Major: 3010
Catalog Year: 2023-2024
Effective Term: 2010 Fall
Last Admit Term: (Mor)
Award: AAS Total Credits: 62 CIP Code: 11.0901 |
Primary College:
Initiating College: Mesa Community College
Program Availability: Not Found
Program Availability: College-Specific (Mor)
Field of Interest:
Instructional Council: Computer Information Systems (12) GPA: 2.00 |
SOC Code:
|
Program Prerequisites: None
|
|||||||||||
Required Courses | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
+ CIS247DA Cyber Forensics and Incident Handling 3 | Credits: 25 |
Restricted Electives | |||
---|---|---|---|
CNT185 Cisco Network Security 4 | Credits: 15-16 |
General Electives | |||
---|---|---|---|
| Credits: |
General Education Requirements | |||
---|---|---|---|
General Education Requirement | Credits: 22-24 | ||
General Education Core | Credits: 12-14 | ||
First-Year Composition | Credits: 6 | ||
ENG101 First Year Composition (3) AND
ENG111 Technical Writing (3) | |||
Oral Communication | Credits: 3 | ||
COM100 Introduction to Human Communication (3) OR
COM225 Public Speaking (3) OR COM230 Small Group Communication (3) | |||
Critical Reading | Credits: 0 | ||
Met by Program Prerequisite | |||
Mathematics | Credits: 3-5 | ||
MAT150 College Algebra / Functions (5) OR
MAT151 College Algebra / Functions (4) OR MAT152++ College Algebra / Functions (3) | |||
General Education Distribution | Credits: 10 | ||
Humanities, Arts and Design | Credits: 3 | ||
Any approved general education course in the Humanities and Fine Arts area.
PHI214 Business Ethics suggested but not required. | |||
Social-Behavioral Sciences | Credits: 3 | ||
ECN211 Microeconomic Principles (3) OR
ECN212 Macroeconomic Principles (3) | |||
Natural Sciences | Credits: 4 | ||
PHY101 Introduction to Physics | |||
Program Competencies | |||
---|---|---|---|
1. Explain and apply forensic and advanced incident handling techniques in a lab setting, demonstrating hands-on skills in incident response, forensic preparation, Windows forensics, UNIX and Linux forensics, data recovery and analysis, malicious code analysis, law enforcement interaction and case law, corporate and managerial legal concerns and direction. Prepare for GIAC Certified Forensic Analyst (GCFA) Certification and IACIS Certified Forensic Computer Examiner (CFCE) certification. (CIS247DA)
2. Explain and apply Unix system administration and security management, including directory structure, access control and authentication mechanisms, password management, system logs and monitoring, process accounting, configuring public services, restricted environments, the sudo command, SSH (Secure Shell), file system mount options, file integrity management, immutable/append-only files and system security levels, loadable kernel modules, rootkits, non-executable stacks, backups, common vulnerabilities and exposures, and firewall filtering. (CIS238US) 3. Explain and apply architecture of network defense and skills for system administrators to implement network defense. Includes network defense fundamentals, designing and configuring firewalls, configuring Virtual Private Networks (VPNs), designing and configuring an Intrusion Detection System (IDS), analyzing intrusion signatures, performing risk analysis, and creating a security policy. (CIS272DA) 4. Explain and apply network security-related fundamentals, issues, and skills for systems administrators to implement network security including network security basics, advanced Transmission Control Protocol/Internet Protocol (TCP/IP), IP packet structure and analysis, routing and access control lists, securing Windows computers, securing Linux computers, Internet security, and hacker attack techniques. (CIS271DA) 5. Identify and analyze legal implications of organizational computing policies, evidence collection, risk management and mitigation of liability. (CIS247DL) 6. Explain and apply procedures for security and protection of data with emphasis on physical security of data servers and storage, disaster recovery plan and procedures, backup management and procedures, business continuity planning for unusual conditions, data confidentiality, integrity, and assurance, data retention policy and procedures, data warehouse, data use authorization and authentication, securing data in the mobile environment, handling data in response to cyber crime, data risk identification and assessment, and user education in and awareness of data assurance. (CIS273DC) 7. Apply core skills and knowledge in information assurance to real-world scenarios or simulations of information security vulnerabilities (CIS279DA) 8. Explain and apply knowledge, skills, and abilities in basic risk analysis techniques to secure information and conduct a technical audit of essential information systems (CIS273DA). | |||
+ indicates course has prerequisites and/or corequisites.
++ indicates that any suffixed course may be selected. MCCCD Governing Board Approval Date: 5-25-04 |