Major: 3197
Catalog Year: 2024-2025
Effective Term: 2023 Fall
Last Admit Term: 2024 Summer
Award: AAS Total Credits: 62-77 CIP Code: 11.1003 |
Primary College: Estrella Mountain Community College
Initiating College: District Office
Program Availability: Not Found
Program Availability: Shared
Field of Interest: Computer and Information Technology
Instructional Council: Computer Information Systems (12) GPA: 2.0 |
SOC Code: Upon completion of this degree, students may pursue a career as:
15-1122.00 Information Security Analysts 15-1142.00 Network and Computer Systems Administrators 15-1152.00 Computer Network Support Specialists Upon completion of a bachelor`s degree, students may pursue a career as: 11-3021.00 Computer and Information Systems Managers 15-1241.00 Computer Network Architects |
Learning Outcomes | |||
---|---|---|---|
1. Explain the fundamental components, concepts, and application of cybersecurity principles. (BPC170, BPC270, BPC274, CIS105, CIS126DL, CIS126RH, CIS143, CIS156, CIS162++, CIS201, CIS202, CIS203, CIS227, CIS238DL, CIS238RH, CIS239DL, CIS240DL, CIS240RH, CIS250, CIS262++, CIS270, CIS271DB, CIS271DL, CIS271RH, CIS272DB, CIS275DL, ITS110, ITS291, ITS292, MST150++, MST160, CLD110 [FYC])
2. Describe cyber defense tools, methods, and components. (CIS156, CIS190, CIS270, CIS271DB, CIS272DB, CNT140AB, CNT150AB, ITS110, ITS240, ITS291, ITS292, (COM), (CRE)) 3. Apply cyber defense methods to prepare a system to repel attacks. (CIS156, CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS272DB, CIS290AC, CIS298AC, CNT150AB, CNT160AB, CNT202, CNT205, ITS110, ITS240, [SG], [SQ]) 4. Analyze common security failures and identify specific design principles that have been violated. (BPC274, CIS121AH, CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS272DB, CNT202, CNT205, ITS110, MST260, CLD120) 5. Understand the interaction between security and system usability and the importance for minimizing the effects of security mechanisms. (BPC274, CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS272DB, CNT160AB, ITS110, MST260, CLD120) 6. Apply appropriate protocols, tools, and techniques to maximize security in the network environment. (CIS119DO, CIS156, CIS162++, CIS190, CIS201, CIS202, CIS203, CIS227, CIS262++. CIS270, CIS271DB, CIS272DB, CIS276++, CIS290AC, CIS298AC, CNT140AB, CNT150AB, CNT160AB, CNT202, CNT205, ITS110, ITS240, ITS291, ITS292, [MA], [SG], [SQ]) 7. Describe the fundamental concepts, technologies, components, vulnerabilities, and issues related to networks. (BPC170, CIS105, CIS119DO, CIS143, CIS190, CIS201, CIS202, CIS238DL, CIS238RH, CIS270, CIS271DB, CIS272DB, CIS276++, CNT140AB, CNT150AB, CNT160AB, CNT202, CNT205, ITS110, (COM)) 8. Identify and describe basic security issues of operating systems. (BPC270, BPC274, CIS105, CIS121AH, CIS126DL, CIS126RH, CIS201, CIS238DL, CIS238RH,, CIS239DL, CIS240DL, CIS240RH, CIS270, CIS271DB, CIS271DL, CIS271RH, CIS272DB, CIS275DL, ITS110, ITS240, MST150++, MST160, CLD110) 9. Identify perpetrators, their resources, and their motivations in cyberspace. (BPC274, CIS111, CIS143, CIS203, CIS270, CIS271DB, CIS272DB, CIS290AC, CIS298AC, ITS110, ITS120, ITS240, MST160, CLD110) 10. Compare and contrast offensive and defensive resources used in cybersecurity ecosystems/environment. (CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS272DB, CIS290AC, CIS298AC, ITS110, ITS240, (COM), (CRE), [FYC]) 11. Delineate differences between the moral, behavioral, ethical, and legal ramifications found in the cybersecurity world. (CIS105, CIS111, CIS143, CIS156, ITS120, (CRE) [FYC], [HU], [SB], [SG], [SQ]) 12. Apply knowledge of regulatory and legal requirements to ensure compliance. (CIS111, CIS143, CIS202, CIS290AC, CIS298AC, ITS120, ITS240, (CRE), [FYC]) 13. Apply risk analysis methodologies to identify potential vulnerabilities, associated impacts, and