Degree Offered: Associate in Applied Science
Credits Required: 62
The Cybersecurity program is designed to provide students with the necessary skills to maintain the confidentiality, integrity, and availability of an organization's data. The data network, infrastructure, and storage hardware and software must be resistent to penetration, and disruption due to malicious activity, accident, or natural disaster.
Classrooms are equipped iwth computer hardware, operating systems, and security software. Topics include data recovery, penetration testing, firewalls, security audits, and leveraging privacy-enhancing technologies such as data, hardware, and facilities.
Graduates of this program are prepared for entry-level employment as a computer security coordinator, intrusion detection analyst, network security analyst, security audit specialist, and risk analysis specialist.
Click below to view a crosswalk (transition of program courses from an old program to a current program):
2010 - 2011 - Computer Forensics
2009 - 2010 - Computer Forensics
2012-2013 - Computer Forensics to Cybersecurity
Curriculum - 1st Year
First Semester - 17 Credits
Introduction to Information Tech
A computer course designed to introduce students to personal computers. Topics include basic concepts of computer operations, storage media, software categories, Windows operating system, computer communication devices, and Internet. The course also includes introduction to Microsoft Word, Excel, Access, and PowerPoint. 3-0-3
CISCO I-Network Fundamentals
This course is designed to introduce students to computer networking fundamentals. Topics include binary numbering systems, electronics and signals, network cabling and testing, network topologies, close study of OSI and TCP/IP network models, IP addressing including sub/net masking, and basic network design. The course covers the CCNA Semester 1 training material. This course, in conjunction with CISN110, CISN215, and CISN220 may assist students in preparation for Cisco Network+ and CCNA certification exams. 5-0-5
Microcomputers and Cloud Services
The course is intended for students who want more information on maintaining and managing their computers; or for those students who want to prepare the Computing Technology Association's A+ Certification. Some of the areas that will be covered include troubleshooting fundamentals; basic and preventative maintenance techniques; computer upgrades; operating systems; networking and Internet connections; printer connections and interfaces; types of RAM; data recovery; and the various multimedia options available for legacy PCs. An equal emphasis will be placed on identifying and supporting today's emerging tablet computers, smartphones, and cloud computing technologies throughout the course. 3-0-3
Introduction to Criminal Justice
This course is an overview of the American criminal justice system dealing with the role of the police, courts, and correctional institutions. The course also covers constitutional limits of police power, the trial process and sentencing structure, and the functions of the numerous agencies within the criminal justice system. 3-0-3
Students will practice expository writing and learn the academic form of the essay and research paper. Students will focus on the development of an academically sound and challenging thesis and resulting essay. The mechanics of writing will be reviewed as needed. 3-0-3 Pre-requisite: Placement testing; successful completion of DEVS012 Reading and DEVS015 Introduction to College Writing if required, permission of the Division Director.
Second Semester - 17 Credits
CISCO II-Routing Protocols and Conc
This course is the study of advanced networking concepts. WAN and the function of routers, router components, protocols and configuration, ISO images, IP addressing, network troubleshooting, introduction to network security and management, and introduction to residential networking. The course covers the CCNA Semester 2 training material. This course, in conjunction with CISN100, CISN215, and CISN220 prepares students for the Cisco Network + and CCNA certification exams.Prerequisite 100
This course focuses on skills needed to deploy and manage Windows 7 Operating System. Installation and troubleshooting of Windows 7, as well as features such as advanced security are covered. Virtualization techniques using Microsoft's Virtual PC are used to install MS-Windows XP (XP Mode) and other operating systems. Material covered may assist in preparation for the MCTS (Microsoft Certified Technical Specialist) #70-680 certification exam. (3-0-3)
This course focuses on skills needed to deploy and manage Linux (Fedora/Red Hat) Operating Systems. Topics include Linux installation, file systems, administration, troubleshooting, and network management using command line statements and Graphical User Interfaces. The use of open source operating systems are becoming dominant in the role of server operating systems and becoming a foundation for virtualization and cloud computing. Course material may assist in preparation for the CompTIA Linux+ certification exam. 3-0-3
Mathematics of Business (or higher)
The first part of the course reviews the mathematics fundamental not only to employment in business but also to intelligent participation in consumer life. Topics to be reviewed include fractions and decimals; ratio and proportion; units of measurement; and percentage. The second part of the course is devoted to business applications. Topics include trade and cash discounts; markup; simple interest; payroll; sales and property tax; and elementary statistical notions. 3-0-3
Description not found.
