Skip to Section
Submitter's Information
Behzad Izadi
Professor
Orange County
Cypress College
CTE Dean
Kathleen Reiland
Log in to view CTE Dean's Email.
Program Details
Cyber Defense Certifcate
New Program
Computer Networking (070810)
08/20/18
The Cyber Defense certificate provides concepts and hands-on skills to identify Cybersecurity threats and implement procedures to protect Cyber assets. It will also enhance students’ chances to pursue a professional career in Cybersecurity by giving them various options to prepare for industry-recognized certificates such as Security+, CEH, CCNA, MCSE, ISM and CCNA Security. To earn a certificate, complete the required courses as listed with a minimum grade of “C”. At least 50% of all course work must be completed at Cypress College.
It is expected that 20 students will be completing this program on an annual basis
Program Proposal Attributes
- Certificate of Achievement: 16 or greater semester (or 24 or greater quarter) units (C)
Program Goals
- Provide students with the academic preparation needed to pursue a career in the field of Cyber Defense.
- Provide those individuals currently working in the Cybersecurity or related field with the opportunity to further their understanding, knowledge and skills according to the latest advances in the field of Cyber Defense.
- Provide students hands-on training by experts using industry-standard equipment and 24/7 availability of laboratory resources through remote connectivity
- Increase employment opportunities of students by preparing them for industry-recognized certificates such as IT Fundamentals, Network+, Security+, CCENT, CCNA, CCNA Security, CEH, ISM and MCSE.
- Develop, implement and update a curriculum that fosters problem-solving skills and provides specific training to better achieve the business goals of employers.
Program Objectives
- Define and describe network design elements and components
- Configure various network devices and troubleshoot connectivity
- Define and describe common threats, attacks and vulnerabilities
- Define and describe various technologies and tools utilized in securing networks
- Secure Linux and Windows Operating systems
- Configure and troubleshoot Microsoft Active Directory
- Given various scenarios, install, configure and implement identity and access services.
- Explain the importance of policies, plans and procedures related to organizational security
- Compare and contrast basic concepts of cryptography
- Given a scenario, analyze the results of a network reconnaissance
- Given a network-based threat, implement or recommend the appropriate response and countermeasure.
- Given a scenario, implement an information security vulnerability management process.
- Given a scenario, analyze common symptoms to select the best course of action to support incident response.
- Given a scenario, review security architecture and make recommendations to implement compensating controls.
- Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies
- Collect and analyze digital evidence and recover partially destroyed information.
- Implement Virtual Private Networks, firewall technologies and intrusion prevention
- Configure and troubleshoot Cisco Adaptive Security Appliance (ASA)
- Explain the purpose of virtualization and network storage technologies
- Describe all technologies that are used for storing, managing and protecting digital information in classic, virtualized, and cloud environments
Course Units and Hours
Minimum 24, Maximum 30
n/a
n/a
Course Report
Take the required core (12 units) and complete required courses for one of the 6 areas of emphasis
Requirements | Course | Title | Units | Year/ Sem |
---|---|---|---|---|
Required Core (12 Units) Take any four courses | CIS 190 CIS 195 CIS 196 CIS 230 CIS 245 OR CIS 247 | Cybersecurity Competition Fundamentals Network Security Ethical Hacking Cisco Networking 1 Perl Programming OR Python Programming | 3 3 3 3 3 3 | Y1, F Y1, F Y1, S Y1, F Y1, S Y1, S |
Computer Forensics Emphasis (18 Units) | CIS 276 CIS 277 CIS 278 CIS 279 CIS 280 CIS 281 | Computer Forensics I Computer Forensics II Cyber Crime Computer Forensics Legal Aspects Analysis of Digital Media Computer Forensics Capstone | 3 3 3 3 3 3 | Y2, F Y2, S Y2, F Y2, S Y3, F Y3, F |
Cisco Networking Emphasis (12 Units) | CIS 231 CIS 232 CIS 233 CIS 258 | Cisco Networking 2 Cisco Networking 3 Cisco Networking 4 CCNA Security | 3 3 3 3 | Y2, F Y2, S Y2, S Y2, F |
Homeland Transportation Security Emphasis (18 Units) | AJ 110 OR AJ 120 ATC 102 ATC 112 ATC 116 OR ATC 256 ATC 118 ATC 274 | Introduction to Criminal Justice OR Concepts of Criminal Law Career Communication/Portfolio Homeland Security Aviation/Transportation Security OR Crew Resource Management Disaster Preparedness and Response Passenger Services and Safety | 3 3 3 3 3 3 3 3 | Y2, F Y2, F Y2, F Y2, S Y2, S Y2, S Y3, F Y3, F |
Microsoft Networking Emphasis (12 Units) | CIS 185 CIS 189 CIS 191 CIS 182 OR CIS 187 | Microsoft Client/Server Administration MS Windows Active Directory Network Infrastructure Administration Data Communications Management OR MS Windows Exchange Server | 3 3 3 3 3 | Y2, F Y2, S Y2, F Y2, S Y2, S |
Network Virtualization Emphasis (12 Units) | CIS 185 CIS 189 CIS 201 CIS 202 | Microsoft Client/Server Administration MS Windows Active Directory MS Virtualization Network VMware Virtualization Network | 3 3 3 3 | Yr2, F Yr2, S Yr2, F Yr2, S |
Advanced Networking Emphasis (12 Units) Take any four courses | CIS 202 CIS 239 CIS 240 CIS 248 CIS 257 CIS 258 | VMware Virtualization Network CCNA Bootcamp Wireless Networking Technology Voice over IP Storage Management and Cloud Computing CCNA Security | 3 3 3 3 3 3 | Yr2, S Yr2, S Yr2, F Yr2, S Yr2, F Yr2, F |
Take the required core (12 units) and complete required courses for one of the 6 areas of emphasis according to the table shown above
Supporting Documents
Orange County Regional Questions
North Orange County
Cypress
Kathleen Reiland
Log in to view Email.
Log in to view Phone.
New Program
n/a
Submission Details
10/26/18 - 02:28 PM
Recommended
Return to Drafts
Please list the reason(s) for returning "Cyber Defense Certifcate". to Behzad Izadi's drafts. This message will be sent to bizadi@cypresscollege.edu
Comments, Documents, Voting
Comments
All Comments
No comments to display.