Drexel Logo
Search
Computer & Security Technology
Saturday Scholars Online Off-site Location

Certificate in Computing and Security Technology

The following information applies to students enrolled in the Computing & Security Technology program for the 2013-2014 academic year. As of Fall Quarter 2014, the Computing & Security Technology Program—and its faculty, professional staff and students—will become a part of Drexel’s new College of Computing & Informatics (CCI). For more information on CCI program offerings, please visit the CCI website.

Update your existing technological skills and become essential in today's Internet-dominated society by developing the skills you need to help all types of organizations keep their computer systems secure.

Whether you are seeking a career change or professional advancement with an additional focus on security, you will gain a deep understanding of security-related issues and technologies through the 24-credit curriculum. Choose from a variety of electives, allowing you to tailor your studies to your personal career goals and interests.

For your convenience, all courses are offered on Drexel's University Main Campus and online.

Please note: Drexel's Certificate in Computing Security Technology is intended for students with extensive experience or a bachelor of science degree in computing technology or similar major. If you are new to the field, please contact us for information about prerequisite courses.


Curriculum

The curriculum for the Post-Bachelor's Certificate in Computing Security Technology includes six required courses and two electives, for a total of eight three-credit courses (24 credits).

Required Courses - 18 Credits
Code Name
CT 300 Security Technology Models & Architecture
CT 312 Access Control & Intrusion Detection Technology
CT 325 Operating Sys Security Architecture I
CT 336 IP Security and VPN Technology
CT 402 Network Security II
CT 472 IT Security Defense Countermeasures

Elective Courses - 6 Credits
Code Name
CT 212 Computer Forensics
CT 222 Security and Info Warfare
CT 295 Public Key Infrastructure Technology
CT 315 Security Management Practice
CT 326 Operating Sys Security Architecture II
CT 355 Wireless LAN Security Technology
CT 362 Network Auditing Tools
CT 382 Applied Cryptography
CT 393 IT Security Risk Assessment
CT 412 IT Security Policies
CT 415 Disaster Recovery and Continuity Planning
CT 422 Incident Response Best Practices
CT 432 IT Security System Audits


Quick Links:



Bookmark and Share