Cyber Defense - Red Hat Linux

The Associate in Applied Science (AAS) in Cyber Defense – Red Hat Linux is designed to focus on the necessary skills required to secure, protect and identify vulnerabilities in Red Hat Linux operating systems. Emphasis is placed on developing the theoretical, legal, ethical and practical skills needed to maintain the security of mission-critical server systems. The program meets the requirements of the National Security Agency’s Center of Academic Excellence in Cybersecurity (NCAE-C) and is designed to meet the training needs of government and industry employees. The program covers a variety of information security technologies and structured languages and also focuses on the skills needed for internationally recognized IT certifications and high demands in business, industry, and government.

Details

Field of Interest
Computer and Information Technology
Degree Type
Associate in Applied Science (AAS)
Academic Plan
Cyber Defense - Red Hat Linux (DEG)
Academic Plan Code
3213
Total credits required
63-69
Catalog Year
2024-2025
Effective Term
Fall 2024
Notes

Students must earn a grade of C or better in all courses within the program.

Courses within any of the following prefixes must be taken within five (5) years prior to completion of the program to be applied toward this award: CIS, CNT, ITS, and MST

What You'll Learn
  • Demonstrate understanding of the fundamental concepts behind cybersecurity.
  • Explain the fundamental security design fundamentals that help create systems that are worthy of being trusted.
  • Demonstrate a foundational understanding of the components in an information technology system and their roles in system operation.
  • Explain where and how cryptography is used.
  • Describe how networks are built and operate and the various basic network analysis tools.
  • Create simple scripts/programs to automate and perform simple operations.
  • Implement algorithms using programming languages to solve problems.
  • Explain the concepts used in defending a network, and the common tools and techniques that can be used to protect a network and communication assets from cyber threats.
  • Demonstrate an understanding of methods such as managing applications, services, and network ports to improve the robustness of operating systems.
  • Describe ethics in a cyber context, including typical situations where ethical dilemmas arise and the tools for ethical decision making.
  • Utilize methods for exploiting vulnerabilities to gain access to a system.
  • Perform basic operations involved in system administration of operating systems.
Required Courses
Course # Course Title Credits
Credits: 41
CIS105 Survey of Computer Information Systems 3
CIS111 Ethics in Information Technology 3
CIS126RH Red Hat System Administration I 3
CIS156 Python Programming: Level I 3
CIS238RH Red Hat System Administration II 3
CIS239DL Linux Shell Scripting 3
CIS240RH Red Hat System Administration III 3
CIS270 Essentials of Network and Information Security 3
CIS271RH Red Hat System Administration IV 3
CIS275DL Linux Capstone 3
CNT140AB Introduction to Networks 4
FYE101 Introduction to College, Career and Personal Success 1
ITS240 Ethical Hacking and Network Defense 3
MST150WT Installing and Configuring Microsoft Windows 10 3

At Maricopa, we strive to provide you with accurate and current information about our degree and certificate offerings. Due to the dynamic nature of the curriculum process, course and program information is subject to change. As a result, the course list associated with this degree or certificate on this site does not represent a contract, nor does it guarantee course availability. If you are interested in pursuing this degree or certificate, we encourage you to meet with an advisor to discuss the requirements at your college for the appropriate catalog year.

Read the official description