The following information applies to students enrolled in the Computing & Security Technology program for the 2013-2014 academic year. As of Fall Quarter 2014, the Computing & Security Technology Program—and its faculty, professional staff and students—will become a part of Drexel’s new College of Computing & Informatics (CCI). For more information on CCI program offerings, please visit the CCI website.
Update your existing technological skills and become essential in today's Internet-dominated society by developing the skills you need to help all types of organizations keep their computer systems secure.
Whether you are seeking a career change or professional advancement with an additional focus on security, you will gain a deep understanding of security-related issues and technologies through the 24-credit curriculum. Choose from a variety of electives, allowing you to tailor your studies to your personal career goals and interests.
For your convenience, all courses are offered on Drexel's University Main Campus and online.
Please note: Drexel's Certificate in Computing Security Technology is intended for students with extensive experience or a bachelor of science degree in computing technology or similar major. If you are new to the field, please contact us for information about prerequisite courses.
The curriculum for the Post-Bachelor's Certificate in Computing Security Technology includes six required courses and two electives, for a total of eight three-credit courses (24 credits).
|Required Courses - 18 Credits|
|CT 300||Security Technology Models & Architecture|
|CT 312||Access Control & Intrusion Detection Technology|
|CT 325||Operating Sys Security Architecture I|
|CT 336||IP Security and VPN Technology|
|CT 402||Network Security II|
|CT 472||IT Security Defense Countermeasures|
|Elective Courses - 6 Credits|
|CT 212||Computer Forensics|
|CT 222||Security and Info Warfare|
|CT 295||Public Key Infrastructure Technology|
|CT 315||Security Management Practice|
|CT 326||Operating Sys Security Architecture II|
|CT 355||Wireless LAN Security Technology|
|CT 362||Network Auditing Tools|
|CT 382||Applied Cryptography|
|CT 393||IT Security Risk Assessment|
|CT 412||IT Security Policies|
|CT 415||Disaster Recovery and Continuity Planning|
|CT 422||Incident Response Best Practices|
|CT 432||IT Security System Audits|