Business and Information Technology

The college's Office of Workforce Development offers Business and Information Technology courses for those preparing for a new job, promotion or looking to update their skills.

Instructor-Led Courses

Business Writing and Reports

Sharp writing skills pay off in an increasingly information-oriented workplace! This blended classroom/online course will help you brush up on the mechanics and structure of written communications and add a professional touch to your reports.

You will:

  • Review basic elements of clarity, grammar mechanics, word choice and report writing
  • Benefit from direct instructor feedback

Course Topics:

  • The Writing Process: Preparation, Organization, Writing and Revision
  • Grammar, Mechanics and Punctuation
  • Style and Clarity: Concise and Precise Writing Techniques
  • Correspondence for the Business Environment: Reports and Emails; Business Memos and Letters

The course begins and ends with classroom meetings and will have four weeks of online sessions in-between. Students will work independently on assignments, with access to the instructor for person-to-person interaction, both in the classroom and via email.

Prerequisites: Basic computer skills; previous experience using a word processing software program; a flash drive; the ability to submit assignments in MS Word or Word-compatible format; and proficiency using email to submit and retrieve class-related documents.

Required Textbook: Rules for Writers, 7th edition by Diana Hacker and Nancy Sommers. ISBN-13: 9780312647360

Location: Hudson Valley Community College Main Campus

Tuition: $380

Delivery of Course:

Instructor-Led (Blended: Classroom / Online)
20 hours, 2.0 CEUs, Non-Credit

Schedule TBA

Startup Business Principles

We've partnered with the Troy Innovation Garage to offer this complete overview of the necessary steps in developing an idea and starting your own business. In addition, this course provides ample opportunity for hands-on application of core concepts with the Troy Innovation Garage, Gramercy Communications and their partners. This unique program allows you the opportunity to gain valuable experience by partnering with formative-stage companies on real world consulting projects, the chance to develop your own business models and start-up concepts, and an advanced knowledge and understanding of the business start-up process. At the conclusion of this course, you will have completed a detailed marketing plan and presentation for your business idea. This course will prove beneficial to both individuals and teams of entrepreneurs in any stage of business idea development.

Prerequisites: None

Textbook: Five suggested texts are used along with subscriptions to “Entrepreneur” and “Fast Company” magazines, as well as the Times Union and Albany Business Review. A complete list is available from WDI.

Location: Troy Innovation Garage, 22-24 Fourth St., Troy

Tuition: $600

Delivery of Course:

Instructor-Led (Classroom)
30 Hours, 3.0 CEUs, Non-Credit

Schedule TBA

Introduction to Automated Web Testing

This 20-hour course, developed in partner with Albany Can Code, will train you to use open source (no cost) tools to write scripts and run tests to validate websites. The class covers element locators, XPath, CSS Selectors and other web content attributes. There is a focus on best practices in writing tests and an exposure to using Git to document test performance and results.

Those who successfully complete the course will have developed the skills for an entry-level position in a business based on web services. The practice with scripting and documenting tests with Selenium, Visual Studio, NuGet and Git will support your continued development in other testing toolkits, as desired. (ex. Groovy, Jenkins, Scala, Python)

The course covers:

  • Orientation to course and tool installation
  • Element identification, keyboard and mouse events, implicit and explicit waits (lecture and lab)
  • Script an application test (lecture and lab)
  • Run an automated test (lecture and lab)
  • Best practices: clean-up, repositories

Prerequisites:

  • Patient, methodical, detail oriented
  • Interested in software/web careers
  • Basic computer skills and use of a laptop with internet access (must be brought to class)
  • Satisfactory completion of Albany Can Code online application process

To apply: Applicants with an interest and motivation to work in the software field should apply online through Albany Can Code.

Location: Hudson Valley Community College Main Campus

Tuition: $400

Delivery of Course:

Instructor-Led (Classroom)
20 Hours, 2.0 CEUs, Non-Credit

Schedule TBA

Online Independent Courses

Communicating Collaboratively

Communicating effectively is critical to the success of a team and critical to your personal success on any given project or task. This introductory-level course will help you improve your collaborative communication by providing best practices and effective tips and techniques.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, Non-Credit
Access time: 90 days

Effective Business Writing

The ability to write clearly and directly is highly prized in most organizations. Well-written emails and documents can help you earn respect among your peers. And poorly written emails and documents can detract from success at all levels. The ideas, techniques and checklists in this introductory-level course apply to all forms of business writing: memos, reports, brochures, proposals, presentations, catalogs and websites. This course will also teach you how to revise for wordiness, reduce unnecessary phrases and jargon, and the appropriate use of email in an organizational setting.

Tuition: $99

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, Non-Credit
Access time: 90 days

Online Independent Certificates and Courses: Cybersecurity & CISSP

As the amount of data stored increases and as hackers become more sophisticated, the need for cybersecurity professionals is greater than ever. With the right cybersecurity knowledge and resources, organizations can protect themselves from attacks, theft and destruction. Our comprehensive Cybersecurity courses through MindEdge help you master the foundational information needed to be successful in the cybersecurity industry.