This course introduces students to the three major forms of literary expression: fiction, poetry, and drama. Significant works from each form will be analyzed to reveal creative techniques, how they represent an author’s time, and how they reflect today’s human condition.
Writing For Business/Tech
Designed to train the student in effective writing, this course aims to increase the student’s ability to write with unity, coherence, and logic. It provides additional study and practice in writing letters, proposals, manuals, and reports of a business or technical nature as well as in professional and contemporary research methods. Prerequisite: WRIT101 3-0-3
Curriculum - 2nd Year
Third Semester - 16 Credits
Provides an introduction to the communication process that occurs between people. Students will gain the knowledge and skills necessary to develop, maintain, and evaluate dyadic relationships through language, perception, self-disclosure, listening and nonverbal communication. Emphasis will be placed on building effective interpersonal relations in a business environment. 3-0-3
This course provides students with an in-depth and comprehensive coverage of all security risks and threats to an organization's data. The topic of information security begins with a study of inventory management, security audits, anti-virus tools, data backup and data recovery. Students will implement basic hardware, software, network and Internet Security configurations. Case studies and current events will give the student insite into current threats that impact an organization. This course and Cybersecurity II may be used for preparing student for CompTIA Security+ certification exam. Prerequisite: CISN110, CISN200. 3-0-3
This course focuses on skills needed to manage a Windows Server 2008 system. Windows Server 2008 materials covered inlcude active directory design, account management, group policy management and configuation, certificate services, AD LDS, AD RMS, AD FS, server core, Windows Hyper-V virtualization, and server management. Material covered may assist in preparation for the MCTS (Microsoft Certified Technical Specialist) #70-640 certification exam.
Interview & Interrogation
The course covers fundamentals of the interviewing process and interrogative technology, taking into consideration the nature, methods, and principles of interviewing with emphasis on role playing in interviews. 3-0-3
The course deals with the nature and causation of crime; approaches to the study of crime, its treatment and prevention; sociology of criminal law; current theories and research on the nature of criminal behavior.
Fourth Semester - 12 Credits
Computer Forensics & Investigation
This course teaches students the fundamentals of computer forensics and investigation. Topics include principles of computer investigations, current computer forensics software tools, digital evidence controls, computer forensic analysis, email investigations, recovering image files, writing investigation reports, and becoming an expert witness. Prerequisite: CISN105, CISF210 3-0-3
This course provides the student with an in-depth coverage of all current risks and threats to an organization's data along with a structured way of addressing the safeguarding of these critical electronic assets using hands-on and practical techniques for working in the security field in the 21st century. Topics include: attacks and malicious code, remote access, e-mail, web security, wireless and instant messsaging, firewalls, intrusion detection, cryptography and principles of disaster recovery. Cybersecurity I and Cybersecurity II may be used for preparing the student for the CompTIA Security + certification exam. 3-0-3
This course is designed to give second/year students supervised, on the job experience in various aspects of the business technologies environment. All students will be required to spend a minimum of six hours per week at the firm where he/she is assigned. Each student will meet with a faculty member before his or her assignment to establish goals and then several times throughout the semester to assess student progress. Prerequisite: Successful completion of 30 credits in course of study with QPA of 3.0 or better and faculty approval 0-9-3
Elements of this course are broken into three sections: (1) Server Virtualization, (2) Virtualization Management, and (3) Virtual Desktop Infrastructure (VDI). It includes hands-on installation of Hyper-V , many components of the System Center Suite, including VMM 2012, and VDI solutions. This Virtualization overview provides an excellent perspective of Microsoft's overall vision for virtualization as well as the options and advantages organizations can realize by implementing virtualization. 3-0-3
Cybersecurity: Law & Ethics
The course is designed to introduce the student to the dynamic of information security. Information security covers a broad range of areas; from keeping networks secure from hackers to protection of one's own personal information. Areas of study will include ethical, moral, and legal issues; industry and vendor specific certifications; encryption and decryption methods and protocols; and the security system design life cycle. The latest developments in information security and network security will also be covered. 3-0-3