Information Security Certificate Program

The Networking and Cyber Security department at Rose State college offers a certificate program in Information Security at all federal training levels. The program certifies the students satisfying program requirements are trained to the federal NSTISSI/CNSSI 4011, 4012, 4013, 4014, 4015, and 4016 standards for Information Systems Security Professionals, Designated Approving Authorities, Information System Security Officers, Systems Certifiers, and Risk Analyst respectively.

Incoming Student Policies:

  • Declared major in Networking or Computer Information Technology or related area and proficiency in either C, C++, or Java programming Languages
  • Significant industrial, military, or government experience in information technology and/or computer security.

CNSS certification curriculum (pdf file). 

Contact:
Ken Dewey
Professor Networking / Cyber Security
Director of Cyber Security
Rose State College
kdewey@rose.edu
(405) 733-7977
or
Eileen Dewey
Professor Networking / Cyber Security
Rose State College
edewey@rose.edu
(405) 733-7510

NSTISSI 4011: Information System Security Professional

BACK TO TOP

This 18 hour certificate program is available to undergraduates and non-traditional students. The core of the program includes CIT 2563 (Computer Security),  CIT 2513 (Secure Electronic Commerce), CIT 2403 Advanced Networking Concepts, CIT 2543 (Information Security Assurance)

Beyond the core, students take two  Information Assurance (IA) electives. Students participating in the program must register as such for each Systems course to receive specialized INFOSEC training/assignments in these courses. (An option for working non-traditional students is to demonstrate proficiency in systems areas by passing comprehensive examinations in those areas.)

4011 Certificate Curriculum

CIT 2563 Computer Security 3 hours
CIT 2513 Secure Electronic Commerce 3 hours
CIT 2403 Advanced Networking Concepts 3 hours
CIT 2543 Information Security Assurance 3 hours
Information Assurance Elective 1 (not listed above) 3 hours
Information Assurance Elective 2 (not listed above) 3 hours
Total 18 hours

CNSSI 4012: Senior System Managers

BACK TO TOP

The 4012 certificate program, aimed at Senior System Managers (SSMs), extends the 4011 certificate with an additional course, CIT 2523 (Enterprise Security Management). This course provides the additional body of knowledge required by SSMs to accredit, extend and operate enterprise information systems in a secure mode.

4012 Certificate Curriculum

CIT 2563 Computer Security 3 hours
CIT 2513 Secure Electronic Commerce 3 hours
CIT 2523 Enterprise Security Management 3 hours
CIT 2403 Advanced Networking Concepts 3 hours
CIT 2543 Information Security Assurance 3 hours
Information Assurance Elective 1 (not listed above) 3 hours
Information Assurance Elective 2 (not listed above) 3 hours
Total 21 hours

CNSSI 4013: System Administrators

BACK TO TOP

The 4013 certificate program, aimed at System Administrators (SAs), extends the 4011 program with an additional course, CIT 2573 (Secure System Administration and Certification). This course provides the additional body of knowledge required to accredit, extend and operate as administrators of information systems in a secure mode.

4013 Certificate Curriculum

CIT 2563 Computer Security 3 hours
CIT 2513 Secure Electronic Commerce 3 hours
CIT 2573 Secure System Administration and Certification 3 hours
CIT 2643 Wireless Networking 3 hours
CIT 2323 Network Security 3 hours
Network Systems Course (not listed above) 3 hours
Information Assurance Elective 1 (not listed above) 3 hours
Information Assurance Elective 2 (not listed above) 3 hours
Total 24 hours

CNSSI 4014: Information System Security Officer

BACK TO TOP

The 4014 certificate program, aimed at certifying Information Systems Security Officers, extends the 4011 program with an additional course, CIT 2523 (Enterprise Security Management). This course provides the additional body of knowledge required to accredit, extend and operate enterprise information systems in a secure mode. Moreover, proficiency in operating systems, databases and networks must be demonstrated.

4014 Certificate Curriculum

CIT 2563 Computer Security 3 hours
CIT 2513 Secure Electronic Commerce 3 hours
CIT 2523 Enterprise Security Management 3 hours
CIT 2583 Operating Systems 3 hours
CIT 2183 Advanced Databases 3 hours
Network Systems Course (not listed above) 3 hours
Information Assurance Elective 1 (not listed above) 3 hours
Information Assurance Elective 2 (not listed above) 3 hours
Total 24 hours

NSTISSI 4015: Systems Certifier

BACK TO TOP

The 4015 certificate program, aimed at certifying systems certifiers, extends the 4011 program with additional courses, CIT 2523 (Enterprise Security Management) and CIT 2573 (Secure System Administration and Certification). This course provides the additional body of knowledge required to accredit, extend and operate as systems certifiers in a secure mode. Moreover, proficiency in operating systems, databases and networks must be demonstrated.

