increasing use of mobile devices, proper collection, and analysis complements traditional computer forensic examinations and may be used in civil and criminal investigations.
    MnTC Goals
    None

    Prerequisite(s): CVF 1065  with a grade of C or higher OR instructor consent
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Call Detail Records/Subscriber Records
    2. Cellular Networks
    3. Evolution and History
    4. Forensic SIM with MPE+
    5. Handsets (CDMA/GSM/iDEN)
    6. Legal
    7. Manual Acquisitions and Screenshots
    8. Mobile Phone Examiner Plus
    9. Mobile Phone Examiner Plus - Extraction
    10. Orientation of Equipment, Course Objectives and Overview
    11. Processing and Troubleshooting
    12. Reporting and Testimony
    13. Subscriber Identity Modules (SIM) / USIM

    Learning Outcomes
    At the end of this course students will be able to:

    1. perform troubleshooting and manual analysis on mobile devices
    2. create a report to document analyses and findings
    3. explain how mobile devices work on cellular networks
    4. examine mobile devices and SIM cards
    5. analyze cellular call detail records
    6. describe the history of mobile devices.
    7. describe legal implications of collection and analyses of mobile devices

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2093 - VMware vSphere ICM (Install, Configure, Manage)

    Credits: 4
    Hours/Week: Lecture 4 Lab None
    Course Description: This course explores how traditional security and IT operations change with the addition of virtualization and cloud technology in the environment. It covers network defense in a cloud environment as it relates to analysis of anti-malware techniques. Topics include the installation, configuration, and management of VMware vSphere, which consists of VMware ESXi and VMware vCenter Server. The course is based on ESXi 5.0 and vCenter Server 5.0. Completion of this course satisfies the prerequisite for taking the VMware Certified Professional 5 exam.
    MnTC Goals
    None

    Prerequisite(s): CVF 1065   and CVF 1092  with grades of C or higher OR instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Access and Authentication Control
      1. Control of user access through roles and permissions
      2. Configuration and management the ESXi firewall
      3. Configuration of ESXi lockdown mode
      4. Integration of ESXi with Active Directory
      5. Introduce VMware vShield Zones
    2. Configure and Manage Virtual Networks
      1. Creation and management of a standard virtual switch
      2. Describe and modify standard virtual switch properties
      3. Configuration of virtual switch load-balancing algorithms
    3. Configure and Manage Virtual Storage
      1. Introduce storage protocols and device names
      2. Configuration of ESXi with iSCSI, NFS, and Fibre Channel storage
      3. Creation and management of vSphere datastores
      4. Deployment and management of the VMware vSphere® Storage Appliance
    4. Create Virtual Machines
      1. Introduce virtual machines, virtual machine hardware, and virtual machine files
      2. Deploy a single virtual machine
    5. Data Protection
      1. Discuss a strategy for backing up ESXi hosts and vCenter Server
      2. Introduce the VMware Data Recovery appliance
      3. Discuss solutions for backing up virtual machines efficiently
    6. High Availability and Fault Tolerance
      1. Introduce new vSphere High Availability (HA) architecture
      2. Configure and manage a vSphere High Availability cluster
      3. Introduce VMware Fault Tolerance
    7. Installing VMware Components
      1. Introduce ESXi installation
      2. Describe boot from SAN requirements
      3. Introduce vCenter Server deployment options
      4. Describe vCenter Server hardware, software, and database requirements
      5. Installation of vCenter Server (Windows based)
    8. Introduction to VMware Virtualization
      1. Introduce virtualization, virtual machines, and vSphere components
      2. Explain the concepts of server, network, and storage virtualization
      3. Describe where vSphere fits into the cloud architecture
      4. Installation and use of vSphere user interfaces
    9. Patch Management
      1. Management of ESXi patching using vCenter Update Manager
      2. Installation of Update Manager and Update Manager plug-in
      3. Creation of patch baselines
      4. Scan and remediate hosts
    10. Resource Management and Monitoring
      1. Virtual CPU and memory concepts
      2. Methods for optimizing CPU and memory usage
      3. Configuration and management of resource pools
      4. Monitoring of resource usage using vCenter Server performance graphs and alarms
    11. Scalability
      1. Configuration and management of a VMware Distributed Resource Scheduler (DRS) cluster
      2. Configuration of Enhanced vMotion Compatibility
      3. Use of vSphere HA and DRS together
    12. VMware vCenter Server
      1. vCenter Server architecture
      2. vCenter Server appliance
      3. Configuration and management of vCenter Server appliance
      4. Management of vCenter Server inventory objects and licenses
    13. Virtual Machine Management
      1. Deployment of virtual machines using templates and cloning
      2. Modification and management of virtual machines
      3. Creation and management virtual machine snapshots
      4. VMware vSphere® vMotion® and Storage vMotion migrations
      5. Creation of a vSphere vApp

    Learning Outcomes
    At the end of this course students will be able to:

    1. install and configure vCenter Server components.
    2. use vCenter Server to monitor resource usage.
    3. configure and manage ESXi networking and storage using vCenter Server.
    4. use vCenter Server to increase scalability.
    5. install and configure ESXi.
    6. perform forensic analysis of a computer system in a cloud environment.
    7. conduct a penetration test in a cloud-based network.
    8. use VMware vCenter Update Manager to apply ESXi patches.
    9. manage user access to the VMware infrastructure.
    10. perform malware analysis in a cloud environment.
    11. use vCenter Server to manage higher availability and data protection.
    12. deploy, manage, and migrate virtual machines.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2099 - Computer Forensics Capstone

    Credits: 1-3
    Hours/Week: Lecture None Lab None
    Course Description: The course is designed to assure that students understand and can communicate the knowledge and skills necessary in key areas of information security and Computer Forensics. The most important characteristic that employers look for from an employee after technical ability to do the job is the ability to communicate well. This course provides an opportunity to show and demonstrate technical knowledge and the ability to communicate clearly.
    MnTC Goals
    None

    Prerequisite(s): Instructor and dean consent.
    Corequisite(s): None
    Recommendation: CVF 1065  

    Major Content
    1. to be determined by the student and instructor

    Learning Outcomes
    At the end of this course students will be able to:

    1. demonstrate ability to exceed minimum requirements/expectations
    2. demonstrate ability to work independently
    3. demonstrate advanced knowledge of the subject area identified in the learning plan
    4. locate material from diverse sources and points of view to develop new tools for the IT community.
    5. participate effectively in groups with emphasis on collaboration, reflective thinking, and responding
    6. present conclusions to a larger group
    7. reflect on personal growth in the subject area identified in the plan
    8. write a technical report covering an important area of security related to the project

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2116 - Virtual End User Computing and Application Virtualization (VMware View: IC

    Credits: 4
    Hours/Week: Lecture 4 Lab None
    Course Description: This course explores the concept and techniques associated with delivering desktop services from a cloud computing environment to enable end-user freedom from IT management and control. This course uses VMware View to demonstrate how IT can simply automate the management of thousands of desktops and securely deliver “desktop as a service” to users from a central location at levels of availability and reliability unmatched by traditional PCs. Students explore, through hands-on labs, how to deliver secure access to applications and data to any device when and where users need it, thus giving end users maximum mobility and flexibility. The VMware Certified Professional - Desktop (VCP-DT) certification is part of this course.
    MnTC Goals
    None

    Prerequisite(s): ECT 1013 , CVF 1092 , and CVF 2093  with grades of C or higher OR instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Course Introduction
      1. Introductions and course logistics
      2. Course objectives
    2. Introduction to VMware Horizon View
      1. Introduce View features and components
    3. View Connection Server
      1. Install and configure View Connection Server
    4. View Desktops
      1. Introduce View Agent
      2. Describe PCoIP and Remote Desktop Protocol remote display protocols
      3. Explain USB redirection and multimedia redirection
    5. VMware View Client Options
      1. Introduce VMware® View Client
      2. Introduce View Client with Local Mode
      3. Describe thin clients and zero clients
      4. Introduce Virtual Printing with View Client
    6. View Administrator
      1. Configure the View environment
      2. Manage users, sessions, and policies
      3. Configure and provision automated pools of desktops
      4. Explain role-based delegated administration
      5. Monitor the View environment
    7. Configuring and Managing Linked Clones
      1. Introduce View Composer operations
      2. Deploy and provision linked-clone desktops
      3. Manage linked-clone desktops
      4. Manage persistent disks
    8. Local-Mode Desktops
      1. Configure local-mode desktops
      2. Describe View Transfer Server and the Transfer Server repository
      3. Describe local-mode operations
    9. Managing View Security
      1. Describe network configuration and authentication options
      2. Configure the View security server
    10. View Persona Management
      1. Configure user profiles with View Persona Management
      2. Describe View Persona Management and Windows roaming profiles
      3. Configure a View Persona Management deployment
      4. Describe best practices for a View Persona Management deployment
    11. Command-Line Tools and Backup Options
      1. Introduce vdmadmin utility
      2. Describe client systems in kiosk mode
      3. Back up the View databases
      4. Restore the View databases
    12. VMware Horizon Application Manager
      1. Ensure that VMware® Horizon Application Manager¿ is working Introduce Application Manager components
      2. Describe single sign-on from Horizon View to View desktops
      3. Enable browser access to View desktops through Horizon View
      4. Entitle applications by using Horizon View
    13. View Connection Server Performance and Scalability
      1. Describe replica connection servers
      2. Explain performance considerations and load balancing
    14. VMware ThinApp
      1. Use ThinApp to capture applications
      2. Deploy and update ThinApp packages
      3. Virtualize Internet Explorer 6 for use on a Windows 7 system
      4. Manage ThinApp applications in View

    Learning Outcomes
    At the end of this course students will be able to:

    1. install and configure Horizon View components.
    2. create and manage dedicated and floating desktop pools.
    3. deploy and manage linked-clone virtual desktops.
    4. configure and manage desktops that run in local mode.
    5. configure secure access to desktops through a public network.
    6. configure user profiles with View Persona Management.
    7. install applications by using Horizon View.
    8. use ThinApp to package applications.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2120 - Cloud Infrastructure: Deployment and Management

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This course explores how to orchestrate the provisioning of software-defined data center services as complete virtual data centers that are ready for consumption in a matter of minutes. Virtual data centers provide virtualized computing, networking, storage, and security so that administrators can rapidly provision the complete set of services necessary to make workloads operational in minutes. This course uses vCloud Director and open stack throughout the hands-on labs to demonstrate how software-defined data center services and the virtual data centers fundamentally simplify infrastructure provisioning, and enable IT to move at the speed of business. The VMware Certified Professional (VCP) exam is part of this course.
    MnTC Goals
    None

    Prerequisite(s): CVF 1065 , CVF 1091 , and CVF 1092  with grades of C or higher OR instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Course Introduction
      1. Review course goals
      2. Review course objectives
      3. Review the course outline
      4. Recognize VMware vCloud Director Essentials/Fundamentals course elements
    2. VMware vCloud Director Providers
      1. Identify storage resources for vCloud Director
      2. Configure and manage storage for providers
      3. Examine provider space allocation to an organization
      4. Recognize Storage vMotion issues
      5. Manage storage requirements for linked clones and shadow virtual machines
    3. VMware vCloud Director Organizations
      1. Create and manage organizations
      2. Recognize resource allocations for an organization
      3. Create and manage catalogs
    4. Monitoring VMware vCloud Components
      1. Monitor usage information at provider and organization virtual datacenters
      2. Analyze vCloud Director logs to monitor vCloud Director cells
    5. Cloud Connectivity
      1. Configure Basic Firewalls in vCloud Director
      2. Describe a Network Troubleshooting Methodology
      3. Configure VPN Tunnels in vCloud Director
      4. Configure Static Routes in vCloud Director
      5. Describe VMware vCloud® Connector
    6. VMware vCloud Security
      1. Identify authentication and authorization tasks
      2. Describe and configure LDAP integration
      3. Describe single sign-on
    7. Cost Analysis and Reporting with VMware vCenter Chargeback
      1. Recognize which elements vCenter Chargeback meters for vCloud Director
      2. Describe how cost models are used to generate reports
      3. Summarize the function of each of the vCenter Chargeback architecture components
      4. Identify how to generate reports
      5. Generate different reports based on business needs
    8. Managing vSphere Resources
      1. Manage VMware vCenter Server¿ instances
      2. Manage VMware ESXi¿ hosts
      3. Manage vSphere datastores
      4. Manage stranded items
      5. Configure and manage resource pools at the vSphere level
    9. Managing Cloud Resources
      1. Understand and identify how vSphere fulfills vCloud Director requests
      2. Manage provider and organization virtual datacenters
    10. VMware vCloud Director Architecture and Components
      1. Describe how VMware products use the cloud computing approach
      2. Review vCloud Director components and explain their functions
      3. Examine how to charge for resources
      4. Determine the licensing needs
    11. Installing VMware vCloud Director
      1. Describe the required prerequisites for a vCloud Director installation
      2. Install vCloud Director
    12. VMware vCloud Director Networking
      1. Describe the network types available in vCloud Director
      2. Discuss the organization and vApp network traffic choices
      3. Describe the function of network pools
      4. Explain how to share content between organizations and vApps
      5. Share content in private, public, and hybrid clouds

