Department:Information and Computer Technologies
School(s): Applied Sciences & TechnologiesCIP Code: 11.1003
This program provides students with comprehensive knowledge and training in the implementation and management of the security measures required to protect computer resources from unauthorized access or attack. In particular, this program is designed to provide students with the technical expertise needed to protect enterprise information and computing assets connected to the Internet. Classroom work provides students with extensive hands-on experience and training using state-of-the-art security tools and techniques. This certificate is designed to meet the needs of Information Technology practitioners, law enforcement personnel, and anyone else interested developing a solid foundation in Cybersecurity.
Although a basic understanding of computers is expected, this program is designed for students with no previous experience in Cybersecurity. Several of the courses in the certificate parallel the training developed by the SysAdmin, Audit, Network, and Security (SANS) Institute and can be used to help prepare students to sit for the Global Information Assurance Certification (GIAC) examinations.
(Housed in the Information and Computer Technologies Department)
Program Learning Outcomes
1) Identify security risks to computing resources.
2) Assess potential threats to computing resources.
3) Develop effective countermeasures aimed at protecting data.
4) Develop effective countermeasures aimed at protecting computer assets.
Requirements for Program Entrance
High school graduate or high school equivalency diploma. Algebra (1 year high school math or placement into Level 4 Math at MCC).
|FIRST SEMESTER: 16 Credit Hours|
|CPT 120 Introduction to Cybersecurity||4|
|CSC 215 Introduction to Linux||3|
|CPT 115 Introduction to Networks||3|
|SCR 211 Computer Security I||3|
|CRC 133 Cloud Computing Design and Implementation||3|
|SECOND SEMESTER: 17 Credit Hours|
|CPT 220 Applied Security Concepts||4|
|SCR 212 Computer Security II OR CRC 132 A Global Perspective on Mobile and Cloud Computing||3|
|CPT 125 Physical Security||3|
|CPT 225 Network Perimeter Security||4|
|CRC 230 Cloud Security||3|