From cloud data security to cryptography, to malware and risk management, the skills taught in our cybersecurity courses will help you master both technical and non-technical aspects of cybersecurity. Our cybersecurity courses offer videos, interactive games, examples, and review questions to ensure mastery of the material.

Certificate in Cybersecurity

This eight-course certificate offers lessons on the critical elements of information security. Each of the eight courses in this suite helps you master both technical and non-technical aspects of cybersecurity and offers examples, videos, interactive games, and review questions to ensure mastery of the material.

Courses included in the certificate include:

  1. Asset Security
  2. Communication and Network Security
  3. Identity and Access Management
  4. Security and Risk Management
  5. Security Assessment and Testing
  6. Security Engineering
  7. Security Operations
  8. Software Development Security

Tuition: $499

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 40 hours, 4.0 CEUs, Non-Credit
Access time: 720 days

Real-World Cloud Cybersecurity Scenarios - 1

This suite of five related courses covers various aspects of securing cloud services. Its structure is based on the Certified Cloud Security Professional (CCSP) certification administered jointly by the Cloud Security Alliance and (ISC)2. Each course is comprised of two modules. The first module provides content related to the course subject matter. The second module provides real-world scenarios in which you must apply the content of the first module.

Courses in this bundle include:

  • Cloud Application Security
  • Cloud Data Security
  • Cloud Infrastructure and Platform Security
  • Cloud Operations Security
  • Introduction to Cloud Computing and Cybersecurity

Tuition: $329

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 25 hours, 2.5 CEUs, 25 (ISC)2 CPEs,Non-Credit
Access time: 450 days

Real-World Cybersecurity Scenarios - 2

These courses each include a module devoted to fictional scenarios, based on real-world challenges that cybersecurity professionals face. Each course in this bundle helps refine and enhance the skills that cybersecurity and IT professionals need.

Courses in this bundle include:

  • Access Control and Identity Management Scenarios
  • Application, Data, and Host Security Scenarios
  • Compliance and Operational Security Scenarios
  • Cryptography Scenarios
  • Network Security Scenarios
  • Threats and Vulnerabilities Scenarios

Tuition: $399

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 30 hours, 3.0 CEUs, 30 (ISC)2 CPEs, 30 PDUs, Non-Credit
Access time: 540 days

Access Control and Identity Management Scenarios

This course introduces the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. This course provides an overview of identity management and the resources used on modern-day information systems, including Web and cloud-based ones. We will cover a number of fictional scenarios based on access control and identity management that professionals face in the real-world.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 (ISC)2 CPEs, 5 PDUs, Non-Credit
Access time: 90 days

Application, Data, and Host Security Scenarios

This course covers the security of applications, data and hosts in information systems. It provides a comprehensive examination of software development and change management and features a number of fictional scenarios based on real-world application, data and host security.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 (ISC)2 CPEs, 5 PDUs, Non-Credit
Access time: 90 days

Asset Security

We will review various security controls that help protect privacy and data leakage prevention (DLP). The content in this course aligns with Domain Two in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 PDUs, Non-Credit
Access time: 90 days

CISSP® Exam Prep Course

The CISSP® Exam Prep Course prepares you for the Certified Information Systems Security Professional exam, as administered by the International Information System Security Certification Consortium (ISC)2. The CISSP® certification is recognized worldwide and adheres to the strict standards of ISO/IEC 17024. As security breaches outpace the available pool of security experts, the need for information security professionals with proper certifications will continue to grow. Among other titles, obtaining the CISSP® certification prepares one for a position as a security analyst, chief information security officer or as a security architect.

Tuition: $549

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 40 hours, 4.0 CEUs, 4 PDUs, Non-Credit
Access time: 180 days

CISSP Practice Exams and Exam Strategies

This course is designed to give you an assessment of their readiness to take ISC2's CISSP® Exam. It contains two 120-question practice exams, which cover the International Information System Security Certification Consortium's eight domains: Security and Risk Management; Asset Security; Security Engineering; Communications and Network Security; Identity and Access Management; Security Assessment and Testing; Security Operations; Software Development Security.

