Students will prepare for careers dealing with networking and system administration fundamentals, with the primary focus being defensive strategies to securing networks and systems. Skills acquired will assist students in preparing to take nationally and internationally recognized industry certification exams.

Program contact: Learn more

This certificate will be automatically awarded when the certificate requirements are completed. If you do not want to receive the certificate, please notify the Office of the Registrar at

Learn more here about how certificate credits apply to the related degree.

Related Degrees and Certificates

Program Admission Requirements

  •  Applicant must have already completed an associate degree or higher from an accredited college or university.
  • Information technology/networking background and/or experience in the field is recommended. Applicants without the recommended background may be required to take additional courses.
  • 18 years of age or older.

Program Learning Outcomes

This program is designed to prepare students to demonstrate the following learning outcomes:

  1. Apply principles of security to install, configure, maintain, and secure business operations.
  2. Take continuous, pro-active measures to intimately know and understand the complete physical and logical structure of your network so that during normal operations and monitoring, security issues can be quickly identified, isolated and resolved, including measures to prevent future occurrences.
  3. Apply fundamental concepts of operating systems, business applications, networking, security, backup and recovery procedures to troubleshoot, maintain, and support hardware and software to ensure efficient and effective business operations.
  4. Explain what a risk assessment is, what types of assessments there are and how it can impact an organization. Also explain drivers to information security policy/standard development, security governance, compliance to external regulation and internal policies and standards.
  5. Identify common industry security frameworks and explain why these exist.  (NIST, Cyber Security Framework, CYBER, COBIT, ISO27001, etc.)
  6. Apply analytical, critical and creative thinking and problem solving/troubleshooting techniques to reduce risk in business operations.
  7. Plan, organize, and prioritize tasks in order to meet project deadlines.
  8. Understand and apply legal, privacy, and ethical concepts; recognize and assess legal, privacy, and ethical issues; and demonstrate ethical, privacy, and legal behavior.

Suggested Semester Sequence

Plan of Study Grid
Summer StartCredit Hours
IT-1025 Information Technology Concepts for Programmers 3
ITNT-2300 Networking Fundamentals 3
 Credit Hours6
First Semester
ITNT-2320 Network Administration I 3
ITNT-2370 Network Security Fundamentals 3
ITNT-2380 Linux Administration 3
EET-1303 Cisco I 3
EET-2303 Cisco II 3
 Credit Hours15
Second Semester
EET-2313 Cisco III 3
IT-2710 Advanced Topics in Network Security 3
IT-2750 Scripting Fundamentals for Cybersecurity 3
IT-2730 Intrusion Detection/Prevention Systems Fundamentals 3
IT-2720 Ethical Hacking and Systems Defense 3
 Credit Hours15
 Total Credit Hours36

MATH-1140, MATH-1141, MATH-1200, MATH-1270, and MATH-1280 can no longer count towards fulfilling the college-level mathematics requirement.  These courses were re-classified as developmental mathematics by the state of Ohio in 2016.  Tri-C established a 5-year transitioning window for students who had completed these courses prior to 2016 to apply them towards meeting graduation requirements, which expired in Summer 2021. It is highly recommended to see a counselor to determine the appropriate math required for your current major.