    Learning Outcomes
    At the end of this course students will be able to:

    1. explain the features and operation of VMware vCloud® Director
    2. deploy vCloud Director.
    3. manage vCloud Director to satisfy private, public, and hybrid cloud business needs.
    4. configure VMware vSphere® storage to enable multiple tiers in provider virtual data centers.
    5. create and manage vCloud Director organizations and vApps to satisfy business needs.
    6. create and manage vCloud Director catalogs.
    7. configure networking for organizations and vApps.
    8. connect organizations with VPN tunnels and static routes.
    9. interface vCloud Director to Open LDAP and Microsoft Active Directory servers.
    10. configure network security between vCloud Director vApps and organizations with VMware vShield Edge firewalls.
    11. use VMware vCenter Chargeback to meter vCloud Director resources.
    12. explain the interactions between VMware vSphere Distributed Resources Scheduler clusters and vCloud Director.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2130 - Advanced Windows Hacking

    Credits: 3
    Hours/Week: Lecture 2 Lab 2
    Course Description: This course build on the topics covered in CVF 2086 and CVF 2088. The focus of this class is on how to identify and abuse weaknesses found in Windows environments. Case scenarios include learning about Windows Active Directory enumeration, privilege escalation methods, Windows credential abuse, lateral movement in a Windows environment, PowerShell attacks, and how cybercriminals maintain persistence in a Windows environment. Hands-on labs will be used to throughout this course.
    MnTC Goals
    None

    Prerequisite(s): CVF 2086  with grades of C or higher OR instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Windows and Active Directory Enumerations

    1. Group Policies
    2. Shares
    3. Users/Accounts
    4. System Files
    5. Open Ports
    6. Automated Discovery Tools

    2. PowerShell Attacks

    1. Invoking Expressions
    2. Bypassing Protections
    3. Evading Logs
    4. PowerShell Attack Tools

    3. Windows Privilege Escalation Methods

    1. Unquoted Service Paths
    2. Accessibility Features
    3. Application Shimming
    4. DLL Hijacking

    4. Windows Credential Attacks

    1. Group Policy Preferences
    2. Unattended Instalattions
    3. Password Hashes
    4. Mimikatz
    5. Shares
    6. Kerberos
    7. Domain Controller Syncs

    5. Windows Environment Lateral Movement

    1. Common Remote Protocols
    2. SMB Replay Attacks
    3. Malicious Shares
    4. Shared Web Roots

    6. Windows Man in the Middle Attacks

    1. NBNS/LLMNR Spoofing
    2. Windows Proxy Auto Discovery
    3. Active Directory DNS Spoofing

    7. Windows Persistence Methods

    1. Scheduled Tasks
    2. DLL Hijacking
    3. Services
    4. Logon Scripts
    5. Backdoor Accounts

    Learning Outcomes
    At the end of this course, students will be able to:

    1. identify critical vulnerabilities in Active Directory and how they could be abused.

    2. identify critical vulnerabilities in Windows Operating Systems and how they could be abused.

    3. articulate how to remediate critical vulnerabilities in Windows environments.

    4. identify tools and resources needed to simulate advanced Windows attacks to test security controls.

    5. explain the value of simulating and testing advanced Windows attacks in a corporate environment.

    6. create robust vulnerability/simulation documentation.

    7. identify security gaps in a Windows environment through testing.

    8. execute Windows privilege escalation techniques.

    9. explain how native Windows configurations and protocols can be abused in man in the middle attacks.

    10. explain integrated Windows environment can be abused by an adversary to laterally access sensitive data.

    11. apply PowerShell techniques for Windows attacks.

    12. use Windows operating systems to maintain access while remaining hidden.

    13. discover and examine Windows environments to find and abuse weaknesses.
    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2131 - Threat Simulation

    Credits: 4
    Hours/Week:
    Course Description: The most advanced hacking course offered, this course builds upon all other previous work and should be taken last by the student. The focus of this class is to explain and execute realistic threat simulations. These threat simulations include sophisticated adversary techniques such as building attack infrastructures, generating reliable payloads, bypassing corporate security controls, and collecting sensitive data on a compromised network. Hands-on labs will be heavily used throughout this course. This course includes how to articulate creative and unique solutions to these problems.
    MnTC Goals
    None

    Prerequisite(s): CVF 2086  with grade of C or higher OR instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Building an Attack Infrastructure

    1. Command and Control
    2. Email Servers
    3. Payload Delivery
    4. Redirection Servers

    2. Payload Creation

    1. MS Office Payloads
    2. Browser Payloads
    3. Non-Windows Payloads

    3. Social Engineering

    1. Phishing
    2. Vishing
    3. Physical

    4. Bypassing Security Controls

    1. Obfuscation
    2. Delay Timers
    3. Disabling Controls
    4. Anti-Forensics
    5. AV Evasion
    6. Web Proxies

    5. Post Exploitation

    1. Pivoting Techniques
    2. Persistence
    3. Low and Slow Techniques

    6. Data Collection

    1. Emails
    2. Clipboard
    3. Sensitive Files
    4. Data Exfiltration

    7. Operational Security

    1. Blacklists
    2. Threat Intelligence
    3. Infrastructure Segmentation
    4. Adapting when caught

    Learning Outcomes
    At the end of this course, students will be able to:

    1. explain how dedicated and advanced cybercriminals compromise and obtain information.

    2. create example infrastructures to execute a coordinated attacks.

    3. explain the different levels of sophistication of a targeted attack compared to commodity threats.

    4. create robust threat simulation documentation.

    5. identify and articulate creative solutions to help thwart or slow down sophisticated adversaries.

    6. execute complex attack chains to accomplish a simulated adversary goal.

    7. explain human weakness in security postures and how it can be exploited.

    8. explain the evolving threat landscape and how agile cybercriminals adapt.

    9. use techniques used by cybercriminals to bypass security controls commonly used by organizations.

    10. create sample payloads to use in threat simulation exercises.

    11. navigate and query a compromised environment for sensitive data.

    12. explain how cybercriminals monitor good security controls to ensure they are not caught.
    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2200 - Advanced IDS Techniques Using SAMPA (Snort, Apache, MySQL, PHP, and ACID)

    Credits: 3
    Hours/Week: Lecture 1 Lab 2
    Course Description: This course addresses the issues associated with open source LAMP (Linux, Apache, MySQL, PHP) stacks with a focus on security and Intrusion Detection Systems (IDS). Topics include the installation, configuration, management of LAMP resources, Snort IDS, ACID and Zenoss threat analytical software, and other IDS related tools as well as the practical test firing of IDS resources.
    MnTC Goals
    None

    Prerequisite(s): CVF 1085  with a grade of C or higher OR instructor consent.
    Corequisite(s): None
    Recommendation: System administration experience on Microsoft Windows or Linux operating systems.

    Major Content

    1. Introduction to Linux, Apache, MySQL and PHP (LAMP) Stacks.
    2. Configure lab LAMP stack for basic web server functionality.
    3. Further configure lab LAMP stack for full LAMP web server functionality.
    4. Create simple PHP pages for database interaction.
    5. Further develop test PHP pages utilizing more SQL queries.
    6. Examine local files, processes and services running on the LAMP stack and how to ensure uptime.
    7. Sensitive data handling.
    8. Introduction to JavaScript.
    9. Further work with JavaScript.
    10. Introduce Cross-Site Scripting (XSS) attacks.
    11. Introduce SQL Injection attacks.
    12. Further XSS/SQL Injection analysis.
    13. Encompass concepts.
    14. Introduction to Intrusion Detection Systems (IDS’) and Snort
    15. Installing and Configuring Snort
    16. Working with Snort rules

    Learning Outcomes
    At the end of this course students will be able to:

    1. configure and manage server network information and simple database interactive PHP page.
    2. create and use PHP web pages to execute SQL query and display resultant information.
    3. demonstrate practical knowledge of SQL queries.
    4. demonstrate practical knowledge of common website exploits (SQL Injection, XSS, etc).
    5. install and configure Apache, MySQL, PHPMyAdmin and PHP.
    6. install and configure a Linux server.
    7. manage MySQL database structure (create and modify multiple databases/tables.) using PHPMyAdmin.
    8. analyze an exploited LAMP stack.
    9. analyze web pages/web servers for exploit vulnerabilities and possible attack vectors.
    10. conduct SQL Injection, XSS and other common attacks against web pages.
    11. implement IDS analytics software.
    12. install and configure Snort for use with MySQL.
    13. install, configure and manage Snort + dependencies.
    14. manage Snort plugins and rules.
    15. manage and configure LAMP stack critical local files, services and processes.

     

     
    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2201 - Malware Analysis Fundamentals & Malicious Code Analysis

    Credits: 3
    Hours/Week: Lecture 2 Lab 2
    Course Description: This course presents the key tools and techniques malware analysts use to examine malicious programs by exploring Windows malware in two phases. Behavioral analysis focuses on the program’s interactions with its environment, such as the registry, the network and the file system. Code analysis focuses on the specimen’s code and makes use of disassembler and debugger tools such as IDA Pro and OllyDbg. This course covers how to patch malicious executables to change their functionality during the analysis without recompiling them and redirect network traffic in the lab to better interact with malware.
    MnTC Goals
    None

    Prerequisite(s): CVF 1065  and CVF 1205  with grades of C or higher or instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Configuring the malware analysis lab
    2. x86 Intel assembly language primer
    3. Handling anti-disassembling techniques
    4. Identifying key x86 assembly logic structures with a disassembler
    5. Patterns of common malware characteristics at the Windows API level (DLL injection, hooking, keylogging, sniffing, etc.)
    6. Assembling the toolkit for malware forensics
    7. Performing behavioral analysis of malicious Windows executables
    8. Performing static and dynamic code analysis of malicious Windows executables
    9. Additional learning resources for reverse-engineering malware
    10. Reinforcing the dynamic analysis concepts learned in 610.1
    11. Patching compiled malicious Windows executables
    12. Analyzing packed malicious executable files
    13. Intercepting network connections in the malware lab
    14. Analyzing Web browser malware implemented in JavaScript and Flash
    15. Core concepts for reverse-engineering malware at the code level

    Learning Outcomes
    At the end of this course students will be able to:

    1. analyze encrypted binaries.
    2. discover heap overflows.
    3. discover stack overflows.
    4. explain hashing functions.
    5. reverse engineer UPX and other compression types.
    6. create a sandbox to isolate malware.
    7. identify malware communication channels.
    8. monitor registry changes.
    9. unpack malware code.
    10. analyze use of Thwart anti-debugger code.
    11. explain System vs. Code Level reversing.
    12. explain conditional branching statements.
    13. demonstrate uses of IDA Pro with hostile code.
    14. identify malware variables.
    15. use Ollydbg for runtime analysis of malware.
    16. perform kernel mode debugging with SoftICE.
    17. dump executables from memory with Dumpbin.
    18. explain Obfuscation of file formats.
    19. locate undocumented APIs.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2202 - Malicious Documents and Memory Forensics

    Credits: 3
    Hours/Week: Lecture 2 Lab 2
    Course Description: This course explores several techniques malware authors commonly employ to protect malicious Windows executables from being analyzed, often with the help of packers. The course deals with how to bypass analysis defenses, such as structured error handling for execution flow, PE header corruption, fake memory breakpoints, tool detection, integrity checks and timing controls. It touches on Web browser malware, the use of additional tools and approaches for analyzing more complex malicious scripts written in VBScript and JavaScript by exploring common patterns of assembly instructions often used to gain initial access to the victim’s computer, how to analyze malicious Microsoft Office documents, covering tools such as Office MalScanner and explore steps for analyzing malicious PDF documents with utilities such as Origami and PDF Tools.
    MnTC Goals
    None

    Prerequisite(s): CVF 1065  with a grade of C or higher or instructor consent.
    Corequisite(s): None
    Recommendation: CVF 2201  with a grade of C or higher.

