Cyber Security Certificates
Cyber Security Certificates
The cyber security certificates are designed for the person who has a strong computer background and is already working in the cyber security field and wants to enhance their skills.
For each Certificate, 9 credits must be completed at Charter Oak and all courses must be completed with a grade of 'C' or better.
Cyber Security Fundamental Certificate
Total | 18cr |
---|---|
ITE 145: Fundamentals of Information Systems Security | 3cr |
CSS 146: Legal Issues in Information Security | 3cr |
CSS 230: Managing Risk in Information Systems | 3cr |
CSS 245: Security Policies and Implementation Issues | 3cr |
CSS 345: Auditing IT infrastructure for Compliance | 3cr |
CSS 435: Fundamentals of Network Security | 3cr |
Security Strategies Application Certificate
Total | 15cr |
---|---|
ITE 145: Fundamentals of Information Systems Security | 3cr |
CSS 230: Managing Risk in Information Systems | 3cr |
CSS 347: Security Strategies in Windows OS/Applications | 3cr |
CSS 348: Security Strategies in Linux OS/Applications | 3cr |
CSS 438: Security Strategies for Web Apps and Social Networking | 3cr |
Cyber Security Investigation Certificate
Total | 15cr |
---|---|
ITE 145: Fundamentals of Information Systems Security | 3cr |
CSS 146: Legal Issues in Information Security | 3cr |
CSS 230: Managing Risk in Information Systems | 3cr |
CSS 436: Systems Forensics Investigation and Response | 3cr |
CSS 437: Hacker Techniques Tools and Incident Handling | 3cr |
Technical Security Administration Certificate
Total | 18cr |
---|---|
ITE 145: Fundamentals of Information Systems Security | 3cr |
CSS 230: Managing Risk in Information Systems | 3cr |
CSS 346: Access Control, Authentication and PKI | 3cr |
CSS 347: Security Strategies in Windows OS/Applications | 3cr |
CSS 435: Fundamentals of Network Security | 3cr |
CSS 437: Hacker Techniques Tools and Incident Handling | 3cr |
Student Learning Outcomes
Students who graduate with one of the Certificates listed above will be able to:
- explain the landscape, key terms, and concepts related to the many layers of information systems security;
- explore and explain the fields in digital forensics and cyber policy analysis;
- create policies and standard operating procedures for organizations that are ethically, morally, and legally sound while recognizing ethical dilemmas and social responsibilities;
- identify and critically assess issues and concepts related to the protection of information and information systems; and
- use risk management principles to assess threats, vulnerabilities, countermeasures and impact contributions at risk in information systems.
Pages In This Section
- Certificates and Credentials
- Cancer Registry Management Certificate
- Certificate in Clinical Documentation Improvement
- Certificate in Health Insurance Customer Service
- Certificate in Health Information Management
- Certificate in Leadership in Health Care Administration
- Certificate in Project Management
- Certificate in Public Safety Administration
- Certificate in Victim Advocacy
- Connecticut Director's Credential
- Cyber Security Certificates
- Health Information Fundamentals for Health Professionals Certificate
- Long term Care Certificate for Direct Care Workers
- Long Term Care Certificate for Direct Care Workers-Specialty Skills in Elder Care
- Medical Coding Certificate
- Paralegal Certificate
- Physician Practice Management Certificate
- Provider Credentialing Specialist Certificate
- ECE ARC: Alternate Route to Certification
Cyber Security Certificates
The cyber security certificates are designed for the person who has a strong computer background and is already working in the cyber security field and wants to enhance their skills.
For each Certificate, 9 credits must be completed at Charter Oak and all courses must be completed with a grade of 'C' or better.
Cyber Security Fundamental Certificate
Total | 18cr |
---|---|
ITE 145: Fundamentals of Information Systems Security | 3cr |
CSS 146: Legal Issues in Information Security | 3cr |
CSS 230: Managing Risk in Information Systems | 3cr |
CSS 245: Security Policies and Implementation Issues | 3cr |
CSS 345: Auditing IT infrastructure for Compliance | 3cr |
CSS 435: Fundamentals of Network Security | 3cr |
Security Strategies Application Certificate
Total | 15cr |
---|---|
ITE 145: Fundamentals of Information Systems Security | 3cr |
CSS 230: Managing Risk in Information Systems | 3cr |
CSS 347: Security Strategies in Windows OS/Applications | 3cr |
CSS 348: Security Strategies in Linux OS/Applications | 3cr |
CSS 438: Security Strategies for Web Apps and Social Networking | 3cr |
Cyber Security Investigation Certificate
Total | 15cr |
---|---|
ITE 145: Fundamentals of Information Systems Security | 3cr |
CSS 146: Legal Issues in Information Security | 3cr |
CSS 230: Managing Risk in Information Systems | 3cr |
CSS 436: Systems Forensics Investigation and Response | 3cr |
CSS 437: Hacker Techniques Tools and Incident Handling | 3cr |
Technical Security Administration Certificate
Total | 18cr |
---|---|
ITE 145: Fundamentals of Information Systems Security | 3cr |
CSS 230: Managing Risk in Information Systems | 3cr |
CSS 346: Access Control, Authentication and PKI | 3cr |
CSS 347: Security Strategies in Windows OS/Applications | 3cr |
CSS 435: Fundamentals of Network Security | 3cr |
CSS 437: Hacker Techniques Tools and Incident Handling | 3cr |
Student Learning Outcomes
Students who graduate with one of the Certificates listed above will be able to:
- explain the landscape, key terms, and concepts related to the many layers of information systems security;
- explore and explain the fields in digital forensics and cyber policy analysis;
- create policies and standard operating procedures for organizations that are ethically, morally, and legally sound while recognizing ethical dilemmas and social responsibilities;
- identify and critically assess issues and concepts related to the protection of information and information systems; and
- use risk management principles to assess threats, vulnerabilities, countermeasures and impact contributions at risk in information systems.