Our Information Technology (IT) Cybersecurity Technician program will teach you about topics including network and security foundations, security concepts, introduction to protocol analysis, secure administration, perimeter defense, and intrusion detection. This program will help prepare you for entry-level positions with businesses, educational systems, and governmental agencies that rely on computer systems to design and manage information.
This is a certificate program and requires fewer credits and less time to complete than a degree or diploma program. Certificate programs can be taken alone but are often taken along with other IT programs.
The IT Cybersecurity program also offers degree and diploma options.
Learn more about this program’s student outcome data.
Certificate requirements
18 Credit Hours
Courses in this program
Course | Course Code | Credit Hours | Link to course details |
---|---|---|---|
CTI-120 | 3 | ||
This course introduces students to the Network concepts, including networking terminology and protocols, local and wide area networks, and network standards. Emphasis is placed on securing information systems and the various implementation policies. Upon completion, students should be able to perform basic tasks related to networking, mathematics, terminology, media and protocols.
|
|||
SEC-110 | 3 | ||
This course introduces the concepts and issues related to securing information systems and the development of policies to implement information security controls. Topics include the historical view of networking and security, security issues, trends, security resources, and the role of policy, people, and processes in information security. Upon completion, students should be able to identify information security risks, create an information security policy, and identify processes to implement and enforce policy.
|
|||
SEC-151 | 3 | ||
This course introduces protocol analysis. Topics include protocol analysis tools, TCP/IP concepts, Internet protocols, network traffic analysis, monitoring network traffic, network security, protocol analysis, and understanding data flow through protocol analysis. Upon completion, students should be able to perform simple protocol analysis to determine baseline network performance and identify anomalies.
|
|||
SEC-160 | 3 | ||
This course provides an overview of security administration and fundamentals of designing security architectures. Topics include networking technologies, TCP/IP concepts, protocols, network traffic analysis, monitoring, and security best practices. Upon completion, students should be able to identify normal network traffic using network analysis tools and design basic security defenses.
|
|||
SEC-175 | 3 | ||
This course introduces the principles of securing networks using routers and firewalls. Topics include networking protocols, threat mitigation, firewall configuration, authentication, authorization, intrusion detection, encryption, IP security, VPNs, and remote access technologies. Upon completion, students should be able to secure internal networks using router and firewall technologies.
|
|||
SEC-210 | 3 | ||
This course introduces the student to intrusion detection methods in use today. Topics include the types of intrusion detection products, traffic analysis, and planning and placement of intrusion detection solutions. Upon completion, students should be able to plan and implement intrusion detection solution for networks and host-based systems.
|