powered by
Center for Curriculum and Transfer Articulation
Major: 3197
Effective Term: 2021 Fall   

Award: AAS
Total Credits: 61-74
CIP Code: 11.1003

Instructional Council: Computer Information Systems (12)
GPA: 2.0
SOC Code: Upon completion of this degree, students may pursue a career as:
15-1122.00 Information Security Analysts
15-1142.00 Network and Computer Systems Administrators
15-1152.00 Computer Network Support Specialists

Upon completion of a bachelor`s degree, students may pursue a career as:
11-3021.00 Computer and Information Systems Managers
15-1241.00 Computer Network Architects


Description: The Associate in Applied Science (AAS) in Cybersecurity is designed to focus on the necessary skills required to secure, protect and identify vulnerabilities in a network, including various operating systems and network devices. Emphasis is placed on developing the theoretical, legal, ethical and practical skills needed to maintain security on mission-critical networking and server systems. The program is designed to meet the training needs of government and industry employees. The program covers a variety of information security technologies and structured languages. The Cybersecurity program also focuses on the skills needed for internationally recognized IT certifications and high demands in business, industry, and government. Certificates of Completion (CCLs) are also available in the following areas: Cybersecurity Fundamentals, Cyber Operations, Linux System Administration, Microsoft, Cisco Networking CCNA Security, Cyber Engineering, and Critical Infrastructure.



Required Courses
+ BPC270 A+ Exam Prep: Operating System Configuration and Support (3) OR
MST150++ Any Microsoft Windows course (3) 3
(MST150++ required for Microsoft System Administration specialization and Critical Infrastructure specialization)

CIS105 Survey of Computer Information Systems 3

CIS111 Ethics in Information Technology (3) OR
ITS120 Legal, Ethical and Regulatory Issues (3) 3

CIS126DL Linux Operating System (3) OR
CIS126RH Red Hat System Administration I (3) 3

+ CIS156 Python Programming: Level I 3

+ CIS190 Introduction to Networking (3) OR
CNT140AB Introduction to Networks (4) 3-4
(CNT140AB required for Cisco Network Administration and Security specialization and Critical Infrastructure specialization)

+ CIS271DB Information Security Essentials (3) AND
+ CIS272DB Information Security Principles (3) OR
+ CIS270 Essentials of Network and Information Security (3) OR
+ ITS110 Information Security Fundamentals (3) 3-6
(ITS110 required for Cyber Operations specialization; CIS271DB AND CIS272DB required for Critical Infrastructure specialization)

+ ITS240 Ethical Hacking and Network Defense 3
Credits: 24-28

Learning Outcomes
1. Explain the fundamental components, concepts, and application of cybersecurity principles. (BPC170, BPC270, CIS105, CIS126DL, CIS126RH, CIS143, CIS156, CIS162++, CIS201, CIS202, CIS203, CIS227, CIS238DL, CIS238RH, CIS239DL, CIS240DL, CIS240RH, CIS250, CIS262++, CIS270, CIS271DB, CIS271DL, CIS271RH, CIS272DB, CIS275DL, ITS110, ITS291, ITS292, MST150++, [FYC])
2. Describe cyber defense tools, methods, and components. (CIS156, CIS190, CIS270, CIS271DB, CIS272DB, CNT140AB, CNT150AB, ITS110, ITS240, ITS291, ITS292, (COM), (CRE))
3. Apply cyber defense methods to prepare a system to repel attacks. (CIS156, CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS272DB, CIS290AC, CIS298AC, CNT150AB, CNT160AB, CNT202, CNT205, ITS110, ITS240, [SG], [SQ])
4. Analyze common security failures and identify specific design principles that have been violated. (CIS121AH, CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS272DB, CNT202, CNT205, ITS110, MST155DC, MST157DC, MST158DC)
5. Understand the interaction between security and system usability and the importance for minimizing the effects of security mechanisms. (CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS272DB, CNT160AB, ITS110, MST155DC, MST157DC, MST158DC)
6. Apply appropriate protocols, tools, and techniques to maximize security in the network environment. (CIS119DO, CIS156, CIS162++, CIS190, CIS201, CIS202, CIS203, CIS227, CIS262++. CIS270, CIS271DB, CIS272DB, CIS276++, CIS290AC, CIS298AC, CNT140AB, CNT150AB, CNT160AB, CNT202, CNT205, ITS110, ITS240, ITS291, ITS292, [MA], [SG], [SQ])
7. Describe the fundamental concepts, technologies, components, vulnerabilities, and issues related to networks. (BPC170, CIS105, CIS119DO, CIS143, CIS190, CIS201, CIS202, CIS238DL, CIS238RH, CIS270, CIS271DB, CIS272DB, CIS276++, CNT140AB, CNT150AB, CNT160AB, CNT202, CNT205, ITS110, (COM))
8. Identify and describe basic security issues of operating systems. (BPC270, CIS105, CIS121AH, CIS126DL, CIS126RH, CIS201, CIS238DL, CIS238RH,, CIS239DL, CIS240DL, CIS240RH, CIS270, CIS271DB, CIS271DL, CIS271RH, CIS272DB, CIS275DL, ITS110, ITS240, MST150++, MST155DC, MST157DC, MST158DC)
9. Identify perpetrators, their resources, and their motivations in cyberspace. (CIS111, CIS143, CIS203, CIS270, CIS271DB, CIS272DB, CIS290AC, CIS298AC, ITS110, ITS120, ITS240)
10. Compare and contrast offensive and defensive resources used in cybersecurity ecosystems/environment. (CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS272DB, CIS290AC, CIS298AC, ITS110, ITS240, (COM), (CRE), [FYC])
11. Delineate differences between the moral, behavioral, ethical, and legal ramifications found in the cybersecurity world. (CIS105, CIS111, CIS143, CIS156, ITS120, (CRE) [FYC], [HU], [SB], [SG], [SQ])
12. Apply knowledge of regulatory and legal requirements to ensure compliance. (CIS111, CIS143, CIS202, CIS290AC, CIS298AC, ITS120, ITS240, (CRE), [FYC])
13. Apply risk analysis methodologies to identify potential vulnerabilities, associated impacts, and recommend appropriate responses. (CIS111, CIS143, CIS121AH, CIS201, CIS202, CIS203, CIS238DL, CIS238RH, CIS270, CIS271DB, CIS272DB, CIS290AC, CIS298AC, CNT150AB, CNT160AB, CNT202, CNT205, ITS110, ITS120, ITS240, ITS291, ITS292, MST155DC, MST157DC, MST158DC, [MA])
14. Communicate professionally in formal and informal situations to diverse audiences. (BPC270, CIS105, CIS111, CIS143, CIS156, CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS271DL, CIS271RH, CIS272DB, CIS275DL, CIS290AC, CIS298AC, ITS110, ITS120, ITS240, (COM), [FYC], [HU], [SB], [SG], [SQ])
15. Collaborate with others to solve cybersecurity problems. (CIS105, CIS111, CIS143, CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS271DL, CIS271RH, CIS272DB, CIS275DL, CIS290AC, CIS298AC, ITS110, ITS120, ITS240, ITS291, ITS292, (COM), [SG], [SQ])
+ indicates course has prerequisites and/or corequisites.
++ indicates that any suffixed course may be selected.
MCCCD Governing Board Approval Date: February 23, 2021

All information published is subject to change without notice. Every effort has been made to ensure the accuracy of information presented, but based on the dynamic nature of the curricular process, course and program information is subject to change in order to reflect the most current information available.