The Computer Information Systems – Cybersecurity program is a sequence of courses designed to provide students with an understanding of the concepts, principles, and techniques required incomputer information processing. Graduates are to be competent in the general areas of humanities or fine arts, social or behavioral sciences, and natural sciences or mathematics, as well as in the technical areas of computer terminology and concepts, program design and development, and computer networking. Program graduates are qualified for employment as Cybersecurity Specialists.
Minimum Program Length: 5 Semesters
Estimated Program Cost: $11,029
Entrance RequirementsAdmissions Requirements
- Must be 16 years of age.
- Completion of high school or GED and submission of official transcript required to apply.
- Achievement of minimum program admission scores in Reading, English, and Math.
- Transfer of previous post secondary credits will be determined by the registrar.
At a GlanceContact: Dr. Peter Ejindu, Program Coordinator
This student success course is designed to transition, connect, and acclimate new students to Atlanta Technical College. The course creates an awareness of various campus resources and holistic skill sets necessary to achieve educational and career success. Through the nurturing of academic, personal, social, occupational, and technological talents, students develop the academic and professional skills necessary to be successful in college and the global community.
This course provides a broad overview of information security. It covers terminology, history, security systems development and implementation. Student will also cover the legal, ethical, and professional issues in information security.
This course provides knowledge and experience to develop and maintain security policies and procedures. Students will explore the legal and ethical issues in information security and the various security layers: physical security, personnel security, operating systems, network, software, communication and database security. Students will develop an Information Security Policy and an Acceptable Use Policy.
This course will provide knowledge and the practical experience necessary to configure the most common server platforms. Lab exercises will provide students with experience of establishing operating systems security for the network environment.
This course provides knowledge and the practical experience necessary to evaluate, implement and manage secure information transferred over computer networks. Topics include network security, intrusion detection, types of attacks, methods of attacks, security devices, basics of cryptography and organizational security elements.
Students will learn how to plan, design, install and configure firewalls that will allow key services while maintaining security. This will include protecting the Internal IP services, configuring a firewall for remote access and managing a firewall and detecting and preventing network intrusions.
This course examines the use of computers in the commission of crimes, collection, analysis and production of digital evidence. Students will use computer resources to explore basic computer forensic investigation techniques.
This course teaches students the skills needed to obtain entry-level security specialist jobs. It provides a hands-on introduction to ethical hacking, and penetration testing. It is for individuals who want to enhance their information security skill set and help meet the growing demand for security professionals. Topics include network and computer attacks, footprinting and social engineering, port scanning, enumeration, OS vulnerabilities, hacking web servers, hacking wireless networks, cryptography and network protection systems.
This course provides students with classroom and laboratory experience in current and emerging network technology. Topics include basic network concepts, basic network device configuration, network protocols and models, network access, Ethernet and access control, end to end communications, IPv4 and IPv6 addressing and subnetting, fundamental application services, security, and network performance.