Maricopa Emergency Management System Alert

Effective August 12, 2021: All Phoenix College employees, students, and visitors are required to wear masks while inside on campus. If you are not feeling well, please do not come to campus. Student services are available remotely, online, and in person. Maricopa Coronavirus Website  |  Need Help?  | Remote Services & Support  | Library

Cybersecurity

The Associate in Applied Science (AAS) in Cybersecurity is designed to focus on the necessary skills required to secure, protect and identify vulnerabilities in a network, including various operating systems and network devices. Emphasis is placed on developing the theoretical, legal, ethical and practical skills needed to maintain security on mission-critical networking and server systems. The program is designed to meet the training needs of government and industry employees. The program covers a variety of information security technologies and structured languages. The Cybersecurity program also focuses on the skills needed for internationally recognized IT certifications and high demands in business, industry, and government. Certificates of Completion (CCLs) are also available in the following areas: Cybersecurity Fundamentals, Cyber Operations, Linux System Administration, Microsoft, Cisco Networking CCNA Security, Cyber Engineering, and Critical Infrastructure.

Details

Details iconImportant information you’ll need when applying for admission:
Field of Interest
Computer and Information Technology
Type
Associate Degree
Cybersecurity (DEG)
Total Credits Required
61-74
Notes

Students must earn a grade of C or better in all courses within the program.

Courses within any of the following prefixes must be taken within five (5) years prior to completion of the program to be applied toward this award: AIM, BPC, CIS, CLD, CNT, CSC, ITS, and MST.

This program replaces:
AAS/3097 Information Technology: Network and Cyber Security
AAS/3160 IT and Power Systems Security

