Network Security Forensics (ATC)
Previous Degree Required: A.S./AAS
Eligible for Financial Aid: No
Delivery Method(s): On-Campus, Hybrid
Location(s): Cocoa, Melbourne, Palm Bay, Titusville, Online
Additional Limited Access Application Process Required: No
Program Testing Requirements: Not Required
Academic Community: STEM
Program Code: NSTC
Classification of Instructional Programs (CIP) Code: 11.1001
Florida Department of Education CIP Code: 0511100166
This twelve credit Advanced Technical Certificate (ATC) program prepares students for employment in the network security field. The program provides coursework in cybersecurity, digital forensics, intrusion detection, and application programming control architectures.
To be awarded an ATC, students must have an A.S. or AAS. The A.S. should be in computer science, computer programming, networking, or a related field and be from a regionally accredited institution. Coursework from the ATC may be apply to the BAS in Computer Information Systems Technology: Cybersecurity Specialization.
This program was created with funding from the XCEL-IT grant program to enhance cybersecurity training. Following successful completion of the program courses, the candidate may be eligible to apply for certification leading to a Global Information Assurance Certification (GIAC) in Certified Forensic Analysis (GCFA).
Refer to the Advanced Technical Certificates overview page to find information about admission, graduation, testing, and other requirements.
Visit the program page for more information.
Program of Study
Code | Title | Credit Hours |
---|---|---|
Major Courses | ||
CISC 3391 | Computer Forensics | 3 |
CISC 3392 | Windows Forensics | 3 |
COP 3703 | Database Design and Architecture | 3 |
ISM 3321 | Cybersecurity Fundamentals | 3 |
Total Credit Hours | 12 |
All courses must be completed with a grade of "C" or higher.
Course Sequence
Below is the recommended sequence for taking courses in this degree. Using this guide and meeting with your assigned advisor each term is the key to successful program completion.
Please note that course prerequisites, including required developmental math, reading, or writing, need to be completed to continue on to the more advanced course. Courses followed by “&” have prerequisites that are not part of this program. Click on the course number to see the requirements.
Code | Title | Credit Hours |
---|---|---|
CISC 3391 | Computer Forensics & | 3 |
CISC 3392 | Windows Forensics | 3 |
COP 3703 | Database Design and Architecture & | 3 |
ISM 3321 | Cybersecurity Fundamentals & | 3 |
Total Credit Hours | 12 |
Learning Outcomes
- Apply techniques for collecting and analyzing forensic data, computer systems and media using readily available open forensic investigative source tools available for popular commercial operating systems
- Core Ability Supported: Think Critically and Solve Problems
- Apply techniques for storage and retrieval of data to support the organization’s functional units and external customers
- Core Ability Supported: Think Critically and Solve Problems
- Determine lab requirements for live acquisition analysis and list current tools, compare current tools for data collection and analysis, explain forensically sound data collection and storage techniques and create a live response testing environment
- Core Ability Supported: Think Critically and Solve Problems
- Assess network security controls and determine security concerns, authentication protocol services, network monitors, and secure data communication techniques
- Core Ability Supported: Think Critically and Solve Problems
- Explain the fundamentals of cybersecurity and its impact on information systems, identify various types of cybersecurity threats, explain cybersecurity management methods and identify current security resources
- Core Ability Supported: Think Critically and Solve Problems