4015 Certificate Curriculum

CIT 2563 Computer Security 3 hours
CIT 2513 Secure Electronic Commerce 3 hours
CIT 2523 Enterprise Security Management 3 hours
CIT 2573 Secure System Administration and Certification 3 hours
CIT 2583 Operating Systems 3 hours
CIT 2183 Advanced Databases 3 hours
Network Systems Course (not listed above) 3 hours
Information Assurance Elective 1 (not listed above) 3 hours
Information Assurance Elective 2 (not listed above) 3 hours
Total 27 hours

CNSSI 4016: Risk Analyst

BACK TO TOP

The 4016 certificate program, aimed at training individuals performing risk analyst function for national security systems and unclassified systems. This standard presents an in-depth analysis of the range of skills required for persons performing RA function.

4016 Certificate Curriculum

CIT 2563 Computer Security 3 hours
CIT 2513 Secure Electronic Commerce 3 hours
CIT 2523 Enterprise Security Management 3 hours
CIT 2573 Secure System Administration and Certification 3 hours
CIT 2603 Security Auditing and Penetration Testing 3 hours
CIT 2583 Operating Systems 3 hours
CIT 2323 Network Security 3 hours
Network Systems Course (not listed above) 3 hours
Information Assurance Elective 1 (not listed above) 3 hours
Total 27 hours

 

 

CIT 2183 - Advanced Database Design

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 2 times the amount of contact hours for an additional 80 hours bringing the estimated total class hours to 120.

Course Description: This course will include a study of the principles and theory of database management and design to include network, hierarchical, and relational. Industry stand software applications such as SQL or Oracle will be used to enforce the concepts learned.

Course Prerequisites: CIT 1183

Course Learning Objectives / Expected Outcomes: Upon completion of this course, students should be proficient in the following database topics:

  1. Data Modeling
  2. Database Design
  3. Query construction
  4. Normalization
  5. Transaction Processing
  6. Concurrency
  7. Backup/Recovery
  8. Optimization

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material. These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

IA Mapping: Special Lectures and projects on database security concepts, access control, concurrency, transaction processing, and inference analysis

CIT 2243 - Unix/Linux

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 1 times the amount of contact hours for an additional 40 hours bringing the estimated total class hours to 80.

Course Description: This course is an in-dept study of the Unix/Linux operating system and how these operating systems are incorporated in today's networks.

Course Prerequisites: CIT 1503

Course Learning Objectives: The objective of this course is to better prepare students for a position in the networking field by demonstrating the use of Unix/Linux operating systems. This course includes practical applications of previously studied material using the Unix/Linux software system.  These applications are necessary for a better understanding of the complex world of networking.

Major Topics: Upon completion of this course, the students will be able to:

  1. Describe and utilize Unix/Linux file systems.
  2. Describe and utilize Unix/Linux editors.
  3. Describe and utilize Unix/Linux shell programming.
  4. Utilize proper access control techniques
  5. Set permissions pertaining to information protection and access control
  6. Configure access control lists

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material.

Grades for the course will be based on the following:
Two Examinations 45%
Homework 20%
Individual Projects 10%
Computer Based Labs 10%
Attendance / Participation 15%

These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

IA Mapping: Special Lectures and projects on access control, concurrency, information protection, access control lists, authentication.

CIT 2353 - Advanced Routing

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 1 times the amount of contact hours for an additional 40 hours bringing the estimated total class hours to 80.

Course Description: This course will expand the students knowledge of the physical and logical aspects of routing. This course will expose students to building and maintaining scalable networks.

Course Prerequisites: CIT 2343

Course Learning Objectives: The objective of this course is to expand on the students understanding of routing and routing technologies. This class is designed to prepare the students for the CCNA certification.

Major Topics:  Upon completion of this course the student will be able to:

  1. describe network scalability
  2. identify IP addressing and broadcasts
  3. identify routing protocols
  4. examine route filtering
  5. evaluate computer forensics software
  6. identify redistribution
  7. configure access control lists
  8. evaluate protocol configuration

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material.

Grades for the course will be based on the following:
Two Examinations 45%
Homework 20%
Individual Projects 10%
Computer Based Labs 10%

Attendance / Participation 15%

These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

IA Mapping: Special Lectures and projects on access control, concurrency, information protection, access control lists, authentication.

CIT 2403 - Advanced Networking Concepts

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 1 times the amount of contact hours for an additional 40 hours bringing the estimated total class hours to 80.

Course Description: An in depth study is conducted of network topologies, standards, protocols, design, management, and troubleshooting.

Course Prerequisites: CIT 1513, CIT 2053

Course Learning Objectives: To better prepare students for a position in Network Administration. This course includes practical applications of previously studied material. These applications are necessary for a better understanding of the complex world of
networking.

