Information Security

The Associate in Applied Science (AAS) in Information Security degree is designed to provide students with the knowledge and tools to understand how networks, operating systems and programs function. Emphasis is placed on developing the theoretical and practical skills needed to maintain security on mission-critical data and systems. The program is designed to meet the training needs of government and industry employees. The program covers a variety of information security disciplines which include both vendor-neutral and vendor-specific information technology (IT) security training. The Information Security program prepares students for internationally recognized IT certifications and high demands in business, industry and government.

Details

Field of Interest
Computer and Information Technology
Degree Type
Associate in Applied Science (AAS)
Academic Plan
Information Security (DEG)
Academic Plan Code
3039
Total credits required
63-74
Catalog Year
2024-2025
Effective Term
Fall 2023
Notes

Students must earn a grade of C or better in all courses within the program.

Courses within any of the following prefixes must be taken within five (5) years prior to completion of the program to be applied toward this award: AIM, BPC, CIS, CLD, CNT, CSC, ITS, and MST.

What You'll Learn
  • Install, configure, administer, use, and maintain a UNIX/Linux operating system.
  • Define common network terminology and protocols to include local area network (LAN) and wide-area network (WAN) topologies, the Open System Interconnection reference (OSI) model and communication cabling standards.
  • Use appropriate equations to solve basic Internet Protocol (IP) addressing and subnetting problems associated with designing a network.
  • Apply basic security techniques such as password protection and access control lists (ACLs).
  • Explain a broad, cross-section of information security concepts including authentication methods, access control, cryptography, public key infrastructure (PKI), network attack and defense methods, operating systems and network device hardening, securing remote access and wireless technologies including viruses and worms.
  • Define workstations, servers, network storage devices, routers, switches, gateways, guards, Virtual Private Networks (VPNs), firewalls, Internet Protocol Security (IPSec), Intrusion Detection Systems (IDSs), mobile devices, peripheral devices and security peripherals.
  • Identify the ethical and legal aspects of information security including government regulatory requirements impacting network and information security professionals.
  • Design, implement, monitor and improve security in-depth for operating systems including Microsoft Windows, Linux, Cisco IOS and Mac OS X.
  • Examine the techniques for defending LAN and WAN networks including firewalls, IDSs and VPNs.
  • Perform day-to-day administration tasks in a Microsoft Windows-based network.
  • Perform day-to-day administration tasks in a UNIX/Linux-based network.
Required Courses
Course # Course Title Credits
Credits: 29-31
Certificate of Completion in Information Security Technology (5347) 28
FYE101 Introduction to College, Career and Personal Success (1) OR
FYE103 Exploration of College, Career and Personal Success (3) 1-3
Restricted Electives
Course # Course Title Credits
Credits: 12-16
Students should select at least four (4) courses from the list below. A minimum of six (6) credits must be ITS prefixed course.
CIS1++++ Any CIS programming Level I course 3
CIS271DL Linux Security 3
CNT150AB Switching, Routing, and Wireless Essentials 4
CNT160AB Enterprise Networking, Security, and Automation 4
CNT205 Cisco Certified Network Associate Security 4
ITS+++++ Any ITS Information Technology Security course except courses used to satisfy Required Courses area 6-16

At Maricopa, we strive to provide you with accurate and current information about our degree and certificate offerings. Due to the dynamic nature of the curriculum process, course and program information is subject to change. As a result, the course list associated with this degree or certificate on this site does not represent a contract, nor does it guarantee course availability. If you are interested in pursuing this degree or certificate, we encourage you to meet with an advisor to discuss the requirements at your college for the appropriate catalog year.

Read the official description