Skip to main content
Browser not supported!
We recommend using a modern browser such as Google Chrome, Microsoft Edge, Apple Safari, or Mozilla Firefox.

Submitter's Information

Name

Margee Loya

Title

Curriculum Analyst

Region

Central/Mother Lode

College

Clovis Community College

CTE Dean

CTE Dean's Name

Robbie Kunkel

CTE Dean's Email

Log in to view CTE Dean's Email.

Program Details

Program Title

Cyber Security

Submission Type

n/a

TOPs Code

Computer Software Development (070700)

Projected Start Date

08/13/18

Catalog Description
This program provides students with the knowledge, training, and hands-on experience to pursue a career and gain professional certification (CompTIA)as an Information Technology Cyber Security Technician professional in a business, government, or education environment. Students should have a basic understanding of computer networking prior to enrolling. Students completing this program of study will be able to enter the cyber security workforce in areas such as security analyst, or penetration tester with a comprehensive understanding of computer hardware, system software, networking essentials, as well as the intermediate skills to protect computer networks against malicious attack, and to use currently available tools to perform network testing, penetration, and assessment of target networks.
Enrollment Completer Projections
Enrollment Data: The following chart illustrates the anticipated enrollment based on historical data from our IT support program in which our proposed Cyber Security program. Growth in this case is restricted by the size of our teaching and lab facilities. Anticipated annual completers: Please see table in attached document

Program Proposal Attributes

Program Award Type(s) (Check all that apply)
  • Certificate of Achievement: 16 or greater semester (or 24 or greater quarter) units (C)
Program Goal
Program Goals and Objectives PROGRAM GOALS 1. Design a network topology for a medium to large enterprise, while reading and understanding the fundamental goal of Cyber Security – Confidentiality, Integrity, and Availability (CIA) of data which is transmitted on a given network and governed by federal and state regulations, and procedures. 2. Design a network security system which is configured to protect a given network, while reading, researching and considering all elements of Cyber Security such as Physical, Communication, and Network security. 3. Design and configure an Intrusion Detection System (IDS), for a typical network for a medium to large enterprise, while using the typical tools and written instructions used by Cyber Security experts to perform network sniffing, monitoring, surveillance, and enumeration of data. OBJECTIVES In the process of completing this program, students will learn the following main competencies to succeed in the field of cyber security and networking: 1. Install switches, routers and hubs, and configure them while reading instructions that outline specific protocols and addressing procedures which are at risk of intrusion. 2. Read, identify and distinguish the 3 key goals of network security: Confidentiality, Integrity, and Availability (CIA), in a medium to large computer network. 3. Implement security policies and standards as required for network protection and security. 4. Secure wireless networks, and test for intrusion, as well configuring for optimal protection such as MAC filtering and traffic encryption. 5. Install and configure Intrusion Detection Systems (IDS) to meet the designed and written requirements given the range of threats in any combination of Physical, Network, or Communications elements of a given network. 6. Determine “Best Practices” in HTTPS, DNS, SMTP, and FTP servers to “harden” these resources against outside attacks, through research, reading professional journals, and publications. 7. Secure a given network using firewalls, and proxy servers, as well as specialized programs and tools. Program Learning Outcomes: • Evaluate the computer network and information security needs of an organization. • Assess cybersecurity risk management policies in order to adequately protect an organization's critical information and assets. • Evaluate the performance of security systems within an enterprise-level information system. • Troubleshoot, maintain, and update an enterprise-level information security system. • Implement continuous network monitoring and provide real-time security solutions. • Formulate, update, and communicate short- and long-term organizational cybersecurity strategies and policies.

Course Units and Hours

Total Certificate Units (Minimum and Maximum)

20-21

Units for Degree Major or Area of Emphasis (Minimum and Maximum)

n/a

Total Units for Degree (Minimum and Maximum)

n/a

Course Report

Program Requirements Narrative

n/a

Program Requirements
IS-15, Computer Concepts; 3 units; Year 1, fall IS-62, Computer & Communication Essentials – troubleshooting and Maintenance; 4 units; Year 1, fall IS-63, Computer Networking Fundamentals; 3 units; Year 1, spring IS-70, Introduction to Information Cyber Security; 3 units; Year 1, spring IS-71, Introduction to Cybersecurity: Ethical Hacking, Year 2, fall OT-17, Job Retention and Responsibilities; 1 unit; Year 1/2; fall OR IS-66, Office and Customer Skills for Technicians; 2 units; Year 2, 1/2 fall TOTAL UNITS: 20-21 Proposed Sequence: Year 1, Fall = 7-9 units Year 1, Spring = 6units Year 2, Fall = 6 -9 units TOTAL UNITS: 20 or 21 units

Central/Mother Lode Regional Questions

Submission Details

Published at

07/23/18 - 03:17 PM

Status

Recommended

Return to Drafts

Please list the reason(s) for returning "Cyber Security". to Margee Loya's drafts. This message will be sent to margee.loya@cloviscollege.edu

Comments, Documents, Voting

Comments

All Comments

No comments to display.