Cybersecurity

image_print

Career Studies  (221-732-09)

PROGRAM OF STUDY 
FIRST YEAR FALL

Course # Course Title Credit
ITE 105
Careers and Cyber Ethics

Career paths in Information Technology will be explored to help the student determine the appropriate degree plan. Career paths will include but not be limited to software development, computer science, database, networking, system administration and operations, end user support, web design and management. The student will learn ethical concerns in business and information technology including the ACM Code of Ethics.

2
ITN 101
Introduction to Network Concepts

Provides instruction in networking media, physical and logical topologies, common networking standards and popular networking protocols. Emphasizes the TCP/IP protocol suite and related IP addressing schemes, including CIDR. Includes selected topics in network implementation, support and LAN/WAN connectivity.

Can be applied to Computer Software Specialist degree program.

3
ITN 260
Network Security Basics

Provides instruction in the basics of network security in depth. Includes security objectives, security architecture, security models and security layers; risk management, network security policy and security training. Includes the five security keys, confidentiality integrity, availability, accountability and auditability. 

Can be applied to both the Computer Networking Technology and the Computer Software Specialist degree programs

3
ITN 171
Unix I

Provides an introduction to UNIX operating systems. Teaches login procedures, file creation, UNIX file structure, input/output control and the UNIX shell. 

Can be applied to Computer Networking Technology degree program.

Can be applied to Computer Software Specialist degree program.

3
BUS 106
Security Awareness for Managers

Covers concepts and terminology related to information security and risk assessment. Topics cover perspective from a manager and end-user’s point of view and will include the identification of security threats, types of hardware/software solutions available and identifying policies and procedures to reduce the severity of security attacks. Includes the completion of a risk assessment and security plan for an organization and/or department. 

3
FIRST YEAR SPRING
ITN  111
Server Administration

Server Administration. Covers installation, configuration, administration, management, maintenance and troubleshooting of a server in a networked environment. 

Can be applied to Computer Networking Technology degree program

3
ITN 112
Network Infrastructure

Covers planning, installation, configuration, administration, management, maintenance, monitoring and troubleshooting of network infrastructure components. 

3
ITN 261
Network Attacks, Computer Crime, and Hacking

Encompasses in-depth exploration of various methods for attacking and defending a network. Explores network security concepts from the viewpoint hackers and their attack methodologies. Includes topics about hackers, attacks, Intrusion Detection Systems (IDS) malicious code, computer crime and industrial espionage. 

Can be applied to Computer Software Specialist degree program.

3
ITN 275
Incident Response and Computer Forensics

Prepares the student for a role on an organizational IT support staff where the need for resolving computer incidents is becoming increasingly common. Includes legal and ethical issues of search and seizure of computer and peripheral storage media leading to laboratory exercises examining computers configured with mix of both simulated criminal and other activities which are not criminal in nature, but do violate scenario-driven organizational policy. Requires the student to make choices and recommendations for further pursuit of forensics evidence gathering and analysis. Students will select and gather the utilities and procedures necessary for a court-acceptable forensics toolkit which will then be used to gather and examine specially configured desktop computers. Students will then participate in a mock court proceeding using the collected evidence. Credit will be given to either ITN 275 or ITN 276 and ITN 277, but not all three courses. 

3
ITN 262
Network Communication, Security, and Authentication

Covers an in-depth exploration of various communication protocols with a concentration on TCP/IP. Explores communication protocols from the point of view of the hacker in order to highlight protocol weaknesses. Includes Internet architecture, routing, addressing, topology, fragmentation and protocol analysis and the use of various utilities to explore TCP/IP. 

Can be applied to Computer Software Specialist degree program.

3
Total Program Credits 29

*Please consult with your advisor on the availability of courses and possible prerequisites and course substitutions.

For Further Information, Contact:

Ritchie Deel
RDeel@mecc.edu 276.523.2400 ext. 444
Fred Coeburn
fcoeburn@mecc.edu 276.523.2400 ext. 285
Terri Lane
tlane@mecc.edu 276.523.2400 ext. 240
Tommy Clements, Dean of Applied Science and Technology
tclements@mecc.edu 276.523.2400 ext. 431