Computer Information Technology
Associate in Applied Science
This program is designed for those who want to work in the Cyber Security field of Computer Information Technology. Students will be able to:
• Identify the scope of security problems, identify risk assessment, and describe malicious logic and security policies
• Identify major concepts of theories used in Cloud computing and architecture
• Describe Cloud ROI models, deployment models, and Cloud computing implementation
• Identify hacker attack techniques and methodologies, network worms, viruses, and malicious code, computer crimes, organizational intelligence regarding their technologies, and information technology warfare
• Identify major concepts used in cyber security, and psychological influences of cyber security
• Describe the mentality of a hacker and a hacker's manifesto
• Identify major conecpts regarding network security and abnormal networking behavior and its causes
• Describe network defense fundamentals, concepts related to managing firewalls, and the use of Intrusion Detection Systems.
According to the Bureau of Labor Statistics, U.S. Department of Labor, employment of information security analysts is projected to grow 37 percent from 2012 to 2022, much faster than the average for all occupations. Demand for information security analysts is expected to be very high as these analysts will be needed to come up with innovative solutions to prevent hackers from stealing critical information or creating havoc on computer networks. Most information security analysts can work for computer companies, consulting firms, federal or state government agencies, or business and financial companies.
First Year – Fall Semester Cr. Hrs.
CIT 101 Introduction to Cyber Security - 3
CIT 105 Operating Systems - 3
CIT 106 Fundamentals of Hacking/IT Psychology & Security - 3
CIT 241 Microsoft Network Administration - 3
ENG 101 College Composition I - 3
First Year – Spring Semester Cr. Hrs.
CIT 184 A+ Networking and Software - 3
CIT 220 Unix/Linux - 3
CIT 222 Ethical Protocols of Cyber Security - 3
CIT 245 Network Security Fundamentals - 3
Second Year – Fall Semester Cr. Hrs.
CIT 117 Microsoft Applications - 3
CIT 142 Cisco I - 3
CIT 235 Introduction to Cloud Computing - 3
CIT 250 IT Analysis and Design - 3
SPCH 101 Interpersonal Communications - 3
SPCH 105 Fundamentals of Speech Communication - (3)
Second Year – Spring Semester Cr. Hrs.
CIT 255 Tactical Perimeter Defense in Network Security - 3
CIT 265 Virtualization Concepts - 3
CIT 291 CIT Practicum - 3
CIT Restricted Elective * - 3
PSYC 155 Human Relations - 3
Total Hours in Program – 60
*Choose from CIT 107, 112, 152, 187 or 232.