Major Topics: Upon completion of Advanced Networking Concepts the student will be able to:

  1. history of the Internet starting from ARPANET
  2. discuss the different types of computers such as micro, mini, and mainframe computers
  3. discuss the different Microsoft Operating Systems and their usages
  4. discuss the different networking topologies bus, star and ring including access methods and bandwidth issues
  5. discuss the pros and cons of sharing of data and devices
  6. discuss various Operating System file servers
  7. use various Network administrator tools through practical applications
  8. describe and utilize network management essentials
  9. describe and utilize network-troubleshooting techniques
  10. configure Virtual Private Networks
  11. evaluate and configure a broad range of Tunneling techniques
  12. configure Public Key Infrastructure
  13. configure multiple authentication techniques
  14. study TCP/IP and other network protocols
  15. discuss Bandwidth, Multilink, Asynchronous-Synchronous, Digital-Analog, Dedicated Lines, Packet Switched and Circuit Switched
  16. discuss Infrared, Microwave, Line of Sight, Radio, Satellite, Baseband and Broadband technologies
  17. describe and utilize DNS
  18. discuss developing protocols such as IPv6
  19. study the mapping of the OSI and Internetworking (TCP/IP) models
  20. external and internal storage devices are discussed
  21. discuss fault tolerance of storage devices
  22. discuss and instruct in the proper configuration of RAID
  23. discuss managing domain and enterprise systems
  24. examine RAM and ROM including the volatile nature of RAM
  25. discuss and compare sequential access to random access
  26. discuss different storage media including storage criteria, handling, and data disposal
  27. discuss magnetic and optical remanence

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.
Course uses the hand on approach to learning, students will install, configure, administer, and troubleshoot various network configurations and applications.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material.

Grades for the course will be based on the following:
Two Examinations 45%
Homework 20%
Computer Based Labs 20%
    VPN Configuration
    DNS Configuration
    PKI Configuration
    Domain Configuration
    IPSec Configuration
Attendance / Participation 15%

These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

IA Mapping: Special Lectures and projects on authentication, security transmissions, Public Key Infrastructure, Encryption, VPNs, and Tunneling

CIT 2423 - Network Management and Design

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 3 times the amount of contact hours for an additional 120 hours bringing the estimated total class hours to 180.

Course Description: This course is a study of the overall design and configuration of a network. Proper design, implementation, and techniques are evaluated. Configuration management, security, access control and network fault tolerance are discussed.

Course Prerequisites: CIT 2403, 2053, 2083

Course Learning Objectives: Students will utilize proper network techniques to design a network. Students must include all aspects from the logical design, physical layout, file systems and their configuration, backup and recovery methods, authentication mechanisms and data protection.

Major Topics: Upon completion of this course, students will have a working knowledge of the following concepts:

  1. Proper network management techniques
  2. Industry standards and their application
  3. Proper network design techniques
  4. Authentication Concepts
  5. Bandwidth utilization
  6. Concurrent Access
  7. Backup / Recovery
  8. Information Assurance / Protection
  9. Micro / Mini / Mainframe computers

Method of Instruction: Lectures, class discussion, individual or group hands on project. Instructor lead project will have Students completing network design project including all aspects as specified in the objectives above.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material.

Grades for the course will be based on the following:
Network Design Project  90%
    Logical Design
    Physical Design
    Feasibility
    Creativity
    Administrative Component
    OS Component
    Software Licensing
    Authentication
    Budget
    Backup/Recovery
Attendance / Participation 10%

These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

IA Mapping: Special Lectures and projects on network design, security, Information Assurance, content protection, backup/recover, authentication, access control, and concurrent access.

CIT 2583 - Operating Systems

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 2 times the amount of contact hours for an additional 80 hours bringing the estimated total class hours to 120.

Course Description: This course will examine the fundamental concepts that are applicable to a variety of systems. Various systems that support threads at the kernel and user levels, symmetric multiprocessing and real-time scheduling will be included in the topic manner.

Course Prerequisites: CIT 1613, CIT 1523, MATH 1513

Course Learning Objectives: Students will gain an understanding of different operating systems, their behaviors, pros and cons. Students will be able to determine optimum configurations and conditions of both hardware and software.

Major Topics: Upon completion of this course, students will have a working knowledge of the following concepts:

1.  describe process management
2.  evaluate memory and storage management
3.  identify I/O systems
4.  describe distributed systems
5.  operating systems security features
6.  distributed systems
7.  multi-processor systems
8.  multi-threaded systems
9.  single/multiple user mode
10. describe agency policy for redeploying classified systems to the SA, SSM, CIO, DAA and CTO.
 

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material.

Grades for the course will be based on the following:
Two Examinations 45%
Individual Projects 25%
Research Project 15%
Attendance / Participation 15%

These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

IA Mapping: Lectures and a project on secure/safe system programming and secure system administration/configuration. Implementation of system security mechanisms for authorization, authentication and audit.

CIT 2613 - Advanced Java Programming

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 2 times the amount of contact hours for an additional 80 hours bringing the estimated total class hours to 120.

Course Description: This course is designed to provide students an in-depth look at Java programming. The student will learn advanced topics in this object-oriented programming language. The student will also incorporate multimedia, networking and input/output techniques.

Course Prerequisites: CIT 1113 and CIT 1613

Course Learning Objectives: Students will gain an understanding of advanced java programming to include memory handling, proper coding techniques as pertaining to static and global variables. Students will also be presented with the idea of "Secure Coding" techniques.

