Apr 25, 2024  
2022-2023 SLCC General Catalog 
    
2022-2023 SLCC General Catalog [**** ATTENTION: YOU ARE VIEWING AN ARCHIVED CATALOG ****]

Ethical Hacking and Digital Forensic Investigation: CP (CTE)


Certificate of Proficiency | 16 credits

Program Website
Academic and Career Advising

Program Description
The focus of the Ethical Hacking and Digital Forensic Investigation CP is to provide students with the skills and knowledge to protect computers, networks, programs, and data from unintended or unauthorized access, change, or destruction.  This is a vital area of need within governments, the military, corporations, financial institutions and other businesses. 

Career Opportunities
See www.slcc.edu/csis  

Employment in computer and information technology occupations is projected to grow 13 percent from 2020 to 2030, faster than the average for all occupations. These occupations are projected to add about 667,600 new jobs. Demand for these workers will stem from greater emphasis on cloud computing, the collection and storage of big data, and information security.

Transfer/Articulation Information
All courses transfer as elective credit. See articulation agreements for specific USHE institutions and programs. CSIS 2350  and CSIS 2360  will help prepare students for industry certifications in those areas.

Estimated Cost for Students
Tuition and student fees: http://www.slcc.edu/student/financial/tuition-fees.aspx 
Course fees: $15

Note: Fees vary based upon specific registration and are subject to changes.

Note: This Certificate of Proficiency is not eligible for financial aid. However, courses within the certificate may be eligible if taken as part of a financial aid eligible program such as an AS or AAS degree. Please check with the Financial Aid Office to determine course and program eligibility.

Program Requirements


Time to Completion & Graduation Map


Program Learning Outcomes


Program learning outcome alignment with Student Learning Outcomes  in brackets.

  • Understand correct procedures for installing, maintaining, and preserving computer hardware, software, and data. [1,9]
  • Select appropriate security hardware, software, policies, and configurations based on an organization’s assessment of its security vulnerabilities. [1,4,9]
  • Perform advanced installation, configuration, monitoring, troubleshooting, maintenance, and recovery. [1,4,9]
  • Understand the legal and ethical aspects of information security and assurance. [1,4]
  • Study and practice hacking techniques and master hacking technologies. Use advanced hacking tools and techniques to defeat security defenses. [1,4,9]