IT Infrastructure Security
The undergraduate certificate in IT Infrastructure Security covers the design of secure networks, and teaches how to develop risk mitigation plans and perform intrusion detection in IT network environments. This online program seeks to enhance your ability to assess, mitigate, and manage security risks in IT infrastructure. The U.S. National Security Agency (NSA) and the Committee on National Security Systems (CNSS) recognize this program as meeting the CNSS National Training Standards 4011 and 4013E, which are required for network security professionals who assist federal agencies in protecting the nation's vital information resources.
Courseware in this online program meets the topical requirements of the DoD Directive 8570.1M Information Assurance Management (IAM) Technical I category. The curriculum is reviewed by an advisory council of industry experts for relevancy to today’s marketplace. Course topics include:
- Local area network (LAN) concepts and technologies
- Operating systems security principles, practices, and policies
- IT security attack methods and defense strategies
- IT security risk management tools, techniques, and practices
- Computer and network security
- IT security attacks, technologies, and countermeasures
This online certificate is intended for undergraduate students who want to expand their knowledge of network security without committing to a degree program.
In addition to the institutional and degree level learning objectives, graduates of this program are expected to achieve these learning outcomes:
- Appraise the impact of operating system and network security on information technology management and global ecommerce.
- Establish the need for a reference model and examine the open systems interconnection (OSI) and the transmission control protocol/internet packet (TCP/IP) reference models.
- Discuss the technical risks, performance factors, and security issues related to operating system and network security in ecommerce, information technology management, and global ecommerce.
- Examine the principles that enable viruses, worms, and Trojan horses to propagate and proliferate throughout the system.
- Differentiate between active and passive intrusion detection, and examine the scope and procedures for implementing border and firewall security.
- Appraise the process for assessing network and application security and analyze the corresponding risk mitigation strategies and techniques.
- Assess the configuration, functionality, and risks of filtering and evaluate security systems such as firewalls, border routers, switches, and intrusion detection systems.
- All undergraduate programs require a minimum of a high school diploma or equivalent (i.e. GED).
- Undergraduate students with less than 9 transferable credit hours may be asked to complete our College Readiness Assessment to determine current math and writing skill levels.
- If you have previous college experience, you will be asked to submit your transcripts from previous schools where you earned academic credit.
- There is no fee to complete our admission application. View steps to apply.
Selecting the right program to meet your educational goals is a key step in ensuring a successful outcome. If you are unsure of which program to choose, or need more information, please contact an admission representative at 877-777-9081 or email@example.com.