CyberSecurity Bootcamp I - Cybersecurity Specialist, Short-Term Technical Certificate

Curriculum Code #6475

Effective May 2024

Division of Engineering, Business and Information Technologies

The Cybersecurity Short Term Technical certificate provides a foundation in computing technology, information assurance, cybercrime investigation, ethical hacking and countermeasures, digital forensics, software exploitation, data integrity, risk assessment and mitigation techniques. Lorain County Community College has articulation agreements with colleges and universities including programs offered by Lorain County Community College's University Partnership. 

Plan of Study Grid
First Year
Fall SemesterHours
CMNW 101 A+ CERTIFICATION PREPARATION I 4
CMNW 120 CYBER-FOREN CYBER CRIME THE LAW 4
CMNW 145 NETWORK INSTALLATION/DIAGNOSTICS 4
SDEV 101 INTRODUCTION TO THE LCCC COMMUNITY 2 1
 Hours13
Spring Semester
CMNW 201 A+ CERTIFICATION PREP II 1 4
CYBR 220 PYTHON SCRIPTING AND PROGRAM CONCEPTS 3
CYBR 231 ETHICAL HACKING AND COUNTERMEASURES 4
CYBR 251 CYBER DEFENSE METHODS 1 3
 Hours14
 Total Hours27
1

Indicates that this course requires a college level prerequisite.

2

A student must register for the orientation course when enrolling for more than six credit hours per semester or any course that would result in an accumulation of thirteen or more credit hours.

3

​The cyber core courses in this program may be earned through a competency-based education option.  See your advisor for more information.  

Program Contact(s):

Lawrence Atkinson
440-366-7050
latkinso@lorainccc.edu

For information about admissions, enrollment, transfer, graduation and other general questions, please contact your advising team.

Credit for Prior Learning (PLA) options may be available for your program.  For more information, please visit our website:  www.lorainccc.edu/PLA

Program Learning Outcomes

  1. Implement cyber security goals, metrics, and safeguards consistent with industry best practices.
  2. Conduct security assessments to identify vulnerabilities in critical infrastructure systems.
  3. Evaluate a variety of cybersecurity tools.