top of page

Overview

CC delivers a cyber career by targeting the core cyber security courses of a masters level program. Thus, it fills the gap between education and training. While it is easier than a masters, it is much more than a training. The program is given entirely online with extensive help from our cyber experts. It is a mix of live lectures, archived media and texts, projects, and live interaction with our experts. It opens the door to cyber motivated people who want a career start or reboot. 

Who is the program for?

  • Motivated people from diverse backgrounds who want to work in this field. 

  • Some knowledge of programming languages, as well as familiarity with Windows, Linux or Unix operating systems, will help with the Cyber Security Engineering Program. 

  • Detail-oriented problem-solvers with a technical background are a good fit for the program.

  • We place a higher value on technical ability over formal education. Networking engineering certifications and degrees in technology, science, and mathematics are helpful 

What will you learn?

  • 4 courses + 2 boot camp courses

  • Learn advanced cybersecurity tools such as Python, Wireshark, Linux, Metasploit and more, and use them to defend against cybercriminals.

  • 4 cyber security courses on Network security, Cryptography, Computer Security, and Risk Management. Drawn from the NSA/DHS Center of Excellence criteria. Both theoretical and lab exercises are covered in each course.  

  • 100% learning takes place online, hands-on materials are prepared to take place in an online environment-giving you all the flexibility and knowledge you need to jump start your cyber security career. 

What will you earn?

  • A CCI certificate. 

  • A combination of theoretical and hands on knowledge. You will experience cyber security tools such as Kali Linux, Wireshark, Snort, Metasploit, and Cryptographic algorithm libraries such as Openssl, etc. And you will learn how to launch and defend cyber attacks, also perform digital forensics analysis. 

Upon Completion 

Upon completion of this program the student, in their work environment, will be able to:​

  • Describe how threat based engineering and assessment are accomplished.

  • Describe the ethical and legal requirements associated with offensive cyber operations

  • Write system cybersecurity performance requirements from the perspective of defeating adversarial attacks.

  • Provide subject matter expertise at system design reviews regarding architectures and designs that are necessary to defeat cyber-attacks on a system.

  • Assume a leadership role in developing and executing cooperative and cybersecurity test and evaluation plans and procedures.

  • Identify exploitable weaknesses in operating systems and software code using FOSS and COTS tools across multiple computing platforms and devices.

  • Use threat based engineering principles to support decisions made regarding cybersecurity throughout the system development lifecycle.

  • Develop system requirements which are intended to reduce the likelihood of cyber-attack success or reduce the mission impact of a successful attack.

  • Train personnel on cyber-attack vectors including removable media, insider threats, social engineering, network and wireless access points.

  • Execute cyber-attacks against networks in a laboratory environment to assess effectiveness of implemented countermeasure.

 

Career paths

The courses are designed to comply with National Security Agency/Department of Homeland Center of Academic Excellence for Cyber Defense Education - NSA/DHS CAE-CDE ( National Centers of Academic Excellence (nsa.gov)) Knowledge Unit (KU) and Learning Unit (LU) mapping in mind.

 

 

Examples of the exciting career paths for CCI grads based on the mapping of our courses KU and LU mapping to the National Institute of Standards (NIST) National Initiative for Cybersecurity Education (NICE).

Security Engineer

Develops detailed cybersecurity designs and builds computer security architecture. They’re on the front line of protecting network assets from threat actors.

Penetration Tester 

Makes their living trying to break things. They are hired to probe computer networks and discover vulnerabilities a malicious hacker could exploit.

· Digital Forensic

· Computer Analyst 

· Information Security Analyst 

· Security Architect 

· Security Systems  Administrator 

· IT Security Consultant

ADMISSION REQUIREMENTS

Qualifications

4 year College Degree from an accredited Institution

Background

Basic Computer and Network Skills 

Sciences preferred, others with permission

Probability & Statistics a plus

Supporting materials 

Citizenship or  Green Card

Application fee: $50.00 non refundable.

Transcript

Resume

PROGRAMS AND SCHEDULE

There are two tracks for admission: the 1-year track for intensive schedule and 2-year track if you want to take it slowly

1-year track: two courses a semester and the boot camp running in parallel

2-year track: one course each semester and the boot camp running in the second year

Overall Plan for Scheduling

  • 12 Week semester for all courses

  • 2 or 4 semesters per year

  • 1 week in between semesters

  • Holidays adjusted with makeup classes

  • No Classes during Christmas week

  • Students can begin any semester

Schedule for next year with just 2 semesters in 2022 (highlighted)

SCHE1.PNG

Schedule for a year with 4 semesters in 2022

SCHE2.PNG

Notes:

We may continue with just 2 semesters per year as currently, but can roll into the 4 semesters per year when we have enough demand. This would allow students to complete our program in just 25 or 26 weeks on an accelerated basis, but the option for a 1 year or 2 year program is still available.

SEMINAR SCHEDULE 

The Seminar Schedule will be negotiated with Morgan and will depend on their ability to recruit as well as logistics of travel and visas.

SCHE3.PNG
Program Overview: Resources and Tips

bottom of page