Our program is divided into six-week sessions that meet in person every Friday. You’ll also have coursework in an online lab that you can access on any smartphone, tablet, or computer. Additional requirements depend on whether you want to earn an occupational certificate or an Associate of Science degree (30 credits of general education required).
Fall Term
Introduction to Computer Science OR Introduction to Computer Programming
Introduction to Information Systems Security
Spring Term
Hacker Techniques, Exploits, and Incident Handling
Computer Forensics Fundamentals
Summer Term
Internship with local companies to gain practical security experience
Fall Term
Secure Coding in Java and .Net
Applications in Information Security
Spring Term
Web Application PEN Testing
IT Security Strategic Planning, Policy, and Leadership
One of our final classes in Year 2, IT Security Strategic Planning, Policy, and Leadership, is a hands-on project that requires creative thinking and group collaboration. It’s an exciting opportunity to apply what you’ve learned in a real way.
In a recent class, students were divided into groups and asked to develop an Information Security Strategy with the following parameters:
The class presents its strategy and recommendations to a panel of CXOs in the final class of the program.
Fall Term
Introduction to Computer Science OR Introduction to Computer Programming
Introduction to Information Systems Security
Spring Term
Hacker Techniques, Exploits, and Incident Handling
Computer Forensics Fundamentals
Summer Term
Internship with local companies to gain practical security experience
Fall Term
Secure Coding in Java and .Net
Applications in Information Security
Spring Term
Web Application PEN Testing
IT Security Strategic Planning, Policy, and Leadership
One of our final classes in Year 2, IT Security Strategic Planning, Policy, and Leadership, is a hands-on project that requires creative thinking and group collaboration. It’s an exciting opportunity to apply what you’ve learned in a real way.
In a recent class, students were divided into groups and asked to develop an Information Security Strategy with the following parameters:
The class presents its strategy and recommendations to a panel of CXOs in the final class of the program.
Fall Term
Introduction to Computer Science OR Introduction to Computer Programming
System and Network Administration
Spring Term
Hacker Techniques, Exploits, and Incident Handling
Computer Forensics Fundamentals
Summer Term
Occupational Work Experience in Security Administration
Fall Term
Cloud Security Fundamentals
Intrusion Detection In-Depth; Compliance, Security, Forensics, and Troubleshooting
Spring Term
Hacker Guard: Security Baseline Training for IT Administrators and Operations
IT Security Strategic Planning, Policy, and Leadership
One of our final classes in Year 2, IT Security Strategic Planning, Policy, and Leadership, is a hands-on project that requires creative thinking and group collaboration. It’s an exciting opportunity to apply what you’ve learned in a real way.
In a recent class, students were divided into groups and asked to develop an Information Security Strategy with the following parameters:
The class presents its strategy and recommendations to a panel of CXOs in the final class of the program.
Fall Term
Introduction to Computer Science OR Introduction to Computer Programming
System and Network Administration
Spring Term
Hacker Techniques, Exploits, and Incident Handling
Computer Forensics Fundamentals
Summer Term
Occupational Work Experience in Security Administration
Fall Term
Cloud Security Fundamentals
Intrusion Detection In-Depth; Compliance, Security, Forensics, and Troubleshooting
Spring Term
Hacker Guard: Security Baseline Training for IT Administrators and Operations
IT Security Strategic Planning, Policy, and Leadership
One of our final classes in Year 2, IT Security Strategic Planning, Policy, and Leadership, is a hands-on project that requires creative thinking and group collaboration. It’s an exciting opportunity to apply what you’ve learned in a real way.
In a recent class, students were divided into groups and asked to develop an Information Security Strategy with the following parameters:
The class presents its strategy and recommendations to a panel of CXOs in the final class of the program.
The Merritt Security Program respects the privacy of every individual who visits our websites or responds to our interactive advertisements. This privacy statement outlines the information The Merritt Security Program will collect and how we will use that information. This statement will also instruct you on what to do if you do not want your personal information collected or shared when you visit The Merritt Security Program websites or respond to our advertisements.
The Merritt Security Program will not collect any personally-identifiable information about you (that is, your name, address, telephone number, or email address) unless you provide it to us voluntarily. If you do not want your personally-identifiable information collected, please do not submit it to us. If you have already submitted this information and would like for us to remove it from our records, please contact us at the Web site, listed at the bottom of this statement. We will use reasonable efforts to delete your information from our existing files. When you do provide us with personally-identifiable information, we may use that information to improve our program going forward.
In some cases, we may collect information about you that is not personally-identifiable. Examples of this type of information include the type of Internet browser you are using, the type of computer operating system you are using, and the domain name of the website from which you linked to our site or advertisement.
When you view one of our websites or advertisements, we may store some information on your computer. This information will be in the form of a "cookie" or similar file and will help us in many ways. For example, cookies allow us to tailor a website or advertisement to better match your interests and preferences. With most Internet browsers, you can erase cookies from your computer hard drive, block all cookies, or receive a warning before a cookie is stored. Please refer to your browser instructions or help screen to learn more about these functions.
Further questions? Contact us info@merittsecurity.com