Cybersecurity Program
This certificate will prepare students for an entry-level position in the field of information security. They will gain an understanding of the technological needs, threats, and weaknesses in cybersecurity. Through this certificate, students will learn the tools needed to manage computer systems as well as gain insight into the legal, and social aspects of the cyber universe.
Upon completion of the program, students will be able to analyze potential cyber threats to an organization network and recommend and apply the proper tools to defend against those attacks.
Area of Emphasis
Students must complete all the following:
Required Core | Units |
---|---|
CS 70 - Network Fundamentals And Architecture | 3 |
CS 73A - Fundamentals of Computer Security | 3 |
CS 73B - Computer Forensics Fundamentals | 3 |
CS 73C - Cybersecurity and Ethical Hacking | 3 |
Total Units for Area of Emphasis: | 12 |
CS 73A: Fundamentals of Computer Security
In this introductory course, students will learn how to defend and protect critical computer assets from various security threats including computer worms and viruses. This course will describe fundamental techniques and principles for modeling and analyzing security. Students will learn how to express security requirements, translate requirements into policies, implement mechanisms that enforce policy, and ensure that these policies are effective. Current industry best practices for safeguarding computer resources will be discussed. Various case studies will outline the typical way that security failures get exploited by attackers and how these attacks can be discovered, understood, and countered.
CS 73B: Computer Forensics Fundamentals
In this course, students will learn the principles and techniques of network forensics investigation and the use of available forensics tools in the list of the International Association of Computer Investigative Specialists (IACIS) certification. This course explores security incidents and intrusions, including identifying and categorizing incidents, responding to incidents, using log analysis, analyzing network traffic, applying various tools, and creating an incident response team. Students will also learn about the ethical implications of computer forensics reporting and the laws regarding computer evidence.
CS 73C: Cybersecurity and Ethical Hacking
This course provides an in-depth understanding of how to protect IT infrastructure. The course combines ethical hacking methodologies with the hands-on application of security tools to secure computer and other digital systems. Students are introduced to common countermeasures that effectively reduce and/or mitigate attacks. In addition, the course covers what an ethical hacker is and how important it is to protect data from cyber attacks. Students will review TCP/IP concepts and practice footprinting, scanning, enumeration, exploitation, and social engineering.