Cyber Security, Associate of Science Degree (A.S.)

Program Outline and Course Descriptions

Information security is the quintessential makeup of every company, organization, and person throughout the globe. With the rapid increase of cyber threats and attacks it is essential that companies protect their network infrastructure from and avoid becoming the next victim of a cyber-attack. The Associate of Science degree in Cyber Security provides students with a solid foundation of the skills needed to become a cyber security professional. Students in this program gain an understanding of how to identify potential cyber threats and prevent both internal and external attacks. This exciting program gives students the tools and the information for potential employment in the rapidly evolving Cyber Security field.

Course Number Course Titles Quarter Credits
CSC 100 Student Success Fundamentals 5
CSC 110 Technology Fundamentals 5
CYB 200 Python Programming Fundamentals 5
CYB 210 Digital Forensics and Investigations 5
CYB 240 Fundamentals of Network Security 5
CYB 245 Network Defense Security 5
CYB 250 Incident Response and Disaster Recovery 5
CYB 260 Offensive Vulnerability Assessment 5
ENG 100 English Composition I 5
ENG 200 English Composition II 5
HUM 120 Introduction to Sociology 5
HUM 140 Introduction to Psychology 5
ITS 110 Fundamentals of Operating System 5
ITS 120 Managing Computer Devices 5
ITS 150 Basic Networking 5
ITS 180 Administering Networks 5
ITS 190 Network Maintenance 5
ITS 210 Network System Services 5
ITS 220 Introduction to Database Management 5
MTH 101 Introductory Algebra 5
Total Credits 100

 

*General Education course

●       Explain the importance of personal responsibility and security in a technological world, ethics, privacy issues, and security threats, vulnerabilities, and countermeasures.

●       Design a cyber security network infrastructure by identifying and utilizing tools and systems that reduce the risk of data breaches, network intrusions, software and hardware hardening, and information data security while complaining with organizational policies and practices.

●       Determine flaws and vulnerabilities in applications, websites, networks, systems, protocols, and configurations using both manual techniques and assistive tools while providing viable solutions for securing the infrastructure while maintaining proper compliance and governance within the enterprise.

●       Discuss the fundamentals of cybersecurity, threats to business continuity, disaster recovery, legal, ethical predicaments, and professional issues relative to security whether it be related to data, information, application, or networks.

●       Implement common standards, procedures, and applications used to protect the confidentiality, integrity, and availability of data and information systems.

●       Develop contingency operations that include administrative planning processes for incident response, disaster recovery, and business continuity planning within information security and implement a comprehensive security plan, including risk analysis, legal, regulatory, physical security, data, and personnel threats.

●       Explain and utilize digital forensic techniques, procedures, and software tools.

●       Implement appropriate procedures and technologies to enforce administrative policies within a corporate environment with sensitivity to the goals and constraints of an organization.

●       Implement a hardware and software configuration responsive to an identified scenario while describing how the historical development of hardware and operating system computing platforms produced the computing systems we have today and diagram the main parts of a computer, including interconnections.

●       Explain and utilize network standards, protocols, components, transmission media, hardware, protocol analyzer, and cybersecurity tools and requirements of distributed computing setting while contrasting various networking topologies in terms of robustness, expandability, and throughput used within an enterprise.

●       Perform database administration tasks such as creating and managing database users, roles, and privileges, backup, and restoring database objects to ensure organizational efficiency, continuity, and information security.

●       Develop critical thinking, reasoning, and problem-solving skills.

●       Use the Library/Resource Center to complete course assignments that require book, periodical, journal, and/or Internet research.

The Cyber Security Associate of Science Degree program is 100 quarter credits and can be completed in two (2) years if the student attends all terms full time and consecutively.

CYB 200

Python Programming Fundamentals

50 hours lecture; 10 hours lab                      5 credits

100 hours additional out-of-class work is expected as part of this course.

