Cybersecurity - A.A. Degree (Transfer)
An Information Technology Area of Concentration
Application Code 304
For curriculum information, contact the Business and Computer Systems Division—Room DH 239—443-518-1520.
The cybersecurity curriculum prepares students to work in network security or support in private, public, and government arenas at the mid-administrative level, and for transferring to four-year programs. Content related to the CISSP domains has been incorporated into the cybersecurity courses. These courses are mapped to the National Training Standard for Information Systems Security designation sponsored by NSA and the Department of Homeland Security. This curriculum is designed to transfer to similar programs at Johns Hopkins University, Capitol College, or the University of Maryland University College to complete a bachelor’s degree in cybersecurity. Students are advised to check the requirements of the major at the institution to which they intend to transfer. HCC is an approved Center for Academic Excellence (CAE) and students are eligible for an HCC certificate that states that the student has completed a curriculum mapped to the CAE Information Assurance and Cyber Defense training standards approved by NSA and Department of Homeland Security.
Suggested Semester 1
|ENGL 121||College Composition||
|CMSY 158||Fundamentals and Practice for Network+ Certification||
|CMSY 162||Introduction to Network Security Systems||
|MATH 143||Precalculus I||
| ||or higher core course||
Suggested Semester 2
Suggested Semester 3
Suggested Semester 4
Total Credit Hours: 60
It is possible to take CMSY 158 and CMSY 162, or CMSY 158 and CSCO 291, or CMSY 162 and CMSY 163 simultaneously. Some courses in the program prepare students for industry certifications such as CompTIA Network+, CompTIA Security+, and Certified Ethical Hacker (CEH).
A graduate should be able to
- Determine the role of network security technologies within a network and establish appropriate security policy.
- Identify appropriate network security tools and technologies to establish and configure a secure computer network.
- Utilize software tools, devices, and procedures to determine if current systems meet the security policy requirements and problem-solve network vulnerabilities and cyber-attacks to harden network infrastructure.
- Develop ethical hacking skills and apply these in countermeasures and cyber defense as necessary.
- Identify, understand, evaluate, and apply ethical reasoning in business practices.