Skip to Navigation
 
Skip to main content

SLCC Catalog

   
2017-2018 SLCC General Catalog
Salt Lake Community College
   
 
  Oct 19, 2017
 
2017-2018 SLCC General Catalog 
  
2017-2018 SLCC General Catalog

Ethical Hacking and Digital Forensic Investigation: CP (CTE)


Certificate of Proficiency | 16 credits

Computer Sciences and Information Systems Division
Taylorsville Redwood Campus,
BB 226
Program Website
Academic and Career Advising

Program Faculty
See www.slcc.edu/csis

Program Description
The focus of the Ethical Hacking and Digital Forensic Investigation CP is to provide students with the skills and knowledge to protect computers, networks, programs, and data from unintended or unauthorized access, change, or destruction.  This is a vital area of need within governments, the military, corporations, financial institutions and other businesses. 

Transfer/Articulation Information
The courses in this CP transfer as elective credit. CSIS 2350  and CSIS 2360  will help prepare students for industry certifications in those areas.

Career Opportunities
See www.slcc.edu/csis

Estimated Time to Completion
2 semesters

Program Learning Outcomes Related College-Wide Student Learning Outcomes
  1 - Acquire substantive knowledge
2 - Communicate effectively
3 - Develop quantitative literacies
4 - Think critically & creatively
5 - Become a community engaged learner
6 - Work in professional & constructive manner
7 - Develop computer & information literacy
Understand correct procedures for installing, maintaining, and preserving computer hardware, software, and data. 1, 7
Select appropriate security hardware, software, policies, and configurations based on an organization’s assessment of its security vulnerabilities. 1, 4, 7
Perform advanced installation, configuration, monitoring, troubleshooting, maintenance, and recovery. 1, 4, 7
Understand the legal and ethical aspects of information security and assurance. 1, 4
Study and practice hacking techniques and master hacking technologies.  Use advanced hacking tools and techniques to defeat security defenses. 1, 4, 7