My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
INTERCOAST COLLEGES
Clerk
>
Contracts / Agreements
>
I
>
INTERCOAST COLLEGES
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
8/20/2024 11:22:50 AM
Creation date
7/1/2022 4:41:14 PM
Metadata
Fields
Template:
Contracts
Company Name
INTERCOAST COLLEGES
Contract #
A-2020-194-32
Agency
Community Development
Council Approval Date
10/6/2020
Expiration Date
6/30/2023
Insurance Exp Date
3/12/2024
Destruction Year
2028
Notes
For Insurance Exp. Date see Notice of Compliance
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
164
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
AAS DEGREE CYBER SECURITY <br />Offered Online Only I High School Diploma or GED Required <br />PROGRAM DESCRIPTION <br />The emphasis of this program is placed on courses which enable the student to gain theoretical knowledge important for working in the field and to <br />apply concepts to meet their occupational objectives. Upon completion of all requirements the student will be awarded an AAS (Associates in Applied <br />Sciences) This degree provides the necessary knowledge for career -relevant industry certifications in cyber security Emphasis is placed on courses <br />which enable the student to gain theoretical knowledge Important for working in the field of information security. Upon completion of all <br />requirements the student will be awarded a Certificate in Cyber Security. The Cyber Security program provides graduates with the necessary skillsto <br />succeed in today's business, banking and defense world. Areas of study Include cybercdme, ethical hacking, network security as well as digital <br />forensics and security compliance legal issues. <br />PROGRAM OBJECTIVES <br />The program prepares individuals to plan, organize, direct, and secure the virtual connections of a firm or organization. Students will learn to <br />troubleshoot computer, operating systems, network switches and routers. The learner will also attain foundational skills in cyber defense to <br />investigate, detect, and quarantine malware and be prepared for optional industry certification testing in A+, N+, S+, Linux/Kali Unux, ECH-Certified <br />Ethical Hacking, Risk Management CASP+, and Pen -Testing. The program prepares students to plan, implement, upgrade, or monitor security <br />measures for the protection of computer networks and information. The graduate may ensure appropriate security controls are in place that will <br />safeguard digital files and vital electronic infrastructure. The graduate may also respond to computer security breaches and viruses. <br />OCCUPATIONAL OBJECTIVES <br />The program provides graduates with knowledge to work in information security governance, network intrusion forensic investigator as well as <br />understanding the chain of custody for recording a digital cyber breach. The student will learn both hard and soft skills needed for this booming <br />career. Typical job titles include Data Security Administrator, Information Security Officer, Information Security Specialist, Information Systems <br />Security Analyst, Information Systems Security Officer, Information Technology Security Analyst (IT Security Analyst), Information Technology <br />Specialist, Network Security Analyst, Security Analyst, Systems Analyst. <br />DEGREE REQUIREMENTS <br />COURSETITIE/NUMBER <br />LECTURE <br />HOURS <br />LABORATORY <br />HOURS <br />INTERNSHIP <br />HOURS <br />TOTAL ACADEMIC <br />HOURS&CREDITS <br />CLOCK <br />CREDIT <br />CLOCK <br />CREDIT <br />CLOCK <br />CREDITS <br />PC101 Hardware Security <br />30 <br />2 <br />0 <br />0 <br />90 <br />4 <br />PC102 Software Security <br />30 <br />2 <br />0 <br />0 <br />90 <br />4 <br />NET101 Network Security <br />30 <br />2 <br />0 <br />0 <br />90 <br />4 <br />NET102 Securing Network Firewalls <br />30 <br />2 <br />W602 <br />0 <br />0 <br />90 <br />4 <br />CYB101 Securing Threats, Attacks &Vulnerabilities <br />3o <br />2 <br />0 <br />0 <br />90 <br />4 <br />FCEH2O1 Certified Ethical Hacking <br />30 <br />2 <br />0 <br />0 <br />90 <br />4 <br />LIX201 Kali-Unux Security <br />30 <br />2 <br />0 <br />0 <br />90 <br />4 <br />CYB102 Advanced Security Essential & Malware <br />30 <br />2 <br />60 <br />2 <br />0 <br />0 <br />90 <br />4 <br />PEN201 Penetration Testing Attacks&Exploits <br />30 <br />2 <br />60 <br />2 <br />0 <br />0 <br />90 <br />4 <br />PEN202 Implementing Penetration TestingTools <br />30 <br />2 <br />60 <br />2 <br />0 <br />0 <br />90 <br />4 <br />ISICP301 Certified Information Systems Security <br />Pro-CISSP <br />30 <br />2 <br />60 <br />2 <br />0 <br />0 <br />90 <br />4 <br />ISPP301 Risk Analysis <br />30 <br />2 <br />60 <br />2 <br />0 <br />0 <br />90 <br />4 <br />GENERAL EDUCATION COURSES — <br />5 Required 15 Credits) <br />MATSO1College Mathematics <br />45 <br />3 <br />0 <br />0 <br />0 <br />0 <br />45 <br />3 <br />ENG1D3 English Composition <br />45 <br />3 <br />0 <br />0 <br />0 <br />0 <br />45 <br />3 <br />PSY101 Principles of Psychology <br />45 <br />3 <br />0 <br />0 <br />0 <br />0 <br />45 <br />3 <br />BU5111 Personal Leadership <br />45 <br />3 <br />0 <br />0 <br />0 <br />0 <br />45 <br />3 <br />PRO100 Professional Development <br />45 <br />3 <br />0 <br />0 <br />0 <br />0 <br />45 <br />3 <br />TOTALS <br />585 <br />39 <br />720 <br />24 <br />0 <br />0 <br />1305 <br />63 <br />1305 HOURS <br />MAXIMUM STUDENT/TEACHER RATIO <br />CLASSROOM/LAB EQUIPMENT AND SUPPLIES <br />Tables and chairs, White Boards, Projector. Computer lab <br />withcomputers and printer available to all programs. <br />CIP CODE: 11.1003 <br />LECTURE-45:1 LAB-24:1 <br />SOC - O*NET: 15-1122 <br />68 WEEKS TO COMPLETE <br />PROGRAM -SPECIFIC EQUIPMENT AND SUPPLIES <br />No specialized laboratory equipment required. <br />531 i'a o; <br />- Inicrc'n.wl t olloeas Scluvil Calnlo� <br />
The URL can be used to link to this page
Your browser does not support the video tag.