    Major Content
    1. Identifying packers
    2. Manual unpacking of packed and otherwise protected malicious Windows executables
    3. Tips and tricks for bypassing anti-analysis mechanisms built into malware
    4. Additional techniques for analyzing obfuscated browser scripts using tools such as SpiderMonkey
    5. Analyzing malicious Microsoft Office (Word, Excel, PowerPoint) and Adobe PDF documents
    6. Examining shellcode in the context of malicious files
    7. Analyzing memory to assess malware characteristics and reconstruct infection artifacts
    8. Using memory forensics to analyze rootkit infections

    Learning Outcomes
    At the end of this course students will be able to:

    1. describe IDA Plug-in architecture and setup.
    2. explain the Kernel API used by malware authors.
    3. use IDA configuration for programmatic reversing and script writing.
    4. describe common rootkit technologies.
    5. use WinDBG for kernel debugging.
    6. explain PE Anti-reversing techniques: De-obfuscating executables for IDA.
    7. explain user-mode obfuscation methods.
    8. demonstrate Anti-RE Techniques: Detecting debuggers, virtual machines, and other tricks.
    9. describe kernel assisted obfuscation.
    10. describe rootkit process / DLL injection.
    11. explain rootkit process / DLL injection.
    12. analyze reverse kernel-mode botnet bots.
    13. describe Metasploit’s Shikata-ga-nai.
    14. utilize Saffron and Ether during malware analysis.
    15. analyze physical memory with memorize.
    16. identify common algorithms inside worms.
    17. analyze Virtual Machine based packers.
    18. describe reverse Themida and other VM packers.
    19. demonstrate reverse storm’s C&C protocol.
    20. demonstrate reverse .NET byte code.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2203 - Network Forensics, Analysis and Incident Handling

    Credits: 3
    Hours/Week: Lecture 2 Lab 2
    Course Description: Network forensics involves the identification, preservation, and analysis of evidence of attacks in order to identify the attackers and document their activity with sufficient reliability to justify appropriate technological, business, and legal responses. This course focuses on the technological components of the topic with emphasis on the network traffic analysis aspect. The technical aspect addresses analysis of intruder types and the intrusion process, review of network traffic logs and profiles and their types, identification of attack signatures and fingerprints, application of data mining techniques, study of various traceback methods, and the extraction of information acquired through the use of network analysis tools and techniques.
    MnTC Goals
    None

    Prerequisite(s): CVF 1085  with a grade of C or higher OR instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1 . Part I. Foundation a. Practical Investigative Strategies

    1.1 Real-World Cases

    1.2 Footprints

    1.3 Concepts in Digital Evidence

    1.4 Challenges Relating to Network Evidence

    1.5 Network Forensics Investigative Methodology (OSCAR)

    1.6 Conclusion 

    2. Statistical Flow Analsis

    5.1 Process Overview

    5.2 Sensors

    5.3 Flow Record Export Protocols

    5.4 Collection and Aggregation

    5.5 Analysis

    5.6 Conclusion

    5.7 Case Study: The Curious Mr. X

    3. Wireless: Network Forensics Unplugged

    6.1 The IEEE Layer 2 Protocol Series

    6.2 Wireless Access Points (WAPs)

    6.3 Wireless Traffic Capture and Analysis

    6.4 Common Attacks

    6.5 Locating Wireless Devices

    6.6 Conclusion

    6.7 Case Study: HackMe, Inc.

    4. Network Intrusion Detection and Analysis

    7.1 Why Investigate NIDS/NIPS?

    7.2 Typical NIDS/NIPS Functionality

    7.3 Modes of Detection

    7.4 Types of NIDS/NIPSs

    7.5 NIDS/NIPS Evidence Acquisition

    7.6 Comprehensive Packet Logging

    7.7 Snort

    7.8 Conclusion

    7.9 Case Study: Inter0ptic Saves the Planet (Part 1 of 2)

    5. Network Devices and Servers

    8. Event Log Aggregation, Correlation, and Analysis

    8.1 Sources of Logs

    8.2 Network Log Architecture

    8.3 Collecting and Analyzing Evidence

    8.4 Conclusion

    8.5 Case Study: L0ne Sh4rk’s Revenge

    6. Switches, Routers, and Firewalls

    9.1 Storage Media

    9.2 Switches

    9.3 Routers

    9.4 Firewalls

    9.5 Interfaces

    9.6 Logging

    9.7 Conclusion

    9.8 Case Study: Ann’s Coffee Ring

    7. Web Proxies

    10.1 Why Investigate Web Proxies?

    10.2 Web Proxy Functionality

    10.3 Evidence

    10.4 Squid

    10.5 Web Proxy Analysis

    10.6 Encrypted Web Traffic

    10.7 Conclusion

    10.8 Case Study: Inter0ptic Saves the Planet (Part 2 of 2)

    8. Network Tunneling

    11.1 Tunneling for Functionality

    11.2 Tunneling for Confidentiality 1

    1.3 Covert Tunneling

    11.4 Conclusion

    11.5 Case Study: Ann Tunnels Underground

    9. Malware Forensics

    12.1 Trends in Malware Evolution

    12.2 Network Behavior of Malware

    12.3 The Future of Malware and Network Forensics

    12.4 Case Study: Ann’s Aurora

    10. Technical Fundamentals

    2.1 Sources of Network-Based Evidence

    2.2 Principles of Internetworking

    2.3 Internet Protocol Suite

    2.4 Conclusion

    11. Evidence Acquisition

    3.1 Physical Interception

    3.2 Traffic Acquisition Software

    3.3 Active Acquisition

    3.4 Conclusion

    12. Traffic Analysis

    4.1 Protocol Analysis

    4.2 Packet Analysis

    4.3 Flow Analysis

    4.4 Higher-Layer Traffic Analysis

    4.5 Conclusion

    4.6 Case Study: Ann’s Rendezvous
    Learning Outcomes
    At the end of this course students will be able to:

    1 . deploy a structured lifecycle approach to data analytics problems.

    2 . distinguish between PCAP and NetFlow data.

    3 . explain the basics of packet capture and traffic analysis.

    4 . demonstrate at least two ways to visualize network data.

    5 . explain at least one approach to network data anonymization.

    6 . explain coarse vs. fine data representation.

    7 . explain what a traffic matrix is.

    8 . demonstrate how to extract some embedded as well as some hidden network data.

    9 . distinguish between at least two types of malicious traffic from network data and categorize them.

    10. configure a connection between host-based events and network-based events.

    11. apply appropriate analytic techniques and tools to analyze big data.

    12. use open source tools such as R, Hadoop, and Postgres.
    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • CVF 2206 - Data Science and Big Data Analytics

    Credits: 3
    Hours/Week: Lecture 2 Lab 2
    Course Description: This course will cover basic and advanced analytic methods and big data analytics technology and tools, including MapReduce and Hadoop. The extensive labs throughout the course provide students with the opportunity to apply these methods and tools to real world business challenges. This course takes a technology-neutral approach. In a final lab, students will address a big data analytics challenge by applying the concepts taught in the course to the context of the Data Analytics Lifecycle. Students will prepare for the Proven Professional Data Scientist Associate (EMCDSA) certification exam and establish a baseline of Data Science skills.
    MnTC Goals
    None

    Prerequisite(s): MATH 1025  with a grade of C or higher OR instructor consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. contribute to a data science team.
    2. reframe a business challenge as an analytics challenge.
    3. deploy a structured lifecycle approach to data analytics problems.
    4. apply appropriate analytic techniques and tools to analyze big data.
    5. develop a compelling story with the data to drive business action.
    6. use open source tools such as R, Hadoop, and Postgres.
    7. prepare for EMC ProvenTM Professional Data Scientist certification.

    Learning Outcomes
    At the end of this course students will be able to:

    1. Introduction to Big Data Analytics
      • Big Data Overview
      • State of the practice in analytics
      • The Role of the Data scientist
      • Big Data Analytics in industry verticals
    2. End-to-end data analytics lifecycle
      • Key role for a successful analytics project
      • Main phases of the lifecycle
      • Developing core deliverables for stakeholders
    3. Using R to execute basic analytics methods
      • Introduction to R
      • Analyzing and exploring data with R
      • Statistics for mode building and evaluation
    4. Advance analytics and statistical modeling for Big Data - Theory and methods
      • K-Means Clustering
      • Association rules
      • Linear and logistic regression
      • Naive Bayesian classifier
      • Decision tree
      • Time series analysis
      • Text analysis
    5. Advance analytics and statistical modeling for Big Data - Technology and Tools
      • Using MapReduce / Hadoop for analyzing unstructured data
      • Hadoop ecosystem of tools
      • In-database analytics
      • MADlib and advanced SQL Techniques
    6. Endgame, or Putting it all together
      • How to operationalize an analytics project
      • Creating the final deliverables
      • Data visualization techniques
      • Hands-on Application of analytics lifecycle to a Big Data Analytics problem

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration


Dental Assistant

  
  • DENA 1000 - Introduction to Dental Assisting

    Credits: 3
    Hours/Week: Lecture None Lab None
    Course Description: This is an introductory course that explores the role of a Certified Dental Assistant and a Licensed Dental Assistant. Topics to be covered include dental history, terminology, occupational safety, common dental emergencies, and professional development. This is a chance to explore the dental clinic and dental laboratory utilizing dental instruments and equipment. Students must be able to perform physical tasks to complete course requirements. Acceptance in the Dental Assisting Program is required.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: Concurrently enrolled in DENA 1011  and DENA 1012  

    Major Content
    1. Activities and projects for professional development
    2. Common medical and dental terms
    3. Content and rules of the dental assistant program
    4. Safety procedures (including hazardous waste and MSDS information)and common dental emergencies
    5. Constructing and trimming of custom trays and dental models
    6. Dental history
    7. Dental instruments, handpieces and equipment used in the clinic
    8. Dental laboratory environment, procedures and equipment used in the laboratory
    9. Plaster “blobs” and dental models
    10. Utilization and maintenance of instruments, handpieces and equipment in the clinic
    11. Dental health teams and comparison of dental team roles

    Learning Outcomes
    At the end of this course students will be able to:

    1. Describe dental history and the role of the dental health team.
    2. Demonstrate management of common dental emergencies.
    3. Discuss and participate in activities and projects for professional development.
    4. Identify and utilize dental instruments, handpieces, and equipment in the clinic.
    5. Construct custom trays.
    6. Make dental models.
    7. Demonstrate knowledge of safe handling, storage, and disposal of hazardous waste.
    8. Identify common dental terminology.
    9. Demonstrate and follow occupational safety procedures.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENA 1011 - Dental Assisting Pre-Clinic I

    Credits: 3
    Hours/Week: Lecture None Lab None
    Course Description: This course is the first in a 2-part series that helps prepare the student for clinical activities. Topics include oral embryology/histology, oral health, dental nutrition, general anatomy/physiology, head & neck anatomy, and tooth morphology. Students must be able to perform physical tasks to complete course requirements. Acceptance in the Dental Assisting Program is required.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: Concurrently enrolled in DENA 1000  and DENA 1012 .

    Major Content
    1. Basic human anatomy and physiology
    2. Blood supply of the head and neck
    3. Bones of the cranium and face, and relation to body systems
    4. Components and functions of the body systems
    5. Composition, formation, and eruption of the teeth
    6. Dental nutrition, diet, and the effects on teeth
    7. Dental plaque and its relation to dental disease
    8. Diet evaluation and consultation
    9. Handling, storage, and disposal of hazardous waste
    10. Oral histology and embryology and morphology
    11. Preventative dentistry and personal oral hygiene-self brush and floss
    12. Tooth identification and anatomical features of each tooth and model waxing

    Learning Outcomes
    At the end of this course students will be able to:

    1. Demonstrate safe handling, storage, and disposal of hazardous waste.
    2. Define the assistant’s role in preventive dentistry.
    3. Demonstrate flossing and brushing on self.
    4. Prepare a slide of dental plaque using a phase microscope for purposes of examining plaque bacteria and recognize dental caries as an infectious disease.
    5. Describe how nutrition is used in the profession of dentistry.
    6. Prepare a diet evaluation for a classmate and an outside patient.
    7. Identify the teeth by name, location, and anatomical structures.
    8. Identify dental arches and surfaces of the teeth.
    9. Reproduce teeth using dental wax on a dental cast.
    10. Describe the structure, function, and landmarks of the face and oral cavity.
    11. Describe the life cycle of a tooth and identify the stages of development.
    12. Identify the parts of the tooth, the surrounding tissues and structures of the gingival and the oral mucosa.
    13. Describe head and neck anatomy as it relates to location of structure and function.
    14. List the components and functions of each of the body systems.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENA 1012 - Dental Assisting Pre-Clinic II

    Credits: 3
    Hours/Week: Lecture None Lab None
    Course Description: This course is the second in a 2-part series that helps prepare the student for clinical activities. Topics include intraoral and extraoral diseases, medical emergencies in the dental office, dental disease transmission concepts and prevention, OSHA guidelines, and dental pharmacology as it relates to dental procedures. Students must be able to perform physical tasks to complete course requirements. Acceptance in the Dental Assisting Program is required.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: Concurrently enrolled in DENA 1000  and DENA 1011 .

