Cyber Security, Associate of Science Degree (A.S.)

Program Outline and Course Descriptions

Information security is the quintessential makeup of every company, organization, and person throughout the globe. With the rapid increase of cyber threats and attacks it is essential that companies protect their network infrastructure from and avoid becoming the next victim of a cyber-attack. The Associate of Science degree in Cyber Security provides students with a solid foundation of the skills needed to become a cyber security professional. Students in this program gain an understanding of how to identify potential cyber threats and prevent both internal and external attacks. This exciting program gives students the tools and the information for potential employment in the rapidly evolving Cyber Security field.

GENERAL EDUCATION
ENG 100 English Composition I 5
HUM 200 World History 5
MTH 101 Introductory Algebra 5
PHY 200 Physical Science 5
PSY 140 Introduction to Psychology 5
Total General Education 25
PROGRAM CORE
CSC 110 Technology Fundamentals 5
CYB 200 Python Programming Fundamentals 5
CYB 210 Intro to Computer Forensics 5
CYB 240 Fundamentals of Network Security 5
CYB 245 Network Defense 5
CYB 250 Incident Response and Disaster Recovery 5
CYB 260 Offensive Vulnerability Assessment 5
ITS 110 Fundamentals of Operating System 5
ITS 120 Managing Computer Devices 5
ITS 150 Basic Networking 5
ITS 180 Administering Networks 5
ITS 190 Network Maintenance 5
ITS 210 Network System Services 5
ITS 220 Introduction to Database Management 5
LAR 100 College Orientation 5
Total Program Core 75
                 Total Credit Hours 100

The academic year is defined as 3 Quarters and 36 quarter credits.

*Students enrolled in Nevada must take POL 210 in addition to the courses listed in the program outline.

●       Explain the importance of personal responsibility and security in a technological world, ethics, privacy issues, and security threats, vulnerabilities, and countermeasures.

●       Design a cyber security network infrastructure by identifying and utilizing tools and systems that reduce the risk of data breaches, network intrusions, software and hardware hardening, and information data security while complaining with organizational policies and practices.

●       Determine flaws and vulnerabilities in applications, websites, networks, systems, protocols, and configurations using both manual techniques and assistive tools while providing viable solutions for securing the infrastructure while maintaining proper compliance and governance within the enterprise.

●       Discuss the fundamentals of cybersecurity, threats to business continuity, disaster recovery, legal, ethical predicaments, and professional issues relative to security whether it be related to data, information, application, or networks.

●       Implement common standards, procedures, and applications used to protect the confidentiality, integrity, and availability of data and information systems.

●       Develop contingency operations that include administrative planning processes for incident response, disaster recovery, and business continuity planning within information security and implement a comprehensive security plan, including risk analysis, legal, regulatory, physical security, data, and personnel threats.

●       Explain and utilize digital forensic techniques, procedures, and software tools.

●       Implement appropriate procedures and technologies to enforce administrative policies within a corporate environment with sensitivity to the goals and constraints of an organization.

●       Implement a hardware and software configuration responsive to an identified scenario while describing how the historical development of hardware and operating system computing platforms produced the computing systems we have today and diagram the main parts of a computer, including interconnections.

●       Explain and utilize network standards, protocols, components, transmission media, hardware, protocol analyzer, and cybersecurity tools and requirements of distributed computing setting while contrasting various networking topologies in terms of robustness, expandability, and throughput used within an enterprise.

●       Perform database administration tasks such as creating and managing database users, roles, and privileges, backup, and restoring database objects to ensure organizational efficiency, continuity, and information security.

●       Develop critical thinking, reasoning, and problem-solving skills.

●       Use the Library/Resource Center to complete course assignments that require book, periodical, journal, and/or Internet research.

The Cyber Security Associate of Science Degree program is 100 quarter credits and can be completed in two (2) years if the student attends all terms full time and consecutively.

GENERAL EDUCATION

ENG 100 English Composition I
This course focuses on developing strong writing and critical thinking skills through various forms of written communication. Students will learn to craft clear, well-structured essays, conduct research, and use proper citation methods. Emphasis is placed on organizing ideas, developing arguments, and refining grammar and style. By the end of the course, students will be able to produce well-reasoned, coherent written work for academic and professional purposes.

