Jun 16, 2025  
2025-2026 Catalog 
    
2025-2026 Catalog

Cyber Security/Information Assurance, AS


Return to {$returnto_text} Return to: School of Information Technology

LOCATIONS:

Bloomington - Columbus - Evansville - Fort Wayne - Greencastle - Hamilton County - Indianapolis - Kokomo - Marion - Richmond - Sellersburg - South Bend/Elkhart - Terre Haute - Valparaiso - Warsaw

ALSO AVAILABLE STATEWIDE VIA DISTANCE EDUCATION

INDIANA COLLEGE CORE


Written Communication (3)


Speaking and Listening (3)


Quantitative Reasoning (6-12)


Humanistic and Artistic Ways of Knowing (3)


REQUIREMENT TOTAL: 30


OTHER INSTITUTIONAL REQUIREMENTS


REQUIREMENT TOTAL: 2


REQUIREMENT TOTAL: 22


TRANSFER CLUSTER


Choose 6 credits from the following:

REQUIREMENT TOTAL: 6


TOTAL CREDITS: 60


Symbol Key

^Capstone Course 

*     Required for Transfer General Education Core (TGEC) Certificate

This degree program carries to the Indiana Transfer Single Articulation Pathway (TSAP) designation and is fully mapped to the Indiana Cyber Security - TSAP competencies.



The Transfer General Education Core - TGEC - Certificate requirements for this degree require a minimum of 30 credits. The TGEC Certificate requires a minimum of one course from six areas of study. The number of TGEC elective courses shown above may vary based on required TGEC course credits earned, area of study, and the student’s Individual Academic Plan. The remaining degree requirements provide a mechanism for students to obtain the required minimum 60 credits to graduate with the appropriate Associate level transfer degree.

Required for Transfer General Education Core Certificate; MATH 123 - Quantitative Reasoning  is not appropriate selections to satisfy the Mathematics requirement.

DEGREE OUTCOMES


  • Identify the bad actors/entities in cyberspace, compare and contrast their resources, capabilities/techniques, motivations, and aversion to risk.
  • List the first principles of security and describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies.
  • Illustrate basic security design fundamentals that help create systems that are worthy of being trusted.
  • Demonstrate the fundamental concepts of information assurance/cyber defense that can be used to provide system security.
  • Describe strengths and weaknesses, modes, and issues that have to be addressed in an implementation and describe how cryptography can be used.
  • Use the hardware components of modern computing environments and their individual functions.
  • Describe and apply the fundamental and higher concepts, technologies, components and issues related to communications and data networks.
  • List the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data. 
  • Understand federal, state, and local cyber defense partners/structure. 
  • Communicate effectively in written and oral forms.
  • Demonstrate critical thinking.
  • Apply project management strategies to real-world industry applications.
  • Prepare for and attempt one or more industry certification exams.
  • Apply an understanding of various IT career opportunities.

Return to {$returnto_text} Return to: School of Information Technology