Cybersecurity

The Associate in Applied Science (AAS) in Cybersecurity is designed to focus on the necessary skills required to secure, protect and identify vulnerabilities in a network, including various operating systems and network devices. Emphasis is placed on developing the theoretical, legal, ethical and practical skills needed to maintain security on mission-critical networking and server systems. The program is designed to meet the training needs of government and industry employees. The program covers a variety of information security technologies and structured languages. The Cybersecurity program also focuses on the skills needed for internationally recognized IT certifications and high demands in business, industry, and government. Certificates of Completion (CCLs) are also available in the following areas: Cybersecurity Fundamentals, Cyber Operations, Linux System Administration, Microsoft, Cisco Networking CCNA Security, Cyber Engineering, and Critical Infrastructure. Some of these programs are available at select colleges. Please check with your local college for program availability.

Details

Field of Interest
Computer and Information Technology
Degree Type
Associate in Applied Science (AAS)
Academic Plan
Cybersecurity (DEG)
Academic Plan Code
3197
Total credits required
62-77
Catalog Year
2024-2025
Effective Term
Fall 2024
Notes

Students must earn a grade of C or better in all courses within the program.

Courses within any of the following prefixes must be taken within five (5) years prior to completion of the program to be applied toward this award: AIM, BPC, CIS, CLD, CNT, CSC, ITS, and MST.

What You'll Learn
  • Explain the fundamental components, concepts, and application of cybersecurity principles. (BPC170, BPC270, BPC274, CIS105, CIS126DL, CIS126RH, CIS143, CIS156, CIS162++, CIS201, CIS202, CIS203, CIS227, CIS238DL, CIS238RH, CIS239DL, CIS240DL, CIS240RH, CIS250, CIS262++, CIS270, CIS271DL, CIS271RH, CIS275DL, ITS110, ITS291, ITS292, MST150++, MST160, CLD110 [FYC])
  • Describe cyber defense tools, methods, and components. (CIS156, CIS190, CIS270, CNT140AB, CNT150AB, ITS110, ITS240, ITS291, ITS292, (COM), (CRE))
  • Apply cyber defense methods to prepare a system to repel attacks. (CIS156, CIS201, CIS202, CIS203, CIS270, CIS290AC, CIS298AC, CNT150AB, CNT160AB, CNT202, CNT205, ITS110, ITS240, [SG], [SQ])
  • Analyze common security failures and identify specific design principles that have been violated. (BPC274, CIS121AH, CIS201, CIS202, CIS203, CIS270, CNT202, CNT205, ITS110, MST260, CLD120)
  • Describe the interaction between security and system usability and the importance for minimizing the effects of security mechanisms. (BPC274, CIS201, CIS202, CIS203, CIS270, CNT160AB, ITS110, MST260, CLD120)
  • Apply appropriate protocols, tools, and techniques to maximize security in the network environment. (CIS119DO, CIS156, CIS162++, CIS190, CIS201, CIS202, CIS203, CIS227, CIS262++. CIS270, CIS276++, CIS290AC, CIS298AC, CNT140AB, CNT150AB, CNT160AB, CNT202, CNT205, ITS110, ITS240, ITS291, ITS292, [MA], [SG], [SQ])
  • Describe the fundamental concepts, technologies, components, vulnerabilities, and issues related to networks. (BPC170, CIS105, CIS119DO, CIS143, CIS190, CIS201, CIS202, CIS238DL, CIS238RH, CIS270, CIS276++, CNT140AB, CNT150AB, CNT160AB, CNT202, CNT205, ITS110, (COM))
  • Identify and describe basic security issues of operating systems. (BPC270, BPC274, CIS105, CIS121AH, CIS126DL, CIS126RH, CIS201, CIS238DL, CIS238RH, CIS239DL, CIS240DL, CIS240RH, CIS270, CIS271DL, CIS271RH, CIS275DL, ITS110, ITS240, MST150++, MST160, CLD110)
  • Identify perpetrators, their resources, and their motivations in cyberspace. (BPC274, CIS111, CIS143, CIS203, CIS270, CIS290AC, CIS298AC, ITS110, ITS120, ITS240, MST160, CLD110)
  • Compare and contrast offensive and defensive resources used in cybersecurity ecosystems/environment. (CIS201, CIS202, CIS203, CIS270, CIS290AC, CIS298AC, ITS110, ITS240, (COM), (CRE), [FYC])
  • Delineate differences between the moral, behavioral, ethical, and legal ramifications found in the cybersecurity world. (CIS105, CIS111, CIS143, CIS156, ITS120, (CRE) [FYC], [HU], [SB], [SG], [SQ])
  • Apply knowledge of regulatory and legal requirements to ensure compliance. (CIS111, CIS143, CIS202, CIS290AC, CIS298AC, ITS120, ITS240, (CRE), [FYC])
  • Apply risk analysis methodologies to identify potential vulnerabilities, associated impacts, and recommend appropriate responses. (BPC274, CIS111, CIS143, CIS121AH, CIS201, CIS202, CIS203, CIS238DL, CIS238RH, CIS270, CIS290AC, CIS298AC, CNT150AB, CNT160AB, CNT202, CNT205, ITS110, ITS120, ITS240, ITS291, ITS292, MST160, MST260, CLD110, CLD120 [MA])
  • Communicate professionally in formal and informal situations to diverse audiences. (BPC270, CIS105, CIS111, CIS143, CIS156, CIS201, CIS202, CIS203, CIS270, CIS271DL, CIS271RH, CIS275DL, CIS290AC, CIS298AC, ITS110, ITS120, ITS240, (COM), [FYC], [HU], [SB], [SG], [SQ])
  • Collaborate with others to solve cybersecurity problems. (CIS105, CIS111, CIS143, CIS201, CIS202, CIS203, CIS270, CIS271DL, CIS271RH, CIS275DL, CIS290AC, CIS298AC, ITS110, ITS120, ITS240, ITS291, ITS292, (COM), [SG], [SQ])
Career statistics

