Charter Oak State College Official Catalog
Connecticut State Colleges and Universities

Cyber Security Certificates

The cyber security certificates are designed for the person who has a strong computer background and is already working in the cyber security field and wants to enhance his/her skills. For each certificate, 9 credits must be completed at Charter Oak.

Cyber Security Fundamental Certificate

ITE 145: Fundamentals of Information Systems Security

3 cr

CSS 146: Legal Issues in Information Security

3 cr

CSS 230: Managing Risk in Information Systems

3 cr

CSS 245: Security Policies and Implementation Issues

3 cr

CSS 345: Auditing IT infrastructure for Compliance

3 cr

CSS 435: Fundamentals of Network Security

3 cr
Total18 cr

Security Strategies Application Certificate

ITE 145: Fundamentals of Information Systems Security

3 cr

CSS 230: Managing Risk in Information Systems

3 cr

CSS 347: Security Strategies in Windows OS/Applications

3 cr

CSS 348: Security Strategies in Linux OS/Applications

3 cr

CSS 438: Security Strategies for Web Apps and Social Networking

3 cr
Total15 cr

Cyber Security Investigation Certificate

ITE 145: Fundamentals of Information Systems Security

3 cr

CSS 146: Legal Issues in Information Security

3 cr

CSS 230: Managing Risk in Information Systems

3 cr

CSS 436: Systems Forensics Investigation and Response

3 cr

CSS 437: Hacker Techniques Tools and Incident Handling

3 cr
Total15 cr

Technical Security Administration Certificate

ITE 145: Fundamentals of Information Systems Security

3 cr

CSS 230: Managing Risk in Information Systems

3 cr

CSS 346: Access Control, Authentication and PKI

3 cr

CSS 347: Security Strategies in Windows OS/Applications

3 cr

CSS 435: Fundamentals of Network Security

3 cr

CSS 437: Hacker Techniques Tools and Incident Handling

3 cr
Total18 cr

Student Learning Outcomes

Students who graduate with one of the certificates listed above will be able to:

  1. explain the landscape, key terms, and concepts related to the many layers of information systems security
  2. explore and explain the fields in digital forensics and cyber policy analysis.
  3. create policies and standard operating procedures for organizations that are ethically, morally, and legally sound while recognizing ethical dilemmas and social responsibilities.
  4. identify and critically assess issues and concepts related to the protection of information and information systems.
  5. use risk management principles to assess threats, vulnerabilities, countermeasures and impact contributions at risk in information systems.

This page was last published on September 18, 2017
View a printable PDF of this page