Cybersecurity Certificate Technical Certificate of Credit
Employment opportunities are: computer and information sciences and support services.
The standard curriculum for the Cybersecurity Certificate program is designed for the semester system. Students may enter the program during any semester. The certificate program generally takes three (3) to four (4) semesters to complete. To graduate, students must earn a minimum of 26 credit hours.
- Submit a completed application and application fee;
- Be at least 16 years of age;
- Submit an official copy of your high school transcript or high school equivalent scores;
- Submit official college transcripts, if applicable;
- Satisfy Placement Testing requirements.
Costs are estimates and are subject to change.
- Tuition/Fees: $3,653
- Books/Supplies: $1,000
|General Core (26 hours)||26|
|CIST 1601Information Security Fundamentals
(Prerequisites: None) This course provides a broad overview of information security. It covers terminology, history, security systems development and implementation. Student will also cover the legal, ethical, and professional issues in information security.
|CIST 1602Security Policies & Procedures||3|
|CIST 2601Implementing Operating Systems Security
(Prerequisites: CIST 2451, CIST 1601) (Co-requisites: None) This course will provide knowledge and the practical experience necessary to configure the most common server platforms. Lab exercises will provide students with experience of establishing operating systems security for the network environment.
|CIST 2602Network Security
(Prerequisites: CIST 2451, CIST 1601) (Co-requisites: None) This course provides knowledge and the practical experience necessary to evaluate, implement, and manage secure information transferred over computer networks. Topics include network security, intrusion detection, types of attacks, methods of attacks, security devices, basics of cryptography, and organizational security elements.
|CIST 2611Network Defense and Countermeasures
(Prerequisites: CIST 2451, CIST 1601) (Co-requisites: None) Students will learn how to plan, design, install, and configure firewalls that will allow key services while maintaining security. This will include protecting the Internal IP services, configuring a firewall for remote access, managing a firewall, and detecting and preventing network intrusions.
|CIST 2612Computer Forensics
This course examines the use of computers in the commission of crimes, collection, analysis and production of digital evidence. Students will use computer resources to explore basic computer forensic investigation techniques.
|CIST 2613Ethical Hacking & Penetration Testing||4|
Up one level
Programs of Study
Notice and Responsibilities Regarding this Catalog
The statements set forth in this catalog are for informational purposes only and should not be construed as the basis of a contract between a student and this institution. While every effort has been made to ensure the accuracy of the material stated herein, we reserve the right to change any provision listed in the catalog, including, but not limited to, entrance requirements and admissions procedures, academic requirements for graduation, and various fees and charges without actual notice to individual students. Every effort will be made to keep students advised of such changes.