Overview
About the Program
Two-year full-time degree schedule; mixture of core software applications, networking classes, and security training including extensive hands-on experience in the classroom environment. Training also includes project management, ethics, and communications; program can be completed on a part-time basis.
Design, build, and maintain secure computer systems and networks based on industry-recognized standards and practices, applications and services based on security policies and standards related to information security. Design, build, and maintain secure computer systems and networks based on industry-recognized standards and practices; learn to use, configure, and maintain routers, switches, servers, and other interconnectivity components to provide secure electronic communications. The concentration is based on the Cyber Security CIA triad of confidentiality, integrity, and availability of assets in use by people, corporations, and government.
Learning Outcomes
- Design, install and manage secure, scalable small to medium size networks.
- Use security tools, logs and packet captures to analyze security incidents and perform forensic analysis on devices.
- Create a security framework based on the tenets of cyber security and current regulations related to business and industry.
- Implement standard IPv4 ACLs to filter traffic and secure administrative access.
- Identify common IT professions and apply basic IT tools to solve problems.
- Build software applications using programming languages.
- Troubleshoot hardware, operating systems, and network communications problems.
- Create business impact analyses statements, business continuity plans and disaster recovery plans for small to medium size organizations.
- Describe TCP/IP protocols used to transfer data across networks in terms of their purpose, what types of packets are sent and how they are used and possible security issues.
- Install, configure, and use various operating systems.
- Identify legal and ethical standards related to the IT profession.
- Apply project management techniques including project charter, time, risk, change management, budgeting, and team dynamics.
- Communicate effectively both written and orally.
- Solve problems using mathematics.
- Solve problems through analysis, creativity, and synthesis to make informed decisions.
- Demonstrate good work habits, effective interpersonal and teamwork skills, and a high level of professionalism.
- Use technology tools efficiently and effectively to perform personal and professional tasks.
- Exhibit respect and sensitivity for individual and institutional differences.
Application Requirements
- MTC Application for Admission and nonrefundable applicable fee.
- Final high school transcript (or GED results) and college transcripts (if applicable).
-
Demonstrate college-readiness by achieving the required minimum score on a placement test, successfully completing any required college foundation courses, or satisfying other measures including but not limited to high school coursework, previous college coursework, samples of work, etc.
Career Opportunities
- Cyber Security Analyst
- Cyber Security Specialist
- Incident Analyst/Responder
- IT Auditor
- Cyber Security Analyst
- Penetration/Vulnerability Tester
- Network Administrator
- Network Engineer
- IT Technician
Curriculum
The following is a typical course sequence for completing this program. The actual time needed to complete the program will vary according to each student’s individual needs.
First Semester - Fall
CIT1000 | Introduction to Information Technology | 3 |
CIT1100 | Intro to Programming Concepts w/Python | 3 |
CIT1351 | IT Essentials | 3 |
FYE1000 | Academic and Career Success | 1 |
ENG1000 | English Composition I | 3 |
OIS1240 | Computer Applications | 3 |
Second Semester - Spring
Third Semester - Summer
Fourth Semester - Fall
Fifth Semester - Spring
Total Credit Hours: 63