Cyber and Information Security Technology
Cyber and Information Security Technology Overview
Living in the age of data means embracing the interconnectedness that allows us to communicate and collaborate in an infinite number of ways Data can mean a wealth of information and insight at our fingertips, but it can also be detrimental in the wrong hands. With progressively more information traveling over the wires and with increasing threats internationally with cyber terrorism, the need to be able to defend and protect an organization’s assets is critically important.
Do you want to stop cyber-crime before it starts? If preventing, detecting, and battling digital crime is important to you, a career in cyber security may be the perfect fit and an associate’s degree in Computer and Information Science with a concentration in Cyber and Information Security Technology could be a great way to start! As a cybersecurity specialist, you could be on the front lines of cyber warfare and defense, protecting vital computer systems against inside and outside threats alike, including social engineering, hackers, malware, spyware, and viruses.
You could earn an Associate of Science Degree in Computer and Information Science with a Cyber and Information Security Technology concentration in as little as 16 months through ECPI University’s year-round degree program.
Our Cyber and Information Security Technology concentration could teach you how to:
- Troubleshoot & maintain hardware, software, or services for single, mixed and multi-user environments
- Use cyber security measures to protect data and manage personnel conduct in relation to safeguarding data.
- Learn how to actively monitor and defend networks
Join an exciting industry where you could make a difference in the lives of so many—contact ECPI University today and learn more about earning your associate’s in Computer and Information Science with a concentration in Cyber and Information Security Technology.
The National Security Agency and the Department of Homeland Security have designated ECPI University as a National Center of Academic Excellence in Cyber Defense Education (CAE-CDE) for the Bachelor of Science in Computer and Information Science: Cyber and Information Security Technology major, Cybersecurity Track through academic year 2023. Designation Letter can be viewed here.
Learn more about the opportunities in this field in Atlanta, GA here!
28 semester credit hours
Course ID Course Name Credits CIS123 Introduction to Scripting 3 CIS126 Introduction to Programming 3 CIS142 Introduction to Cloud Solutions 3 CIS150 Introduction to Networking 3 CIS206 Linux Administration 3 CIS212 Principles of Cybersecurity 3 ONE OF THESE TWO COURSES: BUS121 Introduction to Business 3 CIS290 IAssociate's Externship-CIS 3
CIS290, CIS291, CIS292, CIS293, and CIS294 do not transfer to the BS program.
A combination of the following CIS externship courses may be substituted in lieu of CIS290, provided that they total 3 credits: CIS291, CIS292, CIS293, CIS294.
Arts and Sciences*
15 semester credit hours
Course ID Course Name Credits COM115 Principles of Communication 3 ENG110 College Composition 3 HUM205 Culture and Diversity: Exploring the Humanities 3 MTH131 College Algebra 3 PSY105 Introduction to Psychology 3
*For allowable substitutions of arts and sciences courses, see the Arts & Sciences Department section in the ECPI University Course Catalog.
9 semester credit hours
Course ID Course Name Credits CIS106 Introduction to Operating Systems 3 CIS108 Office Applications 2 FOR110 Essentials for Success 3 COR191 Career Orientation 1
Cyber & Network Security Concentration Required Courses
25 semester credit hours
Course ID Course Name Credits CIS101 Computer Configuration I 3 CIS202 Introduction to Routing and Switching 3 CIS202L Introduction to Routing and Switching Lab 1 CIS204 Intermediate Routing and Switching 3 CIS207L Routing and Switching LAB 1 CIS225 Network Protocols and Services 3 CIS245 Windows Client and Server 3 CIS245L Windows Client and Server Lab 1 CIS251 Advanced Windows Server 3 CIS256 Windows Active Directory 3 CIS256L Windows Active Directory LAB 1
- Program Description
At ECPI University, your classroom experience is reinforced with hands-on instruction, using the same kind of technology found in the workplace. Build secure networks in Windows, Cisco, and Linux environments, and implement network security plans to keep hackers at bay and networks secure. Specifically, ECPI’s Cyber and Information Security Technology degree program could teach you how to:
- Create and manage user/group accounts and configure network routers
- Assist in development and implementation of policies for disaster recovery and network security design
- Assist customers in day-to-day network operations and troubleshooting
- Administer, monitor, and manage networks
- Participate in software installations, network upgrades, and end-user training
- Maintain network & security hardware and software
ECPI’s associate’s degree in Computer & Information Science with a concentration in Cyber and Information Security Technology curriculum aims to prepare graduates to sit for IT certification exams related to CompTIA, Cisco Systems, and Microsoft.
- Possible Career Track
- Technical support and help desks
- Network & Security infrastructure support
- Network administrator
- Network Security implementation
Students in the A.S. in Computer and Information Science program develop implementation and support skills in operating systems, networking, software programs, and cybersecurity. Students develop additional focused skills based on which concentration the student pursues. Students also learn principles of excellent customer service to assist clients with technical issues.
Upon successful completion of the Cyber and Information Security Technology concentration, graduates are expected to:
Computer and Information Science Outcomes:
- Use processes, tools, and technologies common to the profession
- Work as a member of a technical team
- Apply written, oral, and graphical communication in both technical and non-technical environments
- Identify and use appropriate technical literature
- Engage in continuous professional development through user groups, associations, conferences, readings, research, and other channels.
- Apply ethical best practices in the maintenance and security of information and systems
- Use cloud computing tools
Cyber and Information Security Technology Outcomes:
- Configure and administer a network and security infrastructure
- Maintain, monitor, and troubleshoot a network and security infrastructure
- Implement technical and/or non-technical security controls to protect an organization from threats and vulnerabilities
- Program Guide
- Download Program Guide (736.53 KB)