Successful completion of this degree may lead to employment in a variety of different occupations and industries. Below are examples of related occupations with associated Arizona-based wages* for this degree. Education requirements vary for the occupations listed below, so you may need further education or degrees in order to qualify for some of these jobs and earn the related salaries. Please visit with an academic advisor and/or program director for additional information. You can click on any occupation to view the detail regarding education level, wages, and employment information.

Computer and Information Systems Managers

$153,060

There are additional career opportunities associated with this degree that do not have occupational data available for Arizona at this time. These occupations are listed below:

  • Computer Network Support Specialists
  • Information Security Analysts
  • Network and Computer Systems Administrators

* Career and wage information provided by Pipeline AZ using data, reports, and forecasts which are generated using government data sources. Sources

Course Sequence by Term

The following is the suggested course sequence by term. Please keep in mind:

  • Students should meet with an academic advisor to develop an individual education plan that meets their academic and career goals. Use the Degree Progress Report Tool in your Student Center to manage your plan.
  • The course sequence is laid out by suggested term and may be affected when students enter the program at different times of the year.
  • Initial course placement is determined by current district placement measures and/or completion of 100-200 level course and/or program requirements.
  • Degree and transfer seeking students may be required to successfully complete a MCCCD First Year Experience Course (FYE) within the first two semesters at a MCCCD College. Courses include FYE101 and FYE103. Course offerings will vary by college. See an academic, program, or faculty advisor for details.
  • Consult with your faculty mentor or academic advisor to determine educational requirements, including possible university transfer options, for your chosen career field.

Pathway Map Options

There are multiple options available for this pathway map. These options vary depending on the locations, partners, and available tracks of the award.

These pathway map options may share some common coursework. To explore what additional coursework may be required, select your desired option from the list below. Once selected, the list of courses and any associated details will be automatically updated in the course sequence below. The differences between individual pathway map options may only be a few courses.

Full-time Sequence

Full-time status is 12 credits to 18 credits per semester.

Term 1

A sequence of suggested courses that should be taken during Term 1
Course Number Course Name Requisites Notes Area Credits
CIS105 Survey of Computer Information Systems CS 3
CIS190 or
CNT140AB
Introduction to Networking or Introduction to Networks CNT140AB required for Networking emphasis and Critical Infrastructure specialization 3–4
BPC270 or
MST150++
A+ Exam Prep: Operating System Configuration and Support or Any Microsoft Windows course MST150++ required for Microsoft specialization and the Critical Infrastructure specialization 3
CIS126DL or
CIS126RH
Linux Operating System or Red Hat System Administration I 3
ENG101 or
ENG107
First-Year Composition or First-Year Composition for ESL Critical course FYC or FYC 3
FYE101 or
FYE103
Introduction to College, Career and Personal Success or Exploration of College, Career and Personal Success 1–3

Term 2

A sequence of suggested courses that should be taken during Term 2
Course Number Course Name Requisites Notes Area Credits
CIS111 or
ITS120
Ethics in Information Technology or Legal, Ethical and Regulatory Issues CIS111 required for the Critical Infrastructure specialization 3
CIS156 Python Programming: Level I 3
ENG102 or
ENG108
First-Year Composition or First-Year Composition for ESL FYC or FYC 3
CRE101 College Critical Reading and Critical Thinking OR Equivalent as indicated by assessment L 0–3
MAT Mathematics Critical course Any approved general education course in the Mathematics area 3–6
ITS110 or
CIS270 or
CIS271DB
Information Security Fundamentals or Essentials of Network and Information Security or Information Security Essentials Critical course Gateway course ITS110 required for Cyber Operations specialization; CIS271DB AND CIS272DB required for Critical Infrastructure specialization 3

