Cybersecurity - Advanced Technical Certificate (ATC)

ATC - 2 Years (NB)
Explore MoreAbout This Program

Certificate Quick Facts

  • Instructional School: Science, Technology, and Math
  • Department: Information Technology
  • Program Code: CSEC.ATC
  • Program Type: Career and Technical Education
  • Available Fully Online: No
  • Eligible for Federal Financial Aid: Yes

NOTE: Courses required for this program may have an additional fee; more information can be found on the Special Course Fees web page.

Certificate Requirements

Course Course Title Min Credits
General Education Requirements
Select one of the following:3
GEM 3 - Mathematical Ways of Knowing course3
GEM 6 - Social & Behavioral Ways of Knowing course3
Major Requirements
CSEC 111Cybersecurity Essentials4
CSEC 115Introduction to Networks4
CSEC 119Introduction to Internetworking4
CSEC 127Server Operating Systems4
CSEC 129Fundamentals of Linux4
CSEC 131Introduction to Information Security4
CSEC 246Securing a Directory Services Infrastructure4
CSEC 248Advanced Cybersecurity4
CSEC 252Introduction to Programming for Cybersecurity4
CSEC 255Ethical Hacking and Countermeasures4
CSEC 257Introduction to Digital Forensics4
CSEC 290Cybersecurity Capstone4
Minimum Credit Hours Required57

Certificate Plan: Fall Start

The course sequence listed below is strongly recommended in order to complete your program requirements. Many Career and Technical Education (CTE) courses have prerequisites and/or corequisites that have been accounted for within this course sequence plan. Please register for your major requirements each semester as shown below using the Student Planning tool in myCWI. Consult your advisor for any questions regarding this plan.

NOTE: The required general education courses may be completed during any semester the student prefers, including summer semesters.​

NOTE: The certificate plan below is for a Fall or Spring start. Students interested in attending in the Summer should meet with their advisor for additional information and assistance with course planning. 

Plan of Study Grid
First Year
FallCredit Hours
First 8-Week Session
 
CSEC 115 Introduction to Networks 4
Second 8-Week Session
 
CSEC 119 Introduction to Internetworking 4
Full 16-Week Session
 
CSEC 111 Cybersecurity Essentials 4
GEM 3 - Mathematical Ways of Knowing course 3
 Total Semester Credit Hours15
Spring
First 8-Week Session
 
CSEC 127 Server Operating Systems 4
Second 8-Week Session
 
CSEC 131 Introduction to Information Security 4
Full 16-Week Session
 
CSEC 129 Fundamentals of Linux 4
Select one of the following: 3
 
 
 Total Semester Credit Hours15
Second Year
Fall
First 8-Week Session
 
CSEC 248 Advanced Cybersecurity 4
Second 8-Week Session
 
CSEC 252 Introduction to Programming for Cybersecurity 4
Full 16-Week Session
 
CSEC 246 Securing a Directory Services Infrastructure 4
GEM 6 - Social & Behavioral Ways of Knowing course 3
 Total Semester Credit Hours15
Spring
First 8-Week Session
 
CSEC 257 Introduction to Digital Forensics 4
Second 8-Week Session
 
CSEC 290 Cybersecurity Capstone 4
Full 16-Week Session
 
CSEC 255 Ethical Hacking and Countermeasures 4
 Total Semester Credit Hours12
 Minimum Credit Hours Required57

Program Learning Outcomes

Upon successful completion of this program, students will be able to:

  • Identify, describe, and implement secure network and system solutions using elements of physical hardware components, client/server architecture, Windows and Linux server operating systems, and directory systems, in accordance with industry-recognized standards.
  • Apply written, verbal, and interpersonal communication skills to convey cybersecurity concepts - such as confidentiality, integrity, availability, and authentication - to diverse stakeholders while practicing professionalism and ethical reasoning.
  • Design, configure, and manage secure network and system infrastructure, including routers, switches, DNS, DHCP, and firewalls; demonstrate effective troubleshooting techniques while adhering to industry best practices.
  • Apply the NIST CSF, PCI-DSS frameworks, and cybersecurity governance principles to support ethical cybersecurity decision-making, legal compliance, and alignment with applicable regulations.
  • Demonstrate risk management best practices; analyze systems for vulnerabilities using ethical hacking techniques, log files, and SIEM tools; recommend relevant solutions.\\n\\n
  • Apply forensic tools and techniques to collect, preserve, and analyze digital evidence; demonstrate effective incident response procedures, and maintain data integrity.
  • Demonstrate hands-on skills and knowledge aligned with certification domains and CAE KUs that reinforce secure design, ethical behavior, and adherence to relevant security principles in professional practice.
  • Develop and apply Bash, PowerShell, and Python scripts to automate routine cybersecurity tasks and use industry-standard tools, including artificial intelligence, to analyze system behavior, detect anomalies, and support cybersecurity operations.
  • Exhibit competencies of Written Communication (GEM 1) OR Oral Communication (GEM 2); Mathematical Ways of Knowing (GEM 3), and Social and Behavioral Ways of Knowing (GEM 6).