Computer Information Systems Technology (BAS), Cybersecurity Specialization
Previous Degree Required: A.S./A.A.
Eligible for Financial Aid: Yes
Delivery Method(s): On-Campus, Hybrid
Location(s): Palm Bay
Additional Limited Access Application Process Required: No
Program Testing Requirements: Not Required
Academic Community: STEM
Program Code: CTBSCSCT
Classification of Instructional Programs (CIP) Code: 11.0401
Florida Department of Education CIP Code: 1101104011
This is a specialization of the BAS Computer Information Systems Technology degree.
The Cybersecurity specialization at Eastern Florida State College prepares students for entry-level positions involving the fast-expanding field of computer security. Students will gain a fundamental understanding of cybersecurity and can specialize in one or more of the following areas.
- Database security
- Network security
- Application software security
- Forensics
Potential career positions include Software Developer, Database Administrator, Web Developer, Computer Forensics Technician and Network Security Analyst.
Refer to the Bachelor of Applied Science (BAS) overview page to find information about admission, graduation, general education and other requirements. Students who need technical electives will work with a bachelor’s advisor to determine the courses best suited to their plan of study.
Visit the program page for more details and how to apply.
Program of Study
Code | Title | Credit Hours |
---|---|---|
Associate Degree | ||
Complete Associate Degree | 60 | |
General Education or Technical Concentration | ||
General Education (for A.S. degree students) or Technical Concentration (for A.A. degree students) | 21 | |
Computer Information Systems Technology - Major Courses | ||
GEB 3213 | Foundations of Managerial Communications | 3 |
ISM 3011 | Introduction to Information Technology Management | 3 |
ISM 4300 | Information Systems Operations Management | 3 |
MAN 4504 | Operational Decision Making | 3 |
Cybersecurity Specialization Major Courses | ||
CISC 3391 | Computer Forensics | 3 |
CISC 3392 | Windows Forensics | 3 |
CNT 3403 | Network Defense Security | 3 |
COP 3703 | Database Design and Architecture | 3 |
ISM 3321 | Cybersecurity Fundamentals | 3 |
ISM 3322 | Advanced Cybersecurity Concepts | 3 |
Cybersecurity Specialization Electives (Choose 9 Credits) | 9 | |
Platform Technologies | ||
Internship | ||
Network Planning and Design | ||
Object Oriented Programming | ||
Client Side Web Application Programming | ||
Web Applications Programming | ||
Information Systems Analysis and Design | ||
Applications in Information Security | ||
Total Credit Hours | 120 |
In accordance with Florida Statute and Florida Administrative Code, students must
-
Satisfy the foreign language competency requirement
-
Satisfy the Civic Literacy Graduation Requirement.
The BAS in Computer Information Systems Technology has two Common Program Prerequisites. These courses must be completed with a grade of "C" or higher before being admitted to 3000 - 4000 level courses:
- COP 2334 Introduction to C++ Programming
- Any Computer Programming course with a COP prefix will beaccepted in place of COP 2334, except COP 1000 Principles of Programming
- STA 2023 Statistics
- MAC 2311 will be accepted in place of STA 2023. No other course substitutions are permitted for either course. Click on thecourse number to see course prerequisites.
Course Sequence
Below is the recommended sequence for taking the bachelor's-level courses in this degree. Using this guide and meeting with your assigned advisor each term is the key to successful program completion.
Please note that course prerequisites, including required developmental math, reading, or writing, need to be completed to continue on to the more advanced course. Courses followed by “&” have prerequisites that are not part of this program. Click on the course number to see the requirements.
Code | Title | Credit Hours |
---|---|---|
ISM 3011 | Introduction to Information Technology Management | 3 |
GEB 3213 | Foundations of Managerial Communications | 3 |
Tech or Gen Ed Elective 1 | 3 | |
Tech or Gen Ed Elective 1 | 3 | |
Specialization Elective (ISM 3113 recommended) 2 | 3 | |
Tech or Gen Ed Elective 1 | 3 | |
Tech or Gen Ed Elective 1 | 3 | |
Tech or Gen Ed Elective 1 | 3 | |
CISC 3391 | Computer Forensics & | 3 |
ISM 4300 | Information Systems Operations Management & | 3 |
CNT 3403 | Network Defense Security & | 3 |
COP 3703 | Database Design and Architecture & | 3 |
ISM 3321 | Cybersecurity Fundamentals & | 3 |
MAN 4504 | Operational Decision Making | 3 |
CISC 3392 | Windows Forensics | 3 |
ISM 3322 | Advanced Cybersecurity Concepts | 3 |
Specialization Elective 2 | 3 | |
Specialization Elective 2 | 3 | |
Tech or Gen Ed Elective 1 | 3 | |
Tech or Gen Ed Elective 1 | 3 | |
Total Credit Hours | 60 |
- 1
Select 9 credits from the Cybersecurity Specialization Electives list on the Program of Study page
- 2
Select 21 credits to meet the general education requirement or technical elective requirement. Work with a bachelor’s advisor to determine the courses needed.
Learning Outcomes
- Demonstrate the ability to use current techniques, skills, and tools necessary for the evaluation of information systems.
- Core Ability Supported: Think Critically and Solve Problems
- Systematically analyze data to improve organizational input and output processes, productivity and quality of work for users.
- Core Ability Supported: Process Information
- Demonstrate comprehensive understanding for information and network security; planning, risk management, security technologies, and personnel
- Core Ability Supported: Think Critically and Solve Problems
- Apply techniques for network design and network security defense.
- Core Ability Supported: Think Critically and Solve Problems
- Apply techniques for collecting and analyzing forensic data, computer systems and media using readily available open forensic investigative source tools available for popular commercial operating systems.
- Core Ability Supported: Think Critically and Solve Problems
- Apply techniques for storage and retrieval of data to support the organization’s functional units and external customers.
- Core Ability Supported: Process Information
- Demonstrate the ability to design and write high quality computer programs that are well organized and documented.
- Core Ability Supported: Think Critically and Solve Problems
- Apply tools and techniques for mitigating security breaches in the Software Development Life Cycle (SDLC), considering security and privacy concerns in establishing system requirements, analysis and design artifacts, source code, quality assurance testing plans, installation and deployment strategies, and maintenance techniques.
- Core Ability Supported: Think Critically and Solve Problems
- Explain the fundamentals of cybersecurity and its impact on information systems, identify various types of cybersecurity threats, explain cybersecurity management methods and identify current security resources.
- Core Ability Supported: Think Critically and Solve Problems
- Assess network security controls and determine security concerns, authentication protocol services, network monitors, and secure data communication techniques.
- Core Ability Supported: Think Critically and Solve Problems
- Determine lab requirements for live acquisition analysis and list current tools, compare current tools for data collection and analysis, explain forensically sound data collection and storage techniques and create a live response testing environment.
- Core Ability Supported: Think Critically and Solve Problems
- Design implementation strategies for securing web information, apply techniques for securing information in web applications and web servers, examine vulnerabilities, threats and attacks and recommend strategies for securing web information.
- Core Ability Supported: Think Critically and Solve Problems