Program Type(s)
Certificate of Achievement 18+ Semester (27+ Quarter) Units
Program Goals
Program Goals and Objectives
PROGRAM GOALS
1. Design a network topology for a medium to large enterprise, while reading and understanding the fundamental goal of Cyber Security – Confidentiality, Integrity, and Availability (CIA) of data which is transmitted on a given network and governed by federal and state regulations, and procedures.
2. Design a network security system which is configured to protect a given network, while reading, researching and considering all elements of Cyber Security such as Physical, Communication, and Network security.
3. Design and configure an Intrusion Detection System (IDS), for a typical network for a medium to large enterprise, while using the typical tools and written instructions used by Cyber Security experts to perform network sniffing, monitoring, surveillance, and enumeration of data.
OBJECTIVES
In the process of completing this program, students will learn the following main competencies to succeed in the field of cyber security and networking:
1. Install switches, routers and hubs, and configure them while reading instructions that outline specific protocols and addressing procedures which are at risk of intrusion.
2. Read, identify and distinguish the 3 key goals of network security: Confidentiality, Integrity, and Availability (CIA), in a medium to large computer network.
3. Implement security policies and standards as required for network protection and security.
4. Secure wireless networks, and test for intrusion, as well configuring for optimal protection such as MAC filtering and traffic encryption.
5. Install and configure Intrusion Detection Systems (IDS) to meet the designed and written requirements given the range of threats in any combination of Physical, Network, or Communications elements of a given network.
6. Determine “Best Practices” in HTTPS, DNS, SMTP, and FTP servers to “harden” these resources against outside attacks, through research, reading professional journals, and publications.
7. Secure a given network using firewalls, and proxy servers, as well as specialized programs and tools.
Program Learning Outcomes:
• Evaluate the computer network and information security needs of an organization.
• Assess cybersecurity risk management policies in order to adequately protect an organization's critical information and assets.
• Evaluate the performance of security systems within an enterprise-level information system.
• Troubleshoot, maintain, and update an enterprise-level information security system.
• Implement continuous network monitoring and provide real-time security solutions.
• Formulate, update, and communicate short- and long-term organizational cybersecurity strategies and policies.