Skip to Section
Submitter's Information
Name
Margee Loya
Title
Curriculum Analyst
Region
Central/Mother Lode
College
Clovis Community College
CTE Dean
CTE Dean's Name
Robbie Kunkel
CTE Dean's Email
Log in to view CTE Dean's Email.
Program Details
Program Title
Cyber Security
Submission Type
n/a
TOPs Code
Computer Software Development (070700)
Projected Start Date
08/13/18
Catalog Description
This program provides students with the knowledge, training, and hands-on experience to pursue a career and gain professional certification (CompTIA)as an Information Technology Cyber Security Technician professional in a business, government, or education environment. Students should have a basic understanding of computer networking prior to enrolling. Students completing this program of study will be able to enter the cyber security workforce in areas such as security analyst, or penetration tester with a comprehensive understanding of computer hardware, system software, networking essentials, as well as the intermediate skills to protect computer networks against malicious attack, and to use currently available tools to perform network testing, penetration, and assessment of target networks.
Enrollment Completer Projections
Enrollment Data:
The following chart illustrates the anticipated enrollment based on historical data from our IT support program in which our proposed Cyber Security program. Growth in this case is restricted by the size of our teaching and lab facilities.
Anticipated annual completers:
Please see table in attached document
Program Proposal Attributes
Program Award Type(s) (Check all that apply)
- Certificate of Achievement: 16 or greater semester (or 24 or greater quarter) units (C)
Program Goal
Program Goals and Objectives
PROGRAM GOALS
1. Design a network topology for a medium to large enterprise, while reading and understanding the fundamental goal of Cyber Security – Confidentiality, Integrity, and Availability (CIA) of data which is transmitted on a given network and governed by federal and state regulations, and procedures.
2. Design a network security system which is configured to protect a given network, while reading, researching and considering all elements of Cyber Security such as Physical, Communication, and Network security.
3. Design and configure an Intrusion Detection System (IDS), for a typical network for a medium to large enterprise, while using the typical tools and written instructions used by Cyber Security experts to perform network sniffing, monitoring, surveillance, and enumeration of data.
OBJECTIVES
In the process of completing this program, students will learn the following main competencies to succeed in the field of cyber security and networking:
1. Install switches, routers and hubs, and configure them while reading instructions that outline specific protocols and addressing procedures which are at risk of intrusion.
2. Read, identify and distinguish the 3 key goals of network security: Confidentiality, Integrity, and Availability (CIA), in a medium to large computer network.
3. Implement security policies and standards as required for network protection and security.
4. Secure wireless networks, and test for intrusion, as well configuring for optimal protection such as MAC filtering and traffic encryption.
5. Install and configure Intrusion Detection Systems (IDS) to meet the designed and written requirements given the range of threats in any combination of Physical, Network, or Communications elements of a given network.
6. Determine “Best Practices” in HTTPS, DNS, SMTP, and FTP servers to “harden” these resources against outside attacks, through research, reading professional journals, and publications.
7. Secure a given network using firewalls, and proxy servers, as well as specialized programs and tools.
Program Learning Outcomes:
• Evaluate the computer network and information security needs of an organization.
• Assess cybersecurity risk management policies in order to adequately protect an organization's critical information and assets.
• Evaluate the performance of security systems within an enterprise-level information system.
• Troubleshoot, maintain, and update an enterprise-level information security system.
• Implement continuous network monitoring and provide real-time security solutions.
• Formulate, update, and communicate short- and long-term organizational cybersecurity strategies and policies.
Course Units and Hours
Total Certificate Units (Minimum and Maximum)
20-21
Units for Degree Major or Area of Emphasis (Minimum and Maximum)
n/a
Total Units for Degree (Minimum and Maximum)
n/a
Course Report
Program Requirements Narrative
n/a
Program Requirements
IS-15, Computer Concepts; 3 units; Year 1, fall
IS-62, Computer & Communication Essentials – troubleshooting and Maintenance; 4 units; Year 1, fall
IS-63, Computer Networking Fundamentals; 3 units; Year 1, spring
IS-70, Introduction to Information Cyber Security; 3 units; Year 1, spring
IS-71, Introduction to Cybersecurity: Ethical Hacking, Year 2, fall
OT-17, Job Retention and Responsibilities; 1 unit; Year 1/2; fall
OR
IS-66, Office and Customer Skills for Technicians; 2 units; Year 2, 1/2 fall
TOTAL UNITS: 20-21
Proposed Sequence:
Year 1, Fall = 7-9 units
Year 1, Spring = 6units
Year 2, Fall = 6 -9 units
TOTAL UNITS: 20 or 21 units
Supporting Documents
Central/Mother Lode Regional Questions
Submission Details
Published at
07/23/18 - 03:17 PM
Status
Recommended
Return to Drafts
Please list the reason(s) for returning "Cyber Security". to Margee Loya's drafts. This message will be sent to margee.loya@cloviscollege.edu
Comments, Documents, Voting
Comments
All Comments
No comments to display.