Cyber and Information Security Technology Overview
Living in the age of data means embracing the interconnectedness that allows us to communicate and collaborate in an infinite number of ways Data can mean a wealth of information and insight at our fingertips, but it can also be detrimental in the wrong hands. With progressively more information traveling over the wires and with increasing threats internationally with cyber terrorism, the need to be able to defend and protect an organization’s assets is critically important.
Do you want to stop cyber-crime before it starts? If preventing, detecting, and battling digital crime is important to you, a career in cyber security may be the perfect fit and an associate’s degree in Computer and Information Science with a concentration in Cyber and Information Security Technology could be a great way to start! As a cybersecurity specialist, you could be on the front lines of cyber warfare and defense, protecting vital computer systems against inside and outside threats alike, including social engineering, hackers, malware, spyware, and viruses.
You could earn an Associate of Science Degree in Computer and Information Science with a Cyber and Information Security Technology concentration in as little as 1.5 years through ECPI University’s year-round degree program.
Our Cyber and Information Security Technology concentration could teach you how to:
- Troubleshoot & maintain hardware, software, or services for single, mixed and multi-user environments
- Use cyber security measures to protect data and manage personnel conduct in relation to safeguarding data.
- Learn how to actively monitor and defend networks
Join an exciting industry where you could make a difference in the lives of so many—contact ECPI University today and learn more about earning your associate’s in Computer and Information Science with a concentration in Cyber and Information Security Technology.
The National Security Agency and the Department of Homeland Security have designated ECPI University as a National Center of Academic Excellence in Cyber Defense Education (CAE-CDE) for the Bachelor of Science in Computer and Information Science: Cyber and Information Security Technology major, Cybersecurity Track through academic year 2023. Designation Letter can be viewed here.
At ECPI University you’ll find faculty and staff who are dedicated to your success. Not only do we want to see you graduate, but our overarching goal is to prepare you for success. Industry driven curriculum taught using a variety of methods, from lecture to hands-on activities, will expose you to the information and skills you will need.
Our accelerated schedule can allow students to graduate with a bachelor’s degree in as little as 2.5 years, with two classes per 5-week term. While you are completing your course work, our Career Services department can help you with resumes, cover letters, and interview preparation. After graduation, our alumni association can keep you connected with peers within your field and across the country.
ECPI University’s degree programs are developed by talking with local employers first, and focusing on industry-driven curriculum, skillsets, and certifications. Twice a year, an advisory board comprising 16 campuses meets to discuss the latest employer needs. We then integrate these into our programs, developing content and activities used in virtual training environments and in practice with hands-on simulators, clinics, and externships.
Most universities and colleges teach students from a book and then leave them to learn skills “on the job.” At ECPI University, we educate our students and train them using hands-on workshops and labs, externships in the field of study, and certification programs. On their first day on the job, ECPI University students already know what is expected of them and are confident in their capabilities because it is work they have done before through our hands-on learning opportunities.
ECPI University offers discount vouchers for many industry-related certifications, so you’ll pay less here than you would anywhere else. These savings can be quite significant and into the thousands of dollars depending on your degree program and specialty. Not only that, but we also make it very easy! We provide students access to the “GetCertified” portal, where students can register for exam, claim and accept exam vouchers, and find preparatory information needed for the certifications.
In the IT field, certifications demonstrate that you have specialized industry knowledge. In some instances, this might be all that is needed to obtain initial employment. Having a degree can signify your commitment to employers and your field.
A degree may get you in the door, but any additional qualifications may help you stand out in a crowd from other candidates with only a degree. Getting certifications in your field can prove to potential employers that you are an expert who is dedicated to your craft. Certifications also keep you updated on the latest techniques and advancements in your field.
Cyber and Information Security Technology Curriculum
|Course ID||Course Name||Credits|
|CIS123||CIS123 Introduction to Python Scripting||3.00|
|CIS126||CIS126 Introduction to Programming||3.00|
|CIS142||CIS142 Introduction to Cloud Solutions||3.00|
|CIS150||CIS150 Introduction to Networking||3.00|
|CIS206||CIS206 Linux Administration||3.00|
|CIS212||CIS212 Principles of Cybersecurity||3.00|
|BUS121||BUS121 Introduction to Business||3.00|
|CIS290||CIS290 Associate’s Externship-CIS||3.00|
|Credit Hour(s) total||24.00|
*CIS290, CIS291, CIS292, CIS293, and CIS294 do not transfer to the BS program.
**A combination of the following CIS externship courses may be substituted in lieu of CIS290, provided that they total 3 credits: CIS291, CIS292, CIS293, CIS294.
One of these two courses: BUS121, CIS290
*For allowable substitutions of arts and sciences courses, see the Arts & Sciences Department page.
|Course ID||Course Name||Credits|
|CIS101||CIS101 Computer Configuration I||3.00|
|CIS202||CIS202 Introduction to Routing and Switching||3.00|
|CIS202L||CIS202L Introduction to Routing and Switching LAB||1.00|
|CIS204||CIS204 Intermediate Routing and Switching||3.00|
|CIS207L||CIS207L Network Routing and Switching LAB||1.00|
|CIS225||CIS225 Network Protocols and Services||3.00|
|CIS245||CIS245 Windows Client and Server||3.00|
|CIS245L||CIS245L Windows Client and Server LAB||1.00|
|CIS251||CIS251 Advanced Windows Server||3.00|
|CIS256||CIS256 Windows Active Directory||3.00|
|CIS256L||CIS256L Windows Active Directory LAB||1.00|
|Credit Hour(s) total||25.00|
Visit the ECPI University Catalog for the most current program information.
Cyber and Information Security Technology Program Description
At ECPI University, your classroom experience is reinforced with hands-on instruction, using the same kind of technology found in the workplace. Build secure networks in Windows, Cisco, and Linux environments, and implement network security plans to keep hackers at bay and networks secure. Specifically,
ECPI’s Cyber and Information Security Technology degree program could teach you how to:
- Create and manage user/group accounts and configure network routers
- Assist in development and implementation of policies for disaster recovery and network security design
- Assist customers in day-to-day network operations and troubleshooting
- Administer, monitor, and manage networks
- Participate in software installations, network upgrades, and end-user training
- Maintain network & security hardware and software
ECPI’s associate’s degree in Computer & Information Science with a concentration in Cyber and Information Security Technology curriculum aims to prepare graduates to sit for IT certification exams related to CompTIA, Cisco Systems, and Microsoft.
Cyber and Information Security Technology Possible Career Track
- Technical support and help desks
- Network & Security infrastructure support
- Network administrator
- Network Security implementation
Cyber and Information Security Technology Outcomes
Students in the A.S. in Computer and Information Science program develop implementation and support skills in operating systems, networking, software programs, and cybersecurity. Students develop additional focused skills based on which concentration the student pursues. Students also learn principles of excellent customer service to assist clients with technical issues.
Upon successful completion of the Cyber and Information Security Technology concentration, graduates are expected to:
Computer and Information Science Outcomes:
- Use processes, tools, and technologies common to the profession
- Work as a member of a technical team
- Apply written, oral, and graphical communication in both technical and non-technical environments
- Identify and use appropriate technical literature
- Engage in continuous professional development through user groups, associations, conferences, readings, research, and other channels.
- Apply ethical best practices in the maintenance and security of information and systems
- Use cloud computing tools
Cyber and Information Security Technology Outcomes:
- Configure and administer a network and security infrastructure
- Maintain, monitor, and troubleshoot a network and security infrastructure
- Implement technical and/or non-technical security controls to protect an organization from threats and vulnerabilities