Cybersecurity AAS-T (105 Credits)
Plan Code: CISCYAAS
EPC: 506
The Cybersecurity Associate in Applied Science-Transfer (AAS) balances preparation for direct employment and transfer to a bachelor of applied science (BAS) program in select colleges. This six-quarter program provides a solid foundation on information technology administration, integrates the principles and ethical standards expected of cybersecurity professionals, and requires a purposefully selected amount of general education courses to meet transfer requirements. The technical core of the program trains students in the fields of Security +, CySA+, N|DE, Linux, Cisco, and E|HE. Students explore system hardware, software, networking, cisco devices, and virtualization.
Embedded certificates focus on skills sought by the Computing Technology Industry Association (CompTIA) and the International Council of Electronic Commerce Consultants (E-Council) exams. Students can prepare themselves for industry certifications as well as internship opportunities through exclusive corporate and public partnerships with the program.
Courses are mostly delivered via hybrid (part onsite, part online) and online modalities. Students participate in hands-on learning through coursework and in a state-of-the-art cyber lab while on campus as well as engage in digital learning activities. Students will be responsible for either having their own laptop or checking one out from the college. They will need access to the Internet and to purchase 8GB+ USB, books, and Testout access.
Cybersecurity AAS-T differs from its Cybersecurity Associate in Applied Science (AAS) counterpart in the number and focus of technical core courses as well as the number of general education credits required to earn each credential. Consult with your advisor to determine the best option given your career and academic goals.
Outcomes
Communicate effectively with diverse audiences across all levels and demonstrate an understanding of the value of diversity and community.
Communicate an understanding of professional and ethical responsibility as it relates to legal liability in information technology and business.
Demonstrate critical thinking to support integrity, confidentiality, availability of data, and information.
Demonstrate technical proficiency applying procedures to operate more securely, efficiently, and effectively using decision-making strategies to understand the needs and limitations of business and information technology.
Implement and evaluate computer-based solutions to meet requirements of hardware, operating system, cloud, and security infrastructure.
Collect and analyze data from a variety of sources to identify and report events that occur or might occur within the network to protect data information systems and networks from vulnerabilities and threats.
Investigate deviations from acceptable configurations, identify security vulnerabilities, solve problems, make decisions to recommend appropriate defensive countermeasures.
Total Credit Hours: 105