Cybersecurity A.A.S.

Cybersecurity A.A.S.
Minnesota Community and Technical College, graduated with High Honors (Phi Theta Kappa).

What did I learn in two years in the Cybersecurity course at MState? The easiest answer is to post the course descriptions for the technical courses I took. I also took several general courses to meet degree requirements.

General courses:
COMM1120 Introduction to Public Speaking, ENGL1101 College Writing, HIST1112 Western Civilization: 1600's-1800's, HIST2212 American History 19th Century, HUM2236 Technology in the Humanities.

Technical course descriptions:

CPTR1108 Cisco 1
This course covers the OSI model, basic networking math, basic network devices and an introduction to network design . This is an introduction to networking.
  Compare various networking models.
  Compare the various types of networking media.
  Demonstrate a working knowledge of the TCP/IP protocol stack.
  Recognize the components involved with assembling a network.
  Design and assemble small working networks.
  Recognize the tools necessary to troubleshoot networks.
  Solve network hardware and software problems.
  Use network monitoring tools to troubleshooting equipment failures.
  Explain IP addressing and subnetting.

CPTR1118 Cisco 2
This course covers additional OSI layer topics, network routing and auditing. Students learn and practice accepted router configuration procedures.
  Maintain router operating system.
  Analyze a router boot process.
  Examine components in a router.
  Use router command line editing.
  Identify layer three routing protocols.
  Configure routing protocols.
  Configure a router to connect to a network.
  Develop an access list.
  Configure access lists.
  Troubleshoot router connectivity.
  Troubleshoot a routed network.

CSCI1110 Informatics
This course explores how data is gathered and analyzed and how it can be applied to information technology solutions to maximize the benefits of data analysis, including increases in the efficiency and productivity of information systems. Students will explore the social, ethical and personal implications of implementing information technologies and how information processes can impact business on a local and global level.
  Analyze and evaluate various data transmission methods.
  Analyze various Information Technology solutions for applicability in various environments.
  Evaluate data security systems in relation to current legal and social implications.
  Differentiate between authenticity and authority of different information sources.
  Identify and select factual information to provide a potential solution to a problem.
  Interpret and present data conclusions in an appropriate and logical manner for the audience.
  Organize a small group to evaluate various solutions presented from the data.
  Evaluate and understand data security methods in relation to legal and ethical requirements in selected regions of the world.
  Articulate the impact of Information Technology on personal ethics.
  Evaluate the impact of Information Technology on a chosen field of study.

CPTR2272 Network Operating Systems
This course teaches functions of a network operating system so the student can effectively maintain and manage a network. The student learns how to establish and oversee the operations of a network, create logins, design and establish directory structures, and implement security.
  Manage network accounts and groups.
  Configure remote network access.
  Manage network services.
  Design network domain structures.
  Describe multi-domain network structures.
  Create fault-tolerant resource plans.
  Manage security settings and policies.
  Analyze network resource utilization.
  Document network configuration.

CPTR1170 Web Engineering 1
This course is an introduction to programming and maintaining professional Web pages for the business environment. Topics will include page design, authoring tools, accessibility issues and Web page and website development. Focus will be given to client-side programming languages such as HTML and JavaScript, Web server software, Web server maintenance and Internet protocols.
  Describe components of an URL.
  Describe the process of obtaining an Internet domain address.
  Describe the need for, and legal requirements of, Web site policies.
  Describe layouts, structure, design principles, and considerations for well-designed Web sites.
  Evaluate Web sites using principles of good format, structure, design, and programming practices.
  Install and configure Web page programming tools.
  Use current Web programming languages to create and maintain a Web page.
  Incorporate an e-mail link on a Web page.
  Incorporate internal and external hypertext links on a Web page.
  Incorporate tables on a Web page.
  Incorporate forms on a Web page.
  Create client-side scripting code to handle error checking in Web forms.
  Describe the security concerns of Web server administrators.
  Configure Web server software.
  Compare Web server operating systems and software.

CPTR2224 Linux 1
This course deals with Linux installation, configuration and system administration. This course lays the groundwork for continued study of Linux.
  Create Linux accounts.
  Manage Linux accounts.
  Prepare appropriate documentation.
  Analyze graphical environments.
  Write simple shell scripts.
  Manage application software.
  Manage security.
  Evaluate fault-tolerance solutions.
  Use appropriate software and commands.
  Manage printing.

CPTR2236 Network Security
This course deals with the understanding of basic network security. Students learn how to manage systems to guard against various security threats.
  Identify network security threats.
  Administer encryption and authentication for wireless networks.
  Examine protecting advanced communications.
  Identify web-related threats.
  Perform network hardening.
  Examine e-mail threats.
  Configure VPNs for secure sessions.
  Analyze remote access security and social engineering threats.
  Identify software exploits.
  Examine major types of attacks on information systems.
  Identify the factors in a secure network strategy.
  Practice securing web communications utilizing SSL/TLS.
  Examine cryptography.
  Apply IPSec policies.
  Explore basic computer forensics methods.
  Plan a patch management strategy for network servers.
  Analyze the role of firewalls, routers and switches in security.
  Examine intrusion detection systems.

CPTR2245 Enterprise Network Technologies
This course will introduce information technologies used in an enterprise network environment. Possible technologies the course will cover are SANs, virtualization, clustering, enterprise wireless, VPN connectivity, structured cabling and network management. The course will discuss how these technologies provide 24/7 availability and introduce the concept of green technologies.
  Analyze the cause and cost of network downtime.
  Develop strategies for high availability.
  Analyze SAN technology.
  Analyze server virtualization.
  Analyze active and passive server clustering.
  Evaluate concepts for cloud computing.
  Design an enterprise network.
  Implement server virtualization.
  Develop electronic documents supporting an enterprise network design.
  Evaluate options for green technologies.

CSEC2228 Network Defense (CCNA Security)
This course introduces students to the various methodologies for defending the information technology network infrastructure. Students will be introduced to the concepts, principles, type and topologies of firewalls to include packet filtering, proxy firewalls, application gateways, circuit gateways and stateful inspection.
  Outline physical security measures to current best practices.
  Identify personnel security practices and procedures.
  Explain software security best practices.
  Outline network security.
  Describe administrative security procedural controls.
  Define cryptosecurity.
  Indicate proper key management procedures.
  Interpret transmission security models.
  Name the elements of TEMPEST security.
  Complete firewall cryptography strategies.
  Distinguish firewall cryptography strategies.
  Construct a packet filtering firewall.
  Implement a proxy server.

CPTR2210 Security Breaches and Countermeasures (CCNA Cybersecurity Operations)
This course introduces the student to the various methodologies for attacking a network. The student will be introduced to concepts, principles and techniques, supplemented by hands-on exercises for attacking and disabling a network. The course will emphasize network attack methodologies with the emphasis on student use of network attack techniques and tools.
  Describe threats to and vulnerabilities of systems.
  Perform risk management functions.
  Plan a security assessment using current practices.
  Perform a security assessment using current practices.
  Utilize current tools to assess network security.
  Conduct a penetration test using current practices.
  Employ information reconnaissance techniques.
  Conduct an IT audit using current best practices.
  Implement countermeasures for networks.
  Complete written documentation of threats.
  Evaluate methods of non-network methods to gain network access.
  Analyze methods used by attackers to avoid detection.
  Conduct attacks on a controlled network.
  Demonstrate ethical behavior.

CSEC2204 Managing Directory Services
This course is designed to further students' understanding of directory services. Directory services provide a central repository for the information available on the network. The student will learn that the first function of the directory is to provide information about objects in the directory including users and resources such as file shares, printers or email boxes. In addition, the student will learn that the information contained in the directory is crucial for the correct and secure operation of the network.
  Describe the structure of Active Directory.
  Describe the philosophy of directory services.
  Explain the role of Domain Name Services in Active Directory.
  Design an Active Directory architecture.
  Install Domain Name Services using current best practices.
  Implement Active Directory replication to current standards.
  Create an Active Directory auditing plan.
  Employ current authentication and authentication methods.
  Demonstrate proper management of objects.
  Monitor Active Directory performance.
  Demonstrate proper planning for disaster recovery.
  Apply software management using group policy.
  Implement group policy on Active Directory objects.
  Employ Active Directory operation masters.
  Troubleshoot Active Directory.

CPTR1106 Microcomputer Databases
This course covers database concepts, design and construction using the latest database software. Topics include database normalization and table relationships, database objects, file creation, file manipulation, queries, macros, form development and report generation. Database programming concepts will also be introduced.
  Create database reports.
  Create table relationships.
  Define referential integrity.
  Create database queries.
  Manipulate database data.
  Perform data import operations.
  Create data entry forms.
  Demonstrate database programming concepts.
  Create database tables.
  Create and manage a switchboard.
  Create database macros

CPTR1122 Microcomputer Maintenance
This course covers the operation, diagnosis, troubleshooting and basic repair of microcomputer components. Topics include hardware compatibility, system architecture, memory, input devices, video displays, disk drives, modems and printers.
  Analyze the operation of a microcomputer.
  Recognize microcomputer system architecture.
  Examine the various types of computer hardware.
  Demonstrate hardware troubleshooting skills.
  Plan the building of a working computer.
  Analyze the operation of system software.
  Plan a working operating system installation.
  Manage a working operating system.
  Demonstrate operating system troubleshooting skills.
  Examine the various types of networks.
  Examine the various types of printers.
  Examine the various types of portable microcomputers.

CPTR2230 Structured Query Language
This course covers the basics of SQL (Structured Query Language) programming. SQL is a popular computer language that is used by small and large business organizations and computer programmers. The primary purpose of SQL is in working with databases and relational database management systems to store, retrieve, edit, manipulate and format data for end users and decision makers.
  Create a subquery in a SQL statement.
  Join multiple tables in a SQL query utilizing the WHERE clause.
  Create group restrictions utilizing the GROUP BY and HAVING command in a SQL query.
  Utilize the COUNT, SUM, MAX, and MIN statistical functions in a SQL query.
  Specify query selection criteria utilizing the FROM and WHERE clauses.
  Correct data errors and delete records in a table utilizing the UPDATE and DELETE commands.
  View data in a table utilizing the SELECT command.
  Specify the INSERT command in SQL to load data into tables.
  Specify data types in SQL.
  Utilize the CREATE TABLE and DROP TABLE SQL commands.
  Use the ORDER BY command and DESC operator to sort results in a SQL query.
  Describe integrity constraints and support.
  Specify compound conditions in a SQL select query.
  Utilize comparison operators in a SQL select query.

CPTR1001 Introduction to Programming and Scripting
This course is an introduction to computer programming. Emphasis will be on programming concepts, program design methodology, program debugging, problem solving and writing clear code.
  Describe the features and syntax of a programming language.
  Understand how software can be written to solve business problems.
  Use debugging and testing to create error-free code.
  Demonstrate industry standard code development techniques.
  Develop logic structures.
  Develop loop structures.
  Develop control structures.
  Understand datatypes.
  Understand functions.
  Create, update, and process data files.
  Understand techniques required for security in computer programming.