Alamance Community College
2021 Calendar Year

Cybersecurity Certificate

Course and Hour Requirements
Course
Number
Course
TITLE
contact
hours
Credit
hours
CCT-110 Introduction to Cyber Crime 3 3
CCT-110   Introduction to Cyber Crime PREREQUISITES and COREQUISITES • NONE

This course introduces and explains the various types of offenses that qualify as cyber crime activity. Emphasis is placed on identifying cyber crime activity and the response to these problems from both the private and public domains. Upon completion, students should be able to accurately describe and define cyber crime activities and select an appropriate response to deal with the problem.

Register for this class
CCT-231 Technology Crimes & Law 3 3
CCT-231   Technology Crimes & Law PREREQUISITES and COREQUISITES • NONE

This course covers the applicable technological laws dealing with the regulation of cyber security and criminal activity. Topics include an examination of state, federal and international laws regarding cyber crime with an emphasis on both general and North Carolina statutes. Upon completion, students should be able to identify the elements of cyber crime activity and discuss the trends of evolving laws.

Register for this class
NOS-120 Linux/UNIX Single User 4 3
NOS-120   Linux/UNIX Single User PREREQUISITES and COREQUISITES • NONE

This course develops the necessary skills for students to develop both GUI and command line skills for using and customizing a Linux workstation. Topics include Linux file system and access permissions, GNOME Interface, VI editor, X Window System expression pattern matching, I/O redirection, network and printing utilities. Upon completion, students should be able to customize and use Linux systems for command line requirements and desktop productivity roles.

Register for this class
SEC-110 Security Concepts 4 3
SEC-110   Security Concepts PREREQUISITES and COREQUISITES • NONE

This course introduces the concepts and issues related to securing information systems and the development of policies to implement information security controls. Topics include the historical view of networking and security, security issues, trends, security resources, and the role of policy, people, and processes in information security. Upon completion, students should be able to identify information security risks, create an information security policy, and identify processes to implement and enforce policy.

Register for this class
Semester Total 14 12