Cybersecurity - Certificate of Achievement (3322)
Division: Mathematics, Engineering Technologies and Computer Sciences (METCS) Division
Code | Title | Credits |
---|---|---|
General Education Requirements (6 Credits) | ||
Written & Oral Communication (3) | ||
ENG 101 | College Composition I | 3 |
Technological Competency (3) | ||
CSC 100 | Fundamental of Computer Scienc | 3 |
Major Requirements (23 Credits) | ||
CSC 113 | Intro Linux/UNIX Operating Sys (or an approved technology course) | 4 |
CSC 114 | Computer Networks I | 4 |
CSC 116 | Intro to Comp/Network Security | 4 |
CSC 226 | NetworkDefense&CounterMeasures | 4 |
CSC 230 | Computer & Internet Forensics | 4 |
CSC 250 | Infor. Tech. Capstone Project (or an approved technology course) | 3 |
Total Credits | 29 |
Note: The minimum passing grade for all courses designated CSC is "C". If you earn a grade below "C", you need to repeat that course.
Notes:
- For an explanation of why General Education courses are included in this Program, please refer to the Section on General Education for an explanation of its Purpose and Requirements.
- This plan assumes the student is eligible to enroll in College Level Courses (designated as 100 +, e.g., ACC 102 Prin Accounting II Managerial, HST 131 Latin American History I, MTH 221 Calc with Analytic Geom III). Placement results will determine College Level Readiness in English and Mathematics.
Upon completion of this program, graduates will be able to:
- Manage multiple operating systems, systems software, network services and security;
- Evaluate and compare systems software and emerging technologies;
- Develop solutions for networking and security problems, balancing business concerns, technical issues, and security;
- Identify infrastructure components and role they serve, and design infrastructure including devices, topologies, protocols, systems software, management, and security;
- Use resources to stay abreast of industry tools and techniques analyzing impacts;
- Explain concepts of confidentiality, availability, and integrity in Information Assurance, including physical, software, devices, policies, and people, and analyze these in an existing system and design implementations; and
- Cite and comply with relevant industry and organizational codes of conduct and ethics.