Course # | Course Name | Credits | ||
---|---|---|---|---|
-
|
Prerequisites for Fundamentals of Network Security - Successful completion of CCNA 1900 - 1930 or a valid CCNA Certificate in addition to the required courses.
|
|
||
-
|
|
Course # | Course Name | Credits | ||
---|---|---|---|---|
toggle summary |
CPRO2000
|
Network Security Fundamentals
This course provides an introduction to network security principles, application, configuration, and management. The theoretical and historical background necessary for understanding the security field in the 21st century are discussed. Current risks and threats are explored and structured methods of addressing and safeguarding critical economic assets are addressed. Students gain the broad based knowledge necessary for further study in more specialized areas of network security. This is an online course. This course prepares students for the industry standard CompTIA® Security + certificate. (3 Cr – 3 lect, 0 lab) |
3
|
|
toggle summary |
CPRO2010
|
Computer Forensics and Investigations
This course is an introduction to one of the newest and fastest growing fields in computer technology. Computer Forensics and Investigations presents methods required to properly conduct a computer forensics investigation. This introductory course aligns with the objectives of the International Association of Computer Investigative Specialists (IACIS) certification and provides a range of laboratory and hands-on assignments that teach the theory as well as the practical application of computer forensic investigation. This course prepares students for the industry standard CompTIA Security + and IACIS certificates. (3 Cr – 3 lect, 0 lab) |
3
|
|
toggle summary |
CPRO2100
|
Cisco Network Security
This course provides the knowledge and skills needed to succeed in networking careers such as network technicians, network administrators, and network engineers. Upon completion of Cisco Network Security, students have a thorough understanding of the design, planning, implementation, operation, and troubleshooting of Cisco Network Security devices. This course prepares students for the Implementing Cisco IOS Network Security (IINS) certification exam. Prerequisites: CPRO 1900 and CPRO 1930. (3 Cr - 3 lect, 0 lab) |
3
|
|
toggle summary |
CPRO2020
|
Virtualization Technology Fundamentals
This course provides the skills and knowledge necessary to implement and administer server and desktop virtualization. This course is for information technology (IT) professionals who support, administer, or implement server virtualization systems.This course prepares students for industry standard Microsoft and VMware virtualization certifications. Prerequisites: CPRO 1016. (3 Cr - 3 lect, 0 lab) |
3
|
Course # | Course Name | Credits | ||
---|---|---|---|---|
toggle summary |
CPRO1068
|
Linux Network Security
This course provides the skills and knowledge necessary to implement Linux server security. It is designed for individuals or information technology (IT) professionals who desire to move beyond the basics of Linux installation and administration into a broader study of the many security issues surrounding this operating system. Prerequisites: CPRO 1065. (3 Cr - 3 lect, 0 lab) |
3
|
|
toggle summary |
CPRO2115
|
Offensive Security
The course combines an ethical hacking methodology with the hands-on application of security tools to better help students secure their systems. Students are introduced to common countermeasures that effectively reduce and/or mitigate attacks. Prerequisites: All preceding CPRO courses in degree/certificate or instructor approval for individuals pursuing professional development. (3 Cr - 3 lect, 0 lab, 0 other) |
3
|
|
toggle summary |
CPRO2130
|
Cybersecurity Operations
The CCNA Cybersecurity Operations advanced course provides the knowledge and skills required for exciting and growing opportunities in Cybersecurity related careers. This course teaches advanced security skills needed to monitor, detect and respond to cybersecurity threats. This course covers cryptography, host-based security and analysis, security monitoring, computer forensics, attack methods and incident reporting and handling used in Security Operations (SECOPS) Centers. |
3
|