This course introduces students to programming using the Python language. Students will become acquainted with algorithmic design; basic concepts such as data types, variables, assignments and flow control, conditionals, loops, iterators, inheritance, and functions. This course also covers procedural and data abstractions, program design, debugging, testing, and documentation. Advanced topics include object-oriented design, strings, tuples, lists, dictionaries, files, classes, and graphical user interface-driven applications.

Prerequisite:  ITS 120 Managing Computer Devices

CYB 210

Digital Forensics and Investigations

50 hours lecture; 10 hours lab                      5 credits

100 hours additional out-of-class work is expected as part of this course.

Digital Forensics and Investigations is an introductory-level course designed to provide students with a fundamental understanding of the principles, methodologies, and techniques used in the field of computer forensics. This course focuses on teaching students how to investigate and analyze digital evidence to uncover cybercrimes, support legal proceedings, and maintain the integrity of digital investigations. Students will gain hands-on experience in using forensic tools, preserving digital evidence, and applying ethical practices throughout the investigation process.

Prerequisite:  ITS 150 Basic Networking

CYB 240

Fundamentals of Network Security

50 hours lecture; 10 hours lab                      5 credits

100 hours additional out-of-class work is expected as part of this course.

This class introduces students to security threats faced by companies daily. Students in this class will learn how to identify, mitigate, and respond to incidents. Topics covered in this course introduces students the basic principles of network security design, identification of threats, analyzation of logs, and implementation of security principals, physical threats, social engineering, security ethics, cryptography, and securing both data and networks. Students explore the common risks for secure network design and development, including the impact of modularity on security and a summary of the general security issues.

Prerequisite:  ITS 150 Basic Networking

CYB 245

Network Defense Security

50 hours lecture; 10 hours lab                      5 credits

100 hours additional out-of-class work is expected as part of this course.

In the evolving landscape of cybersecurity, the protection of network resources and sensitive data is of paramount importance. Network Defense Security is an advanced-level course designed to provide students with comprehensive knowledge and practical skills in safeguarding computer networks against a wide range of cyber threats. The course covers advanced concepts, strategies, and tools for securing networks, detecting vulnerabilities, and responding to security incidents. Students will gain hands-on experience in configuring network security solutions, conducting penetration testing, and implementing best practices to ensure the integrity, confidentiality, and availability of network resources.

Prerequisite:  CYB 240 Fundaments of Security

CYB 250

Incident Response and Disaster Recovery

50 hours lecture; 10 hours lab                      5 credits

100 hours additional out-of-class work is expected as part of this course.

This course covers the concepts, strategies, and implementation of incident response, business continuity and disaster recovery. Businesses and organizations must deal with business continuity and disaster recovery in all operational areas to maintain operations while meeting the needs of customers. Incidents from manufactured attacks, breeches, weather and natural have increased the risks exponentially for companies and organizations regarding their critical business resources, IT systems and processes. Managing incidents and risks is an integral part of everyday business operations. The overall goal of responding to an incident is have plans in place to maintain business continuity to ensure the company and organizations, its’ assets, its’ ability to do business under any circumstance, and to be resilient.

Prerequisite:  ITS 150 Basic Networking

CYB 260

Offensive Vulnerability Assessment

50 hours lecture; 10 hours lab                      5 credits

100 hours additional out-of-class work is expected as part of this course.

This course covers the theoretical bases for cyber threats and vulnerabilities and delves into the selection and application of penetration testing methodologies ranging from reconnaissance to the exploitation of vulnerabilities by probing infrastructure, services, and applications. This course is designed to provide students with in-depth knowledge and practical skills in conducting offensive vulnerability assessments to identify and exploit security weaknesses in computer systems, applications, and networks. This course emphasizes ethical hacking techniques, enabling students to adopt the mindset of a cyber attacker to discover vulnerabilities and recommend effective remediation strategies. The course places a strong emphasis on the use of these methodologies to demonstrate, document, report on, and provide a clear roadmap for the remediation of exposed security issues.

