Skip to content

Cyber Information Security Administration AAS

Program Overview

The Cyber Information Security Administration Associate of Applied Science (AAS) degree prepares students for careers in cybersecurity, information security, and cyber operations.

Program Requirements

Total Credits: 64-68

Semester 1 (17-19 credits)

Course Title Credits
CITE-118 Computer Information Technology Essentials 2
CITE-121 Network Support I 3
CITE-122 Network Support I Projects 3
CITE-140 Introduction to Cybersecurity 3
ENGL-101 Writing and Rhetoric I 3
GEM 3 Mathematical Ways of Knowing 3-5
Semester Total 17-19

Semester 2 (15 credits)

Course Title Credits
CITE-142 Information Security Fundamentals 3
CITE-145 Cybersecurity Law and Ethics 3
CITE-152 Networking Essentials 3
CITE-155 Linux Essentials 3
COMM-101 Fundamentals of Oral Communication 3
Semester Total 15

Semester 3 (15 credits)

Course Title Credits
CITE-165 Linux System Administration 3
CITE-235 Network Security Fundamentals 3
CITE-243 Command Line and Scripting Fundamentals 3
CITE-275 Intrusion Detection/Prevention Systems Fundamentals 3
GEM 6 Social and Behavioral Ways of Knowing 3
Semester Total 15

Semester 4 (17-19 credits)

Course Title Credits
CITE-104 Systems Administration I 3
CITE-105 Systems Administration I Projects 3
CITE-237 Ethical Hacking and Systems Defense 3
CITE-258 Cyber Operations 3
AAS Institutionally Designated Course requirement 3-5
Elective Options: 2-3
ATEC-117 Occupational Relations and Job Search, OR
CITE-289 Cyber Competitions, OR
CITE-296 Cybersecurity Internship
Semester Total 17-19

Career Outcomes

Graduates are prepared for positions such as: - Cybersecurity Analyst - Information Security Specialist - Security Operations Center (SOC) Analyst - Incident Response Specialist - Penetration Tester - Cyber Operations Specialist

Program Features

  • Comprehensive cybersecurity training
  • Hands-on ethical hacking experience
  • Industry-standard security tools
  • Legal and ethical foundations
  • Real-world threat analysis
  • Internship and competition opportunities

Specialized Focus Areas

  • Network Security: Firewalls, VPNs, intrusion detection
  • System Security: Linux administration, hardening, monitoring
  • Incident Response: Threat hunting, forensics, operations
  • Ethical Hacking: Penetration testing, vulnerability assessment
  • Compliance: Legal frameworks, ethics, policy development