Apr 24, 2024  
2022-2023 SLCC General Catalog 
    
2022-2023 SLCC General Catalog [**** ATTENTION: YOU ARE VIEWING AN ARCHIVED CATALOG ****]

Network and System Administration: CP (CTE)


Certificate of Proficiency | 16 credits minimum

Program Website
Academic and Career Advising

Program Description
The program provides students with an in-depth knowledge of network and system administration. This CP gives students a background in Linux, Microsoft, basic networking, and routing and switching. The student will analyze network traffic for security vulnerabilities, mitigate network outages due to security breaches, and design cyber-security solutions for business problems.

Career Opportunities
Employment in computer and information technology occupations is projected to grow 13 percent from 2020 to 2030, faster than the average for all occupations. These occupations are projected to add about 667,600 new jobs. Demand for these workers will stem from greater emphasis on cloud computing, the collection and storage of big data, and information security.

Transfer/Articulation Information
All courses in this CP transfer as elective credit. Some courses articulate to specific USHE programs.

Estimated Cost for Students
Tuition and student fees: http://www.slcc.edu/student/financial/tuition-fees.aspx  
Course fees: $45

Note: Fees vary based upon specific registration and are subject to changes.

Note: This Certificate of Proficiency is not eligible for financial aid. However, courses within the certificate may be eligible if taken as part of a financial aid eligible program such as an AS or AAS degree. Please check with the Financial Aid Office to determine course and program eligibility. 

Program Requirements


Time to Completion & Graduation Map


  •  
  • Time to completion is 2 semesters based on a full-time minimum of 15 credits per semester. Less than 15 credits per semester will increase time to completion.

Program Learning Outcomes


Program learning outcome alignment with  in brackets.

  • Analyze network traffic for security vulnerabilities. [1]
  • Mitigate network outages due to security breaches. [1]
  • Design cyber-security solutions for business problems. [1]
  • Identify and resolve network security issues. [2,4]
  • Recognize the ethical considerations of utilizing technology in business. [5]