|   | 
		
			 
				Nov 03, 2025			
		 | 
		  | 
		
	
 | 
						
						
								
		| 
  
		 | 
								
								
									
										
	
	
		
			
				
					
						
	2025-2026 Catalog																	 
	    Cyber Security/Information Assurance, Technical Certificate
																				 | 
															 
															
																
																	 
																 | 
															 
														 
		  Return to: Degrees by Type 
			
				LOCATIONS:
Bloomington - Columbus - Evansville - Fort Wayne - Greencastle - Hamilton County - Indianapolis - Kokomo - Marion - Richmond - Sellersburg - South Bend/Elkhart - Terre Haute - Valparaiso - Warsaw 
  
Available via Distance Education 
			 
																 | 
												 
												
													
		PROFESSIONAL - TECHNICAL CORE
 Choose 3 credits from the following:
 Choose 3 credits from the following:
 Choose 3 credits from the following:
 Choose 1 credit from the following:
 TOTAL CREDITS: 33
 Symbol Key  ^ Capstone Course  DEGREE OUTCOMES
  - Demonstrate proficiency in the use of scripting languages to write simple scripts including simple linear and looping scripts.
  - Write simple and compound conditions within a programming language or similar environment.
  - Identify the bad actors/entities in cyberspace, compare and contrast their resources, capabilities/techniques, motivations, and aversion to risk.
  - Simulate different types of attacks and their characteristics. 
  - List the first principles of security and describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies.
  - Illustrate basic security design fundamentals that help create systems that are worthy of being trusted.
  - Describe potential system attacks and the actors/entities that might perform them and choose the appropriate cyber defense tools, methods and components to demonstrate cyber defense methods to prepare a system to repel attacks and deploy appropriate measures in the event of a system breach.
  - Demonstrate the fundamental concepts of information assurance/cyber defense that can be used to provide system security.
  - Construct the architecture of a typical, complex system and identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed.
  - Describe strengths and weaknesses, modes, and issues that have to be addressed in an implementation and describe how cryptography can be used.
  - Use the hardware components of modern computing environments and their individual functions.
  - Describe and apply the fundamental and higher concepts, technologies, components and issues related to communications and data networks.
  - List the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data. 
  - Describe the responsibilities related to the handling of information about vulnerabilities and how the type of legal dispute including civil, criminal, and private affects the evidence used to resolve industry-wide issues.
  - Understand federal, state, and local cyber defense partners/structure. 
  - Communicate effectively in written and oral forms.
  - Demonstrate critical thinking.
  - Apply project management strategies to real-world industry applications.
  - Prepare for and attempt one or more industry certification exams.
  - Apply an understanding of various IT career opportunities.
    													 | 
												 
											 
	  Return to: Degrees by Type
 
  										 | 
									 
								 
							 |