|
Nov 08, 2024
|
|
|
|
Catalog 2019-2020 [ARCHIVED CATALOG]
Cybersecurity Certificate
|
|
|
Short Description
The Cybersecurity certificate program is designed to provide the knowledge and skills needed to analyze security vulnerabilities, create a comprehensive incident-response plan, and implement the equipment, policies and procedures that protect a network and its related resources from unauthorized intrusion, information damage, or theft.
Type of Credential
Credit Certificate
Semester Sequence
This is a suggested full-time schedule for a student who has completed any developmental course work and has no transfer credits.
Courses Needed for This Program*
Program Requirements and Electives - 42 Credits
Total Number of Credits Required for Certificate: 42*
Note
*Credit students who are new to college (no successfully completed transferable college credits from other institutions) are required to take ACDV 101 - Academic Development: Transitioning to College . This 1-credit course is designed to be taken in the first semester at CCBC. Students must provide an official transcript(s) from an accredited institution to document successful completion of college coursework for the ACDV 101 requirement to be waived.
Program Description
The Cybersecurity certificate program is designed to provide the knowledge and skills needed to analyze security vulnerabilities, create a comprehensive incident-response plan, and implement the equipment, policies and procedures that protect a network and its related resources from unauthorized intrusion, information damage, or theft. Behaving ethically, writing policies and procedures, securing operating systems, installing and administering contemporary intrusion detection systems and firewalls, implementing network defenses and countermeasures, responding to intrusions, and utilizing system-wide, multi-layered, compliance-based approaches are emphasized.
Program Outcomes
Upon successful completion of this certificate, students will be able to:
- apply software patches to operating systems and applications;
- assess a system’s security vulnerabilities using appropriate resources;
- use standard software tools to detect attempted security breaches of computer systems; and
- implement system security defenses.
|
|
|