Cyber Defense
Associate of Applied Science
[ Nick Jackson, JaLisa Estes ]
There are four emphasis areas within the Information Systems Technology program: Cyber Defense, Extended Reality (XR), iOS App Development, and System Administration. The Cyber Defense concentration focuses on network security and digital forensics. The iOS App Development concentration emphasizes the development of knowledge and skills necessary to work with mobile networks and devices. Course specific to the concentration address communications, networks, security, and Swift programming language. The System Administration option is a two-year program which offers training in computer repair, network, server maintenance/administration, and testing of websites, Internet programming, and database interaction. Students will be prepared to design, test, implement, and monitor computer systems and networks in the following entities: state and federal government, telecommunications industries, internet based companies and computer consulting environments upon completion of this program. An Associates in Applied Science degree is earned upon completion of the Information Systems Technology curriculum. The Information Systems curriculum also presents students with the opportunity to obtain multiple certifications. CompTIA certifications are known throughout the IT community as one of the best ways to break into the field and build a solid career. CompTIA A+, Network+, and Security+ certification objectives are built into the curriculum. Opportunities for employment for students with this expertise in Information System Technology include state and federal government, telecommunications industries, internet based companies and computer consulting.
A composite ACT score of 17 is required for entrance into this program.
CIP Code: 110201
Program Code: 6004
Freshman Year
First Semester — 15 hrs
This course covers the diagnosis, troubleshooting, and maintenance of computer components. Topics include hardware compatibility, system architecture, memory, input devices, video displays, disk drives, modems, and printers. Two hours lecture and two hours laboratory.
This course presents basic concepts of telephony, local area networks, wide area networks, data transmission, and topology methods. Two hours lecture and two hours laboratory.
This course involves the application of various professional and personal Web design techniques. Students will work with the latest WYSIWYG editors, HTML editors, animation/multimedia products, and photo editors. Two hours lecture and two hours laboratory.
An introduction to the C# programming language. Students are introduced to object-oriented programming and a graphical integrated development environment. Two hours lecture and two hours laboratory.
This course presents basic concepts of operating system virtualization, server virtualization, cloning, teams, and virtual networks. Two hours lecture and two hours laboratory.
Second Semester — 18 hrs
This course is an introduction to the design and manipulation of relational databases. Emphasis is placed on creation, manipulation, extraction, and display of data from existing databases. QBE and SQL are explored. Two hours lecture and two hours laboratory.
This course will provide experience with operating systems. Emphasis will be placed on support personnel interaction (communication and professional behavior) with the platform to assist users in business environments. Topics on safety and environmental issues are included. Two hours lecture and two hours laboratory.
(Prerequisite: IST 2373 C# Programming) This course is designed to help you build a solid foundation in programming fundamentals using Swift as the language. You'll get practical experience with the techniques, and concepts needed to build a basic iOS app from scratch. You'll also learn user interface design principles, which are fundamental to programming and making great apps. Prior programming experience is not required for this course. If you have programming experience, you can move through the early lessons quickly as you can continue to learn about software development tools, concepts, and best practices that go beyond programming fundamentals. Two hours lecture and two hours laboratory.
This course is an introduction to the various technical and administrative aspects of Information Security and Assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Two hours lecture and two hours laboratory.
This course is an introduction to the various technical and administrative aspects of Computer Forensics and laws pertaining to cybercrime. This course provides the foundation for understanding the key issues associated with computer forensic investigations, understanding the boot processes and disk structure for multiple operating systems, and understanding the processes related to data acquisition during investigations. Two hours lecture and two hours laboratory.
English 1113 prepares the student to think critically and compose texts for academic and professional rhetorical situations. Three hours lecture.
Sophomore Year
First Semester — 18 hrs
This course provides the knowledge and fundamental understating of Linux/Unix security, how to harden Linux/Unix, and how to defend against potential attacks against vulnerabilities and unused system services. Topics include how to protect password files, monitor log files, and use port scanners and network scanners, and additional Linux/Unix security topics. Two hours lecture and two hours laboratory.
This course is a continuation of Network Administration Using Microsoft Windows Server. Emphasis is placed on installation, configuration, and implementation of a functional server. Two hours lecture and two hours laboratory.
This course provides a solid foundation of network security and the understanding of the process to create a network defense and counter defense strategy measure policy to respond to intrusion detection. Topics include network address translation, packet filtering, proxy servers, firewalls, and virtual private networks used to design a network. Two hours lecture and two hours laboratory.
(Prerequisite: IST 1483 Fundamentals of Virtualization) This course provides students with the technical skills in deployment, management, and operations of cloud services. This course provides students with the opportunity to examine stability and scalability, provisioning of cloud resources, backup and recovery processes, deployment best practices, monitoring of cloud resources, and managing connectivity. Two hours lecture and two hours laboratory.
(Prerequisite: ACT math subscore of 19 or above or MAT 1233 with a "C" or above.) This course includes the following topics with applications: inequalities; functions; linear and quadratic equations, and their graphs; rational, radical, and higher order equations; polynomial and rational functions; logarithmic and exponential functions; systems of equations. Three hours lecture.
Choose from any fine arts classes.
Second Semester — 15 hrs
This course is an introduction to the use of integrating scripts to add functionality to Web pages. Two hours lecture and two hours laboratory.
(Prerequisite: IST 2373) The emergence of a new generation of highly-capable mobile devices and platforms has opened up new opportunities for application developers. However, mobile development differs from conventional desktop development in that mobile devices operate in a constrained world with smaller screen, slower network connections, as well as limited memory and processing power. Two hours lecture and two hours laboratory.
This course provides an in-depth exploration of various methods for gaining unauthorized access to networks and explores network security concepts from the point of view of hackers and their methodologies. Topics included hackers, crackers, ethical hackers, attacks, intrusion detection systems, malicious code, computer crime, and industrial espionage. Two hours lecture and two hours laboratory.
Study and practice in making speeches for a variety of public forums. Major emphasis is placed on effective speech preparation and delivery. Three hours lecture.
Choose any Social or Behavioral Science course in sociology, psychology, political science, geography, economics, or educational psychology.