What You'll
Learn in Our
2-Year
Program

Our program is divided into six-week sessions that meet in person every Friday. You’ll also have coursework in an online lab that you can access on any smartphone, tablet, or computer. Additional requirements depend on whether you want to earn an occupational certificate or an Associate of Science degree (30 credits of general education required).

Application Security Courses

Year One

Fall Term

Introduction to Computer Science OR Introduction to Computer Programming

Introduction to Information Systems Security

Spring Term

Hacker Techniques, Exploits, and Incident Handling

Computer Forensics Fundamentals

Summer Term

Internship with local companies to gain practical security experience

Year Two

Fall Term

Secure Coding in Java and .Net

Applications in Information Security

Spring Term

Web Application PEN Testing

IT Security Strategic Planning, Policy, and Leadership

One of our final classes in Year 2, IT Security Strategic Planning, Policy, and Leadership, is a hands-on project that requires creative thinking and group collaboration. It’s an exciting opportunity to apply what you’ve learned in a real way.

In a recent class, students were divided into groups and asked to develop an Information Security Strategy with the following parameters:

  • Choose a company that had a major security issue over the past 5 years
  • Using publicly available information, assess their current information security strategy, identify gaps, and develop future strategy
  • Include best practices such as Defense in Depth, Least Privilege, etc.
  • Develop an estimated budget for implementing the strategy and address tradeoffs
  • Create a plan for rolling out the security strategy within the organization
  • Address regulatory issues based upon company industry(e.g., financial services)

The class presents its strategy and recommendations to a panel of CXOs in the final class of the program.

  • Year One

    Fall Term

    Introduction to Computer Science OR Introduction to Computer Programming

    Introduction to Information Systems Security

    Spring Term

    Hacker Techniques, Exploits, and Incident Handling

    Computer Forensics Fundamentals

    Summer Term

    Internship with local companies to gain practical security experience

  • Year Two

    Fall Term

    Secure Coding in Java and .Net

    Applications in Information Security

    Spring Term

    Web Application PEN Testing

    IT Security Strategic Planning, Policy, and Leadership

    One of our final classes in Year 2, IT Security Strategic Planning, Policy, and Leadership, is a hands-on project that requires creative thinking and group collaboration. It’s an exciting opportunity to apply what you’ve learned in a real way.

    In a recent class, students were divided into groups and asked to develop an Information Security Strategy with the following parameters:

    • Choose a company that had a major security issue over the past 5 years
    • Using publicly available information, assess their current information security strategy, identify gaps, and develop future strategy
    • Include best practices such as Defense in Depth, Least Privilege, etc.
    • Develop an estimated budget for implementing the strategy and address tradeoffs
    • Create a plan for rolling out the security strategy within the organization
    • Address regulatory issues based upon company industry(e.g., financial services)

    The class presents its strategy and recommendations to a panel of CXOs in the final class of the program.

Infrastructure Security Courses

Year One

Fall Term

Introduction to Computer Science OR Introduction to Computer Programming

System and Network Administration

Spring Term

Hacker Techniques, Exploits, and Incident Handling

Computer Forensics Fundamentals

Summer Term

Occupational Work Experience in Security Administration

Year Two

Fall Term

Cloud Security Fundamentals

Intrusion Detection In-Depth; Compliance, Security, Forensics, and Troubleshooting

Spring Term

Hacker Guard: Security Baseline Training for IT Administrators and Operations

IT Security Strategic Planning, Policy, and Leadership

One of our final classes in Year 2, IT Security Strategic Planning, Policy, and Leadership, is a hands-on project that requires creative thinking and group collaboration. It’s an exciting opportunity to apply what you’ve learned in a real way.

In a recent class, students were divided into groups and asked to develop an Information Security Strategy with the following parameters:

  • Choose a company that had a major security issue over the past 5 years
  • Using publicly available information, assess their current information security strategy, identify gaps, and develop future strategy
  • Include best practices such as Defense in Depth, Least Privilege, etc.
  • Develop an estimated budget for implementing the strategy and address tradeoffs
  • Create a plan for rolling out the security strategy within the organization
  • Address regulatory issues based upon company industry(e.g., financial services)

The class presents its strategy and recommendations to a panel of CXOs in the final class of the program.

  • Year One

    Fall Term

    Introduction to Computer Science OR Introduction to Computer Programming

    System and Network Administration

    Spring Term

    Hacker Techniques, Exploits, and Incident Handling

    Computer Forensics Fundamentals

    Summer Term

    Occupational Work Experience in Security Administration

  • Year Two

    Fall Term

    Cloud Security Fundamentals

    Intrusion Detection In-Depth; Compliance, Security, Forensics, and Troubleshooting

    Spring Term

    Hacker Guard: Security Baseline Training for IT Administrators and Operations

    IT Security Strategic Planning, Policy, and Leadership

    One of our final classes in Year 2, IT Security Strategic Planning, Policy, and Leadership, is a hands-on project that requires creative thinking and group collaboration. It’s an exciting opportunity to apply what you’ve learned in a real way.

    In a recent class, students were divided into groups and asked to develop an Information Security Strategy with the following parameters:

    • Choose a company that had a major security issue over the past 5 years
    • Using publicly available information, assess their current information security strategy, identify gaps, and develop future strategy
    • Include best practices such as Defense in Depth, Least Privilege, etc.
    • Develop an estimated budget for implementing the strategy and address tradeoffs
    • Create a plan for rolling out the security strategy within the organization
    • Address regulatory issues based upon company industry(e.g., financial services)

    The class presents its strategy and recommendations to a panel of CXOs in the final class of the program.

Attendance Policy

Showing up matters! Attending class—both on campus (in person) and online (virtual) — helps you stay connected, engaged, and on track for success.

We know life can get busy, and being present for every session gives you the best chance to learn, collaborate, and grow with your classmates.

On-Campus Sessions: Please plan to attend the full class in person so you can take part in discussions and activities.

Online Sessions: Join all live, synchronous online meetings and participate actively. Simply logging in without engaging doesn’t count as attendance.

If you ever have a conflict or need to miss a class, just reach out to your instructor as soon as possible—we’re here to help!