Information Technology - Cybersecurity Concentration Degree
Program Code: A25590CS
| First Year | ||
|---|---|---|
| Fall | Hours | |
| Session 1 | ||
| CCT-110 | Introduction to Cyber Crime | 3 |
| NOS-110 | Operating Systems Concepts | 3 |
| CTI-120 | Network and Security Foundations (16 Weeks ) | 3 |
| Session 2 | ||
| CTI-110 | Information Technology Foundations | 3 |
| CTS-115 | Information Systems Business Concepts | 3 |
| ENG-111 | Writing and Inquiry | 3 |
| CTI-120 (16 Weeks Continued) | ||
| Hours | 18 | |
| Spring | ||
| Session 1 | ||
| NET-125 | Introduction to Networks | 3 |
| CTI-140 | Virtualization Concepts | 3 |
| SEC-110 | Security Concepts | 3 |
| Session 2 | ||
| NOS-120 | Linux Single User | 3 |
| CSC-121 | Python Programming | 3 |
| Hours | 15 | |
| Summer | ||
| NET-126 | Switching and Routing | 3 |
| ENG-112 or COM-231 |
Writing and Research in the Disciplines or Public Speaking |
3 |
| HUM-115 | Critical Thinking | 3 |
| Hours | 9 | |
| Second Year | ||
| Fall | ||
| Session 1 | ||
| CSC-211 | Ethical Hacking With Python I | 3 |
| NOS-220 | Linux Administration I | 3 |
| Session 2 | ||
| NOS-230 | Windows Administration I | 3 |
| Math Elective 1 | 3-4 | |
| Hours | 12-13 | |
| Spring | ||
| Session 1 | ||
| SEC-160 | Security Administration I | 3 |
| SEC-210 | Intrusion Detection | 3 |
| Social/Behavioral Science Elective 1 | 3 | |
| Session 2 | ||
| SEC-151 | Introduction to Protocol Analysis | 3 |
| CTI-141 | Cloud and Storage Concepts | 3 |
| Hours | 15 | |
| Total Hours | 69-70 | |
| Code | Title | Hours |
|---|---|---|
| General Ed Courses | ||
| Science/Mathematics | ||
| MAT-110 | Mathematical Measurement and Literacy | 3 |
| MAT-121 | Algebra/Trigonometry I | 3 |
| MAT-143 | Quantitative Literacy | 3 |
| MAT-152 | Statistical Methods I | 4 |
| MAT-171 | Precalculus Algebra | 4 |
| English/Communications | ||
| ENG-111 | Writing and Inquiry | 3 |
| ENG-112 | Writing and Research in the Disciplines | 3 |
| ENG-114 | Professional Research & Reporting | 3 |
| ENG-116 | Technical Report Writing | 3 |
| COM-231 | Public Speaking | 3 |
| Social/Behavioral Science | ||
| PSY-150 | General Psychology | 3 |
| PSY-118 | Interpersonal Psychology | 3 |
| SOC-210 | Introduction to Sociology | 3 |
| ECO-151 | Survey of Economics | 3 |
| ECO-251 | Principles of Microeconomics | 3 |
| ECO-252 | Principles of Macroeconomics | 3 |
| POL-120 | American Government | 3 |
The following occupational information is provided by www.nccareers.org and is subject to change. The occupations list is not an exhaustive list and may include careers that require higher levels of education than those provided at NCCCS colleges.
-
Information Systems Security Officer (ISSO)
-
Security Analyst
-
Cyber Security Specialist
-
Information Security Specialist
-
Information Technology Security Analyst (IT Security Analyst)
-
Security Specialist
-
Data Security Analyst
-
Cloud Security Engineer
-
Cybersecurity Engineer
-
Cybersecurity Specialist
-
IT Auditor (Information Technology Auditor)
-
Security Consultant
-
Computer Security Specialist
-
Computer Systems Security Analyst
-
Network Security Analyst
-
Information Systems Security Analyst
-
Information Technology Analyst (IT Analyst)
-
Information Security Officer
-
Systems Analyst
-
Cyber Defense Analyst
-
Internet Security Specialist
-
AI Security Specialist (Artificial Intelligence Security Specialist)
-
All-Source Analyst
-
Application Security Analyst
-
Applications Security Analyst
-
Blue Team Member
-
Cloud Security Architect
-
Counterespionage Analyst
-
Cyber Defense Forensics Analyst
-
Cyber Intel Planner
-
Cyber Intelligence Specialist
-
Cyber Operations Planner (Cyber Ops Planner)
-
Cyber Operations Specialist
-
Cyber Operator
-
Cyber Policy and Strategy Planner
-
Cybersecurity All-Source Analyst
-
Cybersecurity Analyst
-
Cybersecurity Exploitation Analyst
-
Cybersecurity Multi-Disciplined Language Analyst
-
Cybersecurity Partner Integration Planner
-
Cybersecurity Target Developer
-
Cybersecurity Target Network Analyst
-
Cybersecurity Threat Analyst
-
Cybersecurity Warning Analyst
-
Exploitation Analyst
-
Incident Responder
-
Industrial Internet of Things Security Specialist (IIoT Security Specialist)
-
Information Technology Security Architect (IT Security Architect)
-
Internet of Things Security Specialist (IoT Security Specialist)
