Advanced Technical Certificate - Network Security Forensics
Previous Degree Required: A.S./AAS
Eligible for Financial Aid: No
Delivery Method(s): On-Campus, Hybrid
Location(s): Cocoa, Melbourne, Palm Bay, Titusville, Online
Additional Limited Access Application Process Required: No
Program Testing Requirements: Not Required
Academic Community: STEM
Program Code: NSTC
Classification of Instructional Programs (CIP) Code: 11.1001
Florida Department of Education CIP Code: 0511100166
This twelve credit Advanced Technical Certificate (ATC) program prepares students for employment in the network security field. The program provides coursework in cybersecurity, digital forensics, intrusion detection, and application programming control architectures.
To be awarded an ATC, students must have an A.S. or AAS. The A.S. should be in computer science, computer programming, networking, or a related field and be from a regionally accredited institution. Coursework from the ATC may be apply to the BAS in Computer Information Systems Technology: Networking Systems Specialization.
This program was created with funding from the XCEL-IT grant program to enhance cybersecurity training. Following successful completion of the program courses, the candidate may be eligible to apply for certification leading to a Global Information Assurance Certification (GIAC) in Certified Forensic Analysis (GCFA).
Refer to the Advanced Technical Certificates overview page to find information about admission, graduation, testing, and other requirements.
Visit the program page for more information.
Certificate Requirements
Code | Title | Credit Hours |
---|---|---|
Major Courses | ||
CISC 3391 | Computer Forensics | 3 |
CISC 3392 | Windows Forensics | 3 |
COP 3703 | Database Design and Architecture | 3 |
ISM 3321 | Cybersecurity Fundamentals | 3 |
Total Credit Hours | 12 |
All courses must be completed with a grade of "C" or higher.
Learning Outcomes
- Apply techniques for collecting and analyzing forensic data, computer systems and media using readily available open forensic investigative source tools available for popular commercial operating systems.
- Supports Core Ability: Think Critically and Solve Problems
- Apply techniques for storage and retrieval of data to support the organization’s functional units and external customers.
- Supports Core Ability: Process Information
- Determine lab requirements for live acquisition analysis and list current tools, compare current tools for data collection and analysis, explain forensically sound data collection and storage techniques and create a live response testing environment
- Supports Core Ability: Think Critically and Solve Problems
- Assess network security controls and determine security concerns, authentication protocol services, network monitors, and secure data communication techniques.
- Supports Core Ability: Think Critically and Solve Problems
- Explain the fundamentals of cybersecurity and its impact on information systems, identify various types of cybersecurity threats, explain cybersecurity management methods and identify current security resources
- Supports Core Ability: Think Critically and Solve Problems
- Supports Core Ability: Think Critically and Solve Problems