The Information Technology Cybersecurity Associate in Science degree program prepares students either for transfer to a related bachelor’s degree program in cybersecurity or for employment in various entry-level information security analyst positions in network security administration. Problem-solving and analytical thinking are emphasized throughout the program, with a hands-on approach to learning. The IT program has been designed using the NIST National Initiative for Cybersecurity Education (NICE) framework for academic programs.
Career and Transfer Outlook:
The Department of Homeland Security considers cybersecurity as one of the most significant threats against the US and most companies. The Federal Bureau of Investigation predicts cybersecurity eventually will become the number one threat against the U.S. The U.S.
As of the 2020 (ISC)2 Cybersecurity Workforce Study, it is estimated there is a shortage of approximately 360,000 cybersecurity professionals in the US and more than 3 million worldwide. Graduates of this program will be prepared to find employment as information security analysts, security administrators, or transfer to a four-year program to continue their studies in cybersecurity.
Students should plan on taking courses in the sequence indicated in the Curriculum Map for this program. Content of the core courses is designed to logically build upon previous semesters, culminating in “Ethical Hacking” and the “Capstone” course.
Students should plan on satisfying the math requirement as early as possible.
Graduates of the Information Technology Cybersecurity program will achieve the learning outcomes and are prepared:
- Solve cybersecurity challenges by analyzing problems, managing and storing data, logic and critical thinking, and interpreting results for relevance, accuracy, and consistency.
- Recognize current solution patterns for common problems and adapt those solutions to new situations.
- Communicate clearly, accurately, and succinctly through written and verbal means.
- Configure and operate computing systems to meet the operational and cybersecurity needs of an organization.
- Collaborate effectively with others to design, evaluate, present, and implement solutions to cybersecurity problems.
- Enhance their skills as they experience new cybersecurity challenges.