This Cyber Security Certification program is designed to provide a comprehensive pathway to develop skilled workers in the emerging fields of cybersecurity. After completing this program, students will develop competencies in preventing, detecting, and responding to cyberattacks, the practice of digital forensics investigation, and the legal and ethical issues associated with information security. By completing this associate degree, students will gain technical skills and combined knowledge in multiple disciplines, including (but not limited to) business, law, policy, and critical thinking and problem-solving skills.
The program is based on information security concepts, principles, methods, techniques, and best practices to secure systems. Successful completion of the program will aid students in employment in fields such as I.T. security specialists, firewalls and VPN specialists, data assurance specialists, and a wide range of other careers in the field of cybersecurity.
By completing this program, students can earn up to four (4) stackable certificates: Computer Support Associate, from which students can proceed to obtain Computer Technician, Network Security, and CISCO Networking Security certificates. Embedded in these four certificates are six of our ten Information and Communication Technology (I.C.T.) courses accepted by multiple state universities as transfer credits.
Students completing this degree are also prepared to take industry-based certifications including CompTIA Security, Cisco Security (CCNA Security) Microsoft Technology Associate (M.T.A.) Security Fundamentals, GIAC Information Security Fundamentals (GISF), Certified Information Systems Security Professional (CISSP), and a wide range of other industry-based certifications.
Dual credit courses in this program are available to allow students to start the program while in high school.
Information Technology & Cyber Security AAS Program Goals
- Identify and define a range of problems related to information technology and provide solutions through troubleshooting.
- Deploying and maintaining systems while meeting a specific set of computing requirements to meet organizational needs.
- Effectively communicate technological contexts to a wide range of audiences.
- Identify professional responsibilities and make informed decisions following professional and ethical standards specific to the field.
- Evaluate an enterprise’s security configuration from a holistic perspective, including threat modeling and vulnerability assessments to secure systems from emerging threats.
Admission to the Program: Open
- Complete an application for admission and, if desired, apply for financial aid.
- Send an official high school transcript or GED score report to the Admissions and Records Office.
- Complete the Accuplacer placement exam.
- Meet with an advisor/counselor to select classes and complete the registration process.
Computer Information Systems Course Completion Requirement
For credit toward degree requirements, all ICT courses must have been completed during the five school years preceding conference of the degree or must have the approval of the Dean of Career and Technical Education Programs or Program Coordinator.
Department of Career & Technical Education
2400 Tom L. Wilson Blvd.
Galesburg, IL 61401
For Additional Information Contact:
The Welcome Center
For Graduation Requirements:
See the graduation policies and procedures page for details.