Cybersecurity - A.A. Degree (Transfer)
AN INFORMATION TECHNOLOGY AREA OF CONCENTRATION
APPLICATION CODE 304
For curriculum information, contact the Business and Computer Systems Division—Room DH 239—443-518-1520.
The cybersecurity curriculum prepares students to work in network security or support in private, public, and government arenas at the mid-administrative level, and for transferring to four-year programs. Content related to the CISSP domains has been incorporated into the cybersecurity courses. These courses are mapped to the National Training Standard for Information Systems Security designation sponsored by NSA and the Department of Homeland Security. This curriculum is designed to transfer to similar programs at Capitol College or the University of Maryland Global Campus to complete a bachelor’s degree in cybersecurity. Students are advised to check the requirements of the major at the institution to which they intend to transfer. HCC is an approved Center for Academic Excellence (CAE) and students are eligible for an HCC certificate that states that the student has completed a curriculum mapped to the CAE Information Assurance and Cyber Defense training standards approved by NSA and Department of Homeland Security.
Suggested Semester 1
ENGL 121 | College Composition | 3 |
CMSY 156 | Introduction to Python | 3 |
CMSY 158 | Fundamentals and Practice for Network+ Certification | 3 |
CMSY 163 | Introduction to Firewalls and Network Security | 3 |
MATH 143 | Precalculus I | 3 |
| or higher core course | |
Suggested Semester 2
Suggested Semester 3
Suggested Semester 4
Total Credit Hours: 60
It is possible to take CSCO 291 and CSCO 292 simultaneously. Some courses in the program prepare students for industry certifications such as CompTIA Network+, CompTIA Security+, and Certified Ethical Hacker (CEH).
A graduate should be able to
- Determine the role of network security technologies within a network and establish appropriate security policy.
- Identify appropriate network security tools and technologies to establish and configure a secure computer network.
- Utilize software tools, devices, and procedures to determine if current systems meet the security policy requirements and problem-solve network vulnerabilities and cyber-attacks to harden network infrastructure.
- Develop ethical hacking skills and apply these in countermeasures and cyber defense as necessary.
- Identify, understand, evaluate, and apply ethical reasoning in business practices.