-
Program Duration: Short-term
-
Program Duration: Short-term
-
Total Credit Hours: 16
About This Certificate
This program will teach you how to develop the technical, analytical and problem-solving skills needed to protect both government and organizations’ information technology assets. The coursework for the Cybersecurity Proficiency Certificates I & II will also prepare students for specific industry certification exams, including CompTIA Security+, GIAC Security Essentials (GSEC), Certified Information Privacy Professional (CIPP), Systems Security Certified Practitioner (SSCP), Certified Ethical Hacker (CEH), Security Certified Network Professional (SCNP), and Global Information Assurance Certification (GIAC). Some organizations accept these industry certifications as a stand-alone qualification for employment, especially for entry level jobs.
Upon receiving your proficiency certificates, your courses may be applied to the Cybersecurity Associate in Applied Science degree program at the College, as well as transfer to a four-year college.
Course Sequence
Launch Your Career in Cybersecurity
- Database Administrator – est. salary $107,562
- Information Security Analyst – est. salary $119,390*
- Network and Computer Systems Administrator – est. salary $97,557
- Security Management Specialist – est. salary $87,360
Career Outlook
Median Salary of an Information Security Analyst
Number of Jobs in the Region
10-year Job Outlook in the Region for Information Security Analysts
Information Security Analysts
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure.
Starting Pay: $73,014
Typical Tasks
- Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
- Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
- Monitor current reports of computer viruses to determine when to update virus protection systems.
- Monitor use of data files and regulate access to safeguard information in computer files.