Educatly AI
Efficient Chatbot for Seamless Study Abroad Support
Try Now
inline-defaultCreated with Sketch.

This website uses cookies to ensure you get the best experience on our website.

Students
Tuition Fee
Start Date
Medium of studying
Duration
Program Facts
Program Details
Degree
Courses
Major
Cybersecurity
Area of study
Computer Science & IT | Engineering
Minor
Information Systems Security | Information Technology | Cyber/Electronic Operations and Warfare | Cyber Forensics and Counterterrorism
Course Language
English
About Program

Program Overview


The Cybersecurity Proficiency Certificate II program equips students with the technical and analytical skills to safeguard information technology assets. The program covers cybersecurity principles, industry-standard tools, ethical hacking, and cyber investigation. Upon completion, students are prepared for industry certification exams and can apply their coursework towards an Associate in Applied Science degree or transfer to a four-year college.

Program Outline

Degree Overview:


Overview:

The Cybersecurity Proficiency Certificate II program equips students with the technical, analytical, and problem-solving skills necessary to safeguard information technology assets in government and organizations.


Objectives:

  • Develop a comprehensive understanding of cybersecurity principles and practices.
  • Acquire proficiency in industry-standard cybersecurity tools and techniques.
  • Prepare for industry certification exams, including CompTIA Security+, GIAC Security Essentials (GSEC), Certified Information Privacy Professional (CIPP), Systems Security Certified Practitioner (SSCP), Certified Ethical Hacker (CEH), Security Certified Network Professional (SCNP), and Global Information Assurance Certification (GIAC).

Program Description:

The program consists of 15 credits of coursework, including:

  • Introduction to Computer Programming or JavaScript I
  • Fundamentals of Linux and Unix
  • Cyber Investigation
  • Ethical Hacking & Penetration Testing
  • Upon completion, students may apply their coursework towards the Cybersecurity Associate in Applied Science degree program at the College or transfer to a four-year college.

Outline:


Content:

  • Cybersecurity principles and practices
  • Industry-standard cybersecurity tools and techniques
  • Ethical hacking and penetration testing
  • Cyber investigation techniques

Structure:

  • 15-credit program
  • Four courses
  • Sequence of courses designed for optimal success and completion

Course Schedule:

  • Course sequence and schedule may vary depending on individual student needs and availability.

Individual Modules:


CIS 106 - Introduction to Computer Programming or CIS 114 - JavaScript I

  • Introduces fundamental programming concepts and techniques.

CIS 204 - Fundamentals of Linux and Unix

  • Covers the basics of Linux and Unix operating systems, including command-line interface, file management, and system administration.

CIS 261 - Cyber Investigation

  • Provides an overview of cyber investigation techniques, including evidence collection, analysis, and reporting.

CIS 274 - Ethical Hacking & Penetration Testing

  • Explores ethical hacking and penetration testing methodologies, including vulnerability assessment, exploitation, and reporting.

Assessment:


Assessment Methods:

  • Exams
  • Quizzes
  • Projects
  • Presentations

Assessment Criteria:

  • Knowledge of cybersecurity principles and practices
  • Proficiency in industry-standard cybersecurity tools and techniques
  • Ability to apply cybersecurity knowledge to real-world scenarios
  • Communication and presentation skills

Teaching:


Teaching Methods:

  • Lectures
  • Discussions
  • Hands-on labs
  • Case studies

Faculty:

  • Experienced cybersecurity professionals with industry experience and certifications.

Unique Approaches:

  • Focus on industry-standard cybersecurity tools and techniques.
  • Preparation for industry certification exams.
  • Hands-on labs and case studies to enhance practical skills.

Careers:


Potential Career Paths:

  • Database Administrator
  • Information Security Analyst
  • Network and Computer Systems Administrator
  • Security Management Specialist

Opportunities:

  • Employment in government and organizations
  • Entry-level cybersecurity positions
  • Career advancement in cybersecurity field

Outcomes:

  • Industry-recognized cybersecurity skills and knowledge
  • Eligibility for industry certification exams
  • Pathway to further education in cybersecurity
SHOW MORE