Information Security Technology

The Certificate of Completion (CCL) in Information Security Technology program is designed to provide students with the knowledge and tools to understand how networks, operating systems and programs function, as well as, how to protect them. Emphasis is placed on developing the knowledge and skills to maintain security on mission-critical data and computer systems. The program is designed to meet the training needs of employees in both public and private sectors. The program covers a variety of information security disciplines that include both vendor-neutral and vendor-specific security training. The Information Security Technology program is designed to help prepare students for internationally recognized industry certifications.

Details

Field of Interest
Computer and Information Technology
Degree Type
Certificate of Completion (CCL)
Academic Plan
Information Security Technology (CER)
Academic Plan Code
5347
Total credits required
28
Catalog Year
2024-2025
Effective Term
Fall 2021
Notes

Students must earn a grade of C or better in all courses within the program.

Courses within any of the following prefixes must be taken within five (5) years prior to completion of the program to be applied toward this award: AIM, BPC, CIS, CLD, CNT, CSC, ITS, and MST.

What You'll Learn
  • Install, configure, administer, use, and maintain a UNIX/Linux operating system.
  • Define common network terminology and protocols to include local area network (LAN) and wide-area network (WAN) topologies, the Open System Interconnection reference (OSI) model and communication cabling standards.
  • Use appropriate equations to solve basic Internet Protocol (IP) addressing and subnetting problems associated with designing a network.
  • Apply basic security techniques such as password protection and access control lists (ACLs).
  • Explain a broad, cross-section of information security concepts including authentication methods, access control, cryptography, public key infrastructure (PKI), network attack and defense methods, operating systems and network device hardening, securing remote access and wireless technologies including viruses and worms.
  • Define workstations, servers, network storage devices, routers, switches, gateways, guards, Virtual Private Networks (VPNs), firewalls, Internet Protocol Security (IPSec), Intrusion Detection Systems (IDSs), mobile devices, peripheral devices and security peripherals.
  • Identify the ethical and legal aspects of information security including government regulatory requirements impacting network and information security professionals.
  • Design, implement, monitor and improve security in-depth for operating systems including Microsoft Windows, Linux, Cisco IOS and Mac OS X.
  • Examine the techniques for defending LAN and WAN networks including firewalls, IDSs and VPNs.
  • Perform day-to-day administration tasks in a Microsoft Windows-based network.
  • Perform day-to-day administration tasks in a UNIX/Linux-based network.
Required Courses
Course # Course Title Credits
Credits: 28
BPC170 A+ Exam Prep: Computer Hardware Configuration and Support 3
CIS105 Survey of Computer Information Systems 3
CIS126DL Linux Operating System 3
CIS238++ Any UNIX/Linux Administration course (3) or
CIS239DL Linux Shell Scripting (3) 3
CNT140AB Introduction to Networks 4
ITS110 Information Security Fundamentals 3
ITS120 Legal, Ethical and Regulatory Issues 3
ITS130 Operating System Security 3
MST150++ Any Microsoft Windows Operating System course 3

At Maricopa, we strive to provide you with accurate and current information about our degree and certificate offerings. Due to the dynamic nature of the curriculum process, course and program information is subject to change. As a result, the course list associated with this degree or certificate on this site does not represent a contract, nor does it guarantee course availability. If you are interested in pursuing this degree or certificate, we encourage you to meet with an advisor to discuss the requirements at your college for the appropriate catalog year.

Read the official description