Skip to main content

Charlotte Technical College

Safe and respectful, Always professional, Intellectual, Leaders!

Applied Cybersecurity

Applied Cybersecurity

Registration Deadline: August 8, 2025
Next Start Date: August 11, 2025

 

This program offers a sequence of courses that provides coherent and rigorous content aligned with challenging academic standards and relevant technical knowledge and skills needed to prepare for further education and cybersecurity-related careers in the Information Technology career cluster; provides technical skill proficiency, and includes competency-based applied learning that contributes to the academic knowledge, higher-order reasoning and problem-solving skills, work attitudes, general employability skills, technical skills, and occupation-specific skills, and knowledge of all aspects of cybersecurity.


The content includes but is not limited to foundational knowledge and skills in computer and network security, security vulnerabilities, attack mechanisms and techniques, intrusion detection and prevention, cryptographic systems, system hardening, risk identification, incidence response, penetration testing, key management, access control, and recovery. Specialized courses focus on database security, planning and analysis, software, and web security.

  • Applied Cybersecurity Program Prerequisites (prior to enrollment you must have earned ONE of the following certifications):

    • Currently holds an unexpired CompTIA Network+, Linux+, or higher certification (must be one tier higher than A+); or any unexpired Cisco, EC-Council, or ISC2 certification
  • Please see the Basic Skills Requirement table by clicking here and find your program.

    If required, take the Basic Skills Test at our Testing Center. Call 941-255-7500 Ext. 1745 to schedule to take the test.

  • Applied Cybersecurity industry certification includes CompTIA Security+

    CompTIA Cybersecurity Analyst (CySA+) 

  • Job opportunities in Applied Cybersecurity include:

    • Information Security Analysts

    To find out more about these opportunities, please visit O*Net OnLine.

    fter successfully completing this program, the student will be able to perform the following:

    • Demonstrate knowledge, skill, and application of information technology to accomplish job objectives and enhance workplace performance.  
    • Develop an awareness of microcomputers.  
    • Demonstrate an understanding of networks.  
    • Use word processing applications to enhance the effectiveness of various types of documents and communication. 
    • Use presentation applications to enhance communication skills.  
    • Use spreadsheet applications to enhance communication skills. 
    • Use database applications to store and organize data. 
    • Use electronic mail to enhance communication skills. 
    • Investigate individual assessment and job/career exploration and individual career planning that reflect the transition from school to work, lifelong learning, and personal and professional goals.  
    • Incorporate appropriate leadership and supervision techniques, customer service strategies, and standards of personal ethics to accomplish job objectives and enhance workplace performance.  
    • Demonstrate competence using computer networks, internet and online databases to facilitate collaborative or individual learning and communication.  
    • Develop awareness of computer languages, web-based and software applications, and emerging technologies.  
    • Demonstrate an understanding of basic html by creating a simple web page. 
    • Demonstrate comprehension and communication skills.  
    • Use social media to enhance online communication and develop an awareness of a digital footprint. 
    • Demonstrate proficiency on the principles of design.
    • Demonstrate proficiency planning an effective website. 
    • Demonstrate proficiency using web development tools and techniques.
    • Demonstrate proficiency using specialized web design software.
    • Demonstrate proficiency gathering and preparing web content.
    • Demonstrate an awareness of preparing a website for launch.
    • Explain motherboard components, types and features.
    • Explain the purpose and characteristics of CPUs and their features.
    • Perform installation and configuration activities.
    • Perform the process for problem diagnostics and problem resolution through wireless, infrared, telephone, e-mail, remote access, or direct contact.
    • Demonstrate knowledge of presentation production issues.
    • Demonstrate proficiency using computer networks.
    • Demonstrate proficiency communicating over the Internet.
    • Demonstrate proficiency in troubleshooting, repair and maintenance of hardware.
    • Demonstrate proficiency in the basic principles of security concepts and technologies.
    • Demonstrate proficiency in operational procedures as they relate to computer equipment and components.
    • Use oral and written communication skills in creating, expressing and interpreting information and ideas.
    • Solve problems using critical thinking skills, creativity and innovation.
    • Use information technology tools.
    • Describe the roles within teams, work units, departments, organizations, inter-organizational systems, and the larger environment.
    • Describe the importance of professional ethics and legal responsibilities.
    • Develop the "big picture" of database design and how to best organize data according to business rules and/or client needs.
    • Develop the process of creating an entity by identifying relationships.
    • Formulate and assemble initial entity relationship by expanding on modeling concepts.
    • Consider the degree and optionality of relationships of entities.
    • Demonstrate proficiency in early construction stages of the data modeling process by using unique identifiers and many-to-many (M:M) relationships for building entity relationship diagrams.
    • Demonstrate proficiency in advanced data constructs by analyzing business requirements and diagramming entities and relationships.
    • Apply the complex ERM information by fine-tuning entities and the process for relating them.
    • Apply initial database design and normalization by following the set of house rules that determine how items are stored and retrieved.
    • Manipulating data.
    • Building and modifying tables.
    • Performing queries and filtering records.
    • Demonstrate the importance of health, safety, and environmental management systems in organizations and their importance to organizational performance and regulatory compliance.
    • Demonstrate leadership and teamwork skills needed to accomplish team goals and objectives.
    • Explain the importance of employability skill and entrepreneurship skills.
    • Demonstrate personal money-management concepts, procedures, and strategies.
    • Plan program design.
    • Code programs.
    • Test programs.
    • Perform program maintenance.
    • Create and maintain documentation.
    • Develop an awareness of software quality assurance.
    • Develop an understanding of programming techniques and concepts.
    • Design structured programs.
    • Demonstrate proficiency in page design applicable to the WWW.
    • Demonstrate proficiency in webpage design applicable to the WWW.
    • Demonstrate proficiency in using a WYSIWYG editor, web design, or web animation software for webpage design.
    • Demonstrate proficiency in using digital photography and digital imaging.
    • Design and create webpages suitable for publishing to the Internet.
    • Describe how website performance is monitored and analyzed.
    • Demonstrate proficiency in hosting a website. 
    • Demonstrate the ability to attract and track traffic for a website. 
    • Demonstrate knowledge of presentation production issues.
    • Demonstrate proficiency in using digital photography and digital imaging.
    • Demonstrate basic video production.
    • Demonstrate set-up and configuration of a computer for video applications.
    • Demonstrate the basic operation of a video workstation.
    • Demonstrate basic audio production.
    • Set-up and configure a computer for audio applications.
    • Operate an audio workstation.
    • Demonstrate proficiency in using presentation software and equipment.
    • Demonstrate understanding of network technologies.
    • Understand, install and configure network hardware. 
    • Understand, install and configure networking devices. 
    • Understand, install and configure network management software.
    • Understand, install and configure networking tools. 
    • Install, configure, and manage network security hardware and software devices. 
    • Demonstrate an understanding of cybersecurity, the terminology used, its history and culture, and trends.
    • Recognize the following types of malicious code and specify the appropriate actions to take to mitigate vulnerability and risk.
    • Recognize and be able to differentiate and explain the following access control models.
    • Compare and contrast methods of authentication.
    • Recognize the following attacks and specify the appropriate actions to take to mitigate vulnerability and risk.
    • The processes and risks associated with the following security concerns and tasks.
    • The administration of the following types of remote access technologies.
    • The administration of the following email security concepts.
    • The administration of the following Internet security concepts.
    • The administration of the following vulnerabilities.
    • The administration of the following directory security concepts.
    • The administration of the following file transfer protocols and concepts.
    • The administration of the following wireless technologies and concepts.
    • Compare and contrast the following types of intrusion detection in terms of implementation and configuration.
    • Be able to identify the following different kinds of cryptographic algorithms.
    • Understand how cryptography and digital signatures address the following security concepts.
    • Understand the following concepts of PKI (Public Key Infrastructure).
    • Understand the following concepts of Key Management and Certificate Lifecycles.
  • Applied Cybersecurity teaches:

    • Cybersecurity Associate
    • Information Security Manager OR
    • Data Security Specialist OR
    • Software Security Specialist OR
    • Web Security Specialist OR
    • Information Security Administrator

  • Two people look at a computer screen displaying network configuration information.
  • A teacher points to a whiteboard listing different types of cyberattacks, including ARP Poisoning, SQL Injection, Phishing, Man in the Middle, and Amplified DDoS.
  • A close-up of a computer screen displaying code and system information, including process IDs and user names.
  • A pair of glasses sits on a laptop keyboard, reflecting a computer screen displaying code.

 

Safe and respectful, Always professional, Intellectual, Leaders!

We offer over 20 programs, exceptional instructors, great business and industry partnerships, industry-standard curriculum, equipment, and technology, which all equal SUCCESS!

Find Your Career Apply Now