{"id":3170,"date":"2023-04-05T14:00:34","date_gmt":"2023-04-05T18:00:34","guid":{"rendered":"https:\/\/www.forsythtech.edu\/?post_type=program_tracks&#038;p=3170"},"modified":"2025-08-25T15:35:34","modified_gmt":"2025-08-25T19:35:34","slug":"it-systems-security","status":"publish","type":"program_tracks","link":"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/","title":{"rendered":"IT \u2013 Systems Security"},"content":{"rendered":"<!-- Hero banner program -->\r\n<div class=\"fy-hero-program\">\r\n\t<div class=\"fy-hero-program__link-container container\">\r\n\t\t<a href=\"https:\/\/www.forsythtech.edu\/programs\/it-systems-security\/\" class=\"fy-hero-program__link fy-icon-link fy-icon-link--xs\"><i\r\n\t\t\t\t\tclass=\"fa-regular fa-arrow-left-long fy-icon-link__icon-left\"><\/i> IT &#8211; Systems Security<\/a>\r\n\t<\/div>\r\n\t<div class=\"fy-hero-program__container container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-12 col-lg-8\">\r\n\t\t\t\t<h1 data-aos=\"fade-up\" class=\"fy-hero-program__title fy-h2\"  aria-label=\"main\" role=\"main\">IT \u2013 Systems Security<\/h1>\r\n\t\t\t\t<p data-aos=\"fade-up\" data-aos-delay=\"100\" class=\"fy-hero-program__subtitle fy-highlight\">Associate Degree in Applied Science<\/p>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"fy-hero-program__details row\">\r\n\t\t\t<div data-aos=\"fade-up\" data-aos-delay=\"200\" class=\"col-12 col-md-3 col-lg-2\">\r\n\t\t\t\t\t\t\t\t    <a  class=\"fy-hero-program__button fy-btn-primary\" href=\"https:\/\/www.forsythtech.edu\/apply-now\/\" target=\"_self\">Apply Now<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<div data-aos=\"fade-up\" data-aos-delay=\"300\" class=\"col-6 col-md-3 col-lg-2\">\r\n\t\t\t\t<p class=\"fy-hero-program__label\">Time to Completion:<\/p>\r\n\t\t\t\t<p class=\"fy-hero-program__detail\">Two years<\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<div data-aos=\"fade-up\" data-aos-delay=\"400\" class=\"col-6 col-md-3 col-lg-2\">\r\n\t\t\t\t<p class=\"fy-hero-program__label\">Schedule:<\/p>\r\n\t\t\t\t<p class=\"fy-hero-program__detail\">Evening and online classes<\/p>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/div>\r\n<!-- \/Hero banner program -->\n\n<section class=\"fy-wysiwyg fy-two-column-list fy-mt-80 fy-mb-100\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div data-aos=\"fade-up\" class=\"fy-two-column-list__left col-12 col-md-6 col-lg-5\">\r\n\t\t\t\t<div class=\"wysiwyg\">\r\n\t\t\t      <h2>What You\u2019ll Learn<\/h2><br>\r\n\t\t\t      \t\t\t    <\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div data-aos=\"fade-up\" data-aos-delay=\"100\" class=\"fy-two-column-list__right col-12 col-md-6 offset-lg-1 col-lg-6\">\r\n\t\t\t\t<div class=\"wysiwyg\" style=\"padding-bottom: 3rem;\">\r\n\t\t\t      <p><span data-contrast=\"none\">Studying systems security at Forsyth Tech will teach you how to design security architectures, ensure data integrity through encryption, design Virtual Private Networks, SSL, SSH, and IPSec, mitigate threats, configure firewalls, detect intrusions, and even apply the appropriate defense against intrusions utilizing software and hardware.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:720}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335559685&quot;:720}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Students also learn about compliance, technology crimes and law in our award-winning Center for Academic Excellence in Cyber Defense.<\/span><\/p>\n\t\t\t    <\/div>\r\n\t\t\t    \r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n<section class=\"fy-wysiwyg fy-two-column-list fy-mt-80 fy-mb-100\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div data-aos=\"fade-up\" class=\"fy-two-column-list__left col-12 col-md-6 col-lg-5\">\r\n\t\t\t\t<div class=\"wysiwyg\">\r\n\t\t\t      <h2>Outcomes<\/h2><br>\r\n\t\t\t      \t\t\t    <\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div data-aos=\"fade-up\" data-aos-delay=\"100\" class=\"fy-two-column-list__right col-12 col-md-6 offset-lg-1 col-lg-6\">\r\n\t\t\t\t<div class=\"wysiwyg\" style=\"padding-bottom: 3rem;\">\r\n\t\t\t      <ul>\n<li>Security<\/li>\n<li>Cryptography<\/li>\n<li>Risk management<\/li>\n<li>Cybersecurity<\/li>\n<li>Networking<\/li>\n<li>Incident response<\/li>\n<li>Compliance<\/li>\n<li>Auditing<\/li>\n<\/ul>\n\t\t\t    <\/div>\r\n\t\t\t    \r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n<!