    Major Content
    1. Body defenses-repair, antibodies, resistance and allergy
    2. Oral pathology and how it relates to the dental profession
    3. The assistant’s role in the intra and extra oral examination
    4. Tooth diseases and dental disturbances
    5. Antibiotics and other therapeutic agents and written prescriptions
    6. Benign oral tumors and prevention
    7. Common medical emergencies in the dental setting
    8. Disease transmission prevention and precautions
    9. Drugs used in the dental profession
    10. Infectious and hazardous waste and equipment for removal
    11. Microbiology and disease producing viruses and bacteria
    12. OSHA guidelines for the dental personnel
    13. Standard precautions and personal protective equipment
    14. Techniques for aseptic conditions - including MSDS information
    15. Techniques for disinfecting and sanitizing

    Learning Outcomes
    At the end of this course students will be able to:

    1. Describe the dental professional roles in the oral examination.
    2. Describe task categorization.
    3. Identify standard precautions.
    4. Explain the OSHA hazard communication program.
    5. Describe sanitizing, disinfecting, and sterilizing techniques.
    6. Identify drugs used in the dental profession.
    7. Describe contraindications and side effects of medications.
    8. Describe legal responsibilities of the dental team.
    9. Demonstrate knowledge in safe handling, storage, and disposal of hazardous waste.
    10. Identify causes and effects of diseases of the oral cavity.
    11. Describe oral cancers and prevention.
    12. Define key terms in the prevention of disease transmission, oral pathology, medical emergencies in the dental setting, and dental pharmacology.
    13. Describe the methods of infection transmission.
    14. Describe infectious diseases concerning the dental health professional.
    15. Explain infection control and cross contamination.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENA 1020 - Dental Materials

    Credits: 3
    Hours/Week: Lecture None Lab None
    Course Description: This course provides the basic knowledge and skills required for the Dental Assistant in the dental office. Technical and hands-on experience will be given for dental materials used in operative, restorative, specialty, and laboratory procedures. Students must be able to perform physical tasks to complete course requirements. Acceptance in the Dental Assisting Program is required.
    MnTC Goals
    None

    Prerequisite(s): DENA 1000 , DENA 1011 , and DENA 1012 .
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Application of the various dental materials
    2. Cavity classifications and various restorative materials available for the patient
    3. Knowledge and application of dental liners, bases, and bonding systems
    4. Properties of dental cements including brands, composition, uses, and mixing times of each cement
    5. Types of impression trays and the characteristics of each
    6. Bite registrations
    7. Hydrocoloid materials, irreversible and reversible materials, and elastomeric materials to include: polysulfide, polyether, and polysiloxane
    8. Impressions and pouring in Class I stone
    9. Mouth guards and bleaching trays
    10. Trim and finish casts
    11. Safety in the laboratory area ncluding information on hazardous waste and MSDS, and proper use of the equipment

    Learning Outcomes
    At the end of this course students will be able to:

    1. Demonstrate safety techniques, and care and handling of laboratory equipment.
    2. Identify and use correct terminology for the use of dental materials.
    3. Identify, classify, and manipulate the various dental materials found in the dental office.
    4. Prepare the materials at the dental chair.
    5. Prepare diagnostic casts for laboratory procedures.
    6. Trim and finish casts.
    7. Construct mouth guards and bleaching trays on casts.
    8. Demonstrate knowledge of safe handling, storage, and disposal of hazardous waste.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENA 1031 - Dental Radiology I

    Credits: 2
    Hours/Week: Lecture None Lab None
    Course Description: The course will focus on the study and practical application of the principles of radiation safety, operating and maintaining radiographic equipment, and exposing and processing diagnostically acceptable intraoral radiographs on mannequins. Students must be able to perform physical tasks to complete course requirements. Acceptance in the Dental Assisting Program is required. If a student is pregnant, a physician’s approval is required for course attendance because of radiation exposure.
    MnTC Goals
    None

    Prerequisite(s): DENA 1000 , DENA 1011 , and DENA 1012 .
    Corequisite(s): None
    Recommendation: Assessment placement score in MATH 0070  or higher or completion of MATH 0030  with a grade of C or higher.

    Major Content
    1. Bisecting technique and paralleling technique
    2. Bitewing and periapical radiographs on mannequins
    3. Darkroom use(including hazardous waste and MSDS) and processing errors
    4. Dental film composition, storage, types and uses
    5. Identification and definition of normal/desired anatomy on intraoral films
    6. Mounting radiographic surveys
    7. Operation and maintenance of x-ray processors
    8. Paralleling and bisecting technique on mannequins
    9. Radiation biology
    10. Radiation physics and radiation characteristics
    11. Radiology terminology and history

    Learning Outcomes
    At the end of this course students will be able to:

    1. Identify the basic principles of x-ray generation.
    2. Mount radiographs correctly.
    3. Demonstrate skills in taking bitewing and periapical radiographs.
    4. Demonstrate skills in using the x-ray machine.
    5. Identify diagnostically acceptable radiographs.
    6. Demonstrate film placement on mannequins.
    7. Describe vertical and horizontal angles.
    8. Describe paralleling versus bisecting techniques.
    9. Identify radiographic anatomy.
    10. Identify different types of films and their components.
    11. Process films in the automatic processors and demonstrate skills in maintenance of the processor.
    12. Demonstrate knowledge of safe handling, storage, and disposal of hazardous waste.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENA 1032 - Dental Radiology II

    Credits: 3
    Hours/Week: Lecture 2 Lab 1
    Course Description: This course will focus on the study and practical applications of exposing, processing, and evaluating diagnostically acceptable intraoral radiographs on mannequins and patients. Students must be able to perform physical tasks to complete course requirements. Acceptance in the Dental Assisting Program is required. If a student is pregnant, a physician’s approval is required for course attendance because of radiation exposure.
    MnTC Goals
    None

    Prerequisite(s): DENA 1020 , DENA 1031 , DENA 1041 , DENA 1042 , and DENA 1050 .
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Additional types of radiography used in dentistry (occlusal and localization techniques, panoramic, extraoral and digital)
    2. Diagnostically acceptable full-mouth surveys and mounted radiographs
    3. Full-mouth surveys on mannequin and full-mouth surveys on patients
    4. Interpersonal communication with patients
    5. Legal issues and the dental radiographer
    6. Principles of infection control when taking radiographs on patients including MSDS and hazardous waste information
    7. Principles of radiation safety and infection control for patient and operator
    8. Principles of radiographic quality assurance procedures
    9. Principles of the bitewing, bisecting, and paralleling techniques
    10. “Interpretation” of dental caries, periodontal disease, trauma, pulpal, and periapical lesions

    Learning Outcomes
    At the end of this course students will be able to:

    1. Identify and perform acceptable radiation safety procedures.
    2. Demonstrate skills in taking bitewing radiographs and periapical radiographs with a standard and digital x-ray machine.
    3. Demonstrate skills in maintenance of the automatic processor and stepwedge procedure.
    4. Identify and evaluate diagnostically acceptable radiographs and identify radiographic anatomy.
    5. Demonstrate film placement on mannequins and patients.
    6. Describe vertical and horizontal angles, and paralleling versus bisecting techniques.
    7. Identify and interpret caries, periodontal disease, lesions, and their appearance on an x-ray.
    8. Describe developmental disturbances of teeth and bone.
    9. Identify legal considerations in dentistry.
    10. Identify and perform acceptable radiology infection control procedures.
    11. Demonstrate knowledge of safe handling, storage, and disposal of hazardous waste.
    12. Identify and demonstrate acceptable interpersonal communication with patients.
    13. Perform full- mouth radiographs on mannequins.
    14. Perform full- mouth radiographs on patients.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENA 1041 - Chairside Dental Assisting I

    Credits: 2
    Hours/Week: Lecture None Lab None
    Course Description: This course will focus on how to utilize and maintain a dental clinic. This course follows the American Dental Association Occupational Safety Health Act and the Centers for Disease Control guidelines in preparing, assisting with and dismissing patients. The student will utilize chairside four-handed dentistry in a variety of procedures, as well as teach personal oral hygiene to patients. Acceptance in the Dental Assisting Program is required.
    MnTC Goals
    None

    Prerequisite(s): DENA 1000 , DENA 1011 , and DENA 1012 
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Define various dental procedures.
    2. Demonstrate operation/assistant zones.
    3. Demonstrate personal oral hygiene on yourself, classmates and patients.
    4. Demonstrate sit-down four-handed dentistry.
    5. Describe practice and perform air/water syringe control and evacuation technique.
    6. Identify field isolation/practice and perform cotton roll placement for evaluation.
    7. Identify instrument grasps.
    8. Identify instruments and handpieces and their use.
    9. Introduce student to the care and maintenance of the clinic.
    10. Perform patient admission and dismissing duties/work with apprehensive patient.
    11. Practice and perform sit-down four-handed dentistry procedure.
    12. Research data for personal oral hygiene paper
    13. Sanitize, disinfect and sterilize the appropriate pieces of equipment according to ADA, CDC, and OSHA guidelines.
    14. Set up procedure trays/organize dental operatory
    15. Use aseptic techniques on equipment, instruments and supplies.

    Learning Outcomes
    At the end of this course students will be able to:

    1. Demonstrate the differences and uses of sanitation disinfection and sterilization techniques.
    2. Adhere to disease protection protocol.
    3. Describe rationale of chairside four-handed dentistry.
    4. Describe and demonstrate personal oral hygiene.
    5. Write a personal oral hygiene paper.
    6. Perform instrument transfer for evaluation.
    7. Perform cotton-roll placement and air water syringe/evacuation for evaluation.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENA 1042 - Chairside Dental Assisting II

    Credits: 3
    Hours/Week: Lecture None Lab None
    Course Description: This course will focus on taking and recording dental and medical histories of patients, charting of the oral cavity, taking and recording vital signs, and applying topical medications and varnishes. Other topics include effects of medications on patients and techniques of operative dentistry. Students must be able to perform physical tasks to complete course requirements. Acceptance in the Dental Assisting Program is required.
    MnTC Goals
    None

    Prerequisite(s): DENA 1000 , DENA 1011 , and DENA 1012 
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Blood pressure, pulse, respiration, and body temperature for dental patients
    2. Cavity classifications, charting procedures, and services rendered
    3. Charting a patient¿s oral cavity
    4. Drugs, topical medications, topical and local anesthetics, and cavity varnishes used in dentistry
    5. Esthetic and amalgam procedures, tray set-ups, barriers, and aseptic techniques including information on MSDS and hazardous waste
    6. Ethical considerations by the dental assistant for patient emotions and fears
    7. Medical and dental history forms for patients
    8. Operative dentistry, principles, and motion in procedures
    9. Patients emotions related to dentistry
    10. Teeth identification and charting methods
    11. Topical anesthetic sites

    Learning Outcomes
    At the end of this course students will be able to:

    1. Register a new patient.
    2. Identify topical anesthetic injection sites.
    3. Demonstrate the placement of topical anesthetic.
    4. Apply topical medication and varnishes.
    5. Identify rationale for restorative dentistry.
    6. Perform operative dental procedures.
    7. Demonstrate knowledge of safe handling, storage, and disposal of hazardous waste.
    8. Measure and record patient vital signs
    9. Identify and chart the oral cavity using various methods.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENA 1050 - Dental Specialties

    Credits: 3
    Hours/Week: Lecture None Lab None
    Course Description: This course provides instruction in fundamental principles, instrumentation, and procedures for the specialty areas of dentistry. These specialties include oral and maxillofacial surgery, endodontics, periodontics, fixed and removable prosthodontics, pedodontics, community dentistry, medically and physically compromised patient, and orthodontics. Students must be able to perform physical tasks to complete course requirements. Acceptance in the Dental Assisting Program is required.
    MnTC Goals
    None