recommend appropriate responses. (BPC274, CIS111, CIS143, CIS121AH, CIS201, CIS202, CIS203, CIS238DL, CIS238RH, CIS270, CIS271DB, CIS272DB, CIS290AC, CIS298AC, CNT150AB, CNT160AB, CNT202, CNT205, ITS110, ITS120, ITS240, ITS291, ITS292, MST160, MST260, CLD110, CLD120 [MA]) 14. Communicate professionally in formal and informal situations to diverse audiences. (BPC270, CIS105, CIS111, CIS143, CIS156, CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS271DL, CIS271RH, CIS272DB, CIS275DL, CIS290AC, CIS298AC, ITS110, ITS120, ITS240, (COM), [FYC], [HU], [SB], [SG], [SQ]) 15. Collaborate with others to solve cybersecurity problems. (CIS105, CIS111, CIS143, CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS271DL, CIS271RH, CIS272DB, CIS275DL, CIS290AC, CIS298AC, ITS110, ITS120, ITS240, ITS291, ITS292, (COM), [SG], [SQ]) |
Program Notes | |||
---|---|---|---|
Students must earn a grade of C or better in all courses within the program.
Courses within any of the following prefixes must be taken within five (5) years prior to completion of the program to be applied toward this award: AIM, BPC, CIS, CLD, CNT, CSC, ITS, and MST. This program replaces: AAS/3097 Information Technology: Network and Cyber Security AAS/3160 IT and Power Systems Security |
Admission Criteria | |||
---|---|---|---|
Program Prerequisites: None
|
|||||||||||
Required Courses | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
+ BPC270 A+ Exam Prep: Operating System Configuration and Support (3) OR | Credits: 25-31 |
Restricted Electives | |||
---|---|---|---|
Students must complete 12-18 credits from the following list of courses. Courses that are required for a specialization in Cyber Operations, Linux System Administration, Cloud System Administration, Cisco Network Administration and Security, Cyber Engineering, and/or Critical Infrastructure are noted. Courses cannot be repeated for credit. | Credits: 12-18 |
General Electives | |||
---|---|---|---|
Select additional courses 100-level or higher to complete the minimum total program credits required for this degree. It is recommended to select from the Restricted Elective options. Consult with a faculty advisor, program director, and/or academic advisor to identify coursework that best aligns with academic and professional goals. | Credits: 0-3 |
General Education Requirements | |||
---|---|---|---|
General Education Requirement | Credits: 22-28 | ||
General Education Core | Credits: 12-18 | ||
First-Year Composition | Credits: 6 | ||
+ ENG101 First-Year Composition (3) OR
+ ENG107 First-Year Composition for ESL (3) AND + ENG102 First-Year Composition (3) OR + ENG108 First-Year Composition for ESL (3) 6 | |||
Oral Communication | Credits: 3 | ||
COM100 Introduction to Human Communication (3) OR
COM110 Interpersonal Communication (3) OR + COM225 Public Speaking (3) OR COM230 Small Group Communication (3) 3 COM100 required for students intending to transfer to ASU West to earn a Bachelor of Science in Applied Computing (Cybersecurity). | |||
Critical Reading | Credits: 0-3 | ||
+ CRE101 College Critical Reading and Critical Thinking (3) OR
Equivalent as indicated by assessment (0) 0-3 | |||
Mathematics | Credits: 3-6 | ||
Any approved general education course in the Mathematics area. 3-6 | |||
General Education Distribution | Credits: 10 | ||
Humanities, Arts and Design | Credits: 3 | ||
Any approved general education course(s) in the Humanities, Arts and Design area. | |||
Social-Behavioral Sciences | Credits: 3 | ||
Any approved general education course(s) in the Social-Behavioral Sciences area. | |||
Natural Sciences | Credits: 4 | ||
Any approved general education course(s) from the Natural Sciences area. | |||
+ indicates course has prerequisites and/or corequisites.
++ indicates that any suffixed course may be selected. MCCCD Governing Board Approval Date: June 28, 2022 |