Cybersecurity Certificate Program
Certificate - Computer Information Technology Department
|Course Title||Course Number||Semester Taken||Credits||Prerequisites|
|Applications/Concepts or Info Technology Problem Solving||CIT110 or CIT113*||3||Prerequisites for CIT110: ESL098 or RDG095 or placement; prerequisites for CIT113: ENG090 and RDG090 or placement|
|Principles of Internet and Info Security||CIT118||3||CIT110 or CIT113 or CIT120 or Chair approval|
|Cisco Networking I||CIT162||3||RDG095 or ESL098 or placement|
|Introduction to Computer Forensics||CIT121||3||CIT110 or CIT113 or CIT120 or Chair approval|
|Windows Operating Systems||CIT268||3||CIT110 or CIT113 or CIT120 or Chair approval|
|Information Security and Assurance||CIT219||3||CIT268|
|Python Programming||CIT125||3||CIT113 or CIT110 or CIT120 or CMT121|
|Ethical Hacking||CIT273||4||CIT268 or CIT270 or Chair approval|
*Note: CIT-113 recommended for this program. CIT113 satisfies Learning Communities Requirement. CIT264 is aligned with CompTIA Security+.
This option may prepare students to support the security of networks, systems located on these networks, and the data/information contained within those systems; identifying, developing, implementing and maintaining security processes throughout organizations to reduce risks, respond to incidents and limit exposure and liability; identifying, notifying, and responding to security threats to networks.
This option is designed to align with the National Institute of Technology and Standards’ (NITS) National Initiative for Cybersecurity Education Cybersecurity Workforce Framework to ensure consistent, current, and flexible training in the growing technology field of Information Security. Graduates of this option may qualify for positions as entry level information security professionals.
Upon Completion of this Concentration Graduates will be able to:
- Understand network protocols and routing.
- Understand commonly used network services - DNS, mail, web, etc. as well as less common network services.
- Perform packet analysis and be able to identify malformed packets.
- Understand differences between various operating systems - which OS an event came from and which OS is vulnerable to a certain attack.
- Define the types of malicious software found in modern networks.
- Explain the threats and countermeasures for physical security and social engineering.
- Perform footprinting, port scans, and enumeration on a network.
- Perform very simple programming in C, HTML, and Perl, specifically oriented towards the needs of network security professionals.
- Identify Microsoft Windows vulnerabilities and to harden systems.
- Identify Linux vulnerabilities and to protect servers.
- Describe and deploy security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots.
- Describe the ethics associated with the use of hacking or penetration testing tools and techniques.