Information Security
The Associate in Applied Science (AAS) in Information Security degree is designed to provide students with the knowledge and tools to understand how networks, operating systems and programs function. Emphasis is placed on developing the theoretical and practical skills needed to maintain security on mission-critical data and systems. The program is designed to meet the training needs of government and industry employees. The program covers a variety of information security disciplines which include both vendor-neutral and vendor-specific information technology (IT) security training. The Information Security program prepares students for internationally recognized IT certifications and high demands in business, industry and government.
Details
Students must earn a grade of C or better in all courses within the program.
Courses within any of the following prefixes must be taken within five (5) years prior to completion of the program to be applied toward this award: AIM, BPC, CIS, CLD, CNT, CSC, ITS, and MST.
- Install, configure, administer, use, and maintain a UNIX/Linux operating system.
- Define common network terminology and protocols to include local area network (LAN) and wide-area network (WAN) topologies, the Open System Interconnection reference (OSI) model and communication cabling standards.
- Use appropriate equations to solve basic Internet Protocol (IP) addressing and subnetting problems associated with designing a network.
- Apply basic security techniques such as password protection and access control lists (ACLs).
- Explain a broad, cross-section of information security concepts including authentication methods, access control, cryptography, public key infrastructure (PKI), network attack and defense methods, operating systems and network device hardening, securing remote access and wireless technologies including viruses and worms.
- Define workstations, servers, network storage devices, routers, switches, gateways, guards, Virtual Private Networks (VPNs), firewalls, Internet Protocol Security (IPSec), Intrusion Detection Systems (IDSs), mobile devices, peripheral devices and security peripherals.
- Identify the ethical and legal aspects of information security including government regulatory requirements impacting network and information security professionals.
- Design, implement, monitor and improve security in-depth for operating systems including Microsoft Windows, Linux, Cisco IOS and Mac OS X.
- Examine the techniques for defending LAN and WAN networks including firewalls, IDSs and VPNs.
- Perform day-to-day administration tasks in a Microsoft Windows-based network.
- Perform day-to-day administration tasks in a UNIX/Linux-based network.
Course # | Course Title | Credits |
---|---|---|
Credits: | 12-16 | |
Students should select at least four (4) courses from the list below. A minimum of six (6) credits must be ITS prefixed course. | ||
CIS1++++ Any CIS programming Level I course | 3 | |
CIS271DL | Linux Security | 3 |
CNT150AB | Switching, Routing, and Wireless Essentials | 4 |
CNT160AB | Enterprise Networking, Security, and Automation | 4 |
CNT205 | Cisco Certified Network Associate Security | 4 |
ITS+++++ | Any ITS Information Technology Security course except courses used to satisfy Required Courses area | 6-16 |
At Maricopa, we strive to provide you with accurate and current information about our degree and certificate offerings. Due to the dynamic nature of the curriculum process, course and program information is subject to change. As a result, the course list associated with this degree or certificate on this site does not represent a contract, nor does it guarantee course availability. If you are interested in pursuing this degree or certificate, we encourage you to meet with an advisor to discuss the requirements at your college for the appropriate catalog year.
Read the official description