Information Technology Security Option
|Course Title||Course Number||Semester Taken||Credits||Prerequisites|
|GENERAL EDUCATION COURSES|
|College Writing I||ENG111||3||ENG095 or placement and ESL098 or RDG095 or placement|
|College Writing II||ENG112||3||ENG111|
|Individual and Society||From Area 2||3|
|World View||From Area 3||3|
|Quantitative Thought||From Area 4||3||MAT097 or placement|
|Science and Technology||From Area 5||4|
|Humanities||From Area 6||3|
|Application/Concepts or Information Technology Problem Solving||CIT110 or CIT113 satisfies LCS requirement||3||ESL098 or RDG095 or placement|
|Principles of Internet and Information Security||CIT118||3||CIT110 or CIT113 or CIT120 or Chair approval|
|PC Hardware and Software||CIT182||3|
|Introduction to Networking||CIT162||3||CIT110 or CIT113 or CIT120 or Chair approval|
|Introduction to Computer Forensics||CIT121||3||CIT110 or CIT113 or CIT120 or Chair approval|
|Windows Operating Systems||CIT268||3||CIT110 or CIT113 or CIT120 or Chair approval|
|Routers and Routing Basics||CIT167||3||CIT162|
|Information Security and Assurance||CIT219||3||CIT268|
|Batch File Processing||CIT271||1||CIT270 and Pre/co-req CIT268|
|Ethical Hacking||CIT273||4||CIT268 or CIT270 or Chair approval|
|Information Security Seminar||CIT275||3||Pre/co-req CIT273|
|OPTION ELECTIVES (CHOOSE 2)|
|Advanced Computer Forensics||CIT221||3||CIT121 and CIT268|
|Switching Basics and Intermediate Routing||CIT267||3||CIT167|
|MS Windows Administration/Lab||CIT282||4||CIT162 and pre/co-req CIT268|
|Computer Internship||CIT299C or CIT299N||3||Chair approval|
|Cyber Crime in Today’s Society||CRJ245||3||ENG111 and CRJ101 and CRJ103 or Chair approval|
The Computer Information Technology Department (CIT) has a clear, well-articulated, three-pronged mission, which includes supporting the IT components of the college’s General Education offerings (across divisions, departments, and campuses, as well as through interdepartmental collaboration), preparing an IT workforce through certificate and associate degree offerings, and providing IT students with seamless transfer opportunities to related Baccalaureate Degree programs.
The Computer Technology Program offers many courses that apply to other options to afford students the opportunity to explore the many career tracks in Information Technology before selecting a career in Computer Support, Data Base or Networking. The Department’s goals are in concert with the College’s goals. Using input from its Industry Advisory Committees and internship course, the Department is continually updating and fine tuning its programs of study.
This option prepares students to support the security of networks, systems located on these networks, and the data/information contained within those systems; identifying, developing, implementing and maintaining security processes throughout organizations to reduce risks, respond to incidents and limit exposure and liability; identifying, notifying, and responding to security threats to networks.
The option is designed to align with the National Institute of Technology and Standards’ (NITS) National Initiative for Cybersecurity Education Cybersecurity Workforce Framework to ensure consistent, current, and flexible training in the growing technology field of Information Security. Graduates of this option will qualify for positions as entry-level information security professionals.
Upon Completion of this Concentration Graduates will be able to:
- Understand network protocols and routing.
- Understand commonly used network services - DNS, mail, web, etc. as well as less common network services.
- Perform packet analysis and be able to identify malformed packets.
- Understand differences between various operating systems - which OS an event came from and which OS is vulnerable to a certain attack.
- Define the types of malicious software found in modern networks.
- Explain the threats and countermeasures for physical security and social engineering.
- Perform footprinting, port scans, and enumeration on a network.
- Perform very simple programming in C, HTML, and Perl, specifically oriented towards the needs of network security professionals.
- Identify Microsoft Windows vulnerabilities and to harden systems.
- Identify Linux vulnerabilities and to protect servers.
- Describe and deploy security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots.
- Describe the ethics associated with the use of hacking or penetration testing tools and techniques.