Required Courses for the Certificate (18 units)
Course # | Course Title | Dates* | Term | Session | Instructor | Final Registration and Payment | Census Date | Last Day to drop w/65% refund |
---|---|---|---|---|---|---|---|---|
IST 2110 |
Information Technology |
7/10/23 - 8/11/23 |
Summer 2023 | 2 | Frank Lin | 07/03/2023 | 07/19/2023 | 07/19/2023 |
IST 2210 |
Computer Networks and Security |
8/24/23 - 10/12/23 |
Fall 2023 | 1 | Kenneth Desforges | 08/16/2023 | 09/11/2023 | 09/11/2023 |
IST 2610 |
Cybersecurity |
10/23/23 - 12/8/23 |
Fall 2023 | 2 | Barbara Brough | 10/16/2023 | 11/08/2023 | 11/08/2023 |
IST 4210 |
Advanced Computer Networks |
01/22/24 - 03/08/24 |
Spring 2024 | 1 | Brian Tirch | 01/16/2024 | 02/06/2024 | 02/06/2024 |
IST 4620 |
Penetration Testing and Ethical Hacking |
03/18/24 - 05/03/24 |
Spring 2024 | 2 | Zachary Taylor | 03/11/2024 | 04/03/2024 | 04/03/2024 |
IST 5250 |
Incident Handling and Cyber Investigation |
06/03/24 - 07/03/24 |
Summer 2024 | 1 | TBD | 05/21/2024 | 06/06/2024 | 06/06/2024 |
*Dates are tentative and may be subject to change
Course | Course Title | Dates* | Term | Session | Instructor | Final Registration and Payment | Census Date | Last Day to Drop w/65% refund |
---|---|---|---|---|---|---|---|---|
N/A |
N/A |
N/A |
N/A |
1 |
N/A | N/A | N/A |
N/A |
IST 2110 | Information Technology |
10/23/2023 - 12/08/2023 |
Fall 2023 |
2 |
Ruben Quinonez | 10/16/2023 | 11/08/2023 |
11/08/2023 |
IST 2210 | Computer Networks and Security |
01/22/2024 - 03/08/2024 |
Spring 2024 |
1 |
Ruben Quinonez | 01/16/2024 | 02/06/2024 |
02/06/2024 |
IST 2610 | Cybersecurity |
03/18/2024 - 05/03/2024 |
Spring 2024 |
2 |
Barbara Brough | 03/11/2024 | 04/03/2024 |
04/03/2024 |
IST 4210 | Advanced Computer Networks |
06/03/2024 - 07/03/2024 |
Summer 2024 |
1 |
TBD | 05/21/2024 | 06/06/2024 |
06/06/2024 |
IST 4620 | Penetration Testing and Ethical Hacking |
07/09/2024 - 08/07/2024 |
Summer 2024 |
2 |
TBD | 07/01/2024 | 07/15/2024 |
07/15/2024 |
IST 5250 | Incident Handling and Cyber Investigation | 08/26/2024 - 10/11/2024 | Fall 2024 | 1 | TBD | 08/16/2024 | 09/10/2024 | 09/10/2024 |
*Dates are subject to change
Course | Course Title | Course Dates | Term | Session | Instructor | Final Registration Date | Census Date Last Date to drop w/65% refund |
---|---|---|---|---|---|---|---|
IST 2110 |
Information Technology |
06/03/2024 - 07/03/2024 | Summer 2024 | 1 | TBD | 05/31/2024 | 06/06/2024 |
IST 2210 | Computer Networks and Security | 07/09/2024 - 08/07/2024 | Summer 2024 | 2 | TBD | 07/05/2024 | 07/15/2024 |
IST 2610 | Cybersecurity | 08/26/2024 - 10/11/2024 | Fall 2024 | 1 | TBD | 08/23/2024 | 09/10/2024 |
IST 4210 | Advanced Computer Networks | 10/21/2024 - 12/06/2024 | Fall 2024 | 2 | TBD | 10/18/2024 | 11/04/2024 |
IST 4620 | Penetration Testing and Ethical Hacking | 01/21/2025 - 03/11/2025 | Spring 2025 | 1 | TBD | 01/17/2025 | 02/04/2025 |
IST 5250 | Incident Handling and Cyber Investigation | 03/24/2025 - 05/09/2025 | Spring 2025 | 2 | TBD | 03/21/2025 | 04/07/2025 |
Course Descriptions
Basic computer hardware, software, maintenance, and training technologies including hardware components, operating system functions, information systems maintenance strategies for the organization, and end-user training options. Security practices such as network access, data disposal, introductory forensics, and facilities planning are also explored. Hands-on experience with different computer hardware, operating systems, and software utilities.
This course covers the fundamentals of computer networks for business students. Topics include layered network architecture, communication protocols, local and wide area networks, hardware basics, network security, traffic monitoring, packet level analysis, and operating system command line. Students will learn much of this through hands-on experience using popular packet analyzer tools and simulators.
Study in information assurance and systems security for information systems professionals. This course covers several key domains of knowledge essential to becoming a cybersecurity professional. The topics include (but are not limited to): threats, attacks, and vulnerabilities; technologies and tools; architecture and design; identity and access management; risk management/cryptography and PKI.
Advanced computer networks and their application in organizations. Students are introduced to the technology of routed and switched networks, wireless networks, and network security. Through hands-on experience and using popular packet analyzer tools and simulators, students learn how to design, configure, administer, secure, and debug heterogeneous IP networks. Topics include routing protocols, configuring routers and switches, VLANs, network management techniques, routing IP traffic, wireless networks, network security, and access control lists.
This course covers the process and methods for assessing the security posture of information systems. It reviews in depth the phases of penetration testing including but not limited to planning, reconnaissance, scanning, exploiting, post-exploitation, and reporting. Tools techniques, and procedures for each of the phases will be discussed, demonstrated, and used in lab exercises.
A systematic inspection of systems for evidence of a crime and use in civil litigation. Identify sources of digital evidence, preserve and analyze digital evidence, present findings (deposition of legal evidence in a court of law), and learn tools forensics experts use. The topics may include terrorism, identity theft, fraud, hacking, societal issues, and embezzlement. Students will learn best practices with hands-on experience in identifying and preserving digital evidence.