Cyber Security Network Defense Certificate
Cyber Security Network Defense Certificate
NOT ACCEPTING NEW STUDENTS -PROGRAM ENDS FALL 2023
This certificate program allows students to complete a series of coordinated courses in a shorter period of time than an associate degree. Students in associate degree programs may benefit from adding a certificate to their areas of expertise. A minimum of a 2.00 grade-point average must be obtained for all required courses in order to receive a certificate.
Upon successful completion of a certificate program, a Certificate Request form must be completed in the Student Records Office in order to receive a certificate.
Students Graduating on TimeN/A*Title IV students complete the program within 1 year*Fewer than 10 students enrolled in this program. This number has been withheld to protect the confidentiality of the students.
Program Costs*CostDescriptionCost: $7,412Description: for in-state tuition and fees: No: NoCost: $12,512Description: for out-of-state tuition and fees: No: NoCost: $959Description: for books and supplies: No: No
The typical graduate leaves withN/A*in debt*Fewer than 10 students completed this program within normal time. This number has been withheld to preserve the confidentiality of the students.
The typical monthly loan paymentN/A*per month in student loansN/A*interest rate*Fewer than 10 students completed this program within normal time. This number has been withheld to preserve the confidentiality of the students.
Graduates who got jobsN/A%*of program graduates who got jobs according to the accreditor job placement rate
Program graduates are employed in the following fields:
The following do not have licensure requirements for this profession:
OhioDate Created 3/20/2018 These disclosures are required by the U.S. Department of Education
ITEC 1420 - Introduction to Information Security
This course provides an overview of security challenges and strategies of countermeasure in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on confidentiality, availability and integrity aspects of information systems.
ITEC 1610 - IT Essentials
This course covers the fundamentals of computer hardware and software as well as more advanced concepts such as security, networking, and the responsibilities of an information and communications technology (ICT)professional. The curriculum helps students prepare for entry-level ICT career opportunities and the CompTIA A+ certification. CTAG# CTIT014
ITEC 1640 - Introduction to Networks CCNA1
This is the first course in a series of three. The curriculum provides a comprehensive introduction to the networking field and in-depth exposure to fundamental networking, LAN switching, wireless LANs, basic routing, Cybersecurity, WAN concepts, VPNs, QoS, virtualization, and network automation. Threaded throughout the course are security concepts and skills including threat mitigation through LAN security, ACLs, and IPsec. Through hands-on lab activities, students learn how to implement network technologies and troubleshoot common issues. This course, together with ITEC 1645 and ITEC 1665, prepares students for Cisco's CCNA certification exam. CTAG: CTIT007
ITEC 1645 - Switching, Routing, and Wireless Essentials CCNA2
This is the second course in a series of three. The curriculum provides a comprehensive introduction to the networking field and in-depth exposure to fundamental networking, LAN switching, wireless LANs, basic routing, Cybersecurity, WAN concepts, VPNs, QoS, virtualization, and network automation. Threaded throughout the course are security concepts and skills including threat mitigation through LAN security, ACLs, and IPsec. Through hands-on lab activities, students learn how to implement network technologies and troubleshoot common issues. This course, together with ITEC 1640 and ITEC 1665, prepares students for Cisco's CCNA certification exam. CTAG: CTIT008
ITEC 1860 - Introduction to Programming
Python is a user-friendly, object-oriented programming language. This course provides a clear, accessible, and skill-focused approach to programming with Python using Python 3. The course offers students a thorough overview of multiple applied areas, including image processing, cryptography, astronomy, the Internet, and bioinformatics. Problem sets are based on real-world examples and problem-solving rather than language features. This course offers students a solid platform of key problem-solving skills that translate easily across programming languages.
ITEC 1690 - Network Security (Security+)
This course helps students acquire the knowledge and skills required to identify risk and to employ risk mitigation activities that ensure infrastructure and operational security with respect to network and data confidentiality, integrity, and availability. Students will use a variety of tools to capture, analyze, and generate network traffic. Students will also gain an awareness of applicable security policies, laws, and regulations. This course prepares students for the CompTIA Security+ certification exam.
ITEC 1430 - Certified Ethical Hacker (CEH)
This ethical hacking and countermeasures course prepares students for EC-Council's Certified Ethical Hacker (CEH) exam. The course focuses on hacking techniques and technology from an offensive perspective. The student will learn to scan, test, hack and secure systems. Students will learn the five phases of ethical hacking: reconnaissance; gaining access; enumeration; maintaining access; and covering their tracks. Throughout the course students will be immersed in a hacker's mindset, evaluating not just logical, but physical security-exploring every possible point of entry to find the weakest link in an organization.
ITEC 1620 - Wireshark 101
This course provides a starting point for analyzing network traffic, troubleshooting network performance, and detecting network security related incidents. Students will capture, filter, and analyze network traffic based on network protocols, applications, and data origin.
ITEC 1650 - Linux Fundamentals (Linux+)
This course presents an overview of Linux operating systems and an introduction to data communication concepts in Linux environments. Architecture, package management, and GNU/Unix commands are discussed. Basic Linux shell and scripting tools are demonstrated. Students learn how to install and administer essential Linux system and networking services. This course prepares students for CompTIA's Linux+ certification.
ITEC 2460 - Cloud Computing
This course offers an introduction to cloud computing overview, concepts, and models. This course serves as a basis for understanding the standard cloud terminologies and methodologies needed to implement, maintain, and support cloud technologies and infrastructure. This course covers 100% of all exam CompTIA Cloud+ CV0-002, with a practical focus on real-world skills. Topics include cloud service and delivery models, various types of disk storage systems network infrastructure and management, virtualization components, performance tuning, systems management, troubleshooting and security. Mobile Device Management (MDM), business continuity and disaster recovery are also covered.
ITEC 2670 - Administering Windows Server
This course provides students with the knowledge and skills necessary to administer Windows servers in an enterprise environment. Successful completion of this course validates the student's ability to implement and administer a Windows Server infrastructure. This course prepares students for Microsoft's 70-742 certification exam: Identity with Windows Server 2016.
ITEC 2450 - Computer Hacking Forensic Investigator (CHFI)
This course is based on EC-Council's Computer Hacking Forensic Investigator course and presents a detailed methodological approach to computer forensics and evidence analysis. This is a comprehensive course covering major forensic investigation scenarios. The course enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to prosecution.