LAUNCH A NEW CAREER WITH HIGH-DEMAND TECH SECURITY SKILLS
Did you know that a global shortage of two million cybersecurity professionals is predicted by 2019?1 You can be part of the solution to this ever-increasing need for cybersecurity professionals. Be the one with the tech security know-how employers are scrambling to find.
Our Bachelor’s degree program in Cybersecurity and Networking can give you the expertise, skills, and foundation you need to launch a successful, high-tech career in a variety of settings. And while computer science graduates earn some of the highest starting salaries out there,2 cybersecurity jobs can command a premium over other well-paying IT jobs!1
- Computer crime investigator
- Information systems security officer
- Computer forensic investigator
- Information security officer
- Systems analyst
- NSA and government agencies
- Network administrator
Stevens-Henager College - West Haven (Ogden) is conveniently located in Ogden, Utah. You will enjoy easy parking, friendly local faculty and staff, and modern, comfortable buildings with smaller, personalized classes.
This program is offered at the following location:
WHAT YOU WILL LEARN
Some of the knowledge and skills5 you could learn from this program include:
- Ethical hacking
- Computer forensics
- Computer servicing
- Security concepts
- Network communications
- Operating systems
- Information security management
Cybersecurity and Networking
Advanced Server Administration
This course provides concepts of the installation, configuration, administration of servers, users and groups, and provisioning services and infrastructure to be successful in an enterprise environment. Advanced concepts include server deployment, the maintenance and upgrading network load balancing (NLB), server clusters, disaster recovery, failover, redundancy, and fault tolerance.
Prerequisites: MCS200 or with the consent of the Dean.
Business Computer Fundamentals
This course explores the introductory use of word processing, spreadsheet, and presentation applications. Students will learn computer skills, including document and spreadsheet creation and presentation techniques. Emphasis is on utilization of basic application skills to complete general business tasks.
Students will prepare a formal project proposal and prepare the build foundation and framework in one of the following areas: database programming, web page programming, networking, information security, ethical hacking, or technology-based solutions. Once the proposal is approved, the student will submit an original paper of research and analysis utilizing appropriate APA format. Students will also deliver project build files to support the completion of the project. (Students may select an experiential learning opportunity with Dean approval of both a location and project.)
Cloud and Mobile Computing Concepts
This course introduces students to topics in key concepts and background necessary to provide context on the importance of cloud computing and transforming an organization into an agile, flexible, and operationally efficient business. Students will also be introduced to technologies and software suites the delve into cloud administration and operations by deploying virtual machines and application containers, managing role-based access control, services catalogs, and reporting and chargeback systems.
Students will learn the principles and techniques of computer forensics. Emphasis will be on the investigative process, conducting forensics on multiple computer hardware and software platforms, and creating an attacker profiling scenario. Students will become familiar with the tools used in conducting computer forensics, discuss how to defeat anti-forensics techniques, and demonstrate how to compile and document investigative reports. Students will learn how to conduct forensics analysis on databases, cloud data and information and web attacks.
Students will identify and analyze statutory, regulatory, constitutional, and organizational laws that affect the information technology professional. This course will explore the complex legal issues as they relate to technological advancements. Topics will include the introduction to many of the current laws and acts affecting technologies today including: the Computer Fraud and Abuse Act, the Wiretap Act, the Stored Communications Act and the Cybersecurity Act, and various additional new laws that are enacted.
Cryptographic and Cipher Technologies
Students will be introduced to the many cryptographic and cipher technologies used to protect information a virtual environment. This course will focus on public key cryptography and the RSA algorithm. Students will learn about stream and block cipher algorithms, as well as the advanced encryption standard for symmetric and asymmetric-key encryption. Concepts will include specific security requirements, such as authentication, privacy, confidentiality, integrity and hash functions.
Students are introduced to hacking methodologies and stages, such as foot printing, scanning, and enumeration. This course will focus on the tools and techniques used by the attacker to achieve their goal of gaining and maintaining access to a system. Students will learn about the different techniques used to access a system, privilege escalation, creating and maintaining remote access to a system, different types of rootkits, and how hackers hide the evidence of a system compromise. Students will also learn how to perform and document system hacking penetration testing.
Information Security Management
In this course students are introduced to the different elements of information security, from the safeguard of information and information systems that use, store, and transmit information to the unauthorized access, disclosure, alteration and destruction of information. Upon completion of this course students will be able to: describe and understand current security trends, elements of information security, information security threats, hacking concepts and penetration testing processes.
Students will be introduced to common storage networking architecture used by enterprises for business-critical applications. Students will learn methodologies and tools for security, data protections, and disaster recovery. Students will learn to design network storage to remove single points of failure and become highly available and resilient to failures.