Tuition: $99

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, Non-Credit
Access time: 90 days

Cloud Application Security

This course begins by presenting several challenges and solutions for securing cloud-based applications. You are then presented with several real-world scenarios to apply the material you've learned. This course follows the structure of the (ISC)2 Certified Cloud Computing Professional certification.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 (ISC)2 CPEs, Non-Credit
Access time: 90 days

Cloud Data Security

This two-module course addresses many of the important concepts of cloud-based data and the security responsibilities of both cloud consumers and cloud service providers. The second module offers a series of scenarios that relate to cloud data security to ensure you have mastered the material.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 (ISC)2 CPEs, Non-Credit
Access time: 90 days

Cloud Infrastructure and Platform Security

This course is comprised of two modules. The first addresses many of the challenges for both cloud consumers and cloud service providers in securing the infrastructure and platforms used in cloud computing. The second module offers a series of real-world scenarios designed to give you a sense for how the concepts might be applied in your everyday work.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 (ISC)2 CPEs, Non-Credit
Access time: 90 days

Cloud Operations Security

This two-module course covers security issues with operating cloud services. It is particularly valuable to helping cloud consumers understand how security responsibilities may be divided between consumer and provider. The second module engages the learner with real-world scenarios that represent the challenges to securing cloud operations.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 (ISC)2 CPEs, Non-Credit
Access time: 90 days

Communication and Network Security

This course covers topics related to communications and network security. It begins with a lesson in the different types of networks and different transmission technologies. It also covers the two main models that govern how networks work: the OSI model and the TCP/IP model, as well as their related layers. It includes a detailed discussion of the many protocols that allow networks and network devices to communicate with one another and includes a discussion of firewalls and wireless networks.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 (ISC)2 CPEs, Non-Credit
Access time: 90 days

Compliance and Operational Security Scenarios

This course provides a discussion of the role of security governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee strong information security practices. The course features a number of fictional scenarios based on compliance and operational security to allow you to practice the concepts learned in the material.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 (ISC)2 CPEs, Non-Credit
Access time: 90 days

Cryptography Scenarios

This is an introduction to the key concepts of cryptography and security engineering. The course examines the role of encryption in information security and considers common encryption methods. It features a number of fictional scenarios based on cryptography to help you apply the concepts to situations you may see in the real world.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 (ISC)2 CPEs, 5 PDUs, Non-Credit
Access time: 90 days

Identity and Access Management

This is an introduction to the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. The course reviews different kinds of authentication techniques, how they work, and how they are distinguished from each other.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 (ISC)2 CPEs, Non-Credit
Access time: 90 days

Introduction to Cloud Computing and Cybersecurity

This two-module course provides an introduction to cloud-based services and the accompanying need for cybersecurity and provides a series of real-world scenarios in which learner must apply several of the concepts covered in the first module.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 (ISC)2 CPEs, Non-Credit
Access time: 90 days

Introduction to Cybersecurity

This course teaches the fundamental concepts of information security one will encounter in the cybersecurity field. It provides a groundwork of basic vocabulary and then introduces concepts such as access controls, risk management, cyberattacks and digital forensics.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 PDUs, Non-Credit
Access time: 90 days

Introduction to Malware

This course provides a clear and comprehensive introduction to malware and how to defend against it. Instruction is divided into two modules. The first provides an overview of the history and mechanisms of malware. The second module offers a series of real-world scenarios in which you must apply several of the concepts covered in the first module.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 PDUs, Non-Credit
Access time: 90 days

Network Security Scenarios

This course examines communications and network security. It covers the different types of networks and different transmission technologies and the two main models that govern how networks work, the OSI model and the TCP/IP model, and their related layers. Coursework features a number of fictional scenarios to applied learning to situations encountered in the real world.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 (ISC)2 CPEs, 5 PDUs, Non-Credit
Access time: 90 days

Security Assessment and Testing

This course covers security assessment and testing, focusing on potential disruptions and how they can be addressed with assessments and plans. It provides the opportunity to practice how to assess the impact of disasters that may arise as well as to develop your own versions of these plans.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 PDUs, Non-Credit
Access time: 90 days

Security Engineering

This course is an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. In addition, the course discusses ciphers, their substitutes and how they work.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 PDUs, Non-Credit
Access time: 90 days

Security Operations

This course provides a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security. This course requires a basic understanding of IT concepts.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 PDUs, Non-Credit
Access time: 90 days

Security and Risk Management

This course covers the role of governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. Coursework includes a review of how modern organizations manage information security risks and how to conduct a risk analysis. We also will examine the process for providing information security training and education.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 PDUs, Non-Credit
Access time: 90 days

Software Development Security

This course covers software development security, while focusing on the systems development life cycle, operating systems and their environments. Additional topics include the role of various databases in security and how to recognize and guard against attacks on software. You will have the opportunity to apply application security controls.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 PDUs, Non-Credit
Access time: 90 days

Threats and Vulnerabilities Scenarios

This course examines the process of identifying and mitigating threats and vulnerabilities in information systems. We will cover common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and vulnerabilities.

Tuition: $79

Delivery of Course:

Online Independent (Ask the Expert Available in Course)
Estimated 5 hours, 0.5 CEUs, 5 (ISC)2 CPEs, 5 PDUs, Non-Credit
Access time: 90 days

Get in Touch

Workforce Development
Fitzgibbons Health Technologies Center, Room 131
Office Hours: Monday - Friday, 8:30 a.m. - 4:30 p.m.
Summer Hours: Monday - Friday, 8:30 a.m. - 4 p.m.
(excluding college holidays and vacations)