Award: Associate of Applied Science degree, A.A.S.
Total Credit Hours: a minimum of 61
About the Cybersecurity, Networking and Digital Forensics Department
Purpose: Provides training in computer security disciplines with three specific focus areas: security, digital forensics and networking. These degrees prepare students for entry level positions in information assurance and cybersecurity.
Additional Program Requirements
A grade of C or better is required in each Information Assurance and Cybersecurity program course requirement.
Areas of Concentration: This degree requires that students choose a concentration in one of three areas. A concentration is a structured plan of study within a degree program. The number of credit hours and particular course requirements for a concentration varies, as listed below. To achieve a concentration, students must receive credit for every course requirement listed under that concentration.
1. Information Assurance and Cybersecurity - Security (code AAS.CIS.SECURITY): This program emphasizes computer security and information assurance concepts augmented with current accepted industry practices. Topics cover threats and vulnerabilities, prevention at the technical (hardware and software) and human levels, detection, response, and management aspects of security. This program fully maps to the requirements of DHS/NSA Centers of Academic Excellence in Cyber Defense Education.
- Security specialist
- Information assurance security specialist
- Information systems security analyst
- Manager of network and data security
- Applications security specialist
- Operating system security specialist
2. Information Assurance and Cybersecurity - Digital Forensics (code AAS.CIS.DIGITAL-FRSC): This program emphasizes the proper handling of digital evidence; the tools and techniques utilized in forensics analysis, the importance of proper documentation and report generation; and the laws and ethics that govern evidence handling. Topics include the proper collection and preservation of digital evidence; the retrieval of evidence from multiple environments and devices; the use of commercial forensics and open source tools; manual recovery techniques; the analysis of collected information; and proper documentation and reporting. This program articulates to the Department of Defense Cyber Investigative Training Academy and is designated a Defense Cyber Crime Center National Center of Digital Forensics Academic Excellence.
- Computer forensic investigator
- Corporate forensic investigator
- Incident Handler
- Incident Responder
- Law enforcement investigator
- Legal investigator
- Private investigator
- Financial investigator
- Loss prevention agent
- Computer forensic analyst
- Counterintelligence agent
- Policy analyst
- eDiscovery specialist
- eDiscovery project manager
- Data restoration specialist
- Forensics analyst
- Forensics consultant
- Forensic science technician
- Technology risk management professional
3. Information Assurance and Cybersecurity - Networking (code AAS.CIS.NETWORK): This program emphasizes installing, repairing and administering local and wide area networks. The program incorporates a study of data communication fundamentals together with an in-depth study of current networking architectures and protocols. Client/server and peer networks are studied together with hands-on laboratory time working with Microsoft, Linux and Cisco systems.
- LAN system administration
- Network installation
- Network management
- WAN Management Technology
- Linux administrator
- Windows Server administrator
- System administrator
Related Industry Certifications: These programs also provide the foundation for the following industry recognized certifications: CompTIA Network+ and CompTIA Security+.
Graduates in these fields will find positions available in industry, education and government.