Major Topics:  Upon completion of this course, students will have a basic understanding of the following topics:

1.  Object oriented programming
2.  Synchronization
3.  Proper programming techniques
4.  Type checking
5.  Memory management
6.  Network programming
7.  Input / Output techniques

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material.

Grades for the course will be based on the following:
Two Examinations 45%
Programming Projects 45%
Attendance / Participation 10%

These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

IA Mapping: Lectures and a project on secure/safe system programming and memory management. Enforcement of proper OOP programming concepts and type checking.
 

CIT 2513 - Secure Electronic Commerce

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 1.5 times the amount of contact hours for an additional 60 hours bringing the estimated total class hours to 100.

Course Description: This course is an in depth study of secure electronic commerce, cryptography, passwords, certification authorities, public key infrastructure, biometrics, digital signatures and PKI. Legal and national policy secure electronic commerce issues will be discussed.

Course Prerequisites: CIT 1503

Course Learning Objectives: Upon completion of Secure E- Commerce the student will have an understanding of secure electronic commerce architectures and proficiency with related technologies. Students will gain an appreciation for legislative and regulatory issues of secure electronic commerce and the role of public policy in shaping a global digital economy. An introduction to security architectures for secure electronic commerce including digital signatures, certificates, and public key infrastructure (PKI) will be presented. Legal and national policy secure electronic commerce issues will be examined.

Major Topics:  Upon completion of this course, students will have an understanding of the following topics:

  1. Web technology
  2. Privacy and security for users
  3. Web server security
  4. Security for content providers
  5. system development and how the system is maintained
  6. National COMSEC policy
  7. Digital signatures
  8. Public Key Infrastructure (PKI)
  9. Electronic Key Management Systems (EKMS)
  10. EKMS policy and procedures
  11. EDI
  12. Symmetric and asymmetric systems
  13. Risk management and assessment
  14. Roles and responsibilities of organizational personnel 
  15. Cryptography
  16. Utilize telnet and xml
  17. Utilize Unix in an automated trading environment
  18. RSA
  19. SSL
  20. Certificates
  21. Credit Card Transactions
  22. Basic Encryption
  23. TEMPEST schemes and theory
  24. Have an understanding of legal and national policies pertaining to ecommerce
  25. Cyber Law and ethics
  26. Uniform laws, UETA, UCITA, and ESIGN 
  27. Digital and non-digital evidence 
  28. Hardware, software, input, output and multi-user environments vulnerabilities are discussed
  29. Concurrent access to storage devices
  30. Utilizing multiple drives for redundancy purposes
  31. Pros and cons of distributed and stand alone systems are discussed
  32. Information warfare (INFOWAR)
  33. Database applications as pertaining to distributed systems
  34. Operations security and information security
  35. Contingency planning and disaster recovery
  36. Communications security
  37. Classification and destruction of information is examined
  38. Security clearances and managing of classified data is discussed
  39. Threat identification, prioritization, vulnerabilities and countermeasures
  40. Policy creation, enforcement and management
  41. Discretionary, mandatory and non-discretionary access control methods
  42. Role-based and task-based control methods
  43. System life cycles, trusts and modes
  44. AIS security, accountability and information protection
  45. NSTISS planning and management
  46. Coordinating policy for redeploying systems to the SA, SSM, CIO, DAA, CTO...

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects. A digital economy simulation will be used to reinforce the understanding of EDI, RSA, and secure transactions.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material.

Grades for the course will be based on the following:
2 Examinations 45%
Homework 20%
Individual Projects 10%
Group Projects 10%
Attendance / Participation 15%

These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2523 - Enterprise Security Management

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 1.5 times the amount of contact hours for an additional 60 hours bringing the estimated total class hours to 100.

Course Description: This course examines managerial aspects of computer security and risk management for enterprises. The student will acquire information for accreditation, procurement, extension and operation principles for secure computing systems.

Course Prerequisites: CIT 2503

Course Learning Objectives: An understanding of core concepts and methodologies for enterprise security management as described in the major topics listed below

Major Topics:  Upon completion of Enterprise Security Management the student will be able to:

  1. describe inspection.
  2. evaluate protection.
  3. describe detection.
  4. identify reaction.
  5. Security policies
  6. Security Plan development
  7. Contingency planning
  8. Continuity planning
  9. Disaster planning
  10. Incident handling and response.
  11. explain information warfare (INFOWAR) concepts
  12. identify Computer Emergency Response Team

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material. Grades for the course will be based on the following:

2 Examinations 45%
Homework 20%
Individual Projects 10%
Group Projects 10%
Attendance / Participation 15%

These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2563 - Computer Security

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 1.5 times the amount of contact hours for an additional 60 hours bringing the estimated total class hours to 100.

Course Description: Students will be introduced to security problems in computer, basic encryption and decryption techniques. Secure encryption systems and cryptographic protocols and practices will also be presented.

