Program Overview (IS81)
The Cybersecurity certificate is designed to give students the knowledge they need to understand and maintain computer information systems security.Apply Now! Career Options Request More Info
NOTE: THIS PROGRAM IS NOT CURRENTLY ELIGIBLE FOR FEDERAL FINANCIAL AID
Minimum Program Length: 2 Semesters
Estimated Program Cost: $5,184
Download Advisement Sheet
Entrance RequirementsAdmissions Requirements
- Must be 16 years of age
- Completion of high school or GED and submission of official transcript required to apply
- Achievement of minimum program admission scores in Reading, English, and Math
- Transfer of previous post secondary credits will be determined by the registrar.
At a GlanceContact: Dr. Peter Ejindu, Program Coordinator
This course provides a broad overview of information security. It covers terminology, history, security systems development and implementation. Student will also cover the legal, ethical, and professional issues in information security.
This course provides knowledge and experience to develop and maintain security policies and procedures. Students will explore the legal and ethical issues in information security and the various security layers: physical security, personnel security, operating systems, network, software, communication and database security. Students will develop an Information Security Policy and an Acceptable Use Policy.
This course will provide knowledge and the practical experience necessary to configure the most common server platforms. Lab exercises will provide students with experience of establishing operating systems security for the network environment.
This course provides knowledge and the practical experience necessary to evaluate, implement and manage secure information transferred over computer networks. Topics include network security, intrusion detection, types of attacks, methods of attacks, security devices, basics of cryptography and organizational security elements.
Students will learn how to plan, design, install and configure firewalls that will allow key services while maintaining security. This will include protecting the Internal IP services, configuring a firewall for remote access and managing a firewall and detecting and preventing network intrusions.
This course examines the use of computers in the commission of crimes, collection, analysis and production of digital evidence. Students will use computer resources to explore basic computer forensic investigation techniques.
This course teaches students the skills needed to obtain entry-level security specialist jobs. It provides a hands-on introduction to ethical hacking, and penetration testing. It is for individuals who want to enhance their information security skill set and help meet the growing demand for security professionals. Topics include network and computer attacks, footprinting and social engineering, port scanning, enumeration, OS vulnerabilities, hacking web servers, hacking wireless networks, cryptography and network protection systems.