What You'll
Learn in Our
2-Year
Program

Our program is divided into six-week sessions that meet in person every Friday. You’ll also have coursework in an online lab that you can access on any smartphone, tablet, or computer. Additional requirements depend on whether you want to earn an occupational certificate or an Associate of Science degree (30 credits of general education required).

What You'll
Learn in Our
2-Year
Program

Our program is divided into six-week sessions that meet in person every Friday. You’ll also have coursework in an online lab that you can access on any smartphone, tablet, or computer. Additional requirements depend on whether you want to earn an occupational certificate or an Associate of Science degree (30 credits of general education required).

Application Security Courses

Year One

Fall Term

Introduction to Computer Science OR Introduction to Computer Programming

Introduction to Information Systems Security

Spring Term

Hacker Techniques, Exploits, and Incident Handling

Computer Forensics Fundamentals

Summer Term

Internship with local companies to gain practical security experience

Year Two

Fall Term

Secure Coding in Java and .Net

Applications in Information Security

Spring Term

Web Application PEN Testing

IT Security Strategic Planning, Policy, and Leadership

One of our final classes in Year 2, IT Security Strategic Planning, Policy, and Leadership, is a hands-on project that requires creative thinking and group collaboration. It’s an exciting opportunity to apply what you’ve learned in a real way.

In a recent class, students were divided into groups and asked to develop an Information Security Strategy with the following parameters:

  • Choose a company that had a major security issue over the past 5 years
  • Using publicly available information, assess their current information security strategy, identify gaps, and develop future strategy
  • Include best practices such as Defense in Depth, Least Privilege, etc.
  • Develop an estimated budget for implementing the strategy and address tradeoffs
  • Create a plan for rolling out the security strategy within the organization
  • Address regulatory issues based upon company industry(e.g., financial services)

The class presents its strategy and recommendations to a panel of CXOs in the final class of the program.

  • Year One

    Fall Term

    Introduction to Computer Science OR Introduction to Computer Programming

    Introduction to Information Systems Security

    Spring Term

    Hacker Techniques, Exploits, and Incident Handling

    Computer Forensics Fundamentals

    Summer Term

    Internship with local companies to gain practical security experience

  • Year Two

    Fall Term

    Secure Coding in Java and .Net

    Applications in Information Security

    Spring Term

    Web Application PEN Testing

    IT Security Strategic Planning, Policy, and Leadership

    One of our final classes in Year 2, IT Security Strategic Planning, Policy, and Leadership, is a hands-on project that requires creative thinking and group collaboration. It’s an exciting opportunity to apply what you’ve learned in a real way.

    In a recent class, students were divided into groups and asked to develop an Information Security Strategy with the following parameters:

    • Choose a company that had a major security issue over the past 5 years
    • Using publicly available information, assess their current information security strategy, identify gaps, and develop future strategy
    • Include best practices such as Defense in Depth, Least Privilege, etc.
    • Develop an estimated budget for implementing the strategy and address tradeoffs
    • Create a plan for rolling out the security strategy within the organization
    • Address regulatory issues based upon company industry(e.g., financial services)

    The class presents its strategy and recommendations to a panel of CXOs in the final class of the program.

Infrastructure Security Courses

Year One

Fall Term

Introduction to Computer Science OR Introduction to Computer Programming

System and Network Administration

Spring Term

Hacker Techniques, Exploits, and Incident Handling

Computer Forensics Fundamentals

Summer Term

Occupational Work Experience in Security Administration

Year Two

Fall Term

Cloud Security Fundamentals

Intrusion Detection In-Depth; Compliance, Security, Forensics, and Troubleshooting

Spring Term

Hacker Guard: Security Baseline Training for IT Administrators and Operations

IT Security Strategic Planning, Policy, and Leadership

One of our final classes in Year 2, IT Security Strategic Planning, Policy, and Leadership, is a hands-on project that requires creative thinking and group collaboration. It’s an exciting opportunity to apply what you’ve learned in a real way.

In a recent class, students were divided into groups and asked to develop an Information Security Strategy with the following parameters:

  • Choose a company that had a major security issue over the past 5 years
  • Using publicly available information, assess their current information security strategy, identify gaps, and develop future strategy
  • Include best practices such as Defense in Depth, Least Privilege, etc.
  • Develop an estimated budget for implementing the strategy and address tradeoffs
  • Create a plan for rolling out the security strategy within the organization
  • Address regulatory issues based upon company industry(e.g., financial services)

The class presents its strategy and recommendations to a panel of CXOs in the final class of the program.

  • Year One

    Fall Term

    Introduction to Computer Science OR Introduction to Computer Programming

    System and Network Administration

    Spring Term

    Hacker Techniques, Exploits, and Incident Handling

    Computer Forensics Fundamentals

    Summer Term

    Occupational Work Experience in Security Administration

  • Year Two

    Fall Term

    Cloud Security Fundamentals

    Intrusion Detection In-Depth; Compliance, Security, Forensics, and Troubleshooting

    Spring Term

    Hacker Guard: Security Baseline Training for IT Administrators and Operations

    IT Security Strategic Planning, Policy, and Leadership

    One of our final classes in Year 2, IT Security Strategic Planning, Policy, and Leadership, is a hands-on project that requires creative thinking and group collaboration. It’s an exciting opportunity to apply what you’ve learned in a real way.

    In a recent class, students were divided into groups and asked to develop an Information Security Strategy with the following parameters:

    • Choose a company that had a major security issue over the past 5 years
    • Using publicly available information, assess their current information security strategy, identify gaps, and develop future strategy
    • Include best practices such as Defense in Depth, Least Privilege, etc.
    • Develop an estimated budget for implementing the strategy and address tradeoffs
    • Create a plan for rolling out the security strategy within the organization
    • Address regulatory issues based upon company industry(e.g., financial services)

    The class presents its strategy and recommendations to a panel of CXOs in the final class of the program.