Cybersecurity - IS81 Technical Certificate of Credit
The Information Security Specialist certificate is designed to give students the knowledge they need to understand and maintain computer information systems security.
- Submit a completed application and application fee
- Be at least 16 years of age
- Submit official high school transcript or High School Equivalency transcript or college transcripts showing successful completion of 60+ semester credits or 72+ quarter credits
- Submit official college transcripts, if applicable
- Present acceptable ACCUPLACER, ACT, ASSET, COMPASS, PSAT, or SAT scores or GED score of 145 or higher or have one of the following: an associate degree or higher or have a HOPE GPA of 2.6 after the completion of 10th grade. Documentation on a college transcript of successful completion of appropriate courses from a regionally accredited college or university may be accepted in lieu of test scores.
This program is a HOPE Career Grant eligible program for students who are HOPE Grant eligible. The Career Grant award is a fixed amount per semester based on the number of credit hours taken. Maximum award per term is $500.
|CIST 1601Information Security Fundamentals
Weekly Contact Hours: Lecture - 2 Lab 2 - 2 Lab 3 - 0 Pre-requisite(s): None Co-requisite(s): None This course provides a broad overview of information security. It covers terminology, history, security systems development and implementation. Student will also cover the legal, ethical, and professional issues in information security.
|CIST 1602Security Policies and Procedures
Weekly Contact Hours: Lecture - 3 Lab 2 - 0 Lab 3 - 0 Pre-requisite(s): None Co-requisite(s): None This course provides knowledge and experience to develop and maintain security policies and procedures. Students will explore the legal and ethical issues in information security and the various security layers: physical security, personnel security, operating systems, network, software, communication and database security. Students will develop an Information Security Policy and an Acceptable Use Policy.
|CIST 2601Implementing Operation Systems Security
Weekly Contact Hours: Lecture - 2 Lab 2 - 4 Lab 3 - 0 Pre-requisite(s): CIST 1601 and (CIST 1401 or CIST 2451 or CIST 2441) Co-requisite(s): None This course will provide knowledge and the practical experience necessary to configure the most common server platforms. Lab exercises will provide students with experience of establishing operating systems security for the network environment.
|CIST 2602Network Security
Weekly Contact Hours: Lecture - 2 Lab 2 - 4 Lab 3 - 0 Pre-requisite(s): CIST 1601 and (CIST 1401 or CIST 2451 or CIST 2441) Co-requisite(s): None This course provides knowledge and the practical experience necessary to evaluate, implement and manage secure information transferred over computer networks. Topics include network security, intrusion detection, types of attacks, methods of attacks, security devices, basics of cryptography and organizational security elements.
|CIST 2611Implementing Internet/Intranet Firewalls
Weekly Contact Hours: Lecture - 2 Lab 2 - 4 Lab 3 - 0 Pre-requisite(s): CIST 1601 and (CIST 1401 or CIST 2451 or CIST 2441) Co-requisite(s): None Students will learn how to plan, design, install and configure firewalls that will allow key services while maintaining security. This will include protecting the Internal IP services, configuring a firewall for remote access and managing a firewall.
|CIST 2612Computer Forensics
Weekly Contact Hours: Lecture - 2 Lab 2 - 4 Lab 3 - 0 Pre-requisite(s): CIST 1122, CIST 1601 Co-requisite(s): None This course examines the use of computers in the commission of crimes, collection, analysis and production of digital evidence. Students will use computer resources to explore basic computer forensic investigation techniques.
|CIST 2613Ethical Hacking and Penetration Testing
Weekly Contact Hours: Lecture - 2 Lab 2 - 4 Lab 3 - 0 Pre-requisite(s): CIST 1601 Co-requisite(s): None This course teaches students the skills needed to obtain entry-level security specialist jobs. It provides a hands-on introduction to ethical hacking, and penetration testing. It is for individuals who want to enhance their information security skill set and help meet the growing demand for security professionals. Topics include network and computer attacks, footprinting and social engineering, port scanning, enumeration, OS vulnerabilities, hacking web servers, hacking wireless networks, cryptography and network protection systems.
Up one level
Programs of Study
Notice and Responsibilities Regarding this Catalog
The information in this College Catalog and Student Handbook accurately reflects current policies and procedures at the time of publication. Students are admitted to the College under and are subject to the provisions of the WGTC Catalog and Student Handbooks for the term they initially enroll. Students in all programs are admitted under and are subject to the provisions of the College Catalog and Student Handbook and applicable addendums for the term they are admitted to the program at Wiregrass Georgia Technical College. If for any reason a break in enrollment occurs, students must reapply and satisfy the College Catalog and Student Handbook requirements for the term of their re-entry to any program. The provisions of this catalog are not to be regarded as an irrevocable contract between Wiregrass Georgia Technical College and the student. The College reserves the right to change any provision or requirement at any time.