Cybersecurity, Certificate of Achievement
Banner Code: 3_CN_CYBR2
Control Number: 20383
Financial Aid Eligible
The courses in this program provide students with a solid foundation in the tools, techniques, and procedures used by cybersecurity professionals. The program is designed to prepare students with the knowledge of emerging trends in cybersecurity and the skills needed for an entry-level career or advancement. Provides preparation for careers such as Cybersecurity Specialist, Information Security Analyst, Cyber Crime Analyst, Incident and Intrusion Analyst, and Vulnerability Analyst for a variety of industries including manufacturing, national security, finance, insurance, and health care. Topics include computer networking fundamentals, computer and network security, ethical hacking principles and methodology, digital forensics techniques, introductory programming, server administration, and security policies and procedures to build cyber resilience. The program courses include hands-on and technical writing assignments to help students develop in-demand skills for the cybersecurity workforce.
Program Level Student Learning Outcomes
Upon completion of this program, students will be able to:
- Evaluate and communicate the human role in security systems with an emphasis on ethics, social engineering vulnerabilities, and training.
- Assess security risks and identify methods to minimize their threat and/or impact.
- Demonstrate the ability to locate technical resources to resolve security-related issues with networking hardware and software.
- Apply risk management concepts to develop policies and procedures following security best practices.
Review Graduation Requirements.
Course | Title | Units |
---|---|---|
Required Core | ||
Complete the following: | ||
CYBR C101 | Introduction to Cybersecurity | 3 |
CST C128 | Computer Networking Principles (Network+) | 3 |
CST C158 | Contemporary Operating Systems (Server+) | 3 |
CIS C157 | Introduction to Python Programming | 3 |
Program Electives | ||
Select three courses of the following specialized areas: | 9 | |
Introduction to Ethical Hacking | ||
Introduction to Digital Forensics | ||
Introduction to Incident Response | ||
Cybercrime and CSIRT Coordination | ||
Cybersecurity Governance, Risk, and Compliance | ||
Cyber-Physical Security: Protecting Critical Infrastructure | ||
Network Security (Security+) | ||
Web Application Security | ||
Vulnerability Assessment (PenTest+) | ||
Intermediate Digital Forensics | ||
Cybersecurity Analyst (CySA+) | ||
Mobile Device Forensics | ||
Intermediate Incident Response | ||
Certified Information Systems Security Professional | ||
Become a Security Consultant | ||
Advanced Digital Forensics & Incident Response Capstone | ||
CompTIA Advanced Security Practitioner | ||
Linux Operating System Principles (Linux+) | ||
Units Required for Major | 21 |