    Prerequisite(s): DENA 1000 , DENA 1011 , and DENA 1012 .
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Chain of asepsis during all specialties to include MSDS and hazardous waste information
    2. Custom trays for immediate dentures
    3. Dental assistant’s role in community dental health and options for patient treatment
    4. Diagnostic records used to assess orthodontic situations
    5. Endodontic instruments, functions, and procedures for endodontics
    6. Indications and contraindications for fixed and removable prosthodontics
    7. Major medical disorders that may affect the treatment plan for a medically compromised patient
    8. Manipulation and identification of oral endodontic instruments
    9. Manipulation and identification of oral surgery instruments
    10. Manipulation and identification of periodontic instruments
    11. Oral surgery instruments, functions, and procedures for oral and maxillofacial surgery
    12. Pediatric dental patients and the stages experienced by children from birth to adolescence
    13. Perform a safe wheelchair transfer
    14. Periodontal disease and treatment, instruments, functions, and procedures for periodontics
    15. Provisional coverage for crowns and bridges utilizing and manipulating various materials
    16. The role of the laboratory technician for fixed and removable prosthodontics
    17. Treatment planning for the pediatric patient

    Learning Outcomes
    At the end of this course students will be able to:

    1. Identify and use correct terminology for each of the specialty areas.
    2. Identify the unique needs of the dental patient in each of the specialty areas.
    3. Demonstrate an understanding of the most common dental procedures and treatment in each of the specialty areas.
    4. Describe the assistant’s role while assisting in each of the specialty areas.
    5. Demonstrate knowledge of safe handling, storage, and disposal of hazardous waste
    6. Demonstrate knowledge of the medically compromised patient
    7. Demonstrate knowledge of a safe wheelchair transfer

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENA 1061 - Dental Assisting Advanced Functions I

    Credits: 3
    Hours/Week: Lecture None Lab None
    Course Description: This course will focus on the following Minnesota Licensed Advanced Functions: impressions and bite registrations; placement and removal of rubber dam; removal of excess cement; placement and removal of periodontal dressing (demonstration only); suture removal; pre-selection of orthodontic bands; placement of ligatures, o-rings and power chains; placement and removal of orthodontic separators; application of enamel etch; and removal of excessive orthodontic adhesive with hand and rotary instruments. Students must be able to perform physical tasks to complete course requirements.
    MnTC Goals
    None

    Prerequisite(s): DENA 1020 , DENA 1031 , DENA 1041 , DENA 1042 , and DENA 1050 
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Armamentarium for each advanced function and patient treatment
    2. Disease protection protocol
    3. Minnesota licensure rules, guidelines, and advanced functions to include MSDS and hazardous waste information
    4. Practice and perform on typodonts and patients, the following 10 expanded functions according to the Minnesota State Board of Dentistry guidelines: Placement and removal of rubber dam, dental impressions, placement and removal of periodontal dressing (demonstration only), dental cement removal, pre-selecting orthodontic band (demonstration only), placement and removal of orthodontic separators, application of etching materials, removal of bonding material and excess adhesive with hand and rotary instruments, suture removal, orthodontic ligature tie-in, o-rings, power chains
    5. Procedure and techniques for each advanced function

    Learning Outcomes
    At the end of this course students will be able to:

    1. Identify rationale for the Minnesota Licensed Advanced Functions.
    2. Describe procedure for each expanded function.
    3. Follow disease protection protocol.
    4. Select armamentarium necessary for patient treatment.
    5. Demonstrate dental assisting skills on typodonts and patients.
    6. Demonstrate knowledge of safe handling, storage, and disposal of hazardous waste.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENA 1062 - Dental Assisting Advanced Functions II

    Credits: 2
    Hours/Week: Lecture None Lab None
    Course Description: This course is a continuation of the Dental Assisting Advanced Functions I. Topics include coronal polish/stain removal, fluoride application, and application of pit and fissure sealants. Students must be able to perform physical tasks to complete course requirements.
    MnTC Goals
    None

    Prerequisite(s): DENA 1020 , DENA 1031 , DENA 1041 , DENA 1042 , and DENA 1050 .
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Assistant’s role in application of sealants, fluoride, and coronal polish
    2. Commercial sealant products and effectiveness
    3. Disease protection protocol including MSDS and hazardous waste information
    4. Fluoride procedure and armamentarium
    5. Mechanical polishing of teeth procedure and armamentarium
    6. Patient advantages for coronal polish and stain removal
    7. Perform sealants, fluoride, and coronal polish on patients for evaluation
    8. Pit and fissure sealants procedure and armamentarium
    9. Practice and perform sealants, fluoride, and coronal polish on typodonts
    10. Sealant clinical indications/contraindications
    11. Stain types and abrasive agents

    Learning Outcomes
    At the end of this course students will be able to:

    1. Describe mechanical polishing with stain identification and stain removal.
    2. Determine appropriate fluoride techniques.
    3. Determine appropriate sealant techniques.
    4. Recognize correct armamentarium.
    5. Adhere to aseptic technique guidelines.
    6. Demonstrate coronal polish, fluoride application, and sealant placement.
    7. Demonstrate knowledge of safe handling, storage, and disposal of hazardous waste.
    8. Describe fluoride and its uses.
    9. Define pit and fissure sealants

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENA 1063 - Nitrous Oxide Inhalation Sedation

    Credits: 1
    Hours/Week: Lecture 1 Lab None
    Course Description: This course will focus on the utilization of nitrous oxide sedation for anxiety and pain control in dentistry. Students must be able to perform physical tasks to complete course requirements. If a student is pregnant, a physicians approval is required for course attendance because of nitrous oxide exposure.
    MnTC Goals
    None

    Prerequisite(s): DENA 1020 , DENA 1031 , DENA 1041 , DENA 1042 , and DENA 1050 .
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Armamentarium and documentation for nitrous oxide administration
    2. Flow rates for nitrous oxide and oxygen, titration, and diffusion hypoxia
    3. Human respiratory system and methods of pain management
    4. Identify and describe nitrous oxide abuse issues
    5. Levels of ambient nitrous in the dental office environment
    6. Minnesota Board of Dentistry requirements to administer nitrous oxide
    7. Nitrous oxide administration techniques and indications/contraindications for nitrous oxide use
    8. Patient assessment and selection and medical emergency preparedness
    9. Safety measures and ethical issues related to nitrous oxide administration
    10. Symptoms of minimal sedation and oversedation

    Learning Outcomes
    At the end of this course students will be able to:

    1. Explain how to use nitrous oxide inhalation sedation to manage patient anxiety and pain.
    2. Explain safety issues related to nitrous oxide use.
    3. Describe the anatomy and physiology of the human respiratory system as it relates to nitrous oxide use.
    4. Demonstrate infection control related to nitrous oxide use.
    5. Demonstrate knowledge of safe handling, storage, and disposal of hazardous waste.
    6. Document use of nitrous oxide.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENA 1780 - Introduction of Dental Assisting Internships

    Credits: 3
    Hours/Week: Lecture None Lab None
    Course Description: This course is an introduction to the business aspect of a dental practice and completion of professional development activities. It includes preparation for employment and knowledge of legal and ethical standards. Students will review their prior knowledge in preparation for their clinical internships. Students must be able to perform physical tasks to complete course requirements.
    MnTC Goals
    None

    Prerequisite(s): DENA 1020 , DENA 1031 , DENA 1041 , DENA 1042 , and DENA 1050 .
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Completion of forms for clinical internships
    2. Dental team’s role/ethical responsibilities including MSDS and hazardous waste information
    3. Employment interview and dental assisting skills
    4. Front office and bookkeeping duties of a dental practice
    5. Job seeking/keeping skills and application, resume, and employment correspondence
    6. Management of patient records
    7. Professional development activities
    8. Role of the Minnesota State Board of Dentistry
    9. Simulated business transactions both written and computerized

    Learning Outcomes
    At the end of this course students will be able to:

    1. Manage patient dental records.
    2. Conduct simulated business transactions.
    3. Demonstrate professional development.
    4. Prepare for employment.
    5. Identify legal and ethical standards in dental assisting and dentistry.
    6. Demonstrate understanding of dental assisting skills.
    7. Prepare for clinical internships.
    8. Demonstrate knowledge of safe handling, storage, and disposal of hazardous waste.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENA 1781 - Dental Assisting Specialty Internship

    Credits: 3
    Hours/Week: Lecture None Lab None
    Course Description: This course focuses on the application and practice of dental assisting skills in a dental specialty practice. Students must be able to perform physical tasks to complete course requirements. All Dental Assisting program courses must be completed. Must have HBV series of inoculations and be covered by both medical insurance and professional liability insurance. Student must complete a Minnesota Human Services background study with no restrictions.
    MnTC Goals
    None

    Prerequisite(s): DENA 1780  
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Complete National Certification Exam application
    2. Discuss and share experiences from specialty clinical site including a MSDS and hazardous waste reviewDiscuss effective types of communication skills
    3. Participate in ethical problem solving situations and simulations

    Learning Outcomes
    At the end of this course students will be able to:

    1. Demonstrate eligibility to take the National Examination.
    2. Demonstrate ability to assist in at least one of the following specialty practices: prosthodontics, oral surgery, pedodontics, endodontics, periodontics, or orthodontics,
    3. Demonstrate effective patient and dental setting communication skills.
    4. Identify new technology and research in dentistry.
    5. Demonstrate knowledge of safe handling, storage, and disposal of hazardous waste.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENA 1782 - Dental Assisting General Office Internship

    Credits: 4
    Hours/Week: Lecture 1 Lab 6
    Course Description: This course focuses on the application and practice of dental assisting skills in a general dental practice. Students must be able to perform physical tasks to complete course requirements. All Dental Assisting program courses must be completed. Must have HBV series of inoculations and be covered by both medical insurance and professional liability insurance. Student must complete a Minnesota Human Services background study with no restrictions.
    MnTC Goals
    None

    Prerequisite(s): DENA 1780  
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Complete Minnesota State Licensure Exam application
    2. Discuss and share experiences from their clinical sites including a MSDS and hazardous waste review
    3. Discuss effective types of communication skills
    4. Participate in ethical problem solving situations

    Learning Outcomes
    At the end of this course students will be able to:

    1. Demonstrate ability to assist in a general dental office.
    2. Demonstrate ability to perform expanded functions.
    3. Demonstrate ability to perform business skills.
    4. Demonstrate ability to perform laboratory skills.
    5. Demonstrate ability to perform as a team member.
    6. Demonstrate effective patient and dental setting communication skills.
    7. Demonstrate eligibility to take the Minnesota State Licensure Examination.
    8. Demonstrate knowledge of safe handling, storage, and disposal of hazardous waste.
    9. Identify new technology and research in dentistry.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration


Dental Hygiene

  
  • DENH 1021 - Head and Neck Anatomy

    Credits: 2
    Hours/Week: Lecture None Lab None
    Course Description: This course is the study of the hard and soft tissues of the head and neck, including the skeletal, muscular, nervous, and venous systems with particular emphasis on the masticatory system. Acceptance into the Dental Hygiene Program is required.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Temporomandibular Joint
    2. Vascular system
    3. Glandular tissue
    4. Nervous system
    5. Anatomy of local anesthesia
    6. Lymphatic system
    7. Soft palate and pharynx
    8. Muscular system

    Learning Outcomes
    At the end of this course students will be able to:

    1. describe the action of the temporomandibular joint.
    2. identify the blood supply from the heart to all areas of the oral cavity.
    3. describe the anatomy, function, and purpose of each type of salivary gland.
    4. identify the branches of the trigeminal nerve from where they exit the skull to the last structure they supply.
    5. identify the effects local anesthetics have on the nerves and muscles of the head and neck.
    6. describe the interrelationship of the muscles and nerves in chewing, swallowing, and speech.
    7. identify the lymph drainage of the teeth and other oral structures.
    8. identify the origin, insertion, actions, and innervation of all muscles of the head and neck.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 1024 - Dental Embryology, Histology, and Anatomy

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This course is the study of the microscopic anatomy of the oral tissues and embryonic development of the face and oral cavity, as well as the function and morphological characteristics of the teeth with an emphasis on root morphology. Acceptance into the Dental Hygiene Program is required.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Periodontium: cementum, alveolar Bone, periodontal ligament
    2. Abnormal and normal development of orofacial structures
    3. Cell structures and function
    4. Deciduous dentition
    5. Dental charting
    6. Dental terminology
    7. Development of the face and neck
    8. General histology
    9. Histological features of the TMJ
    10. Occlusion
    11. Oral mucous membranes
    12. Permanent dentition
    13. Prenatal development
    14. Structures/normality in the oral cavity and face and neck regions
    15. Tooth development, eruption, and shedding
    16. Tooth development: enamel, dentin, pulp
    17. Tooth eruption and shedding of primary teeth

    Learning Outcomes
    At the end of this course students will be able to:

    1. identify the divisions of the oral cavity and pharynx.

    2. describe the embryonic development of the head, face, and teeth.

    3. identify the mechanisms involved in the formation of enamel, dentin, and cementum.

    4. describe the components and age changes of pulp.

    5. describe root formation and attachment apparatus.

    6. identify the sequence of eruption and shedding of teeth.

