Laserfiche WebLink
AAS DEGREE CYBER SECURITY <br />High School Diploma or GED Required — Offered as Hybrid or Fully Online <br />PROGRAM DESCRIPTION <br />The emphasis of this program is placed on courses which enable the student to gain theoretical knowledge important for working in the field and to <br />apply concepts to meet their occupational objectives. Upon completion of all requirements the student will be awarded an AAS (Associates in Applied <br />Sciences) This degree provides the necessary knowledge for career -relevant industry certifications In cyber security Emphasis Is placed on courses <br />which enable the student to gain theoretical knowledge important for working in the field of information security. Upon completion of all <br />requirements the student will be awarded a Certificate In Cyber Security. The Cyber Security program provides graduates with the necessary skillsto <br />succeed In today's business, banking and defense world. Areas of study include cybercrime, ethical hacking, network security as well as digital <br />forensics and security compliance legal issues. <br />PROGRAM OBJECTIVES <br />The program prepares Individuals to plan, organize, direct, and secure the virtual connections of a firm or organization. Students will learn to <br />troubleshoot computer, operating systems, network switches and routers. The learner will also attain foundational skills in cyber defense to <br />investigate, detect, and quarantine malware and be prepared for optional industry certification testing in A+, N +, S+, Linux/Kali Llnux, ECH-Certified <br />Ethical Hacking, Risk Management CASP+, and Pen -Testing. The program prepares students to plan, Implement, upgrade, or monitor security <br />measures for the protection of computer networks and information. The graduate may ensure appropriate security controls are In place that will <br />safeguard digital files and vital electronic Infrastructure. The graduate may also respond to computer security breaches and viruses. <br />OCCUPATIONAL OBJECTIVES <br />The program provides graduates with knowledge to work In Information security governance, network intrusion forensic investigator as well as <br />understanding the chain of custody for recording a digital cyber breach. The student will learn both hard and soft skills needed for this booming <br />career. Typical job titles include Data Security Administrator, Information Security Officer, Information Security Specialist, Information Systems <br />Security Analyst, Information Systems Security Officer, Information Technology Security Analyst (IT Security Analyst), Information Technology <br />Specialist, Network Security Analyst, Security Analyst, Systems Analyst. <br />DEGREE REQUIREMENTS <br />COURSE TITLE/NUMBER <br />LECTURE <br />HOURS <br />CLOCK CREDIT <br />LABORATORY <br />HOURS <br />CLOCK CREDIT <br />INTERNSHIP <br />HOURS <br />CLOCK CREDIT <br />TOTAL ACADEMIC <br />HOURS&CREDITS <br />CLOCK CREDITS <br />PC101 Hardware Security <br />30 <br />2 <br />60 <br />2 <br />0 <br />0 <br />90 <br />4 <br />PC102 Software Security <br />30 <br />2 <br />60 <br />2 <br />0 <br />0 <br />90 <br />4 <br />NET101 Network Security <br />30 <br />2 <br />60 <br />2 <br />0 <br />0 <br />90 <br />4 <br />NET102 Securing Network Firewalls <br />30 <br />2 <br />60 <br />2 <br />0 <br />0 <br />90 <br />4 <br />CYB101 Securing Threats, Attacks & Vulnerabilities <br />30 <br />2 <br />60 <br />2 <br />0 <br />0 <br />90 <br />4 <br />FCEH2O1 Certified Ethical Hacking <br />30 <br />2 <br />60 <br />2 <br />0 <br />0 <br />90 <br />4 <br />LIX201 Kali-Linux Security <br />30 <br />2 <br />60 <br />2 <br />0 <br />0 <br />90 <br />4 <br />CY6102 Advanced Security Essential & Malware <br />30 <br />2 <br />60 <br />2 <br />0 <br />0 <br />90 <br />4 <br />PEN201 Penetration Testing Attacks & Exploits <br />30 <br />2 <br />60 <br />2 <br />o <br />0 <br />90 <br />4 <br />PEN202 Implementing Penetration Testing Tools <br />30 <br />2 <br />60 <br />2 <br />0 <br />0 <br />90 <br />4 <br />ISICP301 Certified Information Systems Security <br />Pro-CISSP <br />30 <br />2 <br />60 <br />2 <br />0 <br />0 <br />90 <br />4 <br />ISPP301 Risk Analysis <br />30 <br />2 <br />60 <br />2 <br />0 <br />0 <br />90 <br />4 <br />GENERAL EDUCATION COURSES- <br />5Required 15 Credits <br />MAT101 College Mathematics <br />45 <br />3 <br />0 <br />0 <br />0 <br />0 <br />45 <br />3 <br />ENG101 English Composition <br />45 <br />3 <br />0 <br />0 <br />0 <br />0 <br />45 <br />3 <br />PSY101 Principles of Psychology <br />45 <br />3 <br />0 <br />0 <br />0 <br />0 <br />45 <br />3 <br />BUS111 Personal Leadership <br />45 <br />3 <br />0 <br />0 <br />0 <br />0 <br />45 <br />3 <br />PRO100 Professional Development <br />45 <br />3 <br />0 <br />0 <br />o <br />0 <br />45 <br />3 <br />TOTALS <br />585 <br />39 <br />- 720 <br />24 <br />0 <br />0 <br />1305 <br />63 <br />1305 HOURS <br />MAXIMUM STUDENT/TEACHER RATIO <br />CLASSROOM/LAB EQUIPMENTAND SUPPLIES <br />Tables and chairs, White Boards, Projector. Computer lab <br />withcomputers and printer available to all programs. <br />CIP CODE: 11.1003 <br />LECTURE-45:1 LAB-24:1 <br />SOC - O*NET: 15-1122 <br />68 WEEKS TO COMPLETE <br />PROGRAM -SPECIFIC EQUIPMENT AND SUPPLIES <br />No specialized laboratory equipment required. <br />571 I ts:e Inlert.'naa t blte_es School (.at:Jn.• <br />