Information Security Technology

The Certificate of Completion (CCL) in Information Security Technology program is designed to provide students with the knowledge and tools to understand how networks, operating systems and programs function, as well as, how to protect them. Emphasis is placed on developing the knowledge and skills to maintain security on mission-critical data and computer systems. The program is designed to meet the training needs of employees in both public and private sectors. The program covers a variety of information security disciplines that include both vendor-neutral and vendor-specific security training. The Information Security Technology program is designed to help prepare students for internationally recognized industry certifications.


Field of Interest
Computer and Information Technology
Degree Type
Certificate of Completion (CCL)
Academic Plan
Information Security Technology (CER)
Academic Plan Code
Total credits required
Effective Term
Fall 2021

Students must earn a grade of C or better in all courses within the program.

Courses within any of the following prefixes must be taken within five (5) years prior to completion of the program to be applied toward this award: AIM, BPC, CIS, CLD, CNT, CSC, ITS, and MST.

What You'll Learn
  • Install, configure, administer, use, and maintain a UNIX/Linux operating system. (CIS126DL, CIS238++, CIS239DL)
  • Define common network terminology and protocols to include local area network (LAN) and wide-area network (WAN) topologies, the Open System Interconnection reference (OSI) model and communication cabling standards. (CNT140AB)
  • Use appropriate equations to solve basic Internet Protocol (IP) addressing and subnetting problems associated with designing a network. (CNT140AB)
  • Apply basic security techniques such as password protection and access control lists (ACLs). (MST150++)
  • Explain a broad, cross-section of information security concepts including authentication methods, access control, cryptography, public key infrastructure (PKI), network attack and defense methods, operating systems and network device hardening, securing remote access and wireless technologies including viruses and worms. (CIS105, ITS110)
  • Define workstations, servers, network storage devices, routers, switches, gateways, guards, Virtual Private Networks (VPNs), firewalls, Internet Protocol Security (IPSec), Intrusion Detection Systems (IDSs), mobile devices, peripheral devices and security peripherals. (BPC170, CIS105, ITS110)
  • Identify the ethical and legal aspects of information security including government regulatory requirements impacting network and information security professionals. (ITS120)
  • Design, implement, monitor and improve security in-depth for operating systems including Microsoft Windows, Linux, Cisco IOS and Mac OS X. (ITS130)
  • Examine the techniques for defending LAN and WAN networks including firewalls, IDSs and VPNs. (ITS110)
  • Perform day-to-day administration tasks in a Microsoft Windows-based network. (MST150++)
  • Perform day-to-day administration tasks in a UNIX/Linux-based network. (CIS126DL, CIS238++, CIS239DL)
Required courses
Course #Course TitleCredits
BPC170A+ Exam Prep: Computer Hardware Configuration and Support3
CIS105Survey of Computer Information Systems3
CIS126DLLinux Operating System3
CIS238++Any UNIX/Linux Administration course (3) or
CIS239DLLinux Shell Scripting (3)3
CNT140ABIntroduction to Networks4
ITS110Information Security Fundamentals3
ITS120Legal, Ethical and Regulatory Issues3
ITS130Operating System Security3
MST150++Any Microsoft Windows Operating System course3

At Maricopa, we strive to provide you with accurate and current information about our degree and certificate offerings. Due to the dynamic nature of the curriculum process, course and program information is subject to change. As a result, the course list associated with this degree or certificate on this site does not represent a contract, nor does it guarantee course availability. If you are interested in pursuing this degree or certificate, we encourage you to meet with an advisor to discuss the requirements at your college for the appropriate catalog year.

Read the official description