Prerequisite:  CYB 240 Network Defense Security

Program Outline
Course Number Course Titles Quarter Credits
CSC 100 Student Success Fundamentals 5
CSC 110 Technology Fundamentals 5
CYB 200 Python Programming Fundamentals 5
CYB 210 Digital Forensics and Investigations 5
CYB 240 Fundamentals of Network Security 5
CYB 245 Network Defense Security 5
CYB 250 Incident Response and Disaster Recovery 5
CYB 260 Offensive Vulnerability Assessment 5
ENG 100 English Composition I 5
ENG 200 English Composition II 5
HUM 120 Introduction to Sociology 5
HUM 140 Introduction to Psychology 5
ITS 110 Fundamentals of Operating System 5
ITS 120 Managing Computer Devices 5
ITS 150 Basic Networking 5
ITS 180 Administering Networks 5
ITS 190 Network Maintenance 5
ITS 210 Network System Services 5
ITS 220 Introduction to Database Management 5
MTH 101 Introductory Algebra 5
Total Credits 100

 

*General Education course

Program Outcomes

●       Explain the importance of personal responsibility and security in a technological world, ethics, privacy issues, and security threats, vulnerabilities, and countermeasures.

●       Design a cyber security network infrastructure by identifying and utilizing tools and systems that reduce the risk of data breaches, network intrusions, software and hardware hardening, and information data security while complaining with organizational policies and practices.

●       Determine flaws and vulnerabilities in applications, websites, networks, systems, protocols, and configurations using both manual techniques and assistive tools while providing viable solutions for securing the infrastructure while maintaining proper compliance and governance within the enterprise.

●       Discuss the fundamentals of cybersecurity, threats to business continuity, disaster recovery, legal, ethical predicaments, and professional issues relative to security whether it be related to data, information, application, or networks.

●       Implement common standards, procedures, and applications used to protect the confidentiality, integrity, and availability of data and information systems.

●       Develop contingency operations that include administrative planning processes for incident response, disaster recovery, and business continuity planning within information security and implement a comprehensive security plan, including risk analysis, legal, regulatory, physical security, data, and personnel threats.

●       Explain and utilize digital forensic techniques, procedures, and software tools.

●       Implement appropriate procedures and technologies to enforce administrative policies within a corporate environment with sensitivity to the goals and constraints of an organization.

●       Implement a hardware and software configuration responsive to an identified scenario while describing how the historical development of hardware and operating system computing platforms produced the computing systems we have today and diagram the main parts of a computer, including interconnections.

●       Explain and utilize network standards, protocols, components, transmission media, hardware, protocol analyzer, and cybersecurity tools and requirements of distributed computing setting while contrasting various networking topologies in terms of robustness, expandability, and throughput used within an enterprise.

●       Perform database administration tasks such as creating and managing database users, roles, and privileges, backup, and restoring database objects to ensure organizational efficiency, continuity, and information security.

●       Develop critical thinking, reasoning, and problem-solving skills.

●       Use the Library/Resource Center to complete course assignments that require book, periodical, journal, and/or Internet research.

Program Length

The Cyber Security Associate of Science Degree program is 100 quarter credits and can be completed in two (2) years if the student attends all terms full time and consecutively.

Course Descriptions

CYB 200

Python Programming Fundamentals

50 hours lecture; 10 hours lab                      5 credits

100 hours additional out-of-class work is expected as part of this course.

This course introduces students to programming using the Python language. Students will become acquainted with algorithmic design; basic concepts such as data types, variables, assignments and flow control, conditionals, loops, iterators, inheritance, and functions. This course also covers procedural and data abstractions, program design, debugging, testing, and documentation. Advanced topics include object-oriented design, strings, tuples, lists, dictionaries, files, classes, and graphical user interface-driven applications.

Prerequisite:  ITS 120 Managing Computer Devices

CYB 210

Digital Forensics and Investigations

50 hours lecture; 10 hours lab                      5 credits

100 hours additional out-of-class work is expected as part of this course.