HUM 200 World History
This course provides an overview of key historical events, civilizations, and cultural developments across the world. Topics include ancient civilizations, the Industrial Revolution, and modern global conflicts. Students will explore historical perspectives on social, economic, and political change. By the end of the course, students will be able to analyze historical trends and their impact on contemporary society.

MTH 101 Introductory Algebra
This course introduces students to fundamental algebraic concepts, including equations, inequalities, functions, and graphing. Students will develop problem-solving skills through real-world applications of algebra, preparing them for more advanced mathematical concepts. By the end of the course, students will have a strong foundation in algebra to support future coursework in business, science, and technology.

PHY 200 Physical Science
Students will explore the principles of physics and chemistry, including motion, energy, atomic structure, and chemical reactions. This course emphasizes real-world applications of physical science concepts. By the end of the course, students will be able to apply scientific reasoning to analyze natural phenomena.

PSY 140 Introduction to Psychology
Students will explore fundamental concepts of psychology, including human behavior, cognition, development, and mental health. This course examines psychological theories and their real-world applications. By the end of the course, students will be able to analyze psychological influences on behavior and decision-making.

 

PROGRAM CORE

CSC 110 Technology Fundamentals
In this course, students will explore the impact of digital technology, web usage, e-commerce, computer safety, file management, app integration, Microsoft 365 apps, security, digital ethics, and Windows operating systems and gain practical skills for enhanced productivity and digital well-being. Topics covered include: Impact of Digital Technology, The Web and Online Communication, Personal E-Commerce Transactions, Computer Safety and Health, File and Folder Management, Using Apps in Daily Life, Microsoft 365 Apps and Cloud Storage, Security and Safety Measures, Digital Ethics and Lifestyle, Introduction to Windows 11 and Windows 10 Desktop, Web Browsers, Getting Started with macOS X and macOS Monterey, Using Word, Excel, PowerPoint, OneNote.

CYB 200 Python Programming Fundamentals
This course introduces students to programming using the Python language. Students will become acquainted with algorithmic design; basic concepts such as data types, variables, assignments and flow control, conditionals, loops, iterators, inheritance, and functions. This course also covers procedural and data abstractions, program design, debugging, testing, and documentation. Advanced topics include object-oriented design, strings, tuples, lists, dictionaries, files, classes, and graphical user interface-driven applications.

CYB 210 Intro to Computer Forensics
Introduction to Computer Forensics is an introductory-level course designed to provide students with a fundamental understanding of the principles, methodologies, and techniques used in the field of computer forensics. This course focuses on teaching students how to investigate and analyze digital evidence to uncover cybercrimes, support legal proceedings, and maintain the integrity of digital investigations. Students will gain hands-on experience in using forensic tools, preserving digital evidence, and applying ethical practices throughout the investigation process.

CYB 240 Fundamentals of Network Security
This class introduces students to security threats faced by companies daily. Students in this class will learn how to identify, mitigate, and respond to incidents. Topics covered in this course introduces students the basic principles of network security design, identification of threats, analyzation of logs, and implementation of security principals, physical threats, social engineering, security ethics, cryptography, and securing both data and networks. Students explore the common risks for secure network design and development, including the impact of modularity on security and a summary of the general security issues.

CYB 245 Network Defense
This class introduces students to security threats faced by companies daily. Students in this class will learn how to identify, mitigate, and respond to incidents. Topics covered in this course introduces students the basic principles of network security design, identification of threats, analyzation of logs, and implementation of security principals, physical threats, social engineering, security ethics, cryptography, and securing both data and networks. Students explore the common risks for secure network design and development, including the impact of modularity on security and a summary of the general security issues.

CYB 250 Incident Response and Disaster Recovery
This course covers the concepts, strategies, and implementation of incident response, business continuity and disaster recovery. Businesses and organizations must deal with business continuity and disaster recovery in all operational areas to maintain operations while meeting the needs of customers. Incidents from manufactured attacks, breeches, weather and natural have increased the risks exponentially for companies and organizations regarding their critical business resources, IT systems and processes. Managing incidents and risks is an integral part of everyday business operations. The overall goal of responding to an incident is have plans in place to maintain business continuity to ensure the company and organizations, its’ assets, its’ ability to do business under any circumstance, and to be resilient.

