Stetson University’s IT programs aim to provide substantive education leading towards industry certifications. Students of these certification programs obtain jobs in fields such as cybersecurity, networking and other IT-related fields.
These programs use exceptional technology, instructors and methodology to ensure student success and excellence. The programs not only prepare you to sit for the industry certification exams, they provide you with tools, theories and skills you will be able to immediately implement on the job, ensuring you, and your IT efforts, will be successful.
CND - Certified Network Defender
Students enrolled in the Certified Network Defender course will gain a detailed understanding and hands-on ability to function in real-life situations involving network defense. They will gain the technical depth required to actively design a secure network. This course gives students the fundamental understanding of the true construct of data transfer, network technologies and software technologies so they understand how networks operate, understand what software is automating and how to analyze the subject material.
Students will learn how to protect, detect and respond to the network attacks, network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. Students will learn the intricacies of network traffic signature, analysis and vulnerability scanning, which will help when designing greater network security policies and successful incident response plans. These skills will help the student foster resiliency and continuity of operations during attacks.
CEH - Certified Ethical Hacker
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks; no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5-day class they will have hands-on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
ECSA - EC-Council Certified Security Analyst
ECSA is a globally accepted hacking and penetration testing program that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report. This program takes the tools and techniques covered in CEH to next level by utilizing EC-Council’s published penetration testing methodology.
CISSP - Certified Information Systems Security Professional
The primary goal of the CISSP program is to prepare students to display their knowledge in industry standards in the following areas: Access Control; Application Security; Business Continuity and Disaster Recovery Planning; Cryptography; Information and Security Risk Management; and Legal Regulations, Compliance, and Investigations.
Computer, information and physical security are becoming more important at an exponential rate since the continual increase in computer crimes. The necessity for computer and information security has grown rapidly as websites have been defaced. Denial of service attacks have increased, credit card information has been stolen, publicly available hacking tools have become more sophisticated and today’s viruses and worms cause more damage than ever before.
This section of the Security Program is dedicated to providing a foundation for the many different areas that make up effective security. It helps prepare students pursuing a career in Information Technology and provide the proper education to recognize all of the threats and dangers we are vulnerable to and the steps that must be taken to mitigate these vulnerabilities.
For more information about our IT programs, please contact Linda Alonge-Nichols at Lindaalonge@stetson.edu or 407-579-3957.