What kinds of skills and competencies do cybersecurity professionals need to be successful?
Through our industry-expert faculty and partnerships with employers, we know exactly which technical and professional skills graduates need in the field. Our curriculum is designed to make sure you develop the knowledge and abilities you'll rely on throughout your career.
Upon completion of their academic requirements, graduates of Champlain College's undergraduate Computer Networking & Cybersecurity program will be able to:
- explain the concepts of confidentiality, availability, and integrity (CIA) in context of Information Assurance; articulate the threats to CIA and be able to analyze a given architecture, discern vulnerabilities, and recommend physical, logical, or administrative controls to mitigate the threat; (Cybersecurity Fundamentals—Theory)
- demonstrate expertise in configuring host and network level technical security controls, to include host firewalls, user access controls, host logging, network filtering, intrusion detection, and prevention and encryption at all levels; (Managing Security—Applied)
- describe the hardware, software, and services that comprise an enterprise network, and be able to articulate how these components integrate to form a network solution; (Network Integration—Theory)
- explain key networking protocols, and their hierarchical relationship in the context of a conceptual model, such as the OSI and TCP/IP framework; be able to articulate the low level data communications and subsequent abstractions that allow networked hosts and applications to communicate across the internet; (Networking Protocols—Theory)
- build multiple host and network architectures, given business requirements and constraints; student will configure operating systems, network specific services, routing, switching, and remote access solutions; (Networking—Applied)
- describe the components of a computer, their role and function, and discuss how cpu, memory, storage, and network resources are leveraged by systems software; articulate the various forms of virtualization; (Systems—Theory)
- manage multiple operating systems, systems software, network services, and security, and demonstrate analytical skills in identifying and troubleshooting networking, security, and performance issues; (Managing Systems—Applied)
- identify core networking and infrastructure components, and the roles they serve; and given requirements and constraints, design an IT infrastructure including devices, topologies, protocols, systems software, management, and security; (IT Infrastructure—Theory)
- analyze business requirements, research, develop, and integrate solutions for enterprise IT requirements; balance business, technical, and security requirements and constraints.; integrate operating systems, services, network devices, and security controls to meet the requirements (Developing Infrastructure Solutions—Applied)
- effectively communicate technical information to audiences with different levels of technical sophistication; communicate this information verbally in formal, technical documentation and in presentations; and (Communication)
- serve as a contributing member or leader of a small and project-focused team; be able to clearly identify and document issues adversely affecting the team's performance, and communicate and apply these lessons to future teams. (Teamwork)