CYB 260 Offensive Vulnerability Assessment  
This course covers the theoretical bases for cyber threats and vulnerabilities and delves into the selection and application of penetration testing methodologies ranging from reconnaissance to the exploitation of vulnerabilities by probing infrastructure, services, and applications. This course is designed to provide students with in-depth knowledge and practical skills in conducting offensive vulnerability assessments to identify and exploit security weaknesses in computer systems, applications, and networks. This course emphasizes ethical hacking techniques, enabling students to adopt the mindset of a cyber attacker to discover vulnerabilities and recommend effective remediation strategies. The course places a strong emphasis on the use of these methodologies to demonstrate, document, report on, and provide a clear roadmap for the remediation of exposed security issues.

ITS 110 Fundamentals of Operating System
In this course, students will learn the fundamentals of operating systems, including installation, configuration, and management. The curriculum covers essential topics such as system architecture, process management, memory management, file systems, and security. Students will also learn troubleshooting techniques and best practices for maintaining system performance and reliability. They will develop the skills needed to support and optimize various operating systems in real-world environments through hands-on labs and practical exercises.

ITS 120 Managing Computer Devices
This course prepares students for the CompTIA A+ certification exam by evaluating their knowledge and practical skills. It assesses their ability to install, manage, repair, and troubleshoot PC hardware and operating systems, including Windows, Linux, and macOS. Throughout the course, students explore Active Directory, user and group management, virtual memory, system backup, and other key functions of Windows, macOS, and Linux distributions. Additionally, the curriculum covers security best practices, incident response, social engineering, and other security-related topics. Students also engage in scenario-based learning to analyze workplace situations objectively.

ITS 150 Basic Networking
This course serves as an introduction to the fundamentals of networks. Students will learn about communication services, mail services, and management services. They will gain an understanding of the different layers that make up a network by exploring networking standards and models. A variety of network protocols and their functions will also be examined. In this course, students will explore different types of networking media and learn how to install protocols on various operating systems. A comparison will be made between LANs and WANs, along with an examination of the transport systems that support both. Other topics may include the installation and configuration of network interface cards (NICs). The students will study network hardware such as hubs, repeaters, bridges, and routers.

ITS 180 Administering Networks
Students in this course learn about common causes of service outages and the costs that come with them. Network administrators need a comprehensive understanding of key networking concepts and technologies, including storage, network architecture, Voice over IP (VoIP), and server consolidation. Throughout the course, they also explore methods for measuring network availability, designing data centers, and examining essential factors when consolidating resources.

ITS 190 Network Maintenance
In this course, students explore the essentials of a wide-area network (WAN), including its implementation and the establishment of remote connectivity. They will gain a better understanding of the similarities and differences among various network operating systems. Students will also learn how to establish users, groups, and permissions within a network

ITS 210 Network System Services
In this course, students will gain the skills to deploy, manage, and secure modern Windows environments in preparation for the Microsoft MD-102: Endpoint Administrator examination. Students will gain hands-on experience deploying Microsoft clients through lab exercises, real-world case studies, and practical troubleshooting exercises. Throughout the course, students will learn about Windows client deployment, identity and access management, device compliance, security policies, and troubleshooting strategies using Microsoft Intune, Azure Active Directory (Azure AD), and other enterprise tools.

ITS 220 Introduction to Database Management
This course provides an in-depth understanding of database systems, focusing on their design, implementation, and management. Students will explore relational database models, SQL programming, data normalization, and the latest industry practices. Through theoretical lessons and practical labs, learners will gain the skills necessary to design and manage efficient database systems.

LAR 100 College Orientation
This course introduces students to the skills and strategies needed for success in college and beyond. Topics include goal setting, time management, effective study techniques, and critical thinking. Students will explore resources available to support academic and career growth while developing skills in communication, collaboration, and self-advocacy. By the end of the course, students will be prepared to navigate their academic journey with confidence and apply essential success strategies in both educational and professional settings.

