Applied Cyber SecurityComputer & Business
Click on tabs to read information about this program.
► Security Vulnerabilities
► Attack Mechanisms and Techniques
► Intrusion Detection and Prevention
► Cryptographic Systems
► System Hardening
► Risk Identification
► Incidence Response
► Penetration Testing Key Management
► Access Control and Recovery
► Specialized courses focus on Database Security, Planning and Analysis, Software and Web Security.
► Information Security Analyst
► Network Security Administrator
► Security Specialist
► Security Consultant
► 750 Hours
|Course #||OCP||Course Name||Hours|
|CTS0019||B||Information Security Manager OR||150|
|CTS0021||B||Data Security Specialist OR||150|
|CTS0060||B||Software Security Specialist OR||150|
|CTS0085||B||Web Security Specialist OR||150|
|CTS0089||B||Information Security Administrator||150|
► Math 10 Reading 9 Language 9
► Fall, Spring, and Summer
Monday through Thursday
7:30 a.m. – 3:30 p.m.
Microsoft Tech Associate
An industry-recognized certification for those pursuing a career path in IT infrastructure, database design, or software development using Microsoft technologies.
CompTA Security+ certification designates knowledgable proffessionals int the field of security, one of the fastest-growing fields in IT.
Frequently Asked Questions: