powered by
Center for Curriculum and Transfer Articulation
Major: 5165
Effective Term: 2021 Fall   

Award: CCL  
Total Credits: 41-42
CIP Code: 11.1003

Instructional Council: Computer Information Systems (12)

GPA: 2.0
SOC Code: Upon completion of this certificate, students may pursue a career as:
15-1212.00 Information Security Analysts
15-1244.00 Network and Computer Systems Administrators
15-1231.00 Computer Network Support Specialists

Upon completion of a bachelor`s degree, students may pursue a career as:
11-3021.00 Computer and Information Systems Managers
15-1241.00 Computer Network Architects


Description: The Certificate of Completion (CCL) in Cyber Operations program is designed to focus on the necessary skills required to secure, protect and identify vulnerabilities in a network, including various operating systems and network devices. Emphasis is placed on developing the theoretical, legal, ethical and practical skills needed to maintain security on mission-critical networking and server systems. The program is designed to meet the training needs of government and industry employees. The program covers a variety of information security technologies and structured languages. The Cyber Operations program also focuses on the skills needed for internationally recognized IT certifications and high demands in business, industry, and government. An Associate in Applied Science (AAS) in Cybersecurity is also available.




Required Courses
The following courses are required and included in CCL Cybersecurity Fundamentals.
+ BPC270 A+ Exam Prep: Operating System Configuration and Support (3) OR
MST150++ Any Microsoft Windows course (3) 3

CIS105 Survey of Computer Information Systems 3

CIS111 Ethics in Information Technology (3) OR
ITS120 Legal, Ethical and Regulatory Issues (3) 3

CIS126DL Linux Operating System (3) OR
CIS126RH Red Hat System Administration I (3) 3

+ CIS156 Python Programming: Level I 3

+ CIS190 Introduction to Networking (3) OR
CNT140AB Introduction to Networks (4) 3-4

+ ITS110 Information Security Fundamentals 3
+ ITS240 Ethical Hacking and Network Defense 3

The following courses are required in Cyber Operations
+ BPC170 A+ Exam Prep: Computer Hardware Configuration and Support 3

+ CIS238DL Linux System Administration (3) OR
+ CIS238RH Red Hat System Administration II (3) 3

+ CIS290AC Computer Information Systems Internship (3) OR
+ CIS298AC Special Projects (3) 3

+ ITS291 Computer Forensics Foundations 4
+ ITS292 Advanced Computer Forensics 4
Credits: 41-42

Learning Outcomes
1. Explain the fundamental components, concepts, and application of cybersecurity principles. (BPC170, BPC270, CIS105, CIS126DL, CIS126RH, CIS156, CIS156, CIS238DL, CIS238RH, ITS110, ITS291, ITS292, MST150++)
2. Describe cyber defense tools, methods, and components. (CIS156, CIS190, CNT140AB, ITS110, ITS291, ITS292)
3. Apply cyber defense methods to prepare a system to repel attacks. (CIS156, ITS110, ITS240)
4. Analyze common security failures and identify specific design principles that have been violated. (ITS110)
5. Understand the interaction between security and system usability and the importance for minimizing the effects of security mechanisms. (ITS110)
6. Apply appropriate protocols, tools, and techniques to maximize security in the network environment. (CIS156, CIS190, CNT140AB, ITS110, ITS240, ITS291, ITS292)
7. Describe the fundamental concepts, technologies, components, vulnerabilities, and issues related to networks. (BPC170, CIS105, CIS190, CIS238DL, CIS238RH, CNT140AB, ITS110)
8. Identify and describe basic security issues of operating systems. (BPC270, CIS105 CIS126DL, CIS126RH, CIS238DL, CIS238RH, , ITS110, ITS240, MST150++)
9. Identify perpetrators, their resources, and their motivations in cyberspace. (CIS111, CIS290AC, CIS298AC, ITS110, ITS120, ITS240)
10. Compare and contrast offensive and defensive resources used in cybersecurity ecosystems/environment. (CIS290AC, CIS298AC, ITS110, ITS240)
11. Delineate differences between the moral, behavioral, ethical, and legal ramifications found in the cybersecurity world. (CIS105, CIS111, CIS156, ITS120)
12. Apply knowledge of regulatory and legal requirements to ensure compliance. (CIS111, CIS290AC, CIS298AC, ITS120, ITS240)
13. Apply risk analysis methodologies to identify potential vulnerabilities, associated impacts, and recommend appropriate responses. (CIS111, CIS238DL, CIS238RH, CIS290AC, CIS298AC, ITS110, ITS120, ITS240)
+ indicates course has prerequisites and/or corequisites.
++ indicates that any suffixed course may be selected.
MCCCD Governing Board Approval Date: December 10, 2019

All information published is subject to change without notice. Every effort has been made to ensure the accuracy of information presented, but based on the dynamic nature of the curricular process, course and program information is subject to change in order to reflect the most current information available.





FreeForm1