Cybersecurity - Career Pathway Certificate of Completion

young people working on an IT projectThe Cybersecurity Career Pathway Certificate of Completion extends knowledge and skills beyond entry-level computer networking and administration. Students will learn concepts and techniques essential for securing data and networks in both a vendor-neutral and Cisco environment.

The certificate in cybersecurity requires successful completion of four networking courses:

  • CIS 279L Linux+
  • CIS 279SE Security+
  • CIS 279OP CCNA Cyber Ops
  • CIS 284EH Ethical Hacking

To prepare for these 200-level networking courses students should have educational or industry experience:

  • CIS 140 A+ Essentials I
  • CIS 145 A+ Essentials II
  • CIS 179 Networking Essentials

Note: Students can hold/complete industry certifications for A+ and Network+ in lieu of completing the 100-level networking courses.

Program Outcomes

  1. Describe the function of the network layers as specified by the OSI and the TCP/IP  network models.
  2. Describe the operation of network services such as ARP, DNS, and DHCP.
  3. Describe the basic operation of these network device types: Router, Switch, Hub, Bridge, WAP, WLC.
  4. Describe the functions of these network security systems as deployed on the host, network, or the cloud: Firewall, Intrusion Prevention System (IPS), Advanced Malware Protection (AMP), Web Security Appliance (WSA), Email Security Appliance (ESA).
  5. Describe IP subnets and communication within an IP subnet and between IP subnets.
  6. Describe the relationship between VLANs and data visibility.
  7. Describe the operation of ACLs applied as packet filters on the interfaces of network devices.
  8. Compare and contrast deep packet inspection with packet filtering and stateful firewall operation.
  9. Compare and contrast inline traffic interrogation and taps or traffic mirroring.
  10. Compare and contrast the characteristics of data obtained from taps or traffic mirroring and NetFlow in the analysis of network traffic.
  11. Identify potential data loss from provided traffic profiles.

More Informational Resources

  • Department of Homeland Security
  • Redhawk Network Security
  • Hueya