What You'll Learn
  • Explain the fundamental components, concepts, and application of cybersecurity principles. (BPC170, BPC270, CIS105, CIS126DL, CIS126RH, CIS143, CIS156, CIS162++, CIS201, CIS202, CIS203, CIS227, CIS238DL, CIS238RH, CIS239DL, CIS240DL, CIS240RH, CIS250, CIS262++, CIS270, CIS271DB, CIS271DL, CIS271RH, CIS272DB, CIS275DL, ITS110, ITS291, ITS292, MST150++, [FYC])
  • Describe cyber defense tools, methods, and components. (CIS156, CIS190, CIS270, CIS271DB, CIS272DB, CNT140AB, CNT150AB, ITS110, ITS240, ITS291, ITS292, (COM), (CRE))
  • Apply cyber defense methods to prepare a system to repel attacks. (CIS156, CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS272DB, CIS290AC, CIS298AC, CNT150AB, CNT160AB, CNT202, CNT205, ITS110, ITS240, [SG], [SQ])
  • Analyze common security failures and identify specific design principles that have been violated. (CIS121AH, CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS272DB, CNT202, CNT205, ITS110, MST155DC, MST157DC, MST158DC)
  • Understand the interaction between security and system usability and the importance for minimizing the effects of security mechanisms. (CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS272DB, CNT160AB, ITS110, MST155DC, MST157DC, MST158DC)
  • Apply appropriate protocols, tools, and techniques to maximize security in the network environment. (CIS119DO, CIS156, CIS162++, CIS190, CIS201, CIS202, CIS203, CIS227, CIS262++. CIS270, CIS271DB, CIS272DB, CIS276++, CIS290AC, CIS298AC, CNT140AB, CNT150AB, CNT160AB, CNT202, CNT205, ITS110, ITS240, ITS291, ITS292, [MA], [SG], [SQ])
  • Describe the fundamental concepts, technologies, components, vulnerabilities, and issues related to networks. (BPC170, CIS105, CIS119DO, CIS143, CIS190, CIS201, CIS202, CIS238DL, CIS238RH, CIS270, CIS271DB, CIS272DB, CIS276++, CNT140AB, CNT150AB, CNT160AB, CNT202, CNT205, ITS110, (COM))
  • Identify and describe basic security issues of operating systems. (BPC270, CIS105, CIS121AH, CIS126DL, CIS126RH, CIS201, CIS238DL, CIS238RH,, CIS239DL, CIS240DL, CIS240RH, CIS270, CIS271DB, CIS271DL, CIS271RH, CIS272DB, CIS275DL, ITS110, ITS240, MST150++, MST155DC, MST157DC, MST158DC)
  • Identify perpetrators, their resources, and their motivations in cyberspace. (CIS111, CIS143, CIS203, CIS270, CIS271DB, CIS272DB, CIS290AC, CIS298AC, ITS110, ITS120, ITS240)
  • Compare and contrast offensive and defensive resources used in cybersecurity ecosystems/environment. (CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS272DB, CIS290AC, CIS298AC, ITS110, ITS240, (COM), (CRE), [FYC])
  • Delineate differences between the moral, behavioral, ethical, and legal ramifications found in the cybersecurity world. (CIS105, CIS111, CIS143, CIS156, ITS120, (CRE) [FYC], [HU], [SB], [SG], [SQ])
  • Apply knowledge of regulatory and legal requirements to ensure compliance. (CIS111, CIS143, CIS202, CIS290AC, CIS298AC, ITS120, ITS240, (CRE), [FYC])
  • Apply risk analysis methodologies to identify potential vulnerabilities, associated impacts, and recommend appropriate responses. (CIS111, CIS143, CIS121AH, CIS201, CIS202, CIS203, CIS238DL, CIS238RH, CIS270, CIS271DB, CIS272DB, CIS290AC, CIS298AC, CNT150AB, CNT160AB, CNT202, CNT205, ITS110, ITS120, ITS240, ITS291, ITS292, MST155DC, MST157DC, MST158DC, [MA])
  • Communicate professionally in formal and informal situations to diverse audiences. (BPC270, CIS105, CIS111, CIS143, CIS156, CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS271DL, CIS271RH, CIS272DB, CIS275DL, CIS290AC, CIS298AC, ITS110, ITS120, ITS240, (COM), [FYC], [HU], [SB], [SG], [SQ])
  • Collaborate with others to solve cybersecurity problems. (CIS105, CIS111, CIS143, CIS201, CIS202, CIS203, CIS270, CIS271DB, CIS271DL, CIS271RH, CIS272DB, CIS275DL, CIS290AC, CIS298AC, ITS110, ITS120, ITS240, ITS291, ITS292, (COM), [SG], [SQ])
Career Opportunities
Required courses
Course #Course TitleCredits
Credits:24-28
BPC270A+ Exam Prep: Operating System Configuration and Support (3) OR
MST150++Any Microsoft Windows course (3)3
(MST150++required for Microsoft System Administration specialization and Critical Infrastructure specialization)
 
CIS105Survey of Computer Information Systems3
 
CIS111Ethics in Information Technology (3) OR
ITS120Legal, Ethical and Regulatory Issues (3)3
 
CIS126DLLinux Operating System (3) OR
CIS126RHRed Hat System Administration I (3)3
 
CIS156Python Programming: Level I3
 
CIS190Introduction to Networking (3) OR
CNT140ABIntroduction to Networks (4)3-4
(CNT140ABrequired for Cisco Network Administration and Security specialization and Critical Infrastructure specialization)
 
CIS271DBInformation Security Essentials (3) AND
CIS272DBInformation Security Principles (3) OR
CIS270Essentials of Network and Information Security (3) OR
ITS110Information Security Fundamentals (3)3-6
(ITS110required for Cyber Operations specialization; CIS271DB AND CIS272DB required for Critical Infrastructure specialization)
 
ITS240Ethical Hacking and Network Defense3
Course Sequence by Term
Restricted Electives
Course #Course TitleCredits
Credits:12-18
Students must complete 12-18 credits from the following list of courses. Courses that are required for a specialization in Cyber Operations, Linux System Administration, Microsoft System Administration, Cisco Network Administration and Security, Cyber Engineering, and/or Critical Infrastructure are noted. Courses cannot be repeated for credit.
 