Intermediate Networking Concepts
This course introduces internet connectivity, including networking concepts, remote access, and wireless standards. Students will learn the concepts of network policies and procedures, troubleshooting, network vulnerabilities and threats, firewalls, and basic security in small networks and learn to monitor and manage network operations.
Prerequisites: NET100 or with the consent of the Dean.
Intermediate Security Concepts
This course delves into more advanced security measures and functions including those surrounding networks, malware, password attacks, O/S and application hardening, servers, backups, data defenses, vulnerability assessments, penetration testing, logging and audits.
Prerequisites: NET105, or with the consent of the Dean
Introduction to Hardware and Firmware
This course introduces the student to hardware components of a computer system, firmware used in the systems, and mobile devices. Networking cables, connectors and devices are reviewed to properly configure and interconnect computer systems in addition to their peripherals. Safety concepts and procedures are covered, including electrostatic discharge (ESD) and electrical shock hazards. In this course, a student will disassemble a computer then properly identify and be able to correctly troubleshoot all hardware components. The student will then properly assemble the computer and verify proper operation.
Introduction to Networking Concepts
This course provides an introduction to the concepts of networking, networking types and topologies, and devices used for common network services. Students learn vocabulary and network terminology, protocols, and the concept of creating a network.
Introduction to Operating System Installation and Configuration
This course focuses on Windows Operating System installation and proper configuration for use on a network. Students will identify common features and functionality of the Mac and Linux Operating Systems. Students will learn the threats and vulnerabilities to resolve them with common prevention methods. This course focuses on install configure and be able to properly troubleshoot an operating system. Additionally, students will learn appropriate safety procedures, environmental controls of disposal methods, explain privacy, licensing and policy concepts.
Prerequisites: MCS100 or with the consent of the Dean.
Introduction to Operating Systems
This course covers topics including installing and upgrading Windows as well as configuring hardware, applications, and network connectivity. Upon completion, students will be able to perform configuration and support for computers, devices, users, and associated network and security resources, as well as configure and manage advanced network services in a hands-on environment.
Introduction to Security Concepts
This course introduces foundational concepts in IT Security including access control, cryptography/encryption, security policies, hardware and perimeter defenses, including firewalls.
Introduction to Server Administration
In this course, students will learn to install, configure, and administrate servers in a host and compute environments, work with storage solutions, and virtualization Concepts include advanced networking, controlling a work environment or user accounts, PowerShell, and the use of groups of servers that share workloads to prevent single points of failure.
Prerequisites: NET100 or with consent of the Dean
Linux Operating Systems
This course covers the concepts of the Linux operating system. Topics include X Window system, clients, networking, shell and scripting. Students will be able to install, configure, and administer the Linux operating system. Emphasis will be placed on the hardware, management, configuration, security and documentation of the operating system. Upon completion, students will be proficient with all topic areas of a Linux environment.
Prerequisites: OPS105 or with the consent of the Dean.
Network Communications: Architecture, Structure, and Functions
This course covers networking architecture, structure, and functions. The course introduces the principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations to provide a foundation for the curriculum. By the end of the course, students will be able to explain network technologies, how devices access local and remote network resources, describe router hardware, how switching operates in a small to medium-sized business network, design an IP addressing scheme, configure initial settings on a network device, implement basic network connectivity between devices and configure monitoring tools for small to medium-sized business networks.
Prerequisites: NET105 or with consent of the Dean.
Network Communications: Large Networks
This course covers the architecture, components, and operations of routers and switches in larger and more complex networks. Students learn how to configure routers and switches for advanced functionality. By the end of this course, students will be able to configure and troubleshoot routers and switches, resolve common issues with OSPF, EIGRP, and STP in both IPv4 and IPv6 networks, implement a WLAN in a small-to-medium network.
Prerequisites: NET 305 or with consent of the Dean
Network Communications: Network Services
This course discusses the network services required by converged applications in a complex network. By the end of this course, students will be able to configure and troubleshoot network devices, resolve common issues with data link protocols, resolve common issues with OSPF, EIGRP, and STP in both IPv4 and IPv6 networks, implement virtual private network (VPN) operations in a complex network.
Network Communications: Small Networks
This course covers the architecture, components, and operations of routers and switches in a small network. Students learn how to configure a router and a switch for basic functionality. By the end of the course, students will be able to determine how a router will forward traffic, explain how switching operates in a small to medium-sized business network, configure Ethernet switch ports, implement VLANs, implement static routing, implement DHCP on a router, implement network address translation (NAT), implement access control lists (ACLs) to filter traffic.
Prerequisites: NET 300 or with consent of the Dean.
