Cybersecurity - A.A. Degree (Transfer)
AN INFORMATION TECHNOLOGY AREA OF CONCENTRATION
APPLICATION CODE 304
For curriculum information, contact the Division of Health, Science, and Technology—Room SET-430.
The cybersecurity curriculum prepares students to work in network security or support in private, public, and government arenas at the mid-administrative level, and for transferring to four-year programs. Content related to the CISSP domains has been incorporated into the cybersecurity courses. These courses are mapped to the National Training Standard for Information Systems Security designation sponsored by NSA and the Department of Homeland Security. This curriculum is designed to transfer to similar programs at Capitol College or the University of Maryland Global Campus to complete a bachelor’s degree in cybersecurity. Students are advised to check the requirements of the major at the institution to which they intend to transfer. HCC is an approved Center for Academic Excellence (CAE) and students are eligible for an HCC certificate that states that the student has completed a curriculum mapped to the CAE Information Assurance and Cyber Defense training standards approved by NSA and Department of Homeland Security.
Suggested Semester 1
ENGL 121 | College Composition | 3 |
CMSY 110 | Computer Concepts, Applications, and Ethical Considerations | 3 |
CMSY 158 | Fundamentals and Practice for Network+ Certification | 3 |
CMSY 163 | Introduction to Firewalls and Network Security | 3 |
MATH 143 | Precalculus I | 3 |
| or higher core course | |
Suggested Semester 2
CSCO 291 | Introduction to Networks | 3 |
CMSY 156 | Introduction to Python | 3 |
CMSY 176 | Cybersecurity Fundamentals and Practice | 3 |
CMSY 255 | Introduction to Unix and Linux | 3 |
Gen Ed Core | Biological & Physical Sciences - Scientific Reasoning Core | 3 |
Suggested Semester 3
Suggested Semester 4
Total Credit Hours: 60
A graduate should be able to
- Determine the role of network security technologies within a network and establish appropriate security policy.
- Identify appropriate network security tools and technologies to establish and configure a secure computer network.
- Utilize software tools, devices, and procedures to determine if current systems meet the security policy requirements and problem-solve network vulnerabilities and cyber-attacks to harden network infrastructure.
- Develop ethical hacking skills and apply these in countermeasures and cyber defense as necessary.
- Identify, understand, evaluate, and apply ethical reasoning in business practices.