Cyber Security (Fast-Track) Certificate Program
Certificate - Computer Information Technology Department
|Course Title||Course Number||Semester Taken||Credits||Prerequisites|
|Applications/Concepts or Info Technology Problem Solving||CIT110 or CIT113*||3||Prerequisites for CIT110: ESL098 or RDG095 or placement; prerequisites for CIT113: ENG090 and RDG090 or placement|
|Principles of Internet & Info Security||CIT118||3||CIT110 or CIT113 or CIT120 or Chair approval|
|Cisco Networking I||CIT162||3||RDG095 or ESL098 or placement|
|Information Security and Assurance||CIT219||3||CIT268|
|IT Career Exploration||CIT102||1|
*Note: CIT-113 recommended for this program. CIT113 satisfies Learning Communities Requirement. CIT264 is aligned with CompTIA Security+.
Designed for the IT technician or professional seeking new and updated skills in the area of information security and assurance, this basic level certificate may enhance existing knowledge for increased job opportunities and employment growth. The Information Technology Security + Essentials Certificate aligns with the COMPTIA National Standards for Security + Certification. It may prepare students to be responsible for desktop security support contained within a networked environment.
This entry level certificate provides the skills necessary to provide basic security support for networked computers. It is an entry point into the field of Information Security. This option is designed to provide alignment with the entry level National Institute of Technology and Standards’ (NITS) National Initiative for Cybersecurity Education and Workforce Framework to ensure consistent, current, and flexible training in the growing technology field of Information Security. Graduates of this option may qualify for positions as entry level information security desktop support technicians.
Upon Completion of this Concentration Graduates will be able to:
- Secure a desktop computer connected to a network.
- Install and configure security software.
- Analyze potential security threats.
- Delineate differences between various operating system security issues.
- Define the types of malicious software found.