-- Schedule accordion -->\r\n<div class=\"fy-accordion-section\">\r\n\t<div class=\"fy-accordion-section__container container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div data-aos=\"fade-up\" class=\"fy-accordion-section__left col-12 col-md-6 col-lg-5\">\r\n\t\t\t\t<h2 class=\"fy-accordion-section__title fy-h2\">Curriculum &#038; Class Schedule<\/h2>\r\n\t\t\t\t\t\t\t\t<div class=\"fy-accordion-section__legend fy-accordion-section__legend--desktop\">\r\n\t\t\t\t\t<h6 class=\"fy-accordion-section__legend-title\">Legend:<\/h6>\r\n\t\t\t\t\t<p class=\"fy-accordion-section__legend-item\"><span class=\"fy-legend\">A<\/span>Comprehensive\r\n\t\t\t\t\t\tArticulation Agreement (This course is recommended for students transferring to a four-year\r\n\t\t\t\t\t\tuniversity.)<\/p>\r\n\t\t\t\t\t<p class=\"fy-accordion-section__legend-item\"><span class=\"fy-legend\">L<\/span>Local Requirement<\/p>\r\n\t\t\t\t\t<p class=\"fy-accordion-section__legend-item\"><span class=\"fy-legend\">I<\/span>Instructional Service\r\n\t\t\t\t\t\tAgreement<\/p>\r\n\t\t\t\t\t<p class=\"fy-accordion-section__legend-item\"><span class=\"fy-legend\">U<\/span>Universal General\r\n\t\t\t\t\t\tEducation Transfer Component (UGETC)<\/p>\r\n\t\t\t\t\t<p class=\"fy-accordion-section__legend-item\"><span class=\"fy-legend\">G<\/span>Global Distinction<\/p>\r\n\t\t\t\t\t<p class=\"fy-accordion-section__legend-item\"><span class=\"fy-legend\">R<\/span>Requisite(s)<\/p>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div data-aos=\"fade-up\" data-aos-delay=\"100\" class=\"fy-accordion-section__right col-12 col-md-6 offset-lg-1 col-lg-6\">\r\n\t\t\t\t<div class=\"fy-accordion-section__disclaimer\">\r\n\t\t\t\t\t<i class=\"fa-solid fa-circle-info\"><\/i>\r\n\t\t\t\t\t<p class=\"fy-accordion-section__disclaimer-text\">Disclaimer line: This is a suggested list. You will consult with an academic advisor to develop your exact curriculum, based on your interests and any credits you may already have obtained prior to arriving at Forsyth Tech.<\/p>\n\t\t\t\t\t\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"fy-accorodion\" id=\"fy-accordion2\">\r\n\t\t\t\t\t\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"fy-accordion-section__legend fy-accordion-section__legend--mobile\">\r\n\t\t\t\t\t<h6 class=\"fy-accordion-section__legend-title\">Legend:<\/h6>\r\n\t\t\t\t\t<p class=\"fy-accordion-section__legend-item\"><span class=\"fy-legend\">A<\/span>Comprehensive\r\n\t\t\t\t\t\tArticulation Agreement (This course is recommended for students transferring to a four-year\r\n\t\t\t\t\t\tuniversity.)<\/p>\r\n\t\t\t\t\t<p class=\"fy-accordion-section__legend-item\"><span class=\"fy-legend\">L<\/span>Local Requirement<\/p>\r\n\t\t\t\t\t<p class=\"fy-accordion-section__legend-item\"><span class=\"fy-legend\">I<\/span>Instructional Service\r\n\t\t\t\t\t\tAgreement<\/p>\r\n\t\t\t\t\t<p class=\"fy-accordion-section__legend-item\"><span class=\"fy-legend\">U<\/span>Universal General\r\n\t\t\t\t\t\tEducation Transfer Component (UGETC)<\/p>\r\n\t\t\t\t\t<p class=\"fy-accordion-section__legend-item\"><span class=\"fy-legend\">G<\/span>Global Distinction<\/p>\r\n\t\t\t\t\t<p class=\"fy-accordion-section__legend-item\"><span class=\"fy-legend\">R<\/span>Requisite(s)<\/p>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/div>\r\n<!-- \/Schedule accordion -->\n\n<div data-aos=\"fade-up\" class=\"fy-contact \">\r\n\t<div class=\"fy-contact__container container\">\r\n\t\t<script>!function(){window.__lum_config__={formId:\"forsythtech.forms.1797\",apiUrl:\"https:\/\/forsythtech.api.451.io\/v2\/\",accessToken:\"d74zifGDpWUdOMEZzVutI1iTTBSQB6jmUn6eHXLQ\",featureToken:\"kqZRmHQEZa8I2arqiorpELoTnzJYPNB9Dbdui9h0\",analyticsToken:\"QrNG4Xvz6IS3EwPR3m9Dizgn69eNrhHmK3eB8FtS\",sourceUrl:encodeURIComponent(window.location.href)}}();<\/script><script src=\"\/\/element451-embed-forms.sparksites.io\/bundle.min.js\"><\/script><lum-root>Loading&#8230;<\/lum-root>\t<\/div>\r\n<\/div>\n\n<!