Digital Forensics and Investigations is an introductory-level course designed to provide students with a fundamental understanding of the principles, methodologies, and techniques used in the field of computer forensics. This course focuses on teaching students how to investigate and analyze digital evidence to uncover cybercrimes, support legal proceedings, and maintain the integrity of digital investigations. Students will gain hands-on experience in using forensic tools, preserving digital evidence, and applying ethical practices throughout the investigation process.

Prerequisite:  ITS 150 Basic Networking

CYB 240

Fundamentals of Network Security

50 hours lecture; 10 hours lab                      5 credits

100 hours additional out-of-class work is expected as part of this course.

This class introduces students to security threats faced by companies daily. Students in this class will learn how to identify, mitigate, and respond to incidents. Topics covered in this course introduces students the basic principles of network security design, identification of threats, analyzation of logs, and implementation of security principals, physical threats, social engineering, security ethics, cryptography, and securing both data and networks. Students explore the common risks for secure network design and development, including the impact of modularity on security and a summary of the general security issues.

Prerequisite:  ITS 150 Basic Networking

CYB 245

Network Defense Security

50 hours lecture; 10 hours lab                      5 credits

100 hours additional out-of-class work is expected as part of this course.

In the evolving landscape of cybersecurity, the protection of network resources and sensitive data is of paramount importance. Network Defense Security is an advanced-level course designed to provide students with comprehensive knowledge and practical skills in safeguarding computer networks against a wide range of cyber threats. The course covers advanced concepts, strategies, and tools for securing networks, detecting vulnerabilities, and responding to security incidents. Students will gain hands-on experience in configuring network security solutions, conducting penetration testing, and implementing best practices to ensure the integrity, confidentiality, and availability of network resources.

Prerequisite:  CYB 240 Fundaments of Security

CYB 250

Incident Response and Disaster Recovery

50 hours lecture; 10 hours lab                      5 credits

100 hours additional out-of-class work is expected as part of this course.

This course covers the concepts, strategies, and implementation of incident response, business continuity and disaster recovery. Businesses and organizations must deal with business continuity and disaster recovery in all operational areas to maintain operations while meeting the needs of customers. Incidents from manufactured attacks, breeches, weather and natural have increased the risks exponentially for companies and organizations regarding their critical business resources, IT systems and processes. Managing incidents and risks is an integral part of everyday business operations. The overall goal of responding to an incident is have plans in place to maintain business continuity to ensure the company and organizations, its’ assets, its’ ability to do business under any circumstance, and to be resilient.

Prerequisite:  ITS 150 Basic Networking

CYB 260

Offensive Vulnerability Assessment

50 hours lecture; 10 hours lab                      5 credits

100 hours additional out-of-class work is expected as part of this course.

This course covers the theoretical bases for cyber threats and vulnerabilities and delves into the selection and application of penetration testing methodologies ranging from reconnaissance to the exploitation of vulnerabilities by probing infrastructure, services, and applications. This course is designed to provide students with in-depth knowledge and practical skills in conducting offensive vulnerability assessments to identify and exploit security weaknesses in computer systems, applications, and networks. This course emphasizes ethical hacking techniques, enabling students to adopt the mindset of a cyber attacker to discover vulnerabilities and recommend effective remediation strategies. The course places a strong emphasis on the use of these methodologies to demonstrate, document, report on, and provide a clear roadmap for the remediation of exposed security issues.

Prerequisite:  CYB 240 Network Defense Security

We Have a Lot to Offer You

We Have a Lot to Offer You!

We offer Associate and Bachelor of Science Degrees. The courses at Laurus College are taught online by experienced professionals from the field, and our college is known for its friendly learning environment and supportive staff and instructors who will feel like family.

You can even connect with faculty, classmates, and staff in person by visiting one of our locations: Atascadero, Chula Vista, Las Vegas, Oxnard, San Luis Obispo, and Santa Maria.

Accreditations and Approvals

Laurus College BBB Business Review