Network Communications: WAN Technologies
This course discusses the WAN technologies required by converged applications in a complex network. The course enables students to understand the selection criteria of network devices and WAN technologies to meet network requirements.
Prerequisites: NET400 or with consent of the Dean
In this course, students apply the techniques and strategies learned within the Psychology of Motivation for more in-depth exploration of relevant employment resources, for the development of documents to submit in job application processes, including resumes, cover letters, reference letters, follow up correspondence, and other written communications. Through the course, students will enhance individual verbal communication and interview skills. Students will also learn how to prioritize job search activities, and to appropriately manage and organize relevant documents and records. Upon completion of this course, students will have completed a portfolio of resources and documents to support their current and future job searches and be more informed about the strategies and processes that can more effectively support such efforts.
Psychology of Motivation
This course introduces students to the skills, characteristics, and habits that will help them be successful in a college environment and future careers. Such a desire for goal-oriented behavior is commonly referred to as motivation, and such motivation can propel students toward accomplishing their academic and vocational goals. Couse topics include time management, problem solving, goal setting, career planning and preparation, and a range of additional student success strategies. Upon course completion, students will be more informed and better prepared to progress in their programs and in their efforts to advance their desired career goals (i.e., students will be more academically prepared in knowledge and practical training within an occupational area and also enhance their abilities to support their job searches and submitting application documents such as documents created using standard writing guideline formats).
Technical Project Management
This course develops a foundation of concepts and solutions that supports the successful completion of a project. Common project management methodologies are introduced including; Agile, Scrum, Lean, Waterfall, PMP, ITIL, Six Sigma and PMI/PMBOK. Emphasis will be placed on project management techniques such as internal and external communication, monitoring, budgeting, scheduling, completion, and project management information systems.
Threat and Defense Mechanisms
In this course students will be provided with comprehensive information on computer and internet session hijacking. Students will be presented with session hijacking concepts at the application and network-levels. They will also learn about the tools and countermeasures used to prevent hijacking and threats, as well as penetration testing steps an ethical hacker should follow while performing a systems security assessment.
Advanced Interpersonal Communication
This course is designed to provide students with the skills they need to be effective communicators. Students will apply interpersonal communication skills theory to various situations in order to understand the clear connections between theory, skills, and life situations they will encounter.
This course covers American history from colonization to the present. Emphasis is on the relevance of cultural, economic, political, and social developments in the United States.
This course covers introductory algebraic expressions, formulas, and solving equations. Students learn graphing, numerical sets, exponents, radicals, and inequalities.
Communication and Public Speaking
This course focuses on the principles of effective public speaking and presentation. Focus is on the preparation, presentation, and critique of various forms of oral communication. Emphasis is placed on development, delivery, presentation aids, and persuasive speaking.
This course is designed as an interdisciplinary approach to critical thinking in a modern world. This course will challenge students to learn how to reflect, identify previous assumptions, and be able to analyze and apply common problem-solving techniques associated with the task of thinking critically and challenging the everyday norms.
English Writing Fundamentals
This course focuses on the principles of effective English composition with a comprehensive review and reinforcement of language arts skills. Emphasis is placed on the four essentials of writing: unity, support, coherence, and sentence skills. Practice in proofreading, editing, revision, and clear thinking is incorporated throughout the course.
This course covers basic microeconomic concepts. Topics include recession and depression, the circular flow of production and consumption, the role of the market in the economy, wage and price movements, the functions of markets in capitalism, and government interference in free markets. Emphasis is placed on students acquiring the critical thinking skills of economics.
Research Application Methods
This course explores real world applications in statistics. Topics covered will be analyzing and creating graphs, survey techniques, preparing surveys and analysis of data. Emphasis will be placed on understanding the use of graphs, surveys and the importance of statistical analysis in a business setting.
This course focuses on the practical skills needed in statistics analysis. Topics include distributions, relationships, randomness, inference, proportions, regression, and variance. Emphasis is placed on understanding the use of statistical methods and the demands of statistical practice.
Prerequisites: MAT 225 or with the consent of the Dean.
To access the Cybersecurity and Networking Program Overview click here
Why Choose Stevens-Henager College - West Haven (Ogden)?
Stevens-Henager College - West Haven (Ogden)'s offers the employment-focused education you need to launch a better career - sooner. All of our programs are designed to get you trained and prepared to work in the field of your study - some programs can be completed in as few as 36 months! In addition, our flexible courses allow you to arrange your classes according to your schedule. Go to school during the day or in the evening.
At Stevens-Henager College - West Haven (Ogden), our programs are designed for employment in some of today's most rewarding job fields, without elective courses that you don't need or want. Your program will help prepare you for your career in Utah and beyond.
- Employment focused
- Path to a better career