    7. describe the development of clefts and the stage at which they occur.

    8. describe the formation and destruction of enamel, dentin, cementum, pulp, bone, and periodontal ligaments.

    9. describe the physiologic movement of teeth.

    10. describe tooth development and the development of anomalies.

    11. discuss the morphological characteristics of each classification of tooth in the primary and permanent dentition.

    12. identify the individual teeth and their characteristics from primary and permanent dentitions and label, using major tooth numbering systems.

    13. define occlusion, occlusal relationships, and Angle’s classification of malocclusion. 
    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 1030 - Radiology for the Dental Hygienist

    Credits: 2
    Hours/Week: Lecture 1 Lab 2
    Course Description: Building on the basic principles of radiology, this course prepares the dental hygiene student to use radiographs during patient care and also introduces radiographic interpretation. Students must be able to perform physical tasks to complete course requirements. Prerequisite:  Acceptance into Century Colleges Dental Hygiene Program.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Radiation history, physics, characteristics, biology, and protection
    2. Digital radiography
    3. Radiography of patients with special needs
    4. Normal anatomy: Intraoral films
    5. Normal anatomy: Panoramic films
    6. Introduction to radiographic interpretation
    7. Descriptive terminology
    8. Identification of restorations, dental materials, and foreign objects
    9. Interpretation of dental caries and periodontal disease
    10. Quality assurance in the dental office
    11. Dental radiographs and the dental radiographer
    12. Patient relations and education and the dental radiographer
    13. Infection control and the dental radiographer
    14. Radiographic technique: paralleling, bisecting, bite-wing, occlusal, localization, and panoramic
    15. Radiographic exposure and technique errors
    16. Interpretation of trauma and pulpal and periapical lesions

    Learning Outcomes
    At the end of this course students will be able to:

    1. describe the production and effects of radiation.
    2. perform radiograph exposures, processing and mounting while avoiding cross-contamination as specified by OSHA and program policies and protocols.
    3. identify radiographic anatomical landmarks.
    4. interpret normal and abnormal or pathological conditions visible on dental radiographs.
    5. evaluate radiographic processing quality.
    6. demonstrate safe handling, storage, and disposal of hazardous waste.
    7. discuss radiation safety.
    8. discuss appropriate rationale for exposing radiographs
    9. explain risk/benefit ratios of exposing radiographs to patients.
    10. perform x-ray film exposure on manikin and evaluate diagnostic quality.
    11. describe technique errors and how to avoid and/or correct them.
    12. identify differences between digital radiography and traditional radiography.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 1040 - Principles I: Foundations of Dental Hygiene

    Credits: 3
    Hours/Week: Lecture None Lab None
    Course Description: This course is the first in a series of principles courses providing students with fundamental dental hygiene theory.  Topics include the history, philosophy, theories, and ethics relevant to the dental hygiene discipline. Students will also study patient assessment and education, etiology and prevention of oral diseases, infection/exposure control, and hazardous materials, patients’ rights, and the management of patient records. Acceptance into the Dental Hygiene Program is required.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): DENH 1045  
    Recommendation: None

    Major Content
    1. History of Dental Hygiene

    2. Dental Hygiene Process of Care (A.D.P.I.E.)

    3. Patient Assessment including:

    1. Personal, dental and medical history
    2. Health status
    3. Dental assessment
    4. Periodontal assessment
    5. Risk assessment
    6. Intra and extra oral exam
    7. Oral hygiene status

    4. Cariology

    5. Patient education and counseling

    1. Health promotion and disease prevention
    2. Indices
    3. Use of oral health devices and products

    6. Legal aspects of dental hygiene practice; training related to:

    1. HIPAA
    2. Infection control
    3. Patients’ rights
    4. Documentation of the patient record

    7. Introduction to cultural competency and health literacy

    8. Documentation and management of the dental patient’s record

    9. Evidence-based decision-making

    10. Emergency Management
    Learning Outcomes
    At the end of this course students will be able to:

    1. discuss the theory of dental hygiene.

    2. describe the history of dental hygiene and current roles in the profession of dental hygiene.

    3. identify infection control practices as define by OSHA and the CDC.

    4. identify emergency management strategies.

    5. discuss each element of comprehensive patient assessment.

    6. discuss the dental hygienist’s role in health promotion and disease prevention.

    7. compare preventive dentistry products and techniques.

    8. recognize appropriate management and legal requirements of the patient record.

    9. select appropriate dental hygiene strategies based on patient characteristics.

    10. discuss the influence of culture and health literacy in health care practices.

    11. discuss evidence-based decision-making.
    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 1045 - Preclinic/Clinic I

    Credits: 4
    Hours/Week: Lecture None Lab None
    Course Description: This is the first in a series of clinical courses introducing dental hygiene concepts and practice methods.  Topics include infection control, the use and care of equipment, ergonomics, and patient record management. Clinical experiences include introduction to instrumentation, patient assessment, and care planning. Students must be able to perform physical tasks to complete course requirements. Acceptance into the Dental Hygiene Program is required. Students are restricted from participating in this course if they have not first successfully passed the Minnesota Human Services background study with no restrictions and obtained a medical clearance that follows program requirements.
    MnTC Goals
    None

    Prerequisite(s): None
    Corequisite(s): DENH 1040  
    Recommendation: None

    Major Content
    1. Dental Hygiene practice related to:

    1. Infection Control
    2. Blood Borne Pathogen
    3. Standard Hazard Communication (MSDS)

    2. Care and Maintenance of equipment in the dental clinic

    3. Ergonomics

    4. Patient and operator positioning

    5. Hand instruments including:

    1. Design
    2. Appropriate usage
    3. Sequencing
    4. Care

    6. Culturally appropriate patient education and counseling

    7. Documentation and management of the patient record

    8. Allowable duties and expanded functions allowed under Minnesota dental assisting licensure

    9. Emergency management
    Learning Outcomes
    At the end of this course students will be able to:

    1. demonstrate correct ergonomics.

    2. demonstrate proper use and care of dental equipment and instruments.

    3. demonstrate proper instrument choice and activation principles.

    4. demonstrate proper infection/exposure control techniques.

    5. use appropriate rationale for patient assessment methods.

    6. apply culturally appropriate patient education strategies for the promotion of health and prevention of disease.

    7. demonstrate safe handling, storage, and disposal of hazardous waste.

    8. demonstrate competency in the use of dental biomaterials.

    9. demonstrate proficiency in performing expanded functions as allowed under Minnesota dental assisting licensure.

    10. implement emergency management strategies.
    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 1050 - Periodontology

    Credits: 2
    Hours/Week: Lecture 2 Lab None
    Course Description: This course is the study of periodontology and the role of the dental hygienist as a prevention specialist and periodontal co-therapist.
    MnTC Goals
    None

    Prerequisite(s): DENH 1024 , DENH 1030 , DENH 1040 , and DENH 1045  
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Anatomy of the periodontium (microscopic and clinical)
    2. The hygienist’s role in periodontal assessment, diagnosis, care planning, and therapy
    3. Utilizing radiographs to assess the periodontal condition
    4. Legal aspects of periodontal co-therapy with the dental hygienist and other health care providers
    5. The hygienist¿s role in patient education for the periodontal patient
    6. Healthy versus diseased periodontium (microscopic and clinical anatomy)
    7. Etiology of periodontal diseases
    8. Risk factors in periodontal disease
    9. Elements of a comprehensive clinical periodontal assessment
    10. Risk assessment and analysis for periodontal disease genesis
    11. Periodontal disease classifications

    Learning Outcomes
    At the end of this course students will be able to:

    1. describe the clinical and microscopic features of periodontal anatomy in health and disease.
    2. explain periodontal disease etiology and progression.
    3. identify classifications of periodontal disease.
    4. evaluate systemic, local, and lifestyle risk factors in periodontal disease genesis and progression.
    5. use radiographs to assess the periodontal condition.
    6. identify the hygienist¿s role in the comprehensive clinical assessment of the periodontium.
    7. discuss the hygienist’s role in patient education related to periodontal disease.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 1060 - Pharmacology for the Dental Hygienist

    Credits: 2
    Hours/Week: Lecture 2 Lab None
    Course Description: This course provides an introduction to drug actions, mechanisms of drugs, and bodily reactions. Special emphasis will be given to the oral and systemic effects of drugs and how they my affect dental treatment.
    MnTC Goals
    None

    Prerequisite(s): DENH 1024 , DENH 1030 , DENH 1040 , and DENH 1045  
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Anti-convulsants
    2. Psychotherapeutics
    3. Adrenocorticosteroids
    4. Drugs affecting the endocrine system
    5. Anti-neoplastic drugs
    6. Respiratory and gastrointestinal drugs
    7. Autonomic
    8. Opioid and non-opioid analgesics
    9. Anti-infective agents
    10. Local and general anesthetics
    11. Anti-anxiety agents
    12. Cardiovascular drugs

    Learning Outcomes
    At the end of this course students will be able to:

    1. describe drug action and handling in the body and methods of drug administration.

    2. discuss pharmacologic effects, adverse reactions, contraindications, drug interactions, and dental considerations of drug therapy.

    3. categorize the oral manifestations of drug therapy.

    4. determine the safety and use of drug therapy for the pregnant or breastfeeding woman.

    5. distinguish drugs that may alter dental treatment.

    6. contrast indications and contraindication of drug use in the treatment of dental disease.

    7. outline the physiologic, psychologic, and social consequences of drug abuse.

    8. explain the federal legislation governing of herbal and dietary products and discuss the product’s safety, adverse effects associated with use, and impact on oral health care.
    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 1080 - Principles II: Care of Special Needs Patients

    Credits: 3
    Hours/Week: Lecture None Lab None
    Course Description: This is the second in a series of three DENH principles courses. Students will review the rationale for delivery of dental hygiene services and be introduced to care and management of patients with special needs.
    MnTC Goals
    None

    Prerequisite(s): DENH 1030 , DENH 1040 , and DENH 1045  
    Corequisite(s): DENH 1085  
    Recommendation: None

    Major Content
    1. Case study development

    2. Life stages

    3. Anticipatory guidance

    4. Diabetes

    5. Edentulous patients

    6. Respiratory diseases

    7. Blood disorders 

    8. Cardiovascular diseases 

    9. Patients who use tobacco

    10. Patients with cancer 

    11. Patients with disabilities 

    12. Physical impairments 

    13. Seizure disorders

    14. Mental disorders

    15. Substance abuse

    16. Cleft lip and/or palate 

    17. Oral and maxillofacial surgery patients 

    18. Pregnant patients 

    19. Family abuse and neglect 

    20. Evidence-based decision-making
    Learning Outcomes
    At the end of this course students will be able to:

    1. describe appropriate dental hygiene care for patients throughout the life cycle.

    2. discuss anticipatory guidance strategies appropriate to a patient’s needs.

    3. analyze a dental hygiene case study.

    4. discuss modifications of  dental hygiene care for patients with special health care needs.

    5. identify societal trends in oral health care.

    6. examine the relationship between oral and systemic health.

    7. recognize reporting requirements and responsibilities for a dental hygienist.

