Sep 08, 2024  
2022-2023 Catalog 
    
2022-2023 Catalog [PAST CATALOG]

Network Security (certificate)


Official Title of Major: Network Security, Certificate

Award: Certificate

Code: CRT.CIS.NET-SEC

Total Credit Hours: 16

About the Cybersecurity, Networking and Digital Forensics Department 

Purpose: Gain the skills and knowledge required to configure LAN and WAN networks and to understand the basics of network cybersecurity theory and operation. Acquire in-depth knowledge of TCP/IP, Cisco IOS and experience configuring Cisco routers and switches.

Related Industry Certifications

This program provides partial foundation for the following industry recognized certifications: Network+ (CompTIA), and Security+ (CompTIA) industry certification exams.

Range of Occupations

  • Customer service technician
  • Help desk technician
  • Internet security specialist
  • Internet systems administrator
  • IT compliance specialist
  • Network administrator
  • Network analyst
  • Network support technician
  • Service center technician
  • Technical writer

Additional Certificate Requirements

Students must satisfy the prerequisites for each course in the certificate or have permission from the department chair to take each course.


Open/Print Planner for this Certificate  


Certificate Graduation Requirements


To graduate with a certificate, students must have demonstrated eligibility for ENG 101 ENG 101A , or ENG 111 . Refer to Academic Regulations on Graduation Requirements .

Entrance/Admission Requirements


Entrance Requirements


Students must satisfy the prerequisites for each course in the certificate or have permission of the academic chair to take each course.

Certificate Requirements: 16 credits


Program Outcomes


Upon successful completion of this program, students will be able to:

  1. Effectively use Internet and Web technologies.
  2. Design a network from scratch as well as maintain, upgrade, and troubleshoot an existing network.
  3. Configure a router, manage Cisco IOS software, configure routing protocols on routers, and set the access lists to control the access to routers.
  4. Identify the risks and threats to an organization’s data and provide a structured way of addressing the safeguarding of these critical electronic assets.

Related Offerings


Students may wish to also review requirements for the related majors or programs linked below.

Career and Educational Advancement Resources