Certificate of Proficiency | 16 credits
Computer Sciences and Information Systems Division
Taylorsville Redwood Campus BB 214
General Information 801-957-4073
Program Information 801-957-5150
Program Website
Academic and Career Advising
Program Faculty
See Program Website
Program Description
The focus of the Ethical Hacking and Digital Forensic Investigation CP is to provide students with the skills and knowledge to protect computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. This is a vital area of need within governments, the military, corporations, financial institutions and other businesses.
Career Opportunities
See www.slcc.edu/csis
Transfer/Articulation Information
The courses in this CP transfer as elective credit. CSIS 2350 and CSIS 2360 will help prepare students for industry certifications in those areas.
Estimated Cost for Students
Tuition and student fees: http://www.slcc.edu/student/financial/tuition-fees.aspx
Note: This Certificate of Proficiency is not eligible for financial aid. However, courses within the certificate may be eligible if taken as part of a financial aid eligible program such as an AS or AAS degree. Please check with the Financial Aid Office to determine course and program eligibility.
Estimated Time to Completion
2 semesters
Program Learning Outcomes |
Related College-Wide Student Learning Outcomes |
|
1 - Acquire substantive knowledge
2 - Communicate effectively
3 - Develop quantitative literacies
4 - Think critically & creatively
5 - Become a community engaged learner
6 - Work in professional & constructive manner
7 - Develop computer & information literacy |
Understand correct procedures for installing, maintaining, and preserving computer hardware, software, and data.
|
1, 7
|
Select appropriate security hardware, software, policies, and configurations based on an organization’s assessment of its security vulnerabilities.
|
1, 4, 7
|
Perform advanced installation, configuration, monitoring, troubleshooting, maintenance, and recovery.
|
1, 4, 7
|
Understand the legal and ethical aspects of information security and assurance.
|
1, 4
|
Study and practice hacking techniques and master hacking technologies. Use advanced hacking tools and techniques to defeat security defenses.
|
1, 4, 7
|