Certificate Quick Facts
- Instructional School: Science, Technology, and Math
- Department: Information Technology
- Program Code: CSEC.ATC
- Program Type: Career and Technical Education
- Available Fully Online: No
- Eligible for Federal Financial Aid: Yes
NOTE: Courses required for this program may have an additional fee; more information can be found on the Special Course Fees web page.
Certificate Requirements
| Course | Course Title | Min Credits |
|---|---|---|
| General Education Requirements | ||
| Select one of the following: | 3 | |
| GEM 3 - Mathematical Ways of Knowing course | 3 | |
| GEM 6 - Social & Behavioral Ways of Knowing course | 3 | |
| Major Requirements | ||
| CSEC 111 | Cybersecurity Essentials | 4 |
| CSEC 115 | Introduction to Networks | 4 |
| CSEC 119 | Introduction to Internetworking | 4 |
| CSEC 127 | Server Operating Systems | 4 |
| CSEC 129 | Fundamentals of Linux | 4 |
| CSEC 131 | Introduction to Information Security | 4 |
| CSEC 246 | Securing a Directory Services Infrastructure | 4 |
| CSEC 248 | Advanced Cybersecurity | 4 |
| CSEC 252 | Introduction to Programming for Cybersecurity | 4 |
| CSEC 255 | Ethical Hacking and Countermeasures | 4 |
| CSEC 257 | Introduction to Digital Forensics | 4 |
| CSEC 290 | Cybersecurity Capstone | 4 |
| Minimum Credit Hours Required | 57 | |
Certificate Plan: Fall Start
The course sequence listed below is strongly recommended in order to complete your program requirements. Many Career and Technical Education (CTE) courses have prerequisites and/or corequisites that have been accounted for within this course sequence plan. Please register for your major requirements each semester as shown below using the Student Planning tool in myCWI. Consult your advisor for any questions regarding this plan.
NOTE: The required general education courses may be completed during any semester the student prefers, including summer semesters.
NOTE: The certificate plan below is for a Fall or Spring start. Students interested in attending in the Summer should meet with their advisor for additional information and assistance with course planning.
| First Year | ||
|---|---|---|
| Fall | Credit Hours | |
First 8-Week Session | ||
| CSEC 115 | Introduction to Networks | 4 |
Second 8-Week Session | ||
| CSEC 119 | Introduction to Internetworking | 4 |
Full 16-Week Session | ||
| CSEC 111 | Cybersecurity Essentials | 4 |
| GEM 3 - Mathematical Ways of Knowing course | 3 | |
| Total Semester Credit Hours | 15 | |
| Spring | ||
First 8-Week Session | ||
| CSEC 127 | Server Operating Systems | 4 |
Second 8-Week Session | ||
| CSEC 131 | Introduction to Information Security | 4 |
Full 16-Week Session | ||
| CSEC 129 | Fundamentals of Linux | 4 |
| Select one of the following: | 3 | |
| Total Semester Credit Hours | 15 | |
| Second Year | ||
| Fall | ||
First 8-Week Session | ||
| CSEC 248 | Advanced Cybersecurity | 4 |
Second 8-Week Session | ||
| CSEC 252 | Introduction to Programming for Cybersecurity | 4 |
Full 16-Week Session | ||
| CSEC 246 | Securing a Directory Services Infrastructure | 4 |
| GEM 6 - Social & Behavioral Ways of Knowing course | 3 | |
| Total Semester Credit Hours | 15 | |
| Spring | ||
First 8-Week Session | ||
| CSEC 257 | Introduction to Digital Forensics | 4 |
Second 8-Week Session | ||
| CSEC 290 | Cybersecurity Capstone | 4 |
Full 16-Week Session | ||
| CSEC 255 | Ethical Hacking and Countermeasures | 4 |
| Total Semester Credit Hours | 12 | |
| Minimum Credit Hours Required | 57 | |
Program Learning Outcomes
Upon successful completion of this program, students will be able to:
- Identify, describe, and implement secure network and system solutions using elements of physical hardware components, client/server architecture, Windows and Linux server operating systems, and directory systems, in accordance with industry-recognized standards.
- Apply written, verbal, and interpersonal communication skills to convey cybersecurity concepts - such as confidentiality, integrity, availability, and authentication - to diverse stakeholders while practicing professionalism and ethical reasoning.
- Design, configure, and manage secure network and system infrastructure, including routers, switches, DNS, DHCP, and firewalls; demonstrate effective troubleshooting techniques while adhering to industry best practices.
- Apply the NIST CSF, PCI-DSS frameworks, and cybersecurity governance principles to support ethical cybersecurity decision-making, legal compliance, and alignment with applicable regulations.
- Demonstrate risk management best practices; analyze systems for vulnerabilities using ethical hacking techniques, log files, and SIEM tools; recommend relevant solutions.\\n\\n
- Apply forensic tools and techniques to collect, preserve, and analyze digital evidence; demonstrate effective incident response procedures, and maintain data integrity.
- Demonstrate hands-on skills and knowledge aligned with certification domains and CAE KUs that reinforce secure design, ethical behavior, and adherence to relevant security principles in professional practice.
- Develop and apply Bash, PowerShell, and Python scripts to automate routine cybersecurity tasks and use industry-standard tools, including artificial intelligence, to analyze system behavior, detect anomalies, and support cybersecurity operations.
- Exhibit competencies of Written Communication (GEM 1) OR Oral Communication (GEM 2); Mathematical Ways of Knowing (GEM 3), and Social and Behavioral Ways of Knowing (GEM 6).