Course Prerequisites: CIT 1613

Course Learning Objective:  An understanding of basic concepts of computer security. Emphasis on encryption and decryption, and cryptographic protocols and practices.

Major Topics Covered: Upon completion of Computer Security the student will be able to:

  1. define security
  2. communication security
  3. modes of operation
  4. discuss compartmented and partitioned security aspects
  5. identify threats, vulnerabilities, risks and the major categories and impact of threats
  6. describe aspects of countermeasures
  7. describe methods of defense 
  8. examine encryption and decryption
  9. examine cryptography techniques and concepts
  10. discuss the crypto elements of interruption, interception, modification and fabrication
  11. discuss key management as it pertains to crypto systems
  12. electronic key management system (EKMS) policy and procedure
  13. evaluate secure programs
  14. verify contents of user registries and access control tables
  15. examine different transmission techniques and security
  16. identify protection in Operating Systems
  17. evaluate database security
  18. data protection via passwords, physical, encryption and biometrics
  19. intrusion methods and countermeasures
  20. identify risk analysis
  21. appraise identification and authentication mechanisms
  22. policy management and risk management
  23. DITSCAP and certification/accreditation
  24. life cycles, trusts, modes, and NSTISS
  25. personnel roles and responsibilities
  26. implement RSA 
  27. discuss TEMPEST
  28. evaluate emanation security
  29. access controls  
  30. Mandatory Access control lists
  31. Discretionary Access control lists
  32. Vulnerability analysis

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material.
Grades for the course will be based on the following:
Two Examinations 45%
Homework 20%
Individual Projects 10%
Group Projects 10%
Attendance / Participation 15%

These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2573 - Secure System Administration / Certification

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 2 times the amount of contact hours for an additional 60 hours bringing the estimated total class hours to 120.
 

Course Description: Students will be exposed to provisioning, procurement and installation of network, hardware and software systems for mission critical enterprises. System configuration, maintenance, incident handling and response along with system certification, testing and validation will also be covered.

Course Prerequisites: CIT 2053 or CIT 2243

Course Learning Objective:  The student will be presented with the proper way to create and evaluate policies. System configuration and Accreditation will be discussed. The students will be able to explain the DITSCAP and Certification/Accreditation in detail.

Major Topics Covered: Upon completion of Secure System Administration/Certification, the student will have an understanding of the following topics:

  1. describe security practices
  2. identify physical security needs
  3. identifying physical security protection against unauthorized access
  4. identify techniques for securing servers and workstations
  5. training users' on threats and how to protect information
  6. describe securing public web servers
  7. evaluate deploying firewalls
  8. system development and how the system is maintained
  9. discuss vendor cooperation
  10. explain security implementations
  11. explain security requirements for ST&E development
  12. explain DITSCAP and Certification/Accreditation
  13. explain NIACAP process
  14. describe risk management and policies
  15. describe policy requirements for Telecommunication systems
  16. discuss appraising the maintenance of configuration documents
  17. discuss comparing the maintenance of configuration documents for conformance to the SSAA
  18. discuss roles and responsibilities
  19. discuss points of contact and references
  20. discuss skills need to perform analysis
  21. identify conditions under which certification activities were accomplished
  22. personnel selection
  23. WAN security policies
  24. identify national COMSEC policy and procedures
  25. discuss verifying identified tools are compliant with current accreditation
  26. verification and validation
  27. testing
  28. describe agency policy for redeploying classified systems to the SA, CIO, and DAA
  29. TEMPEST policies and procedures
  30. Red/Black
  31. Shielding
  32. OPSEC
  33. INFOSEC
  34. Network Security Policies
  35. Operating System Integrity
  36. FAX policies and procedures
  37. Internet Security policies and procedures
  38. zone of control
  39. workstation security policies
  40. introduce INFOWAR
  41. Computer Emergency Response Team
  42. Education, Training and Awareness
  43. Performance of vulnerability analysis
  44. Define Accountability
  45. Define Accreditation
  46. Define Security Architecture
  47. Discuss Availability/Integrity/Confidentiality/Authentication/Non-repudiation
  48. Resource Custodians role
  49. Defense in depth
  50. Security Domains
  51. Wireless security Policy
  52. Emanations Security
  53. Describe/Define Aggregation
  54. Discuss the rainbow series
  55. Housekeeping

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material.

Grades for the course will be based on the following:
Two Examinations 35%
Individual Projects 25%
Group Projects 25%
Attendance / Participation 15%

 These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2323 - Network Security

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 2 times the amount of contact hours for an additional 80 hours bringing the estimated total class hours to 120.

Course Description: The student will learn the fundamentals of network security. Students will study security design and development.

Course Learning Objectives: The student will learn the fundamentals of network security. Students will study security design and development. The proper use of access control lists, firewalls, VPNs, and Intrusion Detection Systems.

