|
Jun 16, 2025
|
|
|
|
2025-2026 Catalog
Cyber Security/Information Assurance, AS
|
|
Return to: Cyber Security/Information Assurance
LOCATIONS:
Bloomington - Columbus - Evansville - Fort Wayne - Greencastle - Hamilton County - Indianapolis - Kokomo - Marion - Richmond - Sellersburg - South Bend/Elkhart - Terre Haute - Valparaiso - Warsaw
ALSO AVAILABLE STATEWIDE VIA DISTANCE EDUCATION
|
Written Communication (3)
Speaking and Listening (3)
Quantitative Reasoning (6-12)
Scientific Ways of Knowing (6-12)
Social and Behavioral Ways of Knowing (3-6)
Humanistic and Artistic Ways of Knowing (3)
OTHER INSTITUTIONAL REQUIREMENTS
PROFESSIONAL/TECHNICAL CORE
TRANSFER CLUSTER
Choose 6 credits from the following: TOTAL CREDITS: 60
Symbol Key ^Capstone Course * Required for Transfer General Education Core (TGEC) Certificate This degree program carries to the Indiana Transfer Single Articulation Pathway (TSAP) designation and is fully mapped to the Indiana Cyber Security - TSAP competencies.
The Transfer General Education Core - TGEC - Certificate requirements for this degree require a minimum of 30 credits. The TGEC Certificate requires a minimum of one course from six areas of study. The number of TGEC elective courses shown above may vary based on required TGEC course credits earned, area of study, and the student’s Individual Academic Plan. The remaining degree requirements provide a mechanism for students to obtain the required minimum 60 credits to graduate with the appropriate Associate level transfer degree. Required for Transfer General Education Core Certificate; MATH 123 - Quantitative Reasoning is not appropriate selections to satisfy the Mathematics requirement. DEGREE OUTCOMES
- Identify the bad actors/entities in cyberspace, compare and contrast their resources, capabilities/techniques, motivations, and aversion to risk.
- List the first principles of security and describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies.
- Illustrate basic security design fundamentals that help create systems that are worthy of being trusted.
- Demonstrate the fundamental concepts of information assurance/cyber defense that can be used to provide system security.
- Describe strengths and weaknesses, modes, and issues that have to be addressed in an implementation and describe how cryptography can be used.
- Use the hardware components of modern computing environments and their individual functions.
- Describe and apply the fundamental and higher concepts, technologies, components and issues related to communications and data networks.
- List the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data.
- Understand federal, state, and local cyber defense partners/structure.
- Communicate effectively in written and oral forms.
- Demonstrate critical thinking.
- Apply project management strategies to real-world industry applications.
- Prepare for and attempt one or more industry certification exams.
- Apply an understanding of various IT career opportunities.
|
Return to: Cyber Security/Information Assurance
|
|