Dec 07, 2021  
2016-2017 Catalog 
    
2016-2017 Catalog [PAST CATALOG]

Advanced Network Security, Certificate


Award: Certificate (code CRT.CIS.NET-SEC-ADV)

Total Credit Hours: 16 credit hours.

About the Cybersecurity, Networking and Digital Forensics Department 

Purpose: Provides students with the hands-on skills and knowledge to protect cyber computer networks. Skills covered include the design and implementation of firewalls, IDS, wireless security, cryptography, Linux security, Windows security, among others. In addition to network security fundamentals students will learn valuable defense and countermeasures.

Range of Occupations

  • Internet security specialist
  • IT compliance specialist
  • IT manager
  • Network administrator
  • Network analyst
  • Systems analyst

Occupations can be explored further through the virtual Careers Center at http://www.aacc.edu/resources/careers-and-employment/career-services/.

Special Conditions

Financial Aid: This program has not been approved or is pending approval by the U.S. Department of Education federal aid program eligibility. Students enrolled in this program may not be eligible to receive financial aid from the U.S. Department of Education (Pell Grants, SEOG, Federal Work-Study, Direct Loans or PLUS loans) or the Maryland Higher Education Commission (Educational Assistance Grants, Senatorial Scholarships or Delegate Scholarships). For current information on eligible programs, contact Financial Aid.

Degree/Graduation Requirements


Graduation Requirements


Demonstrated eligibility for ENG 111 .

Related Educational Opportunities


Continuing Education and Workforce Development Offerings


Additional courses, credentials and/or certifications may be available through the AACC School of Continuing Education and Workforce Development. Visit https://www.aacc.edu/about/schools-of-study/continuing-education/ for more information.

Program Outcomes


Upon successful completion of this program, students will be able to:

  • Perform TCP/IP addressing, routing, and packet filtering.
  • Install proxy servers, firewalls, and virtual private networks (VPNs).
  • Secure network perimeters and harden network infrastructure.
  • Identify the priorities and processes used to protect computer and network systems.
  • Identify network vulnerabilities, implement network defense strategies and develop alternate solutions based upon cost and level of security required.