Computer and Information Sciences - Advanced Cyber Security Certificate
Overview of computer systems - hardware operating systems the Internet and application software including word processing spreadsheets presentation graphics and databases. Current topics such as the effect of computers on society and the history and use of computers in business educational and other interdisciplinary settings are also studied. This course is not intended to count toward a student's major field of study in business or computer science.
Additional course fee(s) required.
Instruction in networking technologies and their implementation. Topics include the OSI reference model network protocols transmission media and networking hardware and software.
Additional course fee(s) required.
Instruction in security for network hardware software and data including physical security; backup procedures; relevant tools encryption; and protection from viruses.
Additional course fee(s) required.
Identify elements of firewall design types of security threats and responses to security attacks. Use Best Practices to design implement and monitor a network security plan. Examine security incident postmortem reporting and ongoing newtork security activities.
ITSY 1342
Additional course fee(s) required.
Computer information systems security monitoring intrusion detection and crisis management. Includes alarm management signature configuration sensor configuration and troubleshooting components. Emphasizes identifying resolving and documenting network crises and activating the response team.
ITSY 1342
Additional course fee(s) required.
In-depth study of system forensics including methodologies used for analysis of computer security breaches. Collect document and evaluate evidence to perform postmortem analysis of security breach.
ITSY 1342
Additional course fee(s) required.
This is a practical application and comprehensive course that includes the planning design and construction of defenses for a complex network that will sustain an attack document events and mitigate the effects of the attack.
ITSY 1342
Additional course fee(s) required.
A study of the UNIX operating system including multi-user concepts terminal emulation use of system editor basic UNIX commands and writing script files. Topics include introductory systems management concepts.
Additional course fee(s) required.
Custom operating system installation configuration and troubleshooting; management of file systems memory storage and peripheral devices.
Additional course fee(s) required.
Configure peripherals and devices; set up servers; configure directory replication; manage licensing; create and manage system policies and profiles; administer remote servers and disk resources; create and share resources; implement fault-tolerance; configure servers for interoperability; install and configure Remote Access Service (RAS); and identify and monitor performance bottlenecks and resolve configuration problems.
Additional course fee(s) required.
Total Program Hours
30
PROGRAM DESCRIPTION:
Computer occupations are great field for students who either plan to transfer to a four-year college or university, or develop the knowledge and skills necessary to function as a computer applications specialist in a variety of working environments. Applied skills are developed through “hands-on” training utilizing modern computer equipment and software. Transferability and specific requirements can be determined only by the receiving institution. Curriculum is often used as a resume builder for current or potential employees.