Overview
About the Program
Two-year full-time degree schedule; mixture of core software applications, networking classes, and security training including extensive hands-on experience in the classroom environment. Training also includes project management, ethics, and communications; program can be completed on a part-time basis.
Design, build, and maintain secure computer systems and networks based on industry-recognized standards and practices, applications and services based on security policies and standards related to information security. Design, build, and maintain secure computer systems and networks based on industry-recognized standards and practices; learn to use, configure, and maintain routers, switches, servers, and other interconnectivity components to provide secure electronic communications. The concentration is based on the Cyber Security CIA triad of confidentiality, integrity, and availability of assets in use by people, corporations, and government.
Learning Outcomes
- Identify common IT professions and apply basic IT tools to solve problems.
- Build software applications using current scripting and development languages.
- Recognize and mitigate various types of risks, threats, and vulnerabilities in various environments.
- Install, configure and use various operating systems.
- Troubleshoot hardware, operating systems, and network communications problems.
- Demonstrate a thorough understanding of legal and ethical standards related to the IT profession.
- Create a security framework based on the tenets of cyber security and current regulations related to business and industry.
- Design, install and manage secure, scalable small to medium size networks.
- Install and configure various operating systems and harden these systems against cyber-attacks.
- Demonstrate a thorough understanding business impact analyses statements, business continuity plans and disaster recovery plans for small to medium size organizations.
- Describe TCP/IP protocols used to transfer data across networks in terms of their purpose, what types of packets are sent and how they are used and possible security issues.
- Use security tools, logs and packet captures to analyze security incidents and perform forensic analysis on devices.
- Perform applicable mathematical calculations throughout the business environment.
- Communicate professionally both in writing and verbally with co-workers, managers, stakeholders, and customers.
- Integrate technology skills in making business decisions and performing business functions.
- Use problem-solving and decision-making skills in preparing and implementing business solutions.
- Demonstrate good work habits, interpersonal and virtual teamwork skills, and a high level of professionalism.
- Exhibit inclusiveness where each perspective is considered while progressing toward common goals.
Application Requirements
- MTC Application for Admission and nonrefundable applicable fee.
- Final high school transcript (or GED results) and college transcripts (if applicable).
-
Demonstrate college-readiness by achieving the required minimum score on a placement test, successfully completing any required college foundation courses, or satisfying other measures including but not limited to high school coursework, previous college coursework, samples of work, etc.
Career Opportunities
- Cyber Security Analyst
- Cyber Security Specialist
- Incident Analyst/Responder
- IT Auditor
- Cyber Security Analyst
- Penetration/Vulnerability Tester
- Network Administrator
- Network Engineer
- IT Technician
Curriculum
The following is a typical course sequence for completing this program. The actual time needed to complete the program will vary according to each student’s individual needs.
First Semester - Fall
CIT1000 | Introduction to Information Technology | 3 |
CIT1100 | Intro to Programming Concepts w/Python | 3 |
CIT1351 | IT Essentials | 3 |
FYE1000 | Academic and Career Success | 1 |
ENG1000 | English Composition I | 3 |
OIS1240 | Computer Applications | 3 |
Second Semester - Spring
Third Semester - Summer
Fourth Semester - Fall
Fifth Semester - Spring