Cybersecurity Certificate Program
PC-100: Personal Cybersecurity (3hrs)
Course Description
This course is a broad overview of computer security topics, including security threats, personal computer security, operating system security, web security, physical security, access control, intrusion detection, anti-virus & anti-spyware systems, cryptography, steganography, security models & practice, business continuity & disaster recovery, and risk management. A brief introduction to secure software development is included. The course will not include a significant coding component.
Learning Outcomes
By the end of this course, you will be able to:
- Describe risks, threats, and vulnerabilities related to cybersecurity
- Explain risk management, business continuity planning, and disaster recovery planning
- Describe the importance of standards and compliance to cybersecurity
- Discuss the importance of privacy for cybersecurity
- Employ common, everyday cybersecurity software
Course Preview
https://campusedu.wistia.com/medias/mlgwtc7qchIA-100: Information Assurance (3hrs)
Course Description
This course provides an overarching model for information assurance for businesses, government agencies, and other enterprises needing to establish a comprehensive security plan. Students will be guided through the components of security and the construction of an effective security policy. Topics include asset identification, human factors, compliance with regulations, personnel security, risk assessment, business continuity, and ethical considerations, as well as computer and network security tools and methods
Learning Outcomes
By the end of this course, you will be able to:
- Demonstrate an understanding of the principles related to information assurance
- Construct a model security policy
- Describe the characteristics of an effective sample comprehensive security plan
Course Preview
https://campusedu.wistia.com/medias/nsrob92ez0EH-100: Ethical Hacking (3hrs)
Course Description
A hands-on study of hacking and cryptanalysis. Legal and ethical limitations will be stressed
Learning Outcomes
By the end of this course, you will be able to:
- Discuss what can and cannot legally be done by an ethical hacker
- Demonstrate an ability to use and understand common ethical hacking approaches and tools
- Use ethical hacking approaches to test an appropriate security hacking defense for a model system
Course Preview
https://campusedu.wistia.com/medias/d4yvkj4kkvSE-100: Social Engineering (3hrs)
Course Description
This course will cover human behavior relating to cyber systems and operations, such as social engineering, social networks, user experience, and organizational behavior. This course will help the student to identify how the bad guys are using their humanity against them; but the student will also learn how to defend against these attacks to protect themselves, their loved ones, and their organizations. this course will provide a firm foundation in helping the student understand what is needed to be a professional, ethical, and social engineer.
Learning Outcomes
By the end of this course, you will be able to:
- Understand and explain the basics of social engineering. This topic provides an overview of the different ways that cybercriminals or malicious groups exploit weaknesses in organizations, systems, networks, and personal information used to enable a later cyberattack. Topics may include: phishing attacks, physical/impersonation, vishing (phone phishing), email compromise, and baiting.
- Identify, understand, and protect oneself from social engineering attacks using psychological and behavioral factors. This topic provides an overview of the psychological and behavioral factors related to individuals falling from social engineering attacks. Topics may include social influence, non-verbal communication, lie detection, adversarial thinking, how emotional responses impact decision-making, cognitive biases of risks and rewards, and trust building.
- Understand and explain how cybercriminals mislead users. This topic provides an overview of message systems’ and browsers’ interfaces and /or user interaction that can be exploited to mislead users. Topics may include spoofing message senders, misleading URLs, how users judge and trust websites and emails, as well as user behaviors with phishing and other browser warnings.
- Be able to use tools to protect oneself and advise employers in the detection and mitigation of social engineering attacks: Hands-on experience on the use of tools and technical approaches to detect and/or mitigate different social engineering threats. Use of tools such as email filtering, blacklist, security information and event management (SIEM) tools, and IDS/IPS may be included.
Supported ABET Student Outcomes
- Recognize professional responsibilities and make informed judgements in computing practice based on legal and ethical principles (Cybersecurity Student Outcome 4)
- Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline (Cybersecurity Student Outcome 5)
- Apply security principles and practices to the environment, hardware, software, and human aspects of a system (Cybersecurity Student Outcome 6)
Course Preview
https://campusedu.wistia.com/medias/zwbm8uw2tbDF-100: Digital Forensics (3hrs)
Course Description
This course provides the student with a thorough background in the principles and practices employed in the field of digital forensics. The course provides students with a working foundation of the types of computer and electronic crimes being committed today, and identifies techniques used by offenders to compromise computer systems as well as vulnerabilities of computer and electronic systems. Practical applications of theory and academic study are included as coursework.
Learning Outcomes
By the end of this course, you will be able to:
- Demonstrate an ability to use and understand common digital forensics tools and techniques
- Demonstrate an ability to understand the results produced by common digital forensic tools and techniques
- Demonstrate an ability to understand the potential causes for a system to have come into the condition in which it was discovered to be in during a digital forensics investigation
Course Preview
https://campusedu.wistia.com/medias/59bsd3r5nuNS-100: Network Security (3hrs)
Course Description
A detailed examination of network security tools and techniques. The course will also include a detailed study of both encryption and steganography. Note: Online students need access to a Windows personal computer (Windows 7 or later) on which the student can install software for the duration of the semester.
Learning Outcomes
By the end of this course, you will be able to:
- Configure and utilize network security software
- Recognize and mitigate different network attack techniques
- Explain the use of cryptography in network security and differentiate it from steganography
- Explain common best practices in network security
- Explain the need for good organizational network security policies
Course Preview
https://campusedu.wistia.com/medias/plk826f6evSS-100: Systems Security (3hrs)
Course Description
A detailed study of the preventive configuration/hardening and the subsequent active defense of a computer system. Workstations, servers, virtual machines, mobile devices, IOT, SCADA systems, industrial control systems, and peripheral devices will be discussed.
Learning Outcomes
By the end of this course, you will be able to:
- Apply security principles and practices to maintain operations in the presence of risks and threats
- Understand the attack surfaces of both Windows and Linux systems
- Configure access controls and permissions to secure both Windows and Linux systems
- Use current best practices to harden both Windows and Linux systems
- Audit system logs for evidence of malicious activity against both Windows and Linux systems
Course Preview
https://campusedu.wistia.com/medias/lnjn926a4cStudent Nondiscrimination Policy
The North Carolina College of Theology admits students of any race, color, national or ethic origin with all rights, privileges, programs, and activities generally accorded or made available to students of NCCT. The North Carolina College of Theology does not discriminate on the basis of race, color, national or ethnic origin in administration of it's policies, loan programs, or other school administered programs.