Program Outline
GENERAL EDUCATION
ENG 100 English Composition I 5
HUM 200 World History 5
MTH 101 Introductory Algebra 5
PHY 200 Physical Science 5
PSY 140 Introduction to Psychology 5
Total General Education 25
PROGRAM CORE
CSC 110 Technology Fundamentals 5
CYB 200 Python Programming Fundamentals 5
CYB 210 Intro to Computer Forensics 5
CYB 240 Fundamentals of Network Security 5
CYB 245 Network Defense 5
CYB 250 Incident Response and Disaster Recovery 5
CYB 260 Offensive Vulnerability Assessment 5
ITS 110 Fundamentals of Operating System 5
ITS 120 Managing Computer Devices 5
ITS 150 Basic Networking 5
ITS 180 Administering Networks 5
ITS 190 Network Maintenance 5
ITS 210 Network System Services 5
ITS 220 Introduction to Database Management 5
LAR 100 College Orientation 5
Total Program Core 75
                 Total Credit Hours 100

The academic year is defined as 3 Quarters and 36 quarter credits.

*Students enrolled in Nevada must take POL 210 in addition to the courses listed in the program outline.

Program Outcomes

●       Explain the importance of personal responsibility and security in a technological world, ethics, privacy issues, and security threats, vulnerabilities, and countermeasures.

●       Design a cyber security network infrastructure by identifying and utilizing tools and systems that reduce the risk of data breaches, network intrusions, software and hardware hardening, and information data security while complaining with organizational policies and practices.

●       Determine flaws and vulnerabilities in applications, websites, networks, systems, protocols, and configurations using both manual techniques and assistive tools while providing viable solutions for securing the infrastructure while maintaining proper compliance and governance within the enterprise.

●       Discuss the fundamentals of cybersecurity, threats to business continuity, disaster recovery, legal, ethical predicaments, and professional issues relative to security whether it be related to data, information, application, or networks.

●       Implement common standards, procedures, and applications used to protect the confidentiality, integrity, and availability of data and information systems.

●       Develop contingency operations that include administrative planning processes for incident response, disaster recovery, and business continuity planning within information security and implement a comprehensive security plan, including risk analysis, legal, regulatory, physical security, data, and personnel threats.

●       Explain and utilize digital forensic techniques, procedures, and software tools.

●       Implement appropriate procedures and technologies to enforce administrative policies within a corporate environment with sensitivity to the goals and constraints of an organization.

●       Implement a hardware and software configuration responsive to an identified scenario while describing how the historical development of hardware and operating system computing platforms produced the computing systems we have today and diagram the main parts of a computer, including interconnections.

●       Explain and utilize network standards, protocols, components, transmission media, hardware, protocol analyzer, and cybersecurity tools and requirements of distributed computing setting while contrasting various networking topologies in terms of robustness, expandability, and throughput used within an enterprise.

●       Perform database administration tasks such as creating and managing database users, roles, and privileges, backup, and restoring database objects to ensure organizational efficiency, continuity, and information security.

●       Develop critical thinking, reasoning, and problem-solving skills.

●       Use the Library/Resource Center to complete course assignments that require book, periodical, journal, and/or Internet research.

Program Length

The Cyber Security Associate of Science Degree program is 100 quarter credits and can be completed in two (2) years if the student attends all terms full time and consecutively.

Course Descriptions

GENERAL EDUCATION

ENG 100 English Composition I
This course focuses on developing strong writing and critical thinking skills through various forms of written communication. Students will learn to craft clear, well-structured essays, conduct research, and use proper citation methods. Emphasis is placed on organizing ideas, developing arguments, and refining grammar and style. By the end of the course, students will be able to produce well-reasoned, coherent written work for academic and professional purposes.

HUM 200 World History
This course provides an overview of key historical events, civilizations, and cultural developments across the world. Topics include ancient civilizations, the Industrial Revolution, and modern global conflicts. Students will explore historical perspectives on social, economic, and political change. By the end of the course, students will be able to analyze historical trends and their impact on contemporary society.

