This Certificate of Proficiency documents successful completion of “a three-term program of study where they will learn entry-level and mid-level cryptography, cryptanalysis, protocol analysis, vulnerability assessment, penetration testing, operating system hardening, and computer investigation and analysis techniques on multiple platforms including Linux, Macintosh, Windows PCs, and mobile computing devices;” as outlined by the Computing Technology Industry Association (CompTIA), the International Council of Electronic Commerce Consultants (EC-Council), the Linux Professional Institute (LPI), Cisco, and Microsoft.
This certificate can enable students to gain core skills leading to an entry-level job in the information assurance (IA) field of Information Technology (IT) with a goal to become an IT Security Officer, an IA Security Auditor, an IT Security Professional, or a Site Administrator, and can enable students to pass the following information technology industry certification examinations:
- Cisco Certified Entry-Level Network Technician (CCENT)
- CompTIA Network+
- CompTIA Linux+
- CompTIA Security+
- EC-Council Certified Ethical Hacker (C|EH)
- EC-Council Computer Hacking Forensic Investigator (C|HFI)
- Linux Professional Institute Junior Level Administration Certification (LPIC-1)
- Microsoft Certified Professional (MCP)
- SUSE Certified Linux Administrator Certification
Program Learning Outcomes
Upon successful completion of this program, students will be able to:
- Adapt to new technologies quickly
- Explain and demonstrate the protocols of the TCP/IP protocol suite, the OSI model, and proprietary operating system protocols from Microsoft and various UNIX platform vendors
- Describe the functions, operations, and primary components of local area networks (LANs), metropolitan area networks (MANs), wide area networks (WANs), virtual private networks (VPNs), Intranets, extranets, and storage area networks
- Demonstrate skills required to install and maintain enterprise servers
- Explain and demonstrate basic information systems security concepts
- Detect hacking attacks and properly extract evidence to report crimes and conduct audits to prevent future attacks
- Describe the role of digital evidence in forensic investigation
- Assess the security of computer systems using penetration testing techniques