Skip to content

Cyber Information Security Administration AAS

Program Overview

The Cyber Information Security Administration Associate of Applied Science (AAS) degree prepares students for careers in cybersecurity, information security, and cyber operations.

Program Requirements

Total Credits: 64-68

Semester 1 (17-19 credits)

Course Title Credits
CITE-116 Desktop Operating System Support 3
CITE-118 Computer Information Technology Essentials 2
CITE-127 Desktop Commodity Operating System Support Projects 3
CITE-155 Linux Essentials 3
ENGL-101 Writing and Rhetoric I 3
GEM 3 Mathematical Ways of Knowing 3-5
Semester Total 17-19

Semester 2 (15 credits)

Course Title Credits
CITE-142 Information Security Fundamentals 3
CITE-152 Networking Essentials 3
CITE-165 Linux System Administration 3
CITE-243 Command Line and Scripting Fundamentals 3
COMM-101 Fundamentals of Oral Communication 3
Semester Total 15

Semester 3 (15 credits)

Course Title Credits
CITE-235 Network Security Fundamentals 3
CITE-240 Data Management 3
CITE-244 Intermediate Command Line and Scripting 3
CITE-275 Intrusion Detection/Prevention Systems Fundamentals 3
GEM 6 Social and Behavioral Ways of Knowing 3
Semester Total 15

Semester 4 (17-19 credits)

Course Title Credits
CITE-237 Ethical Hacking and Systems Defense 3
CITE-258 Cyber Operations 3
CITE-260 Systems Architecture 3
CITE-271 AI and Automation 3
AAS Institutionally Designated Course 3-5
Elective Options (choose one): 2-3
• ATEC-117 Occupational Relations and Job Search 3
CITE-289 Cyber Competitions 2
CITE-296 Cybersecurity Internship 2
Semester Total 17-19

Career Outcomes

Graduates are prepared for positions such as: - Cybersecurity Analyst - Information Security Specialist - Security Operations Center (SOC) Analyst - Incident Response Specialist - Penetration Tester - Cyber Operations Specialist

Program Features

  • Comprehensive cybersecurity training
  • Hands-on ethical hacking experience
  • Industry-standard security tools
  • Legal and ethical foundations
  • Real-world threat analysis
  • Internship and competition opportunities

Specialized Focus Areas

  • Network Security: Firewalls, VPNs, intrusion detection
  • System Security: Linux administration, hardening, monitoring
  • Incident Response: Threat hunting, forensics, operations
  • Ethical Hacking: Penetration testing, vulnerability assessment
  • Compliance: Legal frameworks, ethics, policy development