MTH 101 Introductory Algebra
This course introduces students to fundamental algebraic concepts, including equations, inequalities, functions, and graphing. Students will develop problem-solving skills through real-world applications of algebra, preparing them for more advanced mathematical concepts. By the end of the course, students will have a strong foundation in algebra to support future coursework in business, science, and technology.

PHY 200 Physical Science
Students will explore the principles of physics and chemistry, including motion, energy, atomic structure, and chemical reactions. This course emphasizes real-world applications of physical science concepts. By the end of the course, students will be able to apply scientific reasoning to analyze natural phenomena.

PSY 140 Introduction to Psychology
Students will explore fundamental concepts of psychology, including human behavior, cognition, development, and mental health. This course examines psychological theories and their real-world applications. By the end of the course, students will be able to analyze psychological influences on behavior and decision-making.

 

PROGRAM CORE

CSC 110 Technology Fundamentals
In this course, students will explore the impact of digital technology, web usage, e-commerce, computer safety, file management, app integration, Microsoft 365 apps, security, digital ethics, and Windows operating systems and gain practical skills for enhanced productivity and digital well-being. Topics covered include: Impact of Digital Technology, The Web and Online Communication, Personal E-Commerce Transactions, Computer Safety and Health, File and Folder Management, Using Apps in Daily Life, Microsoft 365 Apps and Cloud Storage, Security and Safety Measures, Digital Ethics and Lifestyle, Introduction to Windows 11 and Windows 10 Desktop, Web Browsers, Getting Started with macOS X and macOS Monterey, Using Word, Excel, PowerPoint, OneNote.

CYB 200 Python Programming Fundamentals
This course introduces students to programming using the Python language. Students will become acquainted with algorithmic design; basic concepts such as data types, variables, assignments and flow control, conditionals, loops, iterators, inheritance, and functions. This course also covers procedural and data abstractions, program design, debugging, testing, and documentation. Advanced topics include object-oriented design, strings, tuples, lists, dictionaries, files, classes, and graphical user interface-driven applications.

CYB 210 Intro to Computer Forensics
Introduction to Computer Forensics is an introductory-level course designed to provide students with a fundamental understanding of the principles, methodologies, and techniques used in the field of computer forensics. This course focuses on teaching students how to investigate and analyze digital evidence to uncover cybercrimes, support legal proceedings, and maintain the integrity of digital investigations. Students will gain hands-on experience in using forensic tools, preserving digital evidence, and applying ethical practices throughout the investigation process.

CYB 240 Fundamentals of Network Security
This class introduces students to security threats faced by companies daily. Students in this class will learn how to identify, mitigate, and respond to incidents. Topics covered in this course introduces students the basic principles of network security design, identification of threats, analyzation of logs, and implementation of security principals, physical threats, social engineering, security ethics, cryptography, and securing both data and networks. Students explore the common risks for secure network design and development, including the impact of modularity on security and a summary of the general security issues.

CYB 245 Network Defense
This class introduces students to security threats faced by companies daily. Students in this class will learn how to identify, mitigate, and respond to incidents. Topics covered in this course introduces students the basic principles of network security design, identification of threats, analyzation of logs, and implementation of security principals, physical threats, social engineering, security ethics, cryptography, and securing both data and networks. Students explore the common risks for secure network design and development, including the impact of modularity on security and a summary of the general security issues.

CYB 250 Incident Response and Disaster Recovery
This course covers the concepts, strategies, and implementation of incident response, business continuity and disaster recovery. Businesses and organizations must deal with business continuity and disaster recovery in all operational areas to maintain operations while meeting the needs of customers. Incidents from manufactured attacks, breeches, weather and natural have increased the risks exponentially for companies and organizations regarding their critical business resources, IT systems and processes. Managing incidents and risks is an integral part of everyday business operations. The overall goal of responding to an incident is have plans in place to maintain business continuity to ensure the company and organizations, its’ assets, its’ ability to do business under any circumstance, and to be resilient.

