- Program Contact: Kevin Anderson
- Department Co-Chair: Tim Taylor
- Department Co-Chair: Sheley Little
- CIS - Applications - Schedule of Classes
CIS - Core - Schedule of Classes
CIS - Networking - Schedule of Classes
CIS - Programming - Schedule of Classes
CIS - Security - Schedule of Classes
CIS - Web - Schedule of Classes
Information systems security has become a critical knowledge area for those interested in a career as an information technology professional. This degree provides the information and skills necessary for network administration professionals to implement security from internal and external threats for an enterprise network. It covers client and server security on different operating systems, disaster recovery planning, and forensics. This program also provides preparation for several computer information security certification exams, including the Computer Technology Industry Association (CompTIA) Security+ exam, Microsoft Certified Systems Engineer (MCSE) exams, and several of the Certified Information Systems Security Professional (CISSP) certification exams.
Networking/security skills and experience are needed for technical support staff, administrators, designers, troubleshooters, and information systems security specialists. According to the Bureau of Labor Statistics (2008-2018) figures, job demands in these areas will grow a phenomenal 37.1% annually, and will continue to exceed the number of available and trained workers.
Department of Homeland Security – Cybersecurity Jobs
The Department of Homeland Security is actively
recruiting more than 50 dynamic cybersecurity
professionals to help protect the Nation’s cyberspace.
For more information download their bulletin: Cybersecurity Jobs.
10 Cyber Security Facts
Upon completion of this program, the student will be able to:
- develop best practices for configuring network operating system services to provide optimum security.
- compare and contrast the benefits of firewalls vs. intrusion detection devices and software.
- analyze organizational needs and implement internal security policies for the enterprise.
- evaluate and implement the required security programs and policies to protect the enterprise against viruses, Trojans, worms, rootkits, and spyware.
- construct file system permissions and share permissions to allow only the minimum levels of access needed by users to use network resources.
- prioritize and establish a disaster recovery plan for the enterprise.
- explain and configure a network firewall to provide optimum security from external threats and exploits.
- construct and apply group policies and file system permissions to secure files and network resources.
Associate in Science (A.S.) Degree
The Associate in Science degree may be obtained by completion of the required program, plus general education requirements, plus sufficient electives to meet a 60-unit total. See SCC graduation requirements.
Certificate of Achievement
The Certificate of Achievement may be obtained by completion of the required program with grades of “C” or better.