Major Topics: Upon completion of Network Security, the student will be able to:

  1. Demonstrate a basic knowledge of Network Security.
  2. Demonstrate the ability to design and implement a secure network.
  3. Demonstrate the ability to analysis and assess security breeches.
  4. Configure access control lists
  5. Verify audit log overflow policy
  6. Secure audit trails from unauthorized alteration and/or deletion
  7. Discuss requirements reporting alternative means to satisfy audit collections
  8. Verify criteria for generating alerts provided by audit tools
  9. Demonstrate proper host hardening techniques
  10. Discuss documenting results of any change in security processing mode
  11. Configure security policies
  12. Configure and evaluate Virtual Private Networks
  13. Configure and evaluate Firewalls
  14. Understand dialup, dedicated connections, public vs. private networks and the different security issues associated with each
  15. Segment and configure networks to include DMZs
  16. Configure and evaluate various Intrusion Detection Systems
  17. Different Encryption methods - pros and cons
  18. Demonstrate a basic knowledge of asynchronous vs. synchronous
  19. Analyze network traffic
  20. Identify and fingerprint various different network protocols

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material.
 

Grades for the course will be based on the following:
Two Examinations 45%
Homework 20%
Individual Projects 20%
    Analyzing network traffic
    Fingerprinting - Identifying network protocols
Attendance / Participation 15%

These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

 

CIT 2533 - Cyber Law

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 1 times the amount of contact hours for an additional 40 hours bringing the estimated total class hours to 80.

Course Description: This course will be a study of legal issues, applicable court decisions, federal and state statutes, administrative rulings, legal literature, and ethical considerations relating to Internet law.

Course Prerequisites: None

Course Learning Objectives: The student will learn the fundamentals of Law as it pertains to the Internet and the Cyber Environment. Ethics is also discussed in great detail. Students will be presented with and evaluate current and past case students to determine the impact on today's world.

Major Topics:  Upon completion of CyberLaw, the student will be able to:

  1. describe e-business and cyberlaw
  2. evaluate property issues in cyberspace
  3. describe business issues in cyberspace
  4. identify internet and computer crime

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material.

Grades for the course will be based on the following:
Two Examinations 45%
Individual Projects 30%
Attendance / Participation 25%

These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2543 - Information Security Assurance

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 1.5 times the amount of contact hours for an additional 60 hours bringing the estimated total class hours to 100.

Course Description: This class will focus on design and analysis methods for high assurance information systems. Safety, reliability and security will also be taught over the period of this course. The specification of mission-critical system properties will be discussed along with software and hardware validation, verification and certification.

Course Prerequisites: CIT 2503

Course Learning Objectives: Understanding of information assurance specification and analysis models and technologies. Ability to craft suitable information assurance policies for a variety of systems.

Major Topics: Upon completion of Information Systems Assurance the student will be able to:

  1. describe secure design principles.
  2. evaluate assurance and evaluation methodologies
  3. describe information flow
  4. discuss transmission security
  5. identify malicious logic
  6. discuss documenting results of any change in security processing mode
  7. discuss incident identification and containment
  8. describe physical security measures
  9. identify access controls to include authentication/verification
  10. discuss software security
  11. discuss media handling, backups, recovery and destruction
  12. discuss confidentiality, integrity, classification, repudiation and non-repudiation
  13. describe and discuss agency policy for redeploying classified systems to the SA, CIO, and DAA
  14. describe ethical issues including copyrighting and licensing
  15. evaluate auditing and monitoring
  16. discuss national COMSEC policy and procedures
  17. Security Testing and evaluation.
  18. Security Management
  19. Records Management to include retention, policies, and destruction

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment:

The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material.

Grades for the course will be based on the following:
Two Examinations 45%
Individual Projects 30%
Attendance / Participation 25%

These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2553 - Computer and Networking Forensics

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 3 times the amount of contact hours for an additional 120 hours bringing the estimated total class hours to 160.

Course Description: Students will gain practical knowledge on how to conduct digital investigations and preserve evidence that stands up to inquiries. Procedures for the identification and extraction of electronic evidence from computers and networks will be discussed. Forensic tools and resources for systems administrators and information systems will be utilized and evaluated.

Course Prerequisites: CIT 1503 and CIT 1523

Expected Course Outcomes: Upon completion of Computer and Networking Forensics the student will have competence in using established forensic methods to the handling of electronic evidence. Appreciation for rigorous audit/logging and data archival practices and be able to:

  1. describe computer forensics
  2. identify file systems.
  3. describe data recovery.
  4. examine data structures.
  5. evaluate computer forensics software
  6. identify digital evidence
  7. evaluate data-hiding techniques
  8. identify image files
  9. describe investigation reporting
  10. stegonography
  11. password protection/exploitation
  12. Windows security measures
  13. Linux/Unix security measures

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material. These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2603 - Security Auditing and Penetration Testing

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours. Projects assigned during the course will require an estimated 2 times the amount of contact hours for an additional 80 hours bringing the estimated total class hours to 120.

Course Description:  Aimed at both information-security professionals and network administrators, Security Auditing and Penetration Testing will examine how to tap the best computer-security practices and industry standards to deter attacks and better defend networks.