Specialization I: Cyber Operations
BPC170A+ Exam Prep: Computer Hardware Configuration and Support3
 
CIS238DLLinux System Administration (3) OR
CIS238RHRed Hat System Administration II (3)3
 
CIS290ACComputer Information Systems Internship (3) OR
CIS298ACSpecial Projects (3)3
 
ITS291Computer Forensics Foundations4
ITS292Advanced Computer Forensics4
 
Specialization II: Linux System Administration
CIS238DLLinux System Administration (3) OR
CIS238RHRed Hat System Administration II (3)3
 
CIS239DLLinux Shell Scripting3
 
CIS240DLLinux Network Administration (3) OR
CIS240RHRed Hat System Administration III (3)3
 
CIS271DLLinux Security (3) OR
CIS271RHRed Hat System Administration IV (3)3
 
CIS275DLLinux Capstone3
 
Specialization III: Microsoft System Administration
CIS121AHMicrosoft PowerShell/Command Line Operations3
MST155DCInstallation, Storage, and Compute with Windows Server4
MST157DCNetworking with Windows Server4
MST158DCIdentity Management with Windows Server 20164
 
Specialization IV: Cisco Network Administration and Security
CNT150ABSwitching, Routing, and Wireless Essentials4
CNT160ABEnterprise Networking, Security, and Automation4
 
CNT202Cisco Secure Firewall Appliance Configuration (4) OR
CNT205Cisco Certified Network Associate Security (4)4
 
Specialization V: Cyber Engineering
CIS119DOIntroduction to Oracle: SQL (3) OR
CIS276++Any SQL Database course (3)3
 
CIS162++Any C Programming: Level I course3
(Students intending to transfer to U of A South should take CIS162 C Programming)
 
CIS227Assembler Language3
 
CIS238DLLinux System Administration (3) OR
CIS238RHRed Hat System Administration II (3)3
 
CIS250Management of Information Systems3
CIS262++Any C Programming: Level II course3
 
Specialization VI: Critical Infrastructure
CIS143Introduction to Critical Infrastructure Protection3
CIS201Introduction to Operational Technology3
CIS202Introduction to Smart Grid Security3
CIS203Principles of the Risk Management Framework3
CNT150ABSwitching, Routing, and Wireless Essentials4
Free Electives
Course #Course TitleCredits
Credits:0-3
Select additional courses 100-level or higher to complete a minimum of 61-semester credits. It is recommended to select from the restricted elective options. Consult with a faculty advisor, program director, and/or academic advisor to identify coursework that best aligns with academic and professional goals.
General education requirements
General Education RequirementCredits: 22-28
 
General Education CoreCredits: 12-18
 
First-Year CompositionCredits: 6
ENG101First-Year Composition (3) OR
ENG107First-Year Composition for ESL (3) AND
ENG102First-Year Composition (3) OR
ENG108First-Year Composition for ESL (3)3
 
Oral CommunicationCredits: 3
COM100Introduction to Human Communication (3) OR
COM110Interpersonal Communication (3) OR
COM225Public Speaking (3) OR
COM230Small Group Communication (3)3
 
COM100required for students intending to transfer to ASU West to earn a Bachelor of Science in Applied Computing (Cybersecurity).
 
Critical ReadingCredits: 0-3
CRE101College Critical Reading and Critical Thinking (3) OR
Equivalent as indicated by assessment (0)0-3
 
MathematicsCredits: 3-6
Any approved general education course in the Mathematics area.3-6
 
General Education DistributionCredits: 10
 
Humanities and Fine ArtsCredits: 3
Any approved general education course(s) in the Humanities, Arts and Design area.
 
Social and Behavioral SciencesCredits: 3
Any approved general education course(s) in the Social-Behavioral Sciences area.
 
Natural SciencesCredits: 4
Any approved general education course(s) from the Natural Sciences area.

At Maricopa, we strive to provide you with accurate and current information about our degree and certificate offerings. Due to the dynamic nature of the curriculum process, course and program information is subject to change. As a result, the course list associated with this degree or certificate on this site does not represent a contract, nor does it guarantee course availability. If you are interested in pursuing this degree or certificate, we encourage you to meet with an advisor to discuss the requirements at your college for the appropriate catalog year.