Computer Information Systems - Information Security for Business, Short-Term Technical Certificate

Curriculum Code #6623

Effective May 2024

Division of Engineering, Business and Information Technologies

The short-term technical certificate of information security for business provides the certificate holder a foundation in information security concepts starting with understanding risk concepts and addressing them through organizational elements and technology. A broad understanding of information security concerns such as: business continuity planning, policy development, IT security concepts, technology solutions, physical security issues, legal compliance topics, investigative techniques and accounting principles focused on the detection of fraud. This certificate is designed for the business major who does not have extensive hands-on technology background, but has experience in a managerial or other senior-level position and needs an understanding of information security issues and processes.

REQUIRED COURSES
ACTG 151ACCOUNTING I - FINANCIAL4
ACTG 152ACCOUNTING II - MANAGERIAL 14
ACTG 253FORENSIC ACCOUNTING 13
CMNW 120CYBER-FOREN CYBER CRIME THE LAW4
CYBR 252IT SECURITY CONCEPTS4
SDEV 101INTRODUCTION TO THE LCCC COMMUNITY 21
Total Hours20
1

Indicates that this course has a prerequisite.

2

A student must register for the orientation course when enrolling for more than six credit hours per semester OR any course that would result in an accumulation of 13 or more credit hours.

While completion of this certificate may aid in obtaining employment, many employers recommend the minimum completion of a degree program to gain employment in a business-related field.

Program Contact(s):

Nathanial Neeland
440-366-7790
nneeland@lorainccc.edu

For information about admissions, enrollment, transfer, graduation and other general questions, please contact your advising team.

More program information can be found on our website.

Program Learning Outcomes

  1. Describe the role of risk assessment in information security.
  2. Explain the importance of information security frameworks and application development models.
  3. Explain the process of incident handling, and potential legal requirements.