    8. prepare a scientific literature review paper based on evidence-based decision-making principles.
    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 1085 - Clinic II

    Credits: 3
    Hours/Week: Lecture None Lab None
    Course Description: This is the second in a series of four DENH clinical courses which provides further instrumentation techniques, more advanced assessment skills, and new clinical procedures. This course also covers development of both the dental hygiene diagnosis and the dental hygiene treatment plan. Students will treat  patients in the Century College dental clinic. Students must be able to perform physical tasks to complete course requirements.
    MnTC Goals
    None

    Prerequisite(s): DENH 1021 , DENH 1024 , DENH 1030 , DENH 1040 , and DENH 1045  
    Corequisite(s): DENH 1080  
    Recommendation: None

    Major Content
    1. Dental hygiene diagnosis
    2. Instrument sharpening
    3. Universal curettes and scalers
    4. Application of desensitizing agents
    5. Application of pit & fissure sealants
    6. Student clinical practice
    7. Documentation
    8. Dental hygiene treatment planning
    9. Appointment sequencing

    Learning Outcomes
    At the end of this course students will be able to:

    1. perform comprehensive patient oral examination.
    2. describe instrument sharpening and technique principles.
    3. use universal curettes and scalers appropriately.
    4. perform mechanical polishing.
    5. apply desensitizing agents as needed.
    6. apply sealant materials correctly when indicated.
    7. plan dental hygiene services for patients with special needs.
    8. demonstrate professionalism.
    9. perform clinical practice (minimum 9 hours per week).
    10. develop a dental hygiene diagnosis based on assessment findings.
    11. develop a treatment plan appropriate to the patient’s life cycle.
    12. demonstrate safe handling, storage, and disposal of hazardous waste.
    13. document patient care appropriately.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 2005 - Pain Management

    Credits: 2
    Hours/Week: Lecture 1 Lab 2
    Course Description: This course introduces students to techniques needed to assess and treat patients requiring local anesthesia and nitrous oxide sedation. Emergency procedures will be taught for all new procedures introduced. This course meets the certification requirements of the Minnesota Board of Dentistry for local anesthesia and nitrous oxide administration. Students must be able to perform physical tasks to complete course requirements.
    MnTC Goals
    None

    Prerequisite(s): DENH 1050 , DENH 1060 , DENH 1080 , and DENH 1085  
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Local Anesthesia:
      1. Legal aspects
      2. Anatomy review
      3. Pharmacology review
      4. Chemical properties
      5. Vasoconstrictors
      6. Anesthetic agents
      7. Duration of anesthesia
      8. Physiology - nerve conduction
      9. Armamentarium
      10. Topical anesthetics
      11. Basic injection technique
      12. Client evaluation
      13. Contraindications
      14. Complications
      15. Documentation/ Legal recordkeeping
      16. Treatment planning
    2. Treatment planningNitrous Oxide:
      1. History
      2. Legal Aspects
      3. Anatomy
      4. Physiology
      5. Levels of anesthesia
      6. Equipment
      7. Chemical properties
      8. Patient Selection (indications)
      9. Contraindications
      10. Abuse
      11. Safety
      12. Administration protocols
      13. Documentation / Legal recordkeeping

    Learning Outcomes
    At the end of this course students will be able to:

    1. compose pain management strategies.
    2. defend pain management strategies.
    3. evaluate the effects local anesthetics have on the nerves and muscles of the head and neck.
    4. discuss emergency management strategies in the administration of local anesthesia and nitrous oxide sedation.
    5. demonstrate professionalism.
    6. demonstrate competence in the administration of nitrous oxide sedation.
    7. demonstrate competence in the administration of topical and local anesthesia.
    8. document the administration of local anesthesia and nitrous oxide in the patient’s legal record accurately.
    9. demonstrate safe handling, storage, and disposal of hazardous waste.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 2010 - Principles III: Advanced Dental Hygiene

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This is the third dental hygiene principles course. Advanced assessment techniques are covered as well as diagnosis and care planning for patients with more complex treatment needs.
    MnTC Goals
    None

    Prerequisite(s): DENH 2005  
    Corequisite(s): DENH 2015  
    Recommendation: None

    Major Content
    1. Root morphology review implications in instrumentation strategies
    2. Saliva testing
    3. Microbial testing
    4. Implant maintenance
    5. New technologies in dental hygiene practice
    6. Case presentations
    7. Evidence-based decision-making
    8. Ultrasonic instrumentation
    9. Advanced and special instrumentation techniques
    10. Periodontal adjuncts
    11. Non-surgical periodontal protocols
    12. Margination and polishing of restorations
    13. Dental implant maintenance and patient education
    14. Pulp vitality testing

    Learning Outcomes
    At the end of this course students will be able to:

    1. describe advanced fulcrums and appropriate use of specialty periodontal instruments.
    2. state the indications, contraindications, and protocols for ultrasonic instrumentation.
    3. state the indications, contraindications, and protocols for using periodontal adjuncts.
    4. analyze the role of the dental hygienist in supporting patients with dental restorations.
    5. investigate the indications and contraindications of incorporating new and existing technology in dental hygiene practice.
    6. discuss indications and contraindications of new dental hygiene treatment strategies.
    7. present a comprehensive case study structured according to evidence-based decision-making principles to an audience of peers.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 2015 - Clinic III

    Credits: 5
    Hours/Week: Lecture None Lab 12
    Course Description: This is the third in the series of clinical courses where students treat patients in the college’s dental clinic under supervision of the dental hygiene faculty. Emphasis is placed on the development of competencies in assessment, diagnosis, documentation, treatment planning, evaluation of outcomes, and implementation of various treatment strategies for patients with moderate to advanced periodontal disease. Students are also required to participate in off-campus rotations where they provide care for patients from diverse age and ethnic groups. Students must be able to perform physical tasks to complete course requirements.
    MnTC Goals
    None

    Prerequisite(s): DENH 2005  
    Corequisite(s): DENH 2010  
    Recommendation: None

    Major Content
    1. 12 hours of supervised clinical practice per week in the Century College dental clinic

    2. Off-campus clinical rotations
    Learning Outcomes
    At the end of this course students will be able to:

    1. provide dental hygiene care to patients in the college’s dental clinic under clinical faculty supervision (minimum of 12 hours per week).

    2. provide care to patients in off-campus rotation sites, approximately 24 hours per semester under clinical faculty supervision.

    3. assess patients’ needs in a variety of dental settings.

    4. demonstrate ability to appropriately incorporate advanced techniques in the treatment of periodontal disease.

    5. demonstrate advanced techniques used in the assessment of risk factors for oral diseases.

    6. demonstrate root planing skills and re-evaluation skills.

    7. demonstrate ability to develop an appropriate dental hygiene diagnosis and treatment plan.

    8. demonstrate competence in local anesthetic and nitrous oxide administration.

    9. demonstrate safe handling, storage, and disposal of hazardous waste.
    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 2020 - General and Oral Pathology

    Credits: 3
    Hours/Week: Lecture 3 Lab None
    Course Description: This course is a study of general and oral pathology with topics of special interest to the dental hygienist. It will cover the etiology and symptomatology of oral diseases and oral manifestations of systemic diseases. Special emphasis is placed on the hygienists role in educating patients about oral health and disease and modifying dental hygiene treatment plans for patients who have pathological conditions.
    MnTC Goals
    None

    Prerequisite(s): DENH 2005  
    Corequisite(s): None
    Recommendation: None

    Major Content

    1. Cellular basis of life and disease
    2. Characteristics of benign, premalignant, and malignant lesions
    3. Dental treatment for disease compromised patients
    4. Developmental and genetic diseases
    5. Endocrine, blood, and immune diseases
    6. Immunodeficiency, HIV, and AIDS
    7. Inflammation, repair, and immunity
    8. Intrinsic and extrinsic factors in disease
    9. Neoplasms and cystic diseases
    10. Oral lesions and fibrous diseases
    11. Using differential diagnosis in identifying lesions

    Learning Outcomes
    At the end of this course students will be able to:

    1. summarize the cellular basis of life and disease.

    2. differentiate intrinsic, extrinsic, and retrogressive changes that cause disease.

    3. distinguish developmental disorders including terminology and embryonic development of the dentition and oral cavity.

    4. identify normal and abnormal development consistent with chronological age of the patient throughout the lifespan of the dental patient.

    5. describe oral neoplasia including terminology, causes, classification, and treatment.

    6. describe inflammation and repair of oral tissues.

    7. determine oral and systemic manifestations of disease and drug therapy.

    8. classify oral and systemic symptoms of viral, bacterial, and fungal diseases.

    9. compare characteristics of benign, fibrous, premalignant, and malignant oral lesions.

    10. apply the concept of differential diagnosis to determine the identification of oral pathology.

    11. outline accommodations to dental treatment required for disease-compromised patients.

     
    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 2030 - Community Dental Health and Epidemiology

    Credits: 2
    Hours/Week: Lecture 2 Lab None
    Course Description: This course examines the characteristics of community dental health programs with emphasis on epidemiology, program planning and delivery, scientific research, and the delivery and financing of dental care in the United States. Students examine the professional hygienist’s role and responsibility in the delivery of dental hygiene care to all populations.
    MnTC Goals
    None

    Prerequisite(s): DENH 2005  
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Barriers to dental health care
    2. Dental public health
    3. Costs, financing, and methods of payment of services in dentistry
    4. Effectiveness and costs of community health programs
    5. Methods of care delivery in the United States and around the world
    6. Biostatistics
    7. Career options, including dental public health
    8. Components of a research article and research design
    9. Cultural competence
    10. Dental epidemiology and dental indices
    11. Principles of education and lesson planning

    Learning Outcomes
    At the end of this course students will be able to:

    1. define public (community) health and dental public health.

    2. differentiate the processes in the delivery of dental care in the public health and private sectors.

    3. outline the science of epidemiology and attribute indices used to determine distribution of oral disease.

    4. integrate prevention methods and strategies as it applies to oral disease.

    5. deconstruct barriers to dental health care.

    6. design a dental health education program utilizing the principles of evidence-based scientific literature and dental health education.

    7. integrate elements of scientific theories, research, and biostatistics into educational, preventive, and therapeutic oral health services.

    8. generate a community outreach event promoting oral health education to an underserved population.

    9. determine the distribution of dental personnel as it relates to the treatment need, demand, and utilization.

    10. differentiate the financing of dental care and the methods of reimbursement by government, non-profit and private entities.

    11. outline legislative initiatives addressed to alleviate the shortage of care providers.

    12. determine career options for delivery of care in the public health arena.
    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 2035 - Community Dental HealthLab

    Credits: 1
    Hours/Week: Lecture None Lab 2
    Course Description: This course is the application of concepts learned in DENH 2030 , Community Dental Health. Students design, implement, and evaluate dental health projects conducted in the community in collaboration with the Century College Service Learning department.
    MnTC Goals
    None

    Prerequisite(s): DENH 2010 , DENH 2015 , DENH 2020 , and DENH 2030  
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Analysis of results from a community dental health project
    2. Presentation to a select audience the experience of the community dental health project.
    3. Development of a lesson plan and educational objectives
    4. Implementation of the project
    5. Participation in Give Kids a Smile
    6. Planning, development, research of a community dental health project

    Learning Outcomes
    At the end of this course students will be able to:

    1. Plan a community-based research project.
    2. Analyze research data collected from the community health project conducted.
    3. Conduct presentations for various audiences.
    4. Prepare a summary suitable for public presentation of a community dental health project.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 2040 - Legal Aspects of Dental Practice

    Credits: 1
    Hours/Week: Lecture None Lab None
    Course Description: This course focuses on the ethical and legal implications of providing dental and dental hygiene care. A case study approach will be used throughout the course to provide students experience in resolving legal and ethical dilemmas in a simulated dental office setting.
    MnTC Goals
    None

    Prerequisite(s): DENH 2010 , DENH 2015 , DENH 2020 , and DENH 2030  
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Ethics and professionalism
    2. Ethical principles and values
    3. Social responsibility and justice
    4. Dental hygiene code of ethics
    5. Ethical decision making in dental hygiene
    6. Society and the state dental practice act
    7. Dental hygienist ¿ patient relationship
    8. Dental hygienist ¿ dentist ¿ employer relationship
    9. Risk management
    10. Ethical theory and philosophy
    11. Ethical issues in community dental health

    Learning Outcomes
    At the end of this course students will be able to:

    1. describe the components of the MN Dental Practice Act & the ADHA Code of Ethics.
    2. explain the scope of practice for dentists, dental hygienists & dental assistants.
    3. analyze ethical dilemmas in simulated dental health case studies.
    4. apply 6-step Ethical Decision Making Model to simulated ethical dilemmas.
    5. differentiate civil and criminal laws.
    6. identify personal and professional morals/ethics.
    7. analyze ethical problems relating to dental hygiene.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 2060 - Principles IV: Seminar

    Credits: 1
    Hours/Week: Lecture 1 Lab None
    Course Description: This course focuses on topics important to the graduating dental hygiene student. It is designed to maximize their preparedness for board exams, licensure, and employment in dental hygiene.
    MnTC Goals
    None

    Prerequisite(s): DENH 2010 , DENH 2015 , DENH 2020 , and DENH 2030  
    Corequisite(s): DENH 2065  
    Recommendation: None

    Major Content
    1. Professional associations
    2. Dental hygiene as a regulated profession ¿ the role of the Board of Dentistry and legislature
    3. Collaborative agreements
    4. Managing hygiene productivity ¿ practical applications
    5. Employment contracts and establishing a contractual relationship
    6. Interviewing skills
    7. Résumé and cover letter
    8. Patient selection criteria for clinical boards
    9. National board topics review
    10. Career opportunities in dental hygiene

    Learning Outcomes
    At the end of this course students will be able to:

    1. evaluate the required elements of the written and clinical licensing exams.

    2. prepare a professional résumé and cover letter.

    3. demonstrate effective interviewing skills.

    4. analyze the economics of the dental hygiene workplace.

    5. describe professionalism in the workplace.

