Cyber Defense - Red Hat Linux
The Associate in Applied Science (AAS) in Cyber Defense – Red Hat Linux is designed to focus on the necessary skills required to secure, protect and identify vulnerabilities in Red Hat Linux operating systems. Emphasis is placed on developing the theoretical, legal, ethical and practical skills needed to maintain the security of mission-critical server systems. The program meets the requirements of the National Security Agency’s Center of Academic Excellence in Cybersecurity (NCAE-C) and is designed to meet the training needs of government and industry employees. The program covers a variety of information security technologies and structured languages and also focuses on the skills needed for internationally recognized IT certifications and high demands in business, industry, and government.
Details
Students must earn a grade of C or better in all courses within the program.
Courses within any of the following prefixes must be taken within five (5) years prior to completion of the program to be applied toward this award: CIS, CNT, ITS, and MST
- Demonstrate understanding of the fundamental concepts behind cybersecurity.
- Explain the fundamental security design fundamentals that help create systems that are worthy of being trusted.
- Demonstrate a foundational understanding of the components in an information technology system and their roles in system operation.
- Explain where and how cryptography is used.
- Describe how networks are built and operate and the various basic network analysis tools.
- Create simple scripts/programs to automate and perform simple operations.
- Implement algorithms using programming languages to solve problems.
- Explain the concepts used in defending a network, and the common tools and techniques that can be used to protect a network and communication assets from cyber threats.
- Demonstrate an understanding of methods such as managing applications, services, and network ports to improve the robustness of operating systems.
- Describe ethics in a cyber context, including typical situations where ethical dilemmas arise and the tools for ethical decision making.
- Utilize methods for exploiting vulnerabilities to gain access to a system.
- Perform basic operations involved in system administration of operating systems.
Course # | Course Title | Credits |
---|---|---|
Credits: | 41 | |
CIS105 | Survey of Computer Information Systems | 3 |
CIS111 | Ethics in Information Technology | 3 |
CIS126RH | Red Hat System Administration I | 3 |
CIS156 | Python Programming: Level I | 3 |
CIS238RH | Red Hat System Administration II | 3 |
CIS239DL | Linux Shell Scripting | 3 |
CIS240RH | Red Hat System Administration III | 3 |
CIS270 | Essentials of Network and Information Security | 3 |
CIS271RH | Red Hat System Administration IV | 3 |
CIS275DL | Linux Capstone | 3 |
CNT140AB | Introduction to Networks | 4 |
FYE101 | Introduction to College, Career and Personal Success | 1 |
ITS240 | Ethical Hacking and Network Defense | 3 |
MST150WT | Installing and Configuring Microsoft Windows 10 | 3 |
At Maricopa, we strive to provide you with accurate and current information about our degree and certificate offerings. Due to the dynamic nature of the curriculum process, course and program information is subject to change. As a result, the course list associated with this degree or certificate on this site does not represent a contract, nor does it guarantee course availability. If you are interested in pursuing this degree or certificate, we encourage you to meet with an advisor to discuss the requirements at your college for the appropriate catalog year.
Read the official description