CYB 260 Offensive Vulnerability Assessment  
This course covers the theoretical bases for cyber threats and vulnerabilities and delves into the selection and application of penetration testing methodologies ranging from reconnaissance to the exploitation of vulnerabilities by probing infrastructure, services, and applications. This course is designed to provide students with in-depth knowledge and practical skills in conducting offensive vulnerability assessments to identify and exploit security weaknesses in computer systems, applications, and networks. This course emphasizes ethical hacking techniques, enabling students to adopt the mindset of a cyber attacker to discover vulnerabilities and recommend effective remediation strategies. The course places a strong emphasis on the use of these methodologies to demonstrate, document, report on, and provide a clear roadmap for the remediation of exposed security issues.

ITS 110 Fundamentals of Operating System
In this course, students will learn the fundamentals of operating systems, including installation, configuration, and management. The curriculum covers essential topics such as system architecture, process management, memory management, file systems, and security. Students will also learn troubleshooting techniques and best practices for maintaining system performance and reliability. They will develop the skills needed to support and optimize various operating systems in real-world environments through hands-on labs and practical exercises.

ITS 120 Managing Computer Devices
This course prepares students for the CompTIA A+ certification exam by evaluating their knowledge and practical skills. It assesses their ability to install, manage, repair, and troubleshoot PC hardware and operating systems, including Windows, Linux, and macOS. Throughout the course, students explore Active Directory, user and group management, virtual memory, system backup, and other key functions of Windows, macOS, and Linux distributions. Additionally, the curriculum covers security best practices, incident response, social engineering, and other security-related topics. Students also engage in scenario-based learning to analyze workplace situations objectively.

ITS 150 Basic Networking
This course serves as an introduction to the fundamentals of networks. Students will learn about communication services, mail services, and management services. They will gain an understanding of the different layers that make up a network by exploring networking standards and models. A variety of network protocols and their functions will also be examined. In this course, students will explore different types of networking media and learn how to install protocols on various operating systems. A comparison will be made between LANs and WANs, along with an examination of the transport systems that support both. Other topics may include the installation and configuration of network interface cards (NICs). The students will study network hardware such as hubs, repeaters, bridges, and routers.

ITS 180 Administering Networks
Students in this course learn about common causes of service outages and the costs that come with them. Network administrators need a comprehensive understanding of key networking concepts and technologies, including storage, network architecture, Voice over IP (VoIP), and server consolidation. Throughout the course, they also explore methods for measuring network availability, designing data centers, and examining essential factors when consolidating resources.

ITS 190 Network Maintenance
In this course, students explore the essentials of a wide-area network (WAN), including its implementation and the establishment of remote connectivity. They will gain a better understanding of the similarities and differences among various network operating systems. Students will also learn how to establish users, groups, and permissions within a network

ITS 210 Network System Services
In this course, students will gain the skills to deploy, manage, and secure modern Windows environments in preparation for the Microsoft MD-102: Endpoint Administrator examination. Students will gain hands-on experience deploying Microsoft clients through lab exercises, real-world case studies, and practical troubleshooting exercises. Throughout the course, students will learn about Windows client deployment, identity and access management, device compliance, security policies, and troubleshooting strategies using Microsoft Intune, Azure Active Directory (Azure AD), and other enterprise tools.

ITS 220 Introduction to Database Management
This course provides an in-depth understanding of database systems, focusing on their design, implementation, and management. Students will explore relational database models, SQL programming, data normalization, and the latest industry practices. Through theoretical lessons and practical labs, learners will gain the skills necessary to design and manage efficient database systems.

LAR 100 College Orientation
This course introduces students to the skills and strategies needed for success in college and beyond. Topics include goal setting, time management, effective study techniques, and critical thinking. Students will explore resources available to support academic and career growth while developing skills in communication, collaboration, and self-advocacy. By the end of the course, students will be prepared to navigate their academic journey with confidence and apply essential success strategies in both educational and professional settings.

We Have a Lot to Offer You!

We offer Associate and Bachelor of Science Degrees. The courses at Laurus College are taught online by experienced professionals from the field, and our college is known for its friendly learning environment and supportive staff and instructors who will feel like family.

You can even connect with faculty, classmates, and staff in person by visiting one of our locations: Atascadero, Chula Vista, Las Vegas, Oxnard, San Luis Obispo, and Santa Maria.

Accreditations and Approvals

Laurus College BBB Business Review