-- Large card -->\r\n<div class=\"fy-large-card  fy-large-card--reverse \">\r\n\t<div class=\"fy-large-card__container container\">\r\n\t\t<div class=\"fy-large-card__row row\">\r\n\t\t\t<div class=\"fy-large-card__inner col-12\">\r\n\t\t\t\t<div class=\"fy-large-card__content\">\r\n\t\t\t\t\t<div data-aos=\"fade-left\" class=\"fy-large-card__media-container\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"fy-large-card__media lazyload\" data-src=\"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/03\/IT-resize-19-740x455.jpg\" alt=\"Career Tracks\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 740px; --smush-placeholder-aspect-ratio: 740\/455;\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div data-aos=\"fade-up\" class=\"fy-large-card__info\">\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"fy-large-card__title fy-h3\" role=\"heading\">Career Tracks<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<div class=\"fy-large-card__description fy-paragraph\">\r\n\t\t\t\t\t\t\t<ul>\n<li><span data-contrast=\"none\">Cybersecurity Analyst<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Systems Security Engineer<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Information System Security Engineer<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">IT Security Specialist<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/div>\r\n<!-- \/Large card -->\r\n\n\n<div class=\"fy-x-large-card  fy-x-large-card--teal fy-x-large-card--top-margin\">\r\n\t<div class=\"card\">\r\n\t\t<div class=\"card-img-top\">\r\n\t\t\t<iframe aria-label='Google Map' data-src=\"https:\/\/www.google.com\/maps\/embed?pb=!1m18!1m12!1m3!1d3225.010627040945!2d-80.2739958849692!3d36.06884488010569!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x8853afd95ccd99e3%3A0x3e5d886e5cb8c69f!2s2100%20Silas%20Creek%20Pkwy%2C%20Winston-Salem%2C%20NC%2027103!5e0!3m2!1sen!2sus!4v1678386181777!5m2!1sen!2sus\" width=\"600\" height=\"450\" style=\"border:0;\" allowfullscreen=\"\" referrerpolicy=\"no-referrer-when-downgrade\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" data-load-mode=\"1\"><\/iframe>\r\n\t\t<\/div>\r\n\t\t<div class=\"card-body\">\r\n\t\t\t<div class=\"fy-x-large-card__content\" data-aos=\"fade-up\">\r\n\t\t\t\t<h5 class=\"card-title\">Visit us today!<\/h5>\r\n\t\t\t\t<div class=\"card-text\"><p><span class=\"TextRun SCXW212478640 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW212478640 BCX0\">The <\/span><span class=\"NormalTextRun SCXW212478640 BCX0\">Davis <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW212478640 BCX0\">iTEC<\/span><span class=\"NormalTextRun SCXW212478640 BCX0\"> Center at Forsyth Tech is located at:<\/span><\/span><span class=\"EOP SCXW212478640 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">2100 Silas Creek Parkway,<\/span><br \/>\n<span data-contrast=\"none\">Winston-Salem, NC 27103<\/span><span data-ccp-props=\"{&quot;335559685&quot;:720}\">\u00a0<\/span><\/p>\n<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/div>\r\n","protected":false},"excerpt":"","featured_media":2670,"menu_order":0,"template":"","format":"standard","class_list":["post-3170","program_tracks","type-program_tracks","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT \u2013 Systems Security - Forsyth Tech Community College<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT \u2013 Systems Security - Forsyth Tech Community College\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Forsyth Tech Community College\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/forsythtech\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-25T19:35:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/03\/IT-resize-19.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1250\" \/>\n\t<meta property=\"og:image:height\" content=\"834\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ForsythTechCC\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/\",\"url\":\"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/\",\"name\":\"IT \u2013 Systems Security - Forsyth Tech Community College\",\"isPartOf\":{\"@id\":\"https:\/\/www.forsythtech.edu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/03\/IT-resize-19.jpg\",\"datePublished\":\"2023-04-05T18:00:34+00:00\",\"dateModified\":\"2025-08-25T19:35:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/#primaryimage\",\"url\":\"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/03\/IT-resize-19.jpg\",\"contentUrl\":\"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/03\/IT-resize-19.jpg\",\"width\":1250,\"height\":834,\"caption\":\"image of cables\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forsythtech.edu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT \u2013 