    6. implement professional licensure requirements.
    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 2065 - Clinic IV

    Credits: 5
    Hours/Week: Lecture None Lab 15
    Course Description: This is the fourth and final clinical dental hygiene course in which students will refine their skills in delivering patient care services and prepare to enter the dental hygiene workforce. Students must be able to perform physical tasks to complete course requirements.
    MnTC Goals
    None

    Prerequisite(s): DENH 2010 , DENH 2015 , DENH 2020 , and DENH 2030  
    Corequisite(s): DENH 2060 
    Recommendation: None

    Major Content
    1. Students will deliver dental hygiene care to patients from the community in the Century College dental clinic.

    2. Off-campus clinical rotations
    Learning Outcomes
    At the end of this course students will be able to:

    1. deliver care at a pace that is more congruent with that required post-graduation.
    2. demonstrate the ability to perform nonsurgical periodontal therapies.
    3. demonstrate competency in planning treatment and delivery of care.
    4. demonstrate competency in selected patient care procedures.
    5. demonstrate professional interaction with instructors, classmates, and patients.
    6. demonstrate safe handling, storage, and disposal of hazardous waste.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 2070 - Applied Biochemical Nutrition for the Dental Hygienist

    Credits: 1
    Hours/Week:
    Course Description: This course includes the study of cellular biochemistry and general nutrition, including recent advances in nutrition as it relates to oral health. It also includes the application of this knowledge to nutritional counseling and dietary analysis of dental patients within the framework of their cultural, economic, and psychosocial environment.
    MnTC Goals
    None

    Prerequisite(s): DENH 2010 , DENH 2015 , DENH 2020 , and DENH 2030  
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Healthy eating habits
    2. Digestion and absorption of carbohydrates
    3. Proteins, lipids, and metabolism
    4. Biochemistry of nutrients
    5. Vitamins, minerals, and nutrients for calcified structures
    6. Vitamins, minerals, and water for oral tissues and glands
    7. Nutritional requirements across the lifespan
    8. Factors affecting food intake including age, culture, and health status
    9. Systemic diseases and oral health
    10. Nutritional counseling the dental patient and use of resources
    11. Dental caries and prevention
    12. Dietary analysis

    Learning Outcomes
    At the end of this course, students will be able to:

    1. explain the role diet and nutrition play in oral health and disease.
    2. identify the role of cariogenic foods in the caries process.
    3. carry out a dietary analysis.
    4. describe the functions, deficiencies, surpluses and toxicities, of micronutrients and macronutrients.
    5. demonstrate culturally appropriate nutritional counseling techniques for oral and systemic health promotion.
    6. identify food sources that contain quality micronutrients and macronutrients.
    7. distinguish how culture, age, and medications influence nutritional considerations.
    8. outline the roles of macronutrients and micronutrients in metabolism, energy use, health, oral and systemic disease.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration

  
  • DENH 2790 - Independent Study

    Credits: 1-3
    Hours/Week: Lecture None Lab None
    Course Description: This course is designed to provide students with the opportunity to build their knowledge in the dental hygiene profession. Students will implement a project of their design in a professional setting.
    MnTC Goals
    None

    Prerequisite(s): DENH 2005  and director and dean consent.
    Corequisite(s): None
    Recommendation: None

    Major Content
    Varies, depending on proposed project.
    Learning Outcomes
    At the end of this course students will be able to: At the end of this course, students will be able to …

    1. establish appropriate independent study objectives in collaboration with the faculty advisor.
    2. document independent study activities in a journal.
    3. reflect on learning accomplished during experience in a final paper.
    4. self-evaluate the achievement of independent study objectives.

    Competency 1 (1-6)
    None
    Competency 2 (7-10)
    None


    Courses and Registration


Earth Science

  
  • ESCI 1020 - Earth Science

    Credits: 4
    Hours/Week: Lecture 3 Lab 2
    Course Description: This course is a survey of the earth sciences as a broad and nonquantitative introduction to topics in geology, oceanography, meteorology, and astronomy. It views solid earth, the liquid hydrosphere, and the gaseous atmosphere in terms of continuous interactions as air comes in contact with rock, rock with water, and water with air. Laboratory investigations and hands-on experiences provide the framework for the semester’s study.
    MnTC Goals
    3 Natural Science, 10 People/Environment

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. General The Scientific Method Measurement Matter and Mass
    2. Chemistry Atoms and Molecules Pure Water and Solutions Nuclear Reactions Organic Compounds
    3. Earth Science Rocks and Minerals Atmosphere and Climate Earths Natural Resources
    4. Physics Motion Energy Heat and Temperature Electricity

    Learning Outcomes
    At the end of this course students will be able to:

    1. explain the scientific method and its applications
    2. interpret measurements of mass, volume, and length
    3. apply the concepts of energy and matter to daily activities
    4. describe the basic building blocks of matter: atoms, elements, molecules, and compounds
    5. apply physical science principles from chemistry and physics to the three main categories of earth science and the environment: lithosphere, atmosphere, and hydrosphere

    Competency 1 (1-6)
    03. 01. Demonstrate understanding of scientific theories. 03. 02. Formulate and test hypotheses by performing laboratory, simulation, or field experiments in at least two of the natural science disciplines. One of these experimental components should develop, in greater depth, students’ laboratory experience in the collection of data, its statistical and graphical analysis, and an appreciation of its sources of error and uncertainty. 03. 03. Communicate their experimental findings, analyses, and interpretations both orally and in writing. 03. 04. Evaluate societal issues from a natural science perspective, ask questions about the evidence presented, and make informed judgments about science-related topics and policies.
    Competency 2 (7-10)
    10. 01. Explain the basic structure and function of various natural ecosystems and of human adaptive strategies within those systems. 10. 02. Discern patterns and interrelationships of bio-physical and socio-cultural systems. 10. 04. Evaluate critically environmental and natural resource issues in light of understandings about interrelationships, ecosystems, and institutions. 10. 05. Propose and assess alternative solutions to environmental problems.


    Courses and Registration

  
  • ESCI 1025 - Environmental Science

    Credits: 4
    Hours/Week: Lecture 3 Lab 2
    Course Description: This course covers a variety of environmental topics from an ecological perspective and emphasizes the nature of humanity’s relationship with Planet Earth’s physical and biological systems. Environmental problems are approached in both the framework of ecological principles and within the context of our human-constructed social relationships, economic systems, ethical systems, and political institutions as part of evaluating possible solutions. Hands-on activities provide students the opportunity to observe basic environmental science principles in action. The course includes weekly laboratory and/or fieldwork.
    MnTC Goals
    3 Natural Science, 10 People/Environment

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: Course placement into MATH 0070  and ENGL 1021 

    Major Content
    1. Introduction and basic concepts in environmental science
      1. Environmental problems, their causes, and sustainability
      2. Environmental history
    2. Science, systems, matter, and energy
      1. Scientific method
      2. Systems theory and behavior
      3. Law of conservation of matter
      4. Laws of thermodynamics
    3. The living world
      1. Ecosystem components, energy flow and matter cycling
      2. Evolution and biodiversity: origins, niches, and adaptation
    4. Population
      1. Community ecology, structure, species interaction, succession, and sustainability
      2. Population dynamics, carrying capacity, and conservation biology
    5. Land use
      1. Sustaining wild species
      2. Sustaining terrestrial biodiversity: the ecosystem approach
      3. Food resources
    6. Geology: processes, hazards, and soils
      1. Geologic processes
      2. Soil formation and soil profiles
      3. Characteristics of soil
      4. Soil erosion, desertification, and salinization
    7. Water use
      1. Properties of water
      2. Types of freshwater
      3. Water shortages
    8. Pollution
      1. Air pollution
      2. Water pollution
      3. Solid and hazardous waste
    9. Earth resources and energy resources and consumption
      1. Nonrenewable mineral resources and fossil fuel resources
      2. Renewable energy, both active and passive
    10. Global change
      1. Natural greenhouse effect
      2. Global climate change and possible solutions
    11. Ecological and human Health
      1. Risk, toxicology, and human health
      2. Bioaccumulation and bio magnification
    12. Sustainable society
      1. This topic and the principles of sustainability are integrated and worked throughout the above topical areas and units in the course
      2. Principles governing sustainability include: the law of conservation of matter, the laws of thermodynamics, the principles of population ecology, as well as principles of ecology especially with respect to understanding the difference between nonrenewable and renewable resources, the concept of irreversible biological loss, and the concept of intergenerational equity.

    Learning Outcomes
    At the end of this course students will be able to:

    1. apply the principles of biological ecosystems and the science of ecology to human interactions with the global biosphere and geosphere.
    2. apply the principles of ecology, the law of conservation of matter, thermodynamics to humanity’s relationship to the Earth in the areas such as human population, human land use, human water use, human use of energy resources and their consumption, and pollution.
    3. identify critical criteria of sustainability based upon the principles of ecology, law of conservation of matter, and the laws of thermodynamics.
    4. evaluate the environmental and resource impacts on Planet Earth and human society from the growth of human population and its ecological footprint in the following areas: land-use, water use, energy resources extraction, energy consumption, environmental pollution, within the context of global change.
    5. analyze and interpret information using a variety of methods from ecology and related disciplines to address human society’s environmental problems and our approach to them. 
    6. evaluate alternative solutions to environmental problems: land-use, water use, loss of wild species and their habitats, depletion of non-renewable mineral resources, air and water pollution, depletion of nonrenewable fossil fuel resources, decline of ocean fisheries, and global climate change.
    7. evaluate outcomes of alternative solutions and indicate choices that are viable pathways for a sustainable future human society. 

    Competency 1 (1-6)
    03. 01. Demonstrate understanding of scientific theories.
    03. 02. Formulate and test hypotheses by performing laboratory, simulation, or field experiments in at least two of the natural science disciplines. One of these experimental components should develop, in greater depth, students’ laboratory experience in the collection of data, its statistical and graphical analysis, and an appreciation of its sources of error and uncertainty.
    03. 03. Communicate their experimental findings, analyses, and interpretations both orally and in writing.
    03. 04. Evaluate societal issues from a natural science perspective, ask questions about the evidence presented, and make informed judgments about science-related topics and policies.
    Competency 2 (7-10)
    10. 01. Explain the basic structure and function of various natural ecosystems and of human adaptive strategies within those systems.
    10. 02. Discern patterns and interrelationships of bio-physical and socio-cultural systems.
    10. 04. Evaluate critically environmental and natural resource issues in light of understandings about interrelationships, ecosystems, and institutions.
    10. 05. Propose and assess alternative solutions to environmental problems.
    10. 06. Articulate and defend the actions they would take on various environmental issues.


    Courses and Registration

  
  • ESCI 1030 - Physical Geology

    Credits: 4
    Hours/Week: Lecture 3 Lab 2
    Course Description: This course introduces the student to rocks & minerals, geologic time, plate tectonics, and geologic landforms. Laboratory investigations provide the framework for rock and mineral identification and map interpretation of geologic features and processes.
    MnTC Goals
    3 Natural Science, 10 People/Environment

    Prerequisite(s): None
    Corequisite(s): None
    Recommendation: None

    Major Content
    1. Shaping the Earth’s Crust Folds, Faults and Mountains Earthquakes and the Earth’s Interior Plate Tectonics: Creating Oceans and Continents
    2. Forming the Earth Minerals Igneous Processes and Igneous Rocks Volcanoes and Volcanism Weathering: Breakdown of Rocks Sedimentation and Sedimentary Rocks Metamorphism and Metamorphic Rocks Telling Time Geologically
    3. Sculpting the Earth’s Surface Mass Movement Streams and Floods Groundwater, Caves and Karst Glaciers and Ice Ages Deserts and Wind Action Shores and Coastal Processes Earth’s Resources

    Learning Outcomes
    At the end of this course students will be able to:

    1. interpret topographic maps, geologic maps and stereo photos.
    2. identify common rocks and minerals based on standard physical and chemical properties
    3. recognize regional land forms from their unique geologic features.
    4. explain fundamental principles of geology including plate tectonics, geologic time, geologic structures, and landscape formation.

    Competency 1 (1-6)
    03. 01. Demonstrate understanding of scientific theories.
    03. 03. Communicate their experimental findings, analyses, and interpretations both orally and in writing.
    03. 04. Evaluate societal issues from a natural science perspective, ask questions about the evidence presented, and make informed judgments about science-related topics and policies.
    Competency 2 (7-10)
    10. 01. Explain the basic structure and function of various natural ecosystems and of human adaptive strategies within those systems.
    10. 03. Describe the basic institutional arrangements (social, legal, political, economic, religious) that are evolving to deal with environmental and natural resource challenges.
    10. 04. Evaluate critically environmental and natural resource issues in light of understandings about interrelationships, ecosystems, and institutions.
    10. 05. Propose and assess alternative solutions to environmental problems.


    Courses and Registration

 

Page: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11