Major: 5154
Catalog Year: 2023-2024
Effective Term: 2020 Fall
Last Admit Term: 2020 Fall
Award: CCL Total Credits: 24-31 CIP Code: 11.1003 |
Primary College:
Initiating College: South Mountain Community College
Program Availability: Not Found
Program Availability: Shared
Field of Interest: Computer and Information Technology
Instructional Council: Computer Information Systems (12) GPA: 2.0 |
SOC Code: Upon completion of this certificate, students may pursue a career as:
15-1212.00 Information Security Analysts 15-1244.00 Network and Computer Systems Administrators 15-1231.00 Computer Network Support Specialists Upon completion of a bachelor`s degree, students may pursue a career as: 11-3021.00 Computer and Information Systems Managers 15-1241.00 Computer Network Architects |
Program Prerequisites: None
|
|||||||||||
Required Courses | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
+ BPC270 A+ Exam Prep: Operating System Configuration and Support (3) OR | Credits: 24-31 |
Restricted Electives | |||
---|---|---|---|
| Credits: |
General Electives | |||
---|---|---|---|
| Credits: |
Learning Outcomes | |||
---|---|---|---|
1. Explain the fundamental components, concepts, and application of cybersecurity principles. (BPC270, CIS105, CIS126DL, CIS126RH, CIS156, CIS270, CIS250, CIS271DB, CIS272DB, ITS110, MST150++)
2. Describe cyber defense tools, methods, and components. (CIS156, CIS190, CIS270, CIS250, CIS271DB, CIS272DB, CNT140AB, ITS110, ITS240) 3. Apply cyber defense methods to prepare a system to repel attacks. (CIS156, CIS270, CIS250, CIS271DB, CIS272DB, ITS110, ITS240) 4. Analyze common security failures and identify specific design principles that have been violated. (CIS270, CIS271DB, CIS272DB, ITS110) 5. Understand the interaction between security and system usability and the importance for minimizing the effects of security mechanisms. (CIS270, CIS250, CIS271DB, CIS272DB, ITS110) 6. Apply appropriate protocols, tools, and techniques to maximize security in the network environment. (CIS156, CIS190, CIS270, CIS250, CIS271DB, CIS272DB, CNT140AB, ITS110, ITS240) 7. Describe the fundamental concepts, technologies, components, vulnerabilities, and issues related to networks. (CIS105, CIS190, CIS270, CIS250, CIS271DB, CIS272DB, CNT140AB, ITS110) 8. Identify and describe basic security issues of operating systems. (BPC270, CIS105, CIS126DL, CIS126RH, CIS270, CIS250, CIS271DB, CIS272DB, ITS110, ITS240, MST150++) 9. Identify perpetrators, their resources, and their motivations in cyberspace. (CIS111, CIS270, CIS250, CIS271DB, CIS272DB, ITS110, ITS120, ITS240) 10. Compare and contrast offensive and defensive resources used in cybersecurity ecosystems/environment. (CIS270, CIS250, CIS271DB, CIS272DB, ITS110, ITS240) 11. Delineate differences between the moral, behavioral, ethical, and legal ramifications found in the cybersecurity world. (CIS105, CIS111, CIS156, ITS120) 12. Apply knowledge of regulatory and legal requirements to ensure compliance. (CIS111, ITS120, ITS240) 13. Apply risk analysis methodologies to identify potential vulnerabilities, associated impacts, and recommend appropriate responses. (CIS111, CIS270, CIS271DB, CIS272DB, ITS110, ITS120, ITS240) | |||
+ indicates course has prerequisites and/or corequisites.
++ indicates that any suffixed course may be selected. MCCCD Governing Board Approval Date: December 10, 2019 |