Information Security Technology
The Certificate of Completion (CCL) in Information Security Technology program is designed to provide students with the knowledge and tools to understand how networks, operating systems and programs function, as well as, how to protect them. Emphasis is placed on developing the knowledge and skills to maintain security on mission-critical data and computer systems. The program is designed to meet the training needs of employees in both public and private sectors. The program covers a variety of information security disciplines that include both vendor-neutral and vendor-specific security training. The Information Security Technology program is designed to help prepare students for internationally recognized industry certifications.
Details
Students must earn a grade of C or better in all courses within the program.
Courses within any of the following prefixes must be taken within five (5) years prior to completion of the program to be applied toward this award: AIM, BPC, CIS, CLD, CNT, CSC, ITS, and MST.
- Install, configure, administer, use, and maintain a UNIX/Linux operating system. (CIS126DL, CIS238++, CIS239DL)
- Define common network terminology and protocols to include local area network (LAN) and wide-area network (WAN) topologies, the Open System Interconnection reference (OSI) model and communication cabling standards. (CNT140AB)
- Use appropriate equations to solve basic Internet Protocol (IP) addressing and subnetting problems associated with designing a network. (CNT140AB)
- Apply basic security techniques such as password protection and access control lists (ACLs). (MST150++)
- Explain a broad, cross-section of information security concepts including authentication methods, access control, cryptography, public key infrastructure (PKI), network attack and defense methods, operating systems and network device hardening, securing remote access and wireless technologies including viruses and worms. (CIS105, ITS110)
- Define workstations, servers, network storage devices, routers, switches, gateways, guards, Virtual Private Networks (VPNs), firewalls, Internet Protocol Security (IPSec), Intrusion Detection Systems (IDSs), mobile devices, peripheral devices and security peripherals. (BPC170, CIS105, ITS110)
- Identify the ethical and legal aspects of information security including government regulatory requirements impacting network and information security professionals. (ITS120)
- Design, implement, monitor and improve security in-depth for operating systems including Microsoft Windows, Linux, Cisco IOS and Mac OS X. (ITS130)
- Examine the techniques for defending LAN and WAN networks including firewalls, IDSs and VPNs. (ITS110)
- Perform day-to-day administration tasks in a Microsoft Windows-based network. (MST150++)
- Perform day-to-day administration tasks in a UNIX/Linux-based network. (CIS126DL, CIS238++, CIS239DL)
Course # | Course Title | Credits |
---|---|---|
Credits: | 28 | |
BPC170 | A+ Exam Prep: Computer Hardware Configuration and Support | 3 |
CIS105 | Survey of Computer Information Systems | 3 |
CIS126DL | Linux Operating System | 3 |
CIS238++ | Any UNIX/Linux Administration course (3) or | |
CIS239DL | Linux Shell Scripting (3) | 3 |
CNT140AB | Introduction to Networks | 4 |
ITS110 | Information Security Fundamentals | 3 |
ITS120 | Legal, Ethical and Regulatory Issues | 3 |
ITS130 | Operating System Security | 3 |
MST150++ | Any Microsoft Windows Operating System course | 3 |
At Maricopa, we strive to provide you with accurate and current information about our degree and certificate offerings. Due to the dynamic nature of the curriculum process, course and program information is subject to change. As a result, the course list associated with this degree or certificate on this site does not represent a contract, nor does it guarantee course availability. If you are interested in pursuing this degree or certificate, we encourage you to meet with an advisor to discuss the requirements at your college for the appropriate catalog year.
Read the official description