EN
AR

Systems Engineering

Overview

The Systems Engineering Certificate program will prepare students to design, develop, configure, and manage complex information systems that run on both traditional and cloud-based enterprise networks. This will allow them to enter the workforce with skills in network administration, management, and network security. The program emphasizes the synchronization of legacy systems with public and private data centers leveraged to facilitate the management of server virtualization, enterprise storage, disaster recovery, data de-duplication, and systematic backups in a secure and efficient manner.

Course Clock Hours Course Name
CIS148 50 Cloud Computing Concepts
CIS222 50 Storage Area Networks and Data Recovery
CIS257 50 Virtualization Introduction
CIS355 50 Virtualization Administration
CIS413 50 Cyber Security I
CIS414 50 Cyber Security II
300 Total Clock Hours
Evenings, Program Length 30 weeks

 

 

Cloud Computing Concepts / 50 clock hours

This course is divided into two parts: the first part discusses cloud computing architecture and the second part introduces cloud computing security concepts. First, students will be introduced to cloud computing and review a wide variety of currently available solutions. Students will become familiar with: why industry uses cloud computing, cloud characteristics, cloud models and deployment methods. The student will gain a solid understanding of hardware, storage, thin clients and virtualization in the cloud computing platform. The second part of this course will discuss the cloud security fundamentals and virtualization security management.

Storage Area Networks and Data Recovery / 50 clock hours

This course provides students with a background in storage management needed to advance in today’s technology workplace. This course provides a comprehensive introduction to information storage that will enable one to make informed decisions in an ever growing complexity of the IT industry. The course includes an overview of storage technology with lectures dedicated to the latest storage products: FC-SAN, NAS, IP-SAN, iSCSI as well as the methodology for long-term archiving solutions, the critical need of information security and the ever growing field of storage technologies. Many hands-on activities are included, which allow the student to work with storage computing concepts, using real-world situations to build the skills necessary for a successful understanding of information storage management.

Virtualization Introduction / 50 clock hours

This course provides students with a background in virtualization technology needed to advance in today’s technology workplace. Presentations focus on using virtualization software in networked server environments and include building virtual networks, implementing high-availability clusters, enhancing performance and security, and using Virtual Machine Manager to centralize management of multiple virtual servers. Many hands-on activities are included, which allow the student to work with virtual computing concepts, using real-world situations to build the skills necessary for a successful understanding of virtualization.

Virtualization Administration / 50 clock hours

This course emphasizes standard approaches to manage virtualization environments and the different types of advanced virtualization solutions available to maintain a company’s datacenter. Students will become familiar with why industry uses virtualization, comparing leading industry virtualization solutions currently in use today, how virtualization relates to server, desktop, and application environments and how to install and configure the different types of virtualization scenarios based on a company’s datacenter needs.

Cyber Security I / 50 clock hours

This course will prepare students by submerging them into an interactive environment where they will be shown how to scan, test, hack and secure their own information systems. This course will use hacking techniques used by malicious, black-hat hackers as a means to learn best defense mechanisms, mitigation strategies, and legal issues associated with operating systems and network targets. The advanced lab intensive environment provides each student with in-depth knowledge and practical experience using the most current and essential security systems technologies. While these hacking skills can be used for malicious purposes, this class teaches the student how to use the same hacking techniques to perform a white-hat or ethical hack, on an organizational network. The course objectives are delivered using a combination of lectures, demonstrations, discussions, and hands-on labs.

Cyber Security II / 50 clock hours

This course will prepare students by submerging them into an interactive environment where they will be shown how to scan, test, hack, and secure web servers and/or wireless networks through the use of encryption and penetration testing results. This course will use hacking techniques used by malicious, black-hat hackers as a means to learn best defense mechanisms and mitigation strategies. The advanced lab intensive environment provides each student with in-depth knowledge and practical experience using the most current and essential security systems technologies. While these hacking skills can be used for malicious purposes, this class teaches the student how to use the same hacking techniques to perform a white-hat or ethical hack, on an organizational network. The course objectives are delivered using a combination of lectures, demonstrations, discussions, and hands-on labs.


Through the above course, you can obtain a certificate from the university registered with all the data in that session, which can be referred to the university through any institution that inquires about your data and you can join many courses and other programs available through the Berkshire University