Course Prerequisites: CIT 2553

Expected Course Outcomes: Upon completion of Security Auditing and Penetration Testing the student will be able to:

  1. describe and utilize security auditing and penetration testing tools
  2. recognize HIPAA security regulations
  3. differentiate virus outbreaks
  4. recognize Cyber Extortion
  5. discuss and explain incident reconstruction
  6. explain network architecture
  7. differentiate port scanners
  8. diagram incident discovery
  9. explain wireless approaches
  10. describe and recognize existing security
  11. design an assessment process
  12. create and maintain policies
  13. define industrial espionage
  14. discuss executive fraud
  15. demonstrate how to secure audit trails from unauthorized alteration and deletion

CIT 1503 - Introduction to Networks

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours.

Course Description: An introductory course which covers the fundamental hardware and software concepts involved in a basic network.  The standard open systems interconnect model, popular LAN topologies and network administration will be discussed.

Major Topics: Upon completion of Introduction to Networks the student will be introduced to:

1.    Networking standards
2.    OSI model
3.    Network protocols
4.    Transmission basics and media
5.    Physical and logical topologies
6.    Networking hardware
7.    WANs and remote connectivity
8.    Network OS
9.    Netware
10.  Networking with UNIX
11.  TCP/IP and the Internet
12.  Troubleshooting
13.  Maintaining and upgrading a network
14.  Integrity and availability
15.  Network security

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material. These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 1523 - Micro Hardware and Operating Systems

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours.

Course Description: An introductory course which covers the fundamental hardware and software concepts involved in a basic network.  The standard open systems interconnect model, popular LAN topologies and network administration will be discussed.

Major Topics: Upon completion of Introduction to Networks the student will be introduced to:

1.    Introducing Hardware
2.    How Hardware and Software Work Together
3.    Understanding the Boot Process and Command Line
4.    Electricity and Power Supplies
5.    The Motherboard
6.    Managing Memory
7.    Floppy Drives
8.    Understanding and Installing Hard Drives
9.    Optimizing and Protection Hard Drives
10.  Supporting I/O Devices
11.  Multimedia Devices and Mass Storage
12.  Supporting Windows 9x
13.  Understanding and Installing Windows 2000 and Windows NT
14.  Managing and Troubleshooting Windows 2000
15.  Installing and Using Windows XP Professional
16.  Managing and Supporting Windows XP Professional
17.  Supporting Modems
18.  PCs on a Network
19.  PCs on the Internet
20.  Notebooks, Tablet PCs, and PDAs
21.  Supporting Printers

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material. These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2053 - Network Administration 1

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours.

Course Description: An introductory course in the installation and use of a local area network.  After installing the hardware and network software, the student will then utilize various application programs on the network.  Network terminology, security, and management issues will be studied.

Major Topics: Upon completion of Network Administration I the student will be introduced to:

1.    Introduction to server software
2.    Managing hardware devices
3.    Creating and managing user accounts
4.    Implementing and managing group and computer accounts
5.    Managing file access
6.    Managing disk and data storage
7.    Advanced File System Management
8.    Implementing and managing printers
9.    Implement and using group policy
10.    Server administration
11.  Monitor server performance
12.  Backup and disaster recovery
13.  Administering web resources
14.  Server security features 

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material. These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2083 - Network Administration 2

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours.

Course Description: An in-depth course in the administration of a local area network.  The student will utilize the network operating system to customize a printing environment, create login scripts, design and create menu systems, install and use the Message Handling Service, manage the file server, and maintain the network.  A comprehensive network project will be implemented to give the student experience in the application of the topics covered.

Major Topics: Upon completion of Network Administration II the student will be introduced to:

1.    Active directory
2.    Name resolution and DNS
3.    Active directory design philosophy
4.    Active directory physical and logical design
5.    Replication
6.    Operations Masters
7.    Authentication and security
8.    Managing users, groups, computers and resources
9.    Group policy for corporate policy
10.  Deploying and managing software with group policy
11.  Monitoring and optimizing active directory
12.  Disaster Recovery 

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material. These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2413 - Network Troubleshooting and Performance

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours.

Course Description: This course will cover basic network troubleshooting approaches. Students will learn to isolate network problems and understand how network-troubleshooting equipment is used.

Major Topics:  Upon completion of Network Troubleshooting and Performance the student will be introduced to:

1.    Network monitoring
2.    Baselines
3.    Alert thresholds
4.    Network problems
5.    Device configuration / re-configuration
6.    Port enumeration
7.    Connectivity
8.    Timeouts
9.    Performance issues / problems
10.  Network utilization
11.  Network monitoring and testing tools and applications
12.  Network layout physical / logical
13.  Network segmentation

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material. These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2603 - Secure Auditing and Penetration Testing

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours.

Course Description: This class covers best computer-security practices and industry standards to deter attacks and better defend networks.

