Jun 16, 2025  
2025-2026 Catalog 
    
2025-2026 Catalog

Security Operations Center Specialist, Certificate


Return to {$returnto_text} Return to: School of Information Technology

LOCATIONS:

Bloomington - Evansville - Fort Wayne - Indianapolis - Kokomo - Marion - Richmond - Sellersburg - South Bend/Elkhart - Terre Haute - Valparaiso - Warsaw

Leads to certifications in the Cyber Security/Information Assurance field including CompTIA: A+

Choose 3 Credit Hours


REQUIREMENT TOTAL: 22


TOTAL CREDITS: 22


DEGREE OUTCOMES


  • Demonstrate proficiency in the use of scripting languages to write simple scripts including simple linear and looping scripts.
  • Write simple and compound conditions within a programming language or similar environment.
  • Identify the bad actors/entities in cyberspace, compare and contrast their resources, capabilities/techniques, motivations, and aversion to risk.
  • Simulate different types of attacks and their characteristics. 
  • List the first principles of security and describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies.
  • Illustrate basic security design fundamentals that help create systems that are worthy of being trusted.
  • Describe potential system attacks and the actors/entities that might perform them and choose the appropriate cyber defense tools, methods and components to demonstrate cyber defense methods to prepare a system to repel attacks and deploy appropriate measures in the event of a system breach.
  • Demonstrate the fundamental concepts of information assurance/cyber defense that can be used to provide system security.
  • Construct the architecture of a typical, complex system and identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed.
  • Describe strengths and weaknesses, modes, and issues that have to be addressed in an implementation and describe how cryptography can be used.
  • Use the hardware components of modern computing environments and their individual functions.
  • Describe and apply the fundamental and higher concepts, technologies, components and issues related to communications and data networks.
  • List the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data. 
  • Describe the responsibilities related to the handling of information about vulnerabilities and how the type of legal dispute including civil, criminal, and private affects the evidence used to resolve industry-wide issues.
  • Understand the detailed methodological approach to computer forensics and evidence analysis. 
  • Understand federal, state, and local cyber defense partners/structure. 

Return to {$returnto_text} Return to: School of Information Technology