Cybersecurity, Associate in Applied Science
This program provides the foundation courses to prepare IT students to apply for entry level information assurance/security technician/practitioners positions that support planning, implementing, upgrading, and monitoring security measures for the protection of computer networks and information systems. Students, through in-depth theory and extensive hands-on activities, will develop skills to ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure, and will develop skills to respond to computer security breaches and viruses. Includes instruction in computer architecture, programming, and systems analysis; networking; cryptography; security system design; applicable law and regulations; risk assessment and policy analysis; contingency planning; user access issues; investigation techniques; and troubleshooting.
Pre-employment background screening is required for any candidate seeking employment in the cybersecurity field.
To be successful, persons interested in the program should possess a strong foundation in computer hardware/software troubleshooting skills, equivalent to the CompTIA A+ certification.
Interested in this program? Start the enrollment process by visiting the Apply to STLCC page.
At the completion of the program, students are expected to:
- apply current knowledge and skills based on industry standards to design cybersecurity solutions.
- participate in the design and development of cybersecurity solutions as a member of a team.
- demonstrate proficiency in the use of cybersecurity technologies using hands-on practical projects.
- develop a business continuity plan using cybersecurity methodologies.
- investigate, recover, document and analyze electronic evidence utilizing current tools and methodology.
- develop a client-side browser interface.
- employ methodologies for data validation and subsequent responses consistent with secure coding principles.
- utilize permissions to control and secure access to files.
- configure and activate operating system logging services for auditing purposes.
- explain how data is securely moved across the network.
- design, install, and configure a secure small business local area network solution.
|Career General Education|
|ENG 101||College Composition I (MOTR ENGL 100)||3|
|ENG 102||College Composition II (MOTR ENGL 200)||3|
|or ENG 103||Report Writing|
|MTH 186||Survey of Calculus (or higher)||4|
|XXX xxx||Natural Science/Mathematics Elective||3|
|XXX xxx||Social & Behavioral Sciences: Civics Requirement||3|
|XXX xxx||Social Science Elective||3|
|Physical Education Activity|
|Select 2 credit hours||2|
|IT 100||Introduction to Cybersecurity||1|
|IS 112||Software and Hardware Architecture||3|
|IS 139||Web Publishing||3|
|IS 153||C# Programming I||4|
|or IS 187||Java Programming I|
|IS 225||Database Management||4|
|IS 229||Unix/Linux I||3|
|IS 237||Fundamentals of Information Assurance/Security||3|
|IS 265||Web Scripting Technologies||3|
|IT 101||Cisco Networking Academy I: Introduction to Networks||5|
|IT 120||Enterprise Security Management||3|
|IT 121||Secure E-Commerce and E-Government||3|
|or IS 264||Unix/Linux II|
|IT 212||Ethical Hacking||3|
|IT 214||Systems Security Engineering||3|
|IT 216||Digital Forensics||3|
|Total Credit Hours||65|
| C# Programming I|
or Java Programming I
|IS 139||Web Publishing||3||Reading Proficiency.|
|IS 229||Unix/Linux I||3||Reading Proficiency.|
|IT 100||Introduction to Cybersecurity||1||Reading Proficiency.|
|Natural Science/Mathematics Elective||3||MTH 160 may be used if needed|
|IT 101||Cisco Networking Academy I: Introduction to Networks||5||Reading Proficiency.|
|IS 112||Software and Hardware Concepts||3||MTH 140, Reading Proficiency. Basic computer literacy is expected.||Offered Fall and Spring|
|IS 237||Fundamentals of Information Assurance/Security||3||IT 102 or IS 229 and Reading Proficiency.|
|IS 265||Web Scripting Technologies||3||IS 139 and Reading Proficiency.|
|Physical Education Elective||2||At least one credit must be an activity|
|ENG 101||College Composition I (MOTR ENGL 100)||3||ENG 030 or ENG 070 with a grade of "C" or better or recommendation of department and Reading Proficiency or concurrent enrollment in RDG 030.|
or IS 264
| Secure E-Commerce and E-Government|
or Unix/Linux II
|3||IS 229 and IS 237, both with a minimum grade of "C" and Reading Proficiency.||IT 121 offered Summer only; IS 264 offered Fall and Spring|
|IT 212||Ethical Hacking||3||IS 237 and Reading Proficiency.||Offered Fall only|
|IT 214||Systems Security Engineering||3||IS 237 and Reading Proficiency.||Offered Fall only|
|MTH 186||Survey of Calculus (or higher)||4||MTH 160, MTH 160A, MTH 160B or MTH 160C with grade of "C" or better and Reading Proficiency. All prerequisite courses must have been completed within the last 3 years.|
| College Composition II (MOTR ENGL 200)|
or Report Writing (MOTR ENGL 110)
|3||ENG 100 or ENG 101 with a grade of "C" or better or department approval and Reading Proficiency.|
|Social & Behavioral Sciences: Civics Requirement||3|
|IS 225||Database Management||4||Reading Proficiency.||Offered Fall and Spring only; Apply for graduation|
|IT 216||Digital Forensics||3||IS 112, IS 229, IS 237 and Reading Proficiency.||Offered Spring Only|
|IT 120||Enterprise Security Management||3||IS 237 and Reading Proficiency.||Offered Spring only|
|Social Science Elective||3|
|Total Credit Hours||65|
*Click on the hyperlinked course number to view additional information about the course.
**Students completing a course that has been assigned a MOTR number may transfer that course to any public institution in Missouri. Those who complete CORE 42 requirements will have that verification on their transcript.
*** It is your responsibility to verify that the courses listed above will transfer to the four-year institution of your choice. Maximize your transfer credits/classes by meeting with an academic advisor.