|
Jun 16, 2025
|
|
|
|
2025-2026 Catalog
Security Operations Center Specialist, Certificate
|
|
Return to: Cyber Security/Information Assurance
LOCATIONS:
Bloomington - Evansville - Fort Wayne - Indianapolis - Kokomo - Marion - Richmond - Sellersburg - South Bend/Elkhart - Terre Haute - Valparaiso - Warsaw
Leads to certifications in the Cyber Security/Information Assurance field including CompTIA: A+
|
PROFESSIONAL - TECHNICAL CORE
DEGREE OUTCOMES
- Demonstrate proficiency in the use of scripting languages to write simple scripts including simple linear and looping scripts.
- Write simple and compound conditions within a programming language or similar environment.
- Identify the bad actors/entities in cyberspace, compare and contrast their resources, capabilities/techniques, motivations, and aversion to risk.
- Simulate different types of attacks and their characteristics.
- List the first principles of security and describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies.
- Illustrate basic security design fundamentals that help create systems that are worthy of being trusted.
- Describe potential system attacks and the actors/entities that might perform them and choose the appropriate cyber defense tools, methods and components to demonstrate cyber defense methods to prepare a system to repel attacks and deploy appropriate measures in the event of a system breach.
- Demonstrate the fundamental concepts of information assurance/cyber defense that can be used to provide system security.
- Construct the architecture of a typical, complex system and identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed.
- Describe strengths and weaknesses, modes, and issues that have to be addressed in an implementation and describe how cryptography can be used.
- Use the hardware components of modern computing environments and their individual functions.
- Describe and apply the fundamental and higher concepts, technologies, components and issues related to communications and data networks.
- List the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data.
- Describe the responsibilities related to the handling of information about vulnerabilities and how the type of legal dispute including civil, criminal, and private affects the evidence used to resolve industry-wide issues.
- Understand the detailed methodological approach to computer forensics and evidence analysis.
- Understand federal, state, and local cyber defense partners/structure.
|
Return to: Cyber Security/Information Assurance
|
|