Nov 25, 2024  
2020-2021 Catalog 
    
2020-2021 Catalog [PAST CATALOG]

Information Assurance and Cybersecurity (A.A.S.)


Return to {$returnto_text} Return to: Science and Technology

Award: Associate of Applied Science degree, A.A.S.

Total Credit Hours: a minimum of 61

About the Cybersecurity, Networking and Digital Forensics Department

Purpose: Provides training in computer security disciplines with three specific focus areas: security, digital forensics and networking. These degrees prepare students for entry level positions in information assurance and cybersecurity.

Additional Program Requirements

A grade of C or better is required in each Information Assurance and Cybersecurity program course requirement.

Areas of Concentration: This degree requires that students choose a concentration in one of three areas. A concentration is a structured plan of study within a degree program. The number of credit hours and particular course requirements for a concentration varies, as listed below.  To achieve a concentration, students must receive credit for every course requirement listed under that concentration.

Three Concentrations:

1. Information Assurance and Cybersecurity - Security (code AAS.CIS.SECURITY): This program emphasizes computer security and information assurance concepts augmented with current accepted industry practices. Topics cover threats and vulnerabilities, prevention at the technical (hardware and software) and human levels, detection, response, and management aspects of security. This program fully maps to the requirements of DHS/NSA Centers of Academic Excellence in 2-Year Education. This program provides partial foundation for the CCENT (Cisco Certified Entry Networking Technician) certification exam.

  Range of Occupations
 
  • Security specialist
  • Information assurance security specialist
  • Information systems security analyst
  • Manager of network and data security
  • Applications security specialist
  • Operating system security specialist

2. Information Assurance and Cybersecurity - Digital Forensics (code AAS.CIS.DIGITAL-FRSC): This program emphasizes the proper handling of digital evidence; the tools and techniques utilized in forensics analysis, the importance of proper documentation and report generation; and the laws and ethics that govern evidence handling. Topics include the proper collection and preservation of digital evidence; the retrieval of evidence from multiple environments and devices; the use of commercial forensics and open source tools; manual recovery techniques; the analysis of collected information; and proper documentation and reporting. This program articulates to the Department of Defense Cyber Investigative Training Academy and is designated a Defense Cyber Crime Center National Center of Digital Forensics Academic Excellence.

  Range of Occupations
 
  • Computer forensic investigator
  • Corporate forensic investigator
  • Incident Handler
  • Incident Responder
  • Law enforcement investigator
  • Legal investigator
  • Private investigator
  • Financial investigator
  • Loss prevention agent
  • Computer forensic analyst
  • Counterintelligence agent
  • Policy analyst
  • eDiscovery specialist
  • eDiscovery project manager
  • Data restoration specialist
  • Forensics analyst
  • Forensics consultant
  • Forensic science technician
  • Technology risk management professional

3. Information Assurance and Cybersecurity - Networking (code AAS.CIS.NETWORK): This program incorporates a study of data communication fundamentals together with an in-depth study of current networking architectures and protocols. Client/server and peer networks are specifically studied together with hands-on laboratory time working with Microsoft, UNIX/LINUX and Cisco systems. A combination of lecture and labs provide the basis for potential networking certifications. This program provides partial foundation for the CCENT (Cisco Certified Entry Networking Technician) and CCNA (Cisco Certified Network Associate) certification exams.

  Range of Occupations
 
  • LAN system administration
  • Network installation
  • Network management
  • WAN Management Technology
  • Linux administrator
  • Windows Server administrator
  • System administrator

Related Industry Certifications:  These programs also provide the foundation for the following industry recognized certifications: CompTIA Network+ and CompTIA Security+.

Graduates in these fields will find positions available in industry, education and government.

Honors Program Courses


If you qualify for the Honors Program, you may take honors versions  of some courses (such as ENG 101H , ENG 102H , etc.).

Graduation Requirements


See Academic Regulations for college-wide Graduation Requirements .

General Education Requirements: 21 credits


An approved list of general education courses can be found in the General Education and Diversity, Technology and Wellness Requirements  section of the catalog. Choose general education courses from the following topics:

English Composition: 6 credits


Arts and Humanities: 3 credits


Biological and Physical Sciences: 3 credits


Mathematics: 3 credits


Social and Behavioral Sciences: 3 credits


Student should select a course that satisfies the college Diversity requirement. See General Education Social and Behavioral Sciences and Diversity Requirements  for a list of approved courses.

Additional General Education Requirement: 3 credits


Program Requirements: 40 credits


These are the 16 credits of common program requirements for all three areas of concentration.  Students must complete all of these courses with a grade of C or better.

Students must select one Area of Concentration in Security, Digital Forensics, or Networking:


Security Area of Concentration Requirements: 24 credits


Degree Awarded: Information Assurance and Cybersecurity - Security Concentration (AAS.CIS.SECURITY). Students must complete all of these courses with a grade of C or better.

Digital Forensics Area of Concentration Requirements: 24 credits


Degree Awarded: Information Assurance and Cybersecurity - Digital Forensics Concentration (AAS.CIS.DIGITAL-FRSC). Students must complete all of these courses with a grade of C or better.

Networking Area of Concentration Requirements: 24 credits


Degree Awarded: Information Assurance and Cybersecurity - Networking Concentration (AAS.CIS.NETWORK). Students must complete all of these courses with a grade of C or better.

Diversity Requirement


Students may satisfy the diversity requirement simultaneously as they satisfy the Social and Behavioral Sciences general education requirement. See Diversity Requirement  for a list of approved courses.

Technology Requirement


Satisfied by CTS 107 .  

Wellness Requirement


Satisfied by BIO 135 .

Fast Track Option


This program has a Fast Track Option  for those holding a college degree.

Program Outcomes


Upon successful completion of the Security Area of Concentration, students will be able to:

  1. Analyze network traffic.
  2. Secure network devices and operating systems.
  3. Identify security threats.
  4. Design, configure, and test secure networks.
  5. Identify and implement risk management and security policies.
  6. Effectively communicate technical information.

Upon successful completion of the Digital Forensics Area of Concentration, students will be able to:

  1. Plan and perform digital forensic investigations including preservation, handling, analysis, and documentation of evidence.
  2. Use industry standard tools to access digital evidence and conduct forensic analysis.
  3. Relate the functionality of operating systems and networks to digital evidence.
  4. Explain the characteristics of computer crime offenses and offenders.
  5. Apply Constitutional and case law to digital forensics investigations.
  6. Effectively communicate technical information.

Upon successful completion of the Networking Area of Concentration, students will be able to:

  1. Design, implement, and troubleshoot local and wide area networks.
  2. Perform basic and advanced configurations on routers and Ethernet devices.
  3. Apply relevant policies and procedures to secure and monitor network systems.
  4. Design, implement, and manage server-based systems to support network infrastructure.
  5. Effectively communicate technical information.

This program aligns with the college’s core competencies.

Career and Educational Advancement Resources


   

Return to {$returnto_text} Return to: Science and Technology