Network and Cyber Fundamentals

The Certificate of Completion (CCL) in Network and Cyber Fundamentals program is designed to focus on the necessary skills required to design and secure a network including the security of various systems and network devices. Emphasis is placed on developing the theoretical and practical skills needed to maintain security on mission-critical networking and server systems. The program is designed to meet the training needs of government and industry employees. The program covers a variety of essential security disciplines. The Network and Cyber Fundamentals program also focuses on the skills needed for internationally recognized IT certifications and high demands in business, industry and government. An Associate in Applied Science (AAS) is also available in this area.

Details

Field of Interest
Computer and Information Technology
Degree Type
Certificate of Completion (CCL)
Academic Plan
Network and Cyber Fundamentals (CER)
Academic Plan Code
5908
Total credits required
17
Catalog Year
2024-2025
Effective Term
Fall 2022
Admissions criteria

None.

Notes

Students must earn a grade of C or better in all courses within the program.

Students should select from the following courses in consultation with a department advisor.

Courses within any of the following prefixes must be taken within five (5) years prior to completion of the program to be applied toward this award: AIM, BPC, CIS, CLD, CNT, CSC, ITS, and MST.

What You'll Learn

This pathway map will help you gain the expertise needed to:

  1. Experiment with file and directory systems, file and directory permissions, text editors, file processing, and basic shell programming of the Linux operating system.
  2. Install, configure, administer, use, and maintain a UNIX/Linux operating system.
  3. Execute day-to-day administration tasks in a UNIX/Linux-based network.
  4. Manage the Linux Operating Systems including sophisticated manipulation of file structures, backup systems, printing processes, troubleshooting, user account management, hard disk maintenance and configuration, process monitoring and prioritizing, kernel customization, and system resource control.
  5. Perform day-to-day administration tasks in a UNIX/Linux-based network.
  6. Perform and explain day-to-day administration tasks in a Microsoft Windows-based network.
  7. Apply basic security techniques such as password protection and access control lists (ACLs).
  8. Configure basic network devices, design IP addressing schemes and test various network standards, protocols and technologies.
  9. Troubleshoot using the Open Systems Interconnection (OSI) model as a guide.
  10. Formulate and test appropriate equations to solve basic Internet Protocol (IP) addressing and subnetting problems associated with designing a network.
  11. Install, configure, customize, maintain and troubleshoot Cisco routers utilizing Advanced Internet Protocol (IP) addressing techniques, Variable Length Subnet Masking (VLSM), distance vector and Link State dynamic routing protocols, Routing Information Protocol version 1 (RIPv1) and version 2 (RIPv2), Enhanced Interior Gateway Routing Protocol (EIGRP), Single-area Open Shortest Path First (OSPF), and understanding the structure and behavior of routing tables.
  12. Minimize threats to the security of information systems by using authentication methods, access control, cryptography, Public Key Infrastructure (PKI), hardening of operating systems, infrastructure security, network security (including remote access and wireless), and the use of basic security tools.
  13. Examine the techniques for defending LAN and WAN networks including firewalls, IDSs and VPNs.
  14. Define workstations, servers, network storage devices, routers, switches, gateways, guards, Virtual Private Networks (VPNs), firewalls, Internet Protocol Security (IPSec), Intrusion Detection Systems (IDSs), mobile devices, peripheral devices and security peripherals.
  15. Explain a broad, cross-section of information security concepts including authentication methods, access control, cryptography, public key infrastructure (PKI), network attack and defense methods, operating systems and network device hardening, securing remote access and wireless technologies including viruses and worms.

Successful completion of this certificate may lead to employment in a variety of different occupations and industries. Below are examples of related occupations with associated Maricopa County-based annual median wages* for this certificate. Education requirements vary for the occupations listed below, so you may need further education or degrees in order to qualify for some of these jobs and earn the related salaries. Please visit with an academic advisor and/or program director for additional information. You can click on any occupation to view the detail regarding education level, wages, and employment information.

Computer and Information Systems Managers

$141,802

* Career and wage information provided by Lightcast using data, reports, and forecasts which are generated using government data sources and Lightcast’s proprietary analytical processes. Lightcast’s data covers multiple classes of workers including QCEW, non-QCEW, and those who are self-employed. Disclaimer

Course Sequence by Term

The following is the suggested course sequence by term. Please keep in mind:

  • Students should meet with an academic advisor to develop an individual education plan that meets their academic and career goals. Use the Pathway Planner tool in your Student Center to manage your plan.
  • The course sequence is laid out by suggested term and may be affected when students enter the program at different times of the year.
  • Initial course placement is determined by current district placement measures and/or completion of 100-200 level course and/or program requirements.
  • Degree and transfer seeking students may be required to successfully complete a MCCCD First Year Experience Course (FYE) within the first two semesters at a MCCCD College. Courses include FYE101 and FYE103. Course offerings will vary by college. See an academic, program, or faculty advisor for details.

Full-time Sequence

Full-time status is 12 credits to 18 credits per semester.

Term 1

A sequence of suggested courses that should be taken during Term 1
Course Number Course Name Requisites Notes Area Credits
CIS105 Survey of Computer Information Systems CS 3
CIS126DL or
CIS126RH
Linux Operating System or Red Hat System Administration I 3
CNT140AB Introduction to Networks 4

Term 2

A sequence of suggested courses that should be taken during Term 2
Course Number Course Name Requisites Notes Area Credits
CIS270 Essentials of Network and Information Security 3
MST150++ Any Microsoft Technology course 3
CIS+++ or
BPC+++ or
CNT+++
Any CIS Computer Information Systems course(s) or Any BPC Business-Personal Computers course(s) or Any CNT Cisco Network Technology course(s) Select six (6) Restricted Elective credits from the following (other than courses used to fulfill Required Courses area) 6
Course Area Key
Disclaimer

Students must earn a grade of C or better in all courses within the program.

Course Sequence total credits may differ from the program information located on the MCCCD curriculum website due to program and system design.

View MCCCD’s official curriculum documentation for additional details regarding the requirements of this award (https://aztransmac2.asu.edu/cgi-bin/WebObjects/MCCCD.woa/wa/freeForm?id=174550).

At Maricopa, we strive to provide you with accurate and current information about our degree and certificate offerings. Due to the dynamic nature of the curriculum process, course and program information is subject to change. As a result, the course list associated with this degree or certificate on this site does not represent a contract, nor does it guarantee course availability. If you are interested in pursuing this degree or certificate, we encourage you to meet with an advisor to discuss the requirements at your college for the appropriate catalog year.