Systems Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forsythtech.edu\/#website\",\"url\":\"https:\/\/www.forsythtech.edu\/\",\"name\":\"Forsyth Tech Community College\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forsythtech.edu\/#organization\"},\"alternateName\":\"Forsyth Tech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forsythtech.edu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forsythtech.edu\/#organization\",\"name\":\"Forsyth Tech Community College\",\"url\":\"https:\/\/www.forsythtech.edu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forsythtech.edu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/06\/forsyth-logo.png\",\"contentUrl\":\"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/06\/forsyth-logo.png\",\"width\":867,\"height\":163,\"caption\":\"Forsyth Tech Community College\"},\"image\":{\"@id\":\"https:\/\/www.forsythtech.edu\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/forsythtech\",\"https:\/\/x.com\/ForsythTechCC\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT \u2013 Systems Security - Forsyth Tech Community College","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/","og_locale":"en_US","og_type":"article","og_title":"IT \u2013 Systems Security - Forsyth Tech Community College","og_url":"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/","og_site_name":"Forsyth Tech Community College","article_publisher":"https:\/\/www.facebook.com\/forsythtech","article_modified_time":"2025-08-25T19:35:34+00:00","og_image":[{"width":1250,"height":834,"url":"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/03\/IT-resize-19.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@ForsythTechCC","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/","url":"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/","name":"IT \u2013 Systems Security - Forsyth Tech Community College","isPartOf":{"@id":"https:\/\/www.forsythtech.edu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/#primaryimage"},"image":{"@id":"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/03\/IT-resize-19.jpg","datePublished":"2023-04-05T18:00:34+00:00","dateModified":"2025-08-25T19:35:34+00:00","breadcrumb":{"@id":"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/#primaryimage","url":"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/03\/IT-resize-19.jpg","contentUrl":"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/03\/IT-resize-19.jpg","width":1250,"height":834,"caption":"image of cables"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forsythtech.edu\/"},{"@type":"ListItem","position":2,"name":"IT \u2013 Systems Security"}]},{"@type":"WebSite","@id":"https:\/\/www.forsythtech.edu\/#website","url":"https:\/\/www.forsythtech.edu\/","name":"Forsyth Tech Community College","description":"","publisher":{"@id":"https:\/\/www.forsythtech.edu\/#organization"},"alternateName":"Forsyth Tech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forsythtech.edu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forsythtech.edu\/#organization","name":"Forsyth Tech Community College","url":"https:\/\/www.forsythtech.edu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forsythtech.edu\/#\/schema\/logo\/image\/","url":"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/06\/forsyth-logo.png","contentUrl":"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/06\/forsyth-logo.png","width":867,"height":163,"caption":"Forsyth Tech Community College"},"image":{"@id":"https:\/\/www.forsythtech.edu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/forsythtech","https:\/\/x.com\/ForsythTechCC"]}]}},"_links":{"self":[{"href":"https:\/\/www.forsythtech.edu\/wp-json\/wp\/v2\/program_tracks\/3170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forsythtech.edu\/wp-json\/wp\/v2\/program_tracks"}],"about":[{"href":"https:\/\/www.forsythtech.edu\/wp-json\/wp\/v2\/types\/program_tracks"}],"version-history":[{"count":1,"href":"https:\/\/www.forsythtech.edu\/wp-json\/wp\/v2\/program_tracks\/3170\/revisions"}],"predecessor-version":[{"id":23394,"href":"https:\/\/www.forsythtech.edu\/wp-json\/wp\/v2\/program_tracks\/3170\/revisions\/23394"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forsythtech.edu\/wp-json\/wp\/v2\/media\/2670"}],"wp:attachment":[{"href":"https:\/\/www.forsythtech.edu\/wp-json\/wp\/v2\/media?parent=3170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}