61-CREDIT ASSOCIATE OF APPLIED SCIENCE DEGREE
Network security specialists monitor and protect an organization’s computer network and system, maintain system security and upgrade security measures to prevent computer viruses and cyberattacks.
In the program, discover how to protect data confidentiality, integrity and availability while learning ways to implement security mechanisms to mitigate attacks from various vectors. Emphasis is placed on vigilant security awareness, identifying network threats and deploying appropriate incident responses.
Through hands-on lab work, delve into topics including penetration testing, log analysis, digital forensics, the implementation of firewalls, wireless security and incident response, as well as defenses, countermeasures, and understanding legal and ethical issues associated with information security. Analyze a variety of network operating systems, firewalls, virtual private networks (VPN), packet filters and intrusion detection systems (IDS) to maximize information security in the network.
Program Code 10-151-2
68-CREDIT ASSOCIATE OF APPLIED SCIENCE DEGREE
Network specialists create and maintain computer systems essential for day-to-day business operations, ensuring network security and connectivity throughout an organization. They deal with monitoring network equipment, and maintaining, installing and configuring computer hardware and software. In the Network Specialist program, learn about installation and troubleshooting of network operating systems, cabling, Cisco routers and switches, and wireless and other LAN/WAN technologies
70-CREDIT ASSOCIATE OF APPLIED SCIENCE DEGREE
To create interactive, inviting and functional web pages requires the skills and talents of a web and software developer. Developers have extensive programming skills, knowledge of technical terminology and a solid understanding of computer languages essential to creating easy-to-navigate web pages. In the Web and Software Developer program, learn to develop applications using different web development languages. Apply structured design, design patterns, object-oriented analysis and design practices to applications and systems. In addition, gain an introduction to networking and mobile device application development.
67-CREDIT ASSOCIATE OF APPLIED SCIENCE DEGREE
Those working in information technology (IT) computer support roles are tech-savvy problem solvers. They work to install equipment, assist computer users with technology or software issues, troubleshoot when technical or application problems arise, and serve as a resource to help end users with current and emerging technological devices. In the Computer Support Specialist program, gain skills in problem solving, team building, service management and interpersonal communication. Become proficient at installing and updating computer hardware, software and networks, and find solutions to common technical problems.
Program Code 10-154-3
64-CREDIT ASSOCIATE OF APPLIED SCIENCE DEGREE
Data analysis is the process of inspecting, cleaning, transforming and modeling data to make informed business decisions. As companies downsize their workforce, employers are turning their attention to an analysis of corporate data to gain an edge on the competition. The result is an increase in demand for those with database administration and data analysis knowledge.
In the Database Specialist program, learn how to support the operational database needs of small to medium businesses — including configuration and management of database servers, user permissions on the database and troubleshooting performance issues. Become proficient in data analysis, reporting and the development of data models. Data cubes, data analytics and big data will be introduced.
Program Code 10-156-2
16-CREDIT TECHNICAL CERTIFICATE
Vigilant security awareness and defense is paramount to the integrity of every network infrastructure. Get introduced to computer network threats and the appropriate incident response to include defenses, countermeasures and computer forensics. Gain valuable information to help secure a business network infrastructure, and protect the network and network-accessible resources from unauthorized access. Learn areas of paramount importance to networks today, including ethical hacking and penetration testing concepts, network vulnerability identification and mitigation, wireless security, incident response, disaster recovery and business continuity planning.