Major Topics: Upon completion of Network Troubleshooting and Performance the student will be introduced to:

1.    Security Auditing Tools and Techniques
2.    Penetration testing tools and techniques
3.    HIPPA Security regulations
4.    Detect and defend against virus outbreaks
5.    Recognize Cyber Extortion
6.    Network Architecture
7.    Port Scanning
8.    Incident Respond / Reconstruction
9.    Network Discovery
10.  Wireless network analysis
11.  Existing Security measures
12.  Assessment process
13.  Perimeter Defense / IDSs 

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects. Numerous lab exercises will be utilized to illustrate the topics above.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material. These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2673 - Risk Management

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours.

Course Description: This class covers best computer-security practices and industry standards to deter attacks and better defend networks.

Major Topics: Upon completion of Network Troubleshooting and Performance the student will be introduced to:

1.    Security Auditing Tools and Techniques
2.    Penetration testing tools and techniques
3.    HIPPA Security regulations
4.    Detect and defend against virus outbreaks
5.    Recognize Cyber Extortion
6.    Network Architecture
7.    Port Scanning
8.    Incident Respond / Reconstruction
9.    Network Discovery
10.  Wireless network analysis
11.  Existing Security measures
12.  Assessment process
13.  Perimeter Defense / IDSs 

Method of Instruction: Lectures, class discussion, hands on projects for both individuals and groups, tests covering text and projects. Numerous lab exercises will be utilized to illustrate the topics above.

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material. These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

CIT 2643 - Wireless Networking

BACK TO TOP

Course Length: This 3 credit hour undergraduate course runs for 16 weeks with 2.5 contact hours per week totaling 40 contact hours.

Course Description: This course is a study of wireless networking. Management, design, deployment and security of Wireless Local Area Networks (WLANs) will be topics covered in this course.

Major Topics: Upon completion of Wireless Networking, the student will have an understanding of the following topics:

1. Identify different wireless technologies
2. Describe WLAN devices
3. Describe wireless standards
4. Describe types of wireless LANs
5. Define radio wave transmission principles
6. Differentiate analog and digital transmissions
7. Define antenna transmissions
8. Evaluate WLANs
9. Assess the need for a wireless LAN
10. Evaluate benefits of a wireless LAN
11. Describe wireless LAN design
12. Evaluate access point management
13. Identify security principles
14. Evaluate wireless attacks
15. Describe categories of attackers
16. Identify wireless security solutions
17. Evaluate security models
18. Describe WEP encryption and other encryption methods
19. Identify WLAN monitoring tools
20. Evaluate network monitoring tools
21. Describe wireless security policies
22. Threats to electronic emanations
23. Vulnerabilities in wireless technologies
24. Importance of wireless technologies
25. Risks associated with wireless networking and wireless devices
26. Wireless Security protocols
27. Wireless topologies

Method of Instruction:
Lectures
Class discussion
Hands-on training in computer lab environment
Case Projects
Classroom tests covering the text and training exercises

Course Assessment: The basic means of evaluation will be student scores on tests, lab assignments, projects and other assignments relating to the course material. These scores will be equated to a semester score between 0 and 100. The final grade will be based on the standard A-F scale. Borderline scores will be considered for equating the next higher grade by the instructor, based on attendance, participation, and demonstrated effort.

Certificate Program Course Offerings

BACK TO TOP

Systems Courses: (Grade Required for Certificates)
CIT 2183 --Advanced Database Design (SQL/Oracle) - C
CIT 2403 --Advanced Networking Concepts - B
CIT 2583 --Operating Systems - C

IA Core Courses: (Grade Required for Certificates)
CIT 2513 --Secure Electronic Commerce - B
CIT 2523 --Enterprise Security Management - B
CIT 2563 --Computer Security - B
CIT 2573 --Secure System Administration and Certification - B

IA Electives: (Grade Required for Certificates)
CIT 2323 --Network Security - C
CIT 2533 --Cyber Law - C
CIT 2543 --Information Security Assurance - B
CIT 2553 --Computer and Network Forensics - B
CIT 2603 --Secure Auditing and Penetration Testing - C
CIT 2593 --Advanced Forensics - B
CIT 2633 --Biometrics - C

Supporting Courses: (Grade Required for Certificates)
CIT 2023 --Micro Hardware and Operating Systems - C
CIT 2033 --Introduction to Networks - C
CIT 2053 --Network Administration - B
CIT 2243 --Unix / Linux - C
CIT 2353 --Advanced Routing - B
CIT 2423 --Network Troubleshooting & Management Design - B
CIT 2613 --Advanced Java Programming - C

Network System Courses: (Grade Required for Certificates)
CIT 2053 --Network Administration - B
CIT 2323 --Network Security - C
CIT 2243 --Unix / Linux - C
CIT 2353 --Advanced Routing - B
CIT 2423 --Network Troubleshooting & Management Design - B
CIT 2643 --Wireless Networking - C

 

 

Rose State College
6420 S.E. 15th Street.
Midwest City, OK 73110-2704
Phone: 405-733-ROSE (7673)
Toll Free: 866 621-0987

© Copyright 2014 Rose State College
All Rights Reserved
Designed by Element Fusion
Powered by Radium3