Overview
About the Program
Two-year full-time degree schedule; mixture of core software applications, networking classes, and security training including extensive hands-on experience in the classroom environment. Training also includes project management, ethics, and communications; program can be completed on a part-time basis.
Design, build, and maintain IT networks, applications and services based on security policies and standards related to information security. The concentration is based on the Cyber Security CIA triad of confidentiality, integrity, and availability of assets in use by people, corporations, and government.
Learning Outcomes
- Identify common IT professions and apply basic IT tools to solve problems.
- Build software applications using current scripting and development languages.
- Recognize and mitigate various types of risks, threats, and vulnerabilities in various environments.
- Install, configure and use various operating systems.
- Troubleshoot hardware, operating systems, and network communications problems.
- Demonstrate a thorough understanding of legal and ethical standards related to the IT profession.
- Create a security framework based on the tenets of cyber security and current regulations related to business and industry.
- Design, install and manage secure, scalable small to medium size networks.
- Install and configure various operating systems and harden these systems against cyber-attacks.
- Demonstrate a thorough understanding business impact analyses statements, business continuity plans and disaster recovery plans for small to medium size organizations.
- Describe TCP/IP protocols used to transfer data across networks in terms of their purpose, what types of packets are sent and how they are used and possible security issues.
- Use security tools, logs and packet captures to analyze security incidents and perform forensic analysis on devices.
- Perform applicable mathematical calculations throughout the business environment.
- Communicate professionally both in writing and verbally with co-workers, managers, stakeholders, and customers.
- Integrate technology skills in making business decisions and performing business functions.
- Use problem-solving and decision-making skills in preparing and implementing business solutions.
- Demonstrate good work habits, interpersonal and virtual teamwork skills, and a high level of professionalism.
- Exhibit inclusiveness where each perspective is considered while progressing toward common goals.
Application Requirements
- MTC Application for Admission and nonrefundable applicable fee.
- Final high school transcript (or GED results) and college transcripts (if applicable).
- Successful completion of the Basic Skills Assessment (ACCUPLACER) and Technology Skills Test (TST) is required. Any college foundation courses recommended by placement assessment results are also required
Career Opportunities
- Cyber Security Analyst
- Cyber Security Specialist
- Incident Analyst/Responder
- IT Auditor
- Cyber Security Analyst
- Penetration/Vulnerability Tester
Curriculum
The following is a typical course sequence for completing this program. The actual time needed to complete the program will vary according to each student’s individual needs.
The following course is only offered in an 8-week half session format only: Digital Forensics.
First Semester
CIT1351 | IT Essentials / A+ | 3 |
OIS1240 | Computer Applications | 3 |
CIT1100 | Intro to Programming Concepts w/Python | 3 |
ENG1000 | English Composition I | 3 |
CIT1000 | Introduction to Information Technology | 3 |
Second Semester
Third Semester
Fourth Semester
Fifth Semester
Total Credit Hours: 64