Program Codes:
CYB.AAS
Associate in Applied Science
Explore careers, salaries, and local job opportunities >
The program provides students with the knowledge, skills and tools required to protect hardware, software and networks in an organization’s infrastructure as well as an understanding of the social, ethical, and legal aspects of security and privacy. Students will have the opportunity to build the knowledge and skills essential to develop strategies to secure networks and mitigate risks of future threats. Students learn the essential elements of digital devices, operating systems, connectivity, security, ethical hacking, digital evidence, and programming.
The degree incorporates curricula the prepare students to take industry certification exams, including: CompTIA CySA+ (Cybersecurity Analyst), CompTIA Security+, CompTIA Network+, and Certified Ethical Hacking.
The Cybersecurity A.A.S. degree prepares students for entry-level careers in positions such as Cybersecurity Specialist, Cyber Crime Analyst, Incident Analyst, Junior Penetration Tester, IT Technician, Information Systems Security Analyst, and Network Security Analyst.
Below are required courses and recommended course groupings and sequences for program completion. Courses may have prerequisite and corequisite requirements. Check course descriptions for details.
This course defines computers and computer applications and their use in business, industry and government. Students completing this course will be computer fluent. Students will understand the capabilities and limitations of computers and know how to use them. In addition, students will understand computers and their ethical, legal and societal implications. Topics include the history of computers, hardware devices, software programs, terminology, privacy of information, ethical behavior and the influence of computers on people and society. Hands-on experience includes: using a Windows operating system, a word processor, designing and implementing spreadsheets and producing presentations. This course is recommended for anyone who will be involved with computers and the use of computer application software.
Familiarizes students with mathematical models that occur in more advanced courses and in the areas of business, science and the social sciences using exploratory data analysis and statistical methods. Topics include descriptive statistics linear regression, probability and probability distribution, confidence intervals, and an introduction to hypothesis testing.
Algebra I, MAT-013, or the equivalent as demonstrated through multiple measures.
Corequiste Exemption: Proficiency at the Level of Algebra II
Students will be introduced to programming and problem-solving using the object-oriented programming language Python. Algorithum development and basic problem-solving techniques are introduced. Fundamental topics of computer programming including sequence, selection, repetitiion, input/output, functions, parameter passing, scope, lifetime, arrays, and data types are presented and implemented.
MAT-014 or appropriate score on the College Placement Test.
Through a variety of writing projects requiring competence in clear, correct, and effective English, students use inferential and critical skills in the process of composing documented essays. Extensive reading materials serve as structural models and as the bases for discussion and for the writing of essays involving response, analysis, and synthesis.
RDG-011 may be taken as a co-requisite if not previously completed with a grade of "C" or better.
Introduces the foundations of economic analysis and explores the problems of macroeconomics, including national income, equilibrium analysis and fiscal and monetary policy. The public sector of the national economy is also stressed.
A passing score on the algebra portion of the College placement test or MAT-013 or as the equivalent as demonstrated through multiple measures.
This course will teach students the role of microcomputer operating systems and how the operating systems interact with the computer. The course covers the structure and function of hardware including input/output devices, memory, central processing unit, storage devices, communications devices and buses. The commonly used microcomputer operating systems Windows and DOS will be discussed and emphasized with hands-on exercises covering topics including: disk maintenance, directory and file management, batch files, interaction of graphical user interface and utilities. Configuration and optimization of standard hardware and system software will also be discussed. Upon successful completion of this course, the student will be prepared to take the associated A+ test.
Introduces the student to the field of information security. The managerial, legal, ethical and technical aspects of information security are covered. Students will learn about the need for information security, planning for security and risk management. The function of firewalls, virtual private networks, intrusion detection systems, cryptography and access control mechanisms will be discussed. Physical security and the role of personnel in properly executing security standards and controls are also covered.
This course will provide students with a thorough understanding of the basic concepts of data communications, networking and connectivity. The course covers a broad range of computer networking technologies and topologies (devices, media, network, operating systems, protocols, WAN and troubleshooting and support) providing students with a solid networking background. Students use a network simulation tool to create virtual networks that imitate today's modern computer networks.
This course will provide students with the knowledge necessary to support and service a PC. Cabling, network interfaces, storage devices, and other network hardware components will be studied. Hardware and software installation, troubleshooting, and the use of network diagnostic and repair utilities will also be examined. Students conduct research on hardware and software issues using the Web. Students learn to debug printing problems. Upon successful completion of this course, the student will be prepared to take the associated certification test, such as Microsoft Certified Professional or A+ Hardware.
A grade of “C” or better in ENG-121
This course introduces the basic concepts of the LINUX/UNIX operating system including the LINUX/UNIX file system, shell programming and process management. Features of the LINUX/UNIX shell are explored, including: input and output redirection, pipes, variable and filename substitution, and shell and environmental variables. Regular expressions are covered. Students learn a POSIX compliant shell and develop the ability to use shell utilities and editors and create shell programs of moderate difficulty.
Students will explore the foundation for network administration in an environment that includes Windows operating systems. Topics include network architecture, client and server installation, configuration of active directory parent and child domains, user and computer group policies, Internet Web services, routing, DNS, file and folder permissions, and DHCP. Hands-on exercises will allow students to perform the above-mentioned tasks.
Students will learn, in depth, the management of hardware and software networking components that include IP configuration, wireless networking, network security, network hardening, switch management, firewalls, routing, network policies and procedures, and network protocols. Hands-on activities will reinforce network certification exam objectives.
Select a 3-credit Lab Science course designated in the course descriptions as General Education Science Elective (GE MST).
This course introduces students to the field of computer forensics. Students will learn the procedures and tools of the computer forensics field as related to corporate, civil and criminal investigations, including EnCase, DriveSpy and freeware. Data acquisition, analysis and preservation techniques will be covered. Both corporate and criminal case studies will be discussed. Linux, DOS and Windows operating system environments will be covered.
Students will immerse in a "Hacker Mindset" in order to teach them how to think like a hacker and defend against future cyber-attacks. Students will utilize hands-on applications of security techniques by employing systematic and ethical hacking processes in a professional manner. Various tools for scanning, penetration testing, and securing target systems will be demonstrated. The five phases of ethical hacking will be presented including reconnaissance, gaining access, enumeration, maintaining access, and covering tracks. Hands-on activities will reinforce third-party certification exam objectives.
A study of the basic theories, methods, and problems of ethics and morality. Students will apply ethical principles and problem solving models to examples taken from everyday life.
Contact Name: Aslihan Cakmak, Chairperson
Contact Phone: 732.906.2526
Contact Email: BusinessAndCompSci@middlesexcc.edu
Department Web: https://www.middlesexcc.edu/business-and-computer-science