Cyber Defense Infrastructure Support Specialist

Certificate of CompletionComputer hack fail concept graphic

22 credit hours

This program is based on the National Security Agency (NSA) CAE Workforce Development Grant. The Certificate program meets the NSA Cybersecurity Center of Excellence/Cyber Defense (CAE/CD) knowledge unit’s designation, NIST National Initiative in Cybersecurity Education Framework (NICE) and is specifically designed to prepare students as Information Systems Security (INFOSEC) Professionals, NSTISSI No. 4011 and CNSSI No. 4016 Entry Level Risk Analysts or provide current Information Systems professionals with an Information Systems security certification to meet the needs of current and future employer requirements based on the NICE Work Roles for Operate and Maintain, Protect and Defend, and Operate. Upon completion of this program students will be receiving a university certification of completion, ACT WorkKeys National Career Readiness Certificate, and the following Industry Stackable Certifications: CompTIA A+, Security+, and EC Council ECH Ethical Hacking. Note, the labs use the INFOSEC virtual labs for hands-on training and the National Cyber League (NCL) Competition. Students also receive an NCL Scouting report showing their knowledge skills and abilities in the following cybersecurity areas:

The following are the categories of cybersecurity scenarios that you will be evaluated against:

  • Cryptography – Identify techniques used to encrypt or obfuscate messages and leverage tools to extract the plain text.
  • Enumeration and Exploitation – Identify actionable exploits and vulnerabilities and use them to bypass the security measures in code and compiled binaries.
  • Log Analysis – Utilize the proper tools and techniques to establish a baseline for normal operation and identify malicious activities using log files from various services.
  • Network Traffic Analysis – Identify malicious and benign network traffic to demonstrate an understanding of potential security breaches.
  • Open Source Intelligence – Utilize publicly available information such as search engines, public repositories, social media, and more to gain in-depth knowledge on a topic or target.
  • Password Cracking – Identify types of password hashes and apply various techniques to efficiently determine plain text passwords.
  • Scanning – Identify and use the proper tools to gain intelligence about a target including its services and potential vulnerabilities.
  • Web Application Exploitation – Identify actionable exploits and vulnerabilities and use them to bypass the security measures in online services.
  • Wireless Access Exploitation – Identify the security posture of wireless networks from network captures.

Any student who is ineligible for state, national, or industry licensure or certification is ineligible for entry into this program.

To learn more about the program requirements, click on the links below:

Cyber Defense Infrastructure Support Specialist CC
Cyber Defense Infrastructure Support Specialist Certificate Pathway