Program Overview
The Cyber Information Security Administration Associate of Applied Science (AAS) degree prepares students for careers in cybersecurity, information security, and cyber operations.
Program Requirements
Total Credits: 64-68
Semester 1 (17-19 credits)
| Course |
Title |
Credits |
| CITE-118 |
Computer Information Technology Essentials |
2 |
| CITE-121 |
Network Support I |
3 |
| CITE-122 |
Network Support I Projects |
3 |
| CITE-140 |
Introduction to Cybersecurity |
3 |
| ENGL-101 |
Writing and Rhetoric I |
3 |
| GEM 3 |
Mathematical Ways of Knowing |
3-5 |
| Semester Total |
|
17-19 |
Semester 2 (15 credits)
| Course |
Title |
Credits |
| CITE-142 |
Information Security Fundamentals |
3 |
| CITE-145 |
Cybersecurity Law and Ethics |
3 |
| CITE-152 |
Networking Essentials |
3 |
| CITE-155 |
Linux Essentials |
3 |
| COMM-101 |
Fundamentals of Oral Communication |
3 |
| Semester Total |
|
15 |
Semester 3 (15 credits)
| Course |
Title |
Credits |
| CITE-165 |
Linux System Administration |
3 |
| CITE-235 |
Network Security Fundamentals |
3 |
| CITE-243 |
Command Line and Scripting Fundamentals |
3 |
| CITE-275 |
Intrusion Detection/Prevention Systems Fundamentals |
3 |
| GEM 6 |
Social and Behavioral Ways of Knowing |
3 |
| Semester Total |
|
15 |
Semester 4 (17-19 credits)
| Course |
Title |
Credits |
| CITE-104 |
Systems Administration I |
3 |
| CITE-105 |
Systems Administration I Projects |
3 |
| CITE-237 |
Ethical Hacking and Systems Defense |
3 |
| CITE-258 |
Cyber Operations |
3 |
| AAS Institutionally Designated |
Course requirement |
3-5 |
| Elective Options: |
|
2-3 |
| ATEC-117 |
Occupational Relations and Job Search, OR |
|
| CITE-289 |
Cyber Competitions, OR |
|
| CITE-296 |
Cybersecurity Internship |
|
| Semester Total |
|
17-19 |
Career Outcomes
Graduates are prepared for positions such as:
- Cybersecurity Analyst
- Information Security Specialist
- Security Operations Center (SOC) Analyst
- Incident Response Specialist
- Penetration Tester
- Cyber Operations Specialist
Program Features
- Comprehensive cybersecurity training
- Hands-on ethical hacking experience
- Industry-standard security tools
- Legal and ethical foundations
- Real-world threat analysis
- Internship and competition opportunities
Specialized Focus Areas
- Network Security: Firewalls, VPNs, intrusion detection
- System Security: Linux administration, hardening, monitoring
- Incident Response: Threat hunting, forensics, operations
- Ethical Hacking: Penetration testing, vulnerability assessment
- Compliance: Legal frameworks, ethics, policy development