CNIT Cybersecurity Certificate

City College of San Francisco

Certificate Course Sequence:

CNIT Cybersecurity Course Sequence

Introduction to Networking

CNIT 106

Analysis of technologies for connecting computers and devices into networks. Terminology and the major components of networks: architecture, topologies, hardware, connections, protocols, operations, administration, support, security and troubleshooting. Local Area Networks (LANs), Wide Area Networks (WANs), Wireless LANS and Virtual networks are also covered. Follows the objectives of the CompTIA Network+ certification exam.


Network Security

CNIT 120

Knowledge and skills to recognize security vulnerabilities, implement security measures, analyze network environments for known security threats or risks, defend against attacks or viruses, ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security: access control, authorization, encryption, packet filters, firewalls and Virtual Private Networks (VPNs).


Computer Forensics

CNIT 121

Forensics tools, methods and procedures for investigating computers. Data recovery techniques and evidence collection, protection of evidence, expert witness skills and computer crime investigation techniques. Analysis of various file systems and specialized diagnostic software to retrieve data. Prepares in part for CompTIA Security+and maps to Computer Investigation Specialists exam.



CNIT 122

Fundamentals, techniques, and procedures to design an effective secure Internet connection using software or hardware firewalls. Discussion of types of firewalls, packet filtering, proxy servers, Intrusion Detection Systems, and Virtual Private Networks (VPNs).


Ethical Hacking and Network Defense

CNIT 123

Learn how hackers attack computers and networks, and how to protect Windows and Linux systems. Legal restrictions and ethical guidelines will be taught and enforced. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.