Jun 16, 2025  
2025-2026 Catalog 
    
2025-2026 Catalog

Cyber Security/Information Assurance, Technical Certificate


Return to {$returnto_text} Return to: Cyber Security/Information Assurance

LOCATIONS:

Bloomington - Columbus - Evansville - Fort Wayne - Greencastle - Hamilton County - Indianapolis - Kokomo - Marion - Richmond - Sellersburg - South Bend/Elkhart - Terre Haute - Valparaiso - Warsaw

GENERAL EDUCATION CORE


REQUIREMENT TOTAL: 7


Choose 3 credits from the following:


Choose 3 credits from the following:


Choose 3 credits from the following:


REQUIREMENT TOTAL: 26


TOTAL CREDITS: 33


Symbol Key

^ Capstone Course 

DEGREE OUTCOMES


  • Demonstrate proficiency in the use of scripting languages to write simple scripts including simple linear and looping scripts.
  • Write simple and compound conditions within a programming language or similar environment.
  • Identify the bad actors/entities in cyberspace, compare and contrast their resources, capabilities/techniques, motivations, and aversion to risk.
  • Simulate different types of attacks and their characteristics. 
  • List the first principles of security and describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies.
  • Illustrate basic security design fundamentals that help create systems that are worthy of being trusted.
  • Describe potential system attacks and the actors/entities that might perform them and choose the appropriate cyber defense tools, methods and components to demonstrate cyber defense methods to prepare a system to repel attacks and deploy appropriate measures in the event of a system breach.
  • Demonstrate the fundamental concepts of information assurance/cyber defense that can be used to provide system security.
  • Construct the architecture of a typical, complex system and identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed.
  • Describe strengths and weaknesses, modes, and issues that have to be addressed in an implementation and describe how cryptography can be used.
  • Use the hardware components of modern computing environments and their individual functions.
  • Describe and apply the fundamental and higher concepts, technologies, components and issues related to communications and data networks.
  • List the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data. 
  • Describe the responsibilities related to the handling of information about vulnerabilities and how the type of legal dispute including civil, criminal, and private affects the evidence used to resolve industry-wide issues.
  • Understand federal, state, and local cyber defense partners/structure. 
  • Communicate effectively in written and oral forms.
  • Demonstrate critical thinking.
  • Apply project management strategies to real-world industry applications.
  • Prepare for and attempt one or more industry certification exams.
  • Apply an understanding of various IT career opportunities.

Return to {$returnto_text} Return to: Cyber Security/Information Assurance