Jul 27, 2024  
Catalog 2024-2025 
    
Catalog 2024-2025

Cybersecurity Certificate

Location(s): Catonsville, Dundalk, Essex, Online


Important Information


Short Description


This program is designed to provide the knowledge and skills needed to analyze security vulnerabilities, create a comprehensive incident-response plan, and implement the equipment, policies, and procedures that protect a network and its related resources from unauthorized intrusion, information damage, or theft.  Behaving ethically, writing policies and procedures, security operating systems, installing and administering contemporary intrusion detection systems and firewalls, implementing network defenses and countermeasures, responding to intrusions, and utilizing system-wide, multi-layered, compliance-based approaches are emphasized.

Type of Credential


Credit Certificate

Program Code


583

Contacts and Additional Information


Department Chair:

CCBC Essex, Noell Damron
443-840-2811 or cdamron@ccbcmd.edu

Program Coordinators:

CCBC Essex
Sabum Anyangwe
443-840-1775 or sanyangwe@ccbcmd.edu

CCBC Catonsville
Vini Nithianandam
443-840-3391 or vnithiana@ccbcmd.edu

Additional Information:

Disclosures


CCBC cannot confirm whether the course or program meets requirements for professional licensure in states other than Maryland. If you plan to apply for licensure in a state other than Maryland, contact that state’s licensing board to determine whether the CCBC course or program meets requirements for licensure in that state. If you need assistance finding contact information for your state, click here .

Curriculum Maps


Curriculum Maps are a tool to provide students with a clear understanding of which courses to take and the order in which to complete them. Curriculum Maps help define a student’s individual path towards graduation, ensuring their time and efforts are not spent on credits that fall outside their program of study.

Each map identifies critical courses that must be completed in order to progress through the program and graduate. Curriculum Maps come complete with helpful hints for students - like recommended course electives and a reminder to apply to graduate.

Select the link(s) below to view the Curriculum Map(s) for this program:

Semester Sequence


This is a suggested full-time schedule for a student who has completed any developmental course work and has no transfer credits.

Courses Needed for This Program*


Total Number of Credits Required for Certificate: 39*


Note


*Credit students who are new to college (no successfully completed transferable college credits from other institutions) are required to take ACDV 101 - Academic Development 101 . This 1-credit course is designed to be taken in the first semester at CCBC. Students must provide an official transcript(s) from an accredited institution to document successful completion of college coursework for the ACDV 101 requirement to be waived.

Program Description


This program is designed to provide the knowledge and skills needed to analyze security vulnerabilities, create a comprehensive incident-response plan, and implement the equipment, policies, and procedures that protect a network and its related resources from unauthorized intrusion, information damage, or theft.  Behaving ethically, writing policies and procedures, security operating systems, installing and administering contemporary intrusion detection systems and firewalls, implementing network defenses and countermeasures, responding to intrusions, and utilizing system-wide, multi-layered, compliance-based approaches are emphasized.

Program Outcomes


Upon successful completion of this certificate, students will be able to:

  1. Apply best practices in the field of cybersecurity through implementation of CIA (Confidentiality, Integrity and Availability);
  2. identify and mitigate security threats;
  3. demonstrate how Python programming can be used in cybersecurity functions;
  4. configure and troubleshoot using system tools to secure the Linux operating system;
  5. configure and troubleshoot network infrastructure devices for LAN (Local Area Network), WAN (Wide Area Network) and WLAN (Wireless Local Area Network) networks;
  6. perform various scenario-based network and hosts attacks using penetration tools;
  7. construct mitigation strategies for various types of attacks;
  8. analyze and implement risk management and security policies; and
  9. apply ethical behavior appropriate to security-related technologies.