Drexel Course Reviews
Drexel University
Code | Name | Overall | Easiness | Interest | Usefulness | Reviewssorted descending |
---|---|---|---|---|---|---|
CT 431 | Project Management | 0 | 0 | 0 | 0 | 0 |
CT 389 | Topics in Computing Technology II | 0 | 0 | 0 | 0 | 0 |
CT 400 | Network Security | 0 | 0 | 0 | 0 | 0 |
CT 414 | Ethical Hacking and Penetration Testing | 0 | 0 | 0 | 0 | 0 |
CT 491 [WI] | Senior Project I | 0 | 0 | 0 | 0 | 0 |
CT I299 | Independent Study in CST | 0 | 0 | 0 | 0 | 0 |
CT 100 | Microcomputer Hardware | 0 | 0 | 0 | 0 | 0 |
CT 300 | Security Technology Models And Architecture I | 0 | 0 | 0 | 0 | 0 |
CT 336 | Internet Protocol Security And Virtual Private Network Techn... | 0 | 0 | 0 | 0 | 0 |
CT 360 | Operating Systems Architecture II | 0 | 0 | 0 | 0 | 0 |
CT 375 | Database II | 0 | 0 | 0 | 0 | 0 |
CT 385 | Web Development III | 0 | 0 | 0 | 0 | 0 |
CT 395 | Information Technology Security I | 0 | 0 | 0 | 0 | 0 |
CT 420 | Information Technology Security II | 0 | 0 | 0 | 0 | 0 |
CT 355 | Wireless Network Security Technology | 0 | 0 | 0 | 0 | 0 |
CT 491 | Senior Project I | 0 | 0 | 0 | 0 | 0 |
CT 222 | Security And Information Warfare | 0 | 0 | 0 | 0 | 0 |
CT 325 | Operating System Security Architecture I | 0 | 0 | 0 | 0 | 0 |
CT 340 | Operating Systems Architecture I | 0 | 0 | 0 | 0 | 0 |
CT 350 | Network Administration III | 0 | 0 | 0 | 0 | 0 |
CT 370 | Object Oriented Systems Analysis | 0 | 0 | 0 | 0 | 0 |
CT 380 | Operating Systems Architecture III | 0 | 0 | 0 | 0 | 0 |
CT 390 | Server Side Programming | 0 | 0 | 0 | 0 | 0 |
CT 405 | Enterprise Programming | 0 | 0 | 0 | 0 | 0 |
CT 422 | Incident Response Best Practices | 0 | 0 | 0 | 0 | 0 |
CT 472 | Security Defense Countermeasures | 0 | 0 | 0 | 0 | 0 |
CT 496 | Senior Project II | 0 | 0 | 0 | 0 | 0 |
CT 301 | Information Technology Security II | 0 | 0 | 0 | 0 | 0 |
CT 212 | Computer Forensics I: Fundamentals | 0 | 0 | 0 | 0 | 0 |
CT 310 | Open Server II | 0 | 0 | 0 | 0 | 0 |
CT 320 | Server II | 0 | 0 | 0 | 0 | 0 |
CT 335 | Mobile Applications | 0 | 0 | 0 | 0 | 0 |
CT 362 | Network Auditing Tools | 0 | 0 | 0 | 0 | 0 |
CT 388 | Topics in Computing Technology I | 0 | 0 | 0 | 0 | 0 |
CT 402 | Network Security II | 0 | 0 | 0 | 0 | 0 |
CT 415 | Disaster Recovery and Continuity Planning | 0 | 0 | 0 | 0 | 0 |
CT 496 [WI] | Senior Project II | 0 | 0 | 0 | 0 | 0 |
CT I399 | Independent Study in CST | 0 | 0 | 0 | 0 | 0 |
CT 140 | Network Administration I | 0 | 0 | 0 | 0 | 0 |
CT 210 | Open Server I | 0 | 0 | 0 | 0 | 0 |
CT 200 | Server I | 0 | 0 | 0 | 0 | 0 |
CT 315 | Security Management Practice | 0 | 0 | 0 | 0 | 0 |
CT 353 | Virtual Environments and Cloud Security | 0 | 0 | 0 | 0 | 0 |
CT 382 | Applied Cryptography | 0 | 0 | 0 | 0 | 0 |
CT 393 | Information Technology Security Risk Assessment | 0 | 0 | 0 | 0 | 0 |
CT 412 | Information Technology Security Policies | 0 | 0 | 0 | 0 | 0 |
CT 432 | Information Technology Security Systems Audits | 0 | 0 | 0 | 0 | 0 |
CT I199 | Independent Study in CST | 0 | 0 | 0 | 0 | 0 |
CT I499 | Independent Study in CST | 0 | 0 | 0 | 0 | 0 |
CT 201 | Information Technology Security I | 0 | 0 | 0 | 0 | 0 |
CT 250 | IT Security Awareness | 0 | 0 | 0 | 0 | 0 |
CT 312 | Access Control and Intrusion Detection Technology | 0 | 0 | 0 | 0 | 0 |
CT 330 | Network Administration II | 0 | 0 | 0 | 0 | 0 |
CT 431
Project Management
CT 389
Topics in Computing Technology II
CT 400
Network Security
CT 414
Ethical Hacking and Penetration Testing
CT 491 [WI]
Senior Project I
CT I299
Independent Study in CST
CT 100
Microcomputer Hardware
CT 300
Security Technology Models And Architecture I
CT 336
Internet Protocol Security And Virtual Private Network Techn...
CT 360
Operating Systems Architecture II
CT 375
Database II
CT 385
Web Development III
CT 395
Information Technology Security I
CT 420
Information Technology Security II
CT 355
Wireless Network Security Technology
CT 491
Senior Project I
CT 222
Security And Information Warfare
CT 325
Operating System Security Architecture I
CT 340
Operating Systems Architecture I
CT 350
Network Administration III
CT 370
Object Oriented Systems Analysis
CT 380
Operating Systems Architecture III
CT 390
Server Side Programming
CT 405
Enterprise Programming
CT 422
Incident Response Best Practices
CT 472
Security Defense Countermeasures
CT 496
Senior Project II
CT 301
Information Technology Security II
CT 212
Computer Forensics I: Fundamentals
CT 310
Open Server II
CT 320
Server II
CT 335
Mobile Applications
CT 362
Network Auditing Tools
CT 388
Topics in Computing Technology I
CT 402
Network Security II
CT 415
Disaster Recovery and Continuity Planning
CT 496 [WI]
Senior Project II
CT I399
Independent Study in CST
CT 140
Network Administration I
CT 210
Open Server I
CT 200
Server I
CT 315
Security Management Practice
CT 353
Virtual Environments and Cloud Security
CT 382
Applied Cryptography
CT 393
Information Technology Security Risk Assessment
CT 412
Information Technology Security Policies
CT 432
Information Technology Security Systems Audits
CT I199
Independent Study in CST
CT I499
Independent Study in CST
CT 201
Information Technology Security I
CT 250
IT Security Awareness
CT 312
Access Control and Intrusion Detection Technology
CT 330
Network Administration II