Term 3

A sequence of suggested courses that should be taken during Term 3
Course Number Course Name Requisites Notes Area Credits
ITS240 Ethical Hacking and Network Defense Term is dependent on Specialization 3
COM100 or
COM110 or
COM225 or
COM230
Introduction to Human Communication or Interpersonal Communication or Public Speaking or Small Group Communication COM100 required for students intending to transfer to ASU West to earn a Bachelor of Science in Applied Computing (Cybersecurity) SB or SB or L or SB 3
SG or
SQ
Natural Sciences General or Natural Sciences Quantitative SG or SQ 4
Specialization Specialization Coursework 3–4
Specialization Specialization Coursework 3–4
Specialization Specialization Coursework 0–3
CIS272DB Information Security Principles Only required for the Critical Infrastructure specialization 0–3

Term 4

A sequence of suggested courses that should be taken during Term 4
Course Number Course Name Requisites Notes Area Credits
HU Humanities, Fine Arts & Design HU 3
SB Social & Behavioral Sciences SB 3
Specialization Specialization Coursework 3–4
Specialization Specialization Coursework 3–4
Specialization Specialization Coursework 0–3

Part-time Sequence

Part-time status is 11 credit hours or less.

Term 1

A sequence of suggested courses that should be taken during Term 1
Course Number Course Name Requisites Notes Area Credits
CIS105 Survey of Computer Information Systems CS 3
ENG101 or
ENG107
First-Year Composition or First-Year Composition for ESL Critical course FYC or FYC 3
FYE101 or
FYE103
Introduction to College, Career and Personal Success or Exploration of College, Career and Personal Success 1–3

Term 2

A sequence of suggested courses that should be taken during Term 2
Course Number Course Name Requisites Notes Area Credits
CIS190 or
CNT140AB
Introduction to Networking or Introduction to Networks CNT140AB required for Networking emphasis and and Critical Infrastructure specialization 3–4
ENG102 or
ENG108
First-Year Composition or First-Year Composition for ESL FYC or FYC 3
CRE101 College Critical Reading and Critical Thinking OR Equivalent as indicated by assessment L 0–3

Term 3

A sequence of suggested courses that should be taken during Term 3
Course Number Course Name Requisites Notes Area Credits
BPC270 or
MST150++
A+ Exam Prep: Operating System Configuration and Support or Any Microsoft Windows course MST150++ required for Microsoft specialization and the Critical Infrastructure specialization 3
CIS126DL or
CIS126RH
Linux Operating System or Red Hat System Administration I 3

Term 4

A sequence of suggested courses that should be taken during Term 4
Course Number Course Name Requisites Notes Area Credits
MAT Mathematics Critical course Any approved general education course in the Mathematics area 3–6
ITS110 or
CIS270 or
CIS271DB
Information Security Fundamentals or Essentials of Network and Information Security or Information Security Essentials Critical course Gateway course ITS110 required for Cyber Operations specialization; CIS271DB AND CIS272DB required for Critical Infrastructure specialization 3

Term 5

A sequence of suggested courses that should be taken during Term 5
Course Number Course Name Requisites Notes Area Credits
CIS111 or
ITS120
Ethics in Information Technology or Legal, Ethical and Regulatory Issues CIS111 required for the Infrastructure specialization 3
CIS272DB Information Security Principles Only required for the Critical Infrastructure specialization 0–3

Term 6

A sequence of suggested courses that should be taken during Term 6
Course Number Course Name Requisites Notes Area Credits
CIS156 Python Programming: Level I 3
COM100 or
COM110 or
COM225 or
COM230
Introduction to Human Communication or Interpersonal Communication or Public Speaking or Small Group Communication COM100 required for students intending to transfer to ASU West to earn a Bachelor of Science in Applied Computing (Cybersecurity) SB or SB or L or SB 3

Term 7

A sequence of suggested courses that should be taken during Term 7
Course Number Course Name Requisites Notes Area Credits
ITS240 Ethical Hacking and Network Defense 3
SG or
SQ
Natural Sciences General or Natural Sciences Quantitative SG or SQ 4

Term 8

A sequence of suggested courses that should be taken during Term 8
Course Number Course Name Requisites Notes Area Credits
Specialization Specialization Coursework 3–4
Specialization Specialization Coursework 3–4

Term 9

A sequence of suggested courses that should be taken during Term 9
Course Number Course Name Requisites Notes Area Credits
SB Social & Behavioral Sciences SB 3
Specialization Specialization Coursework 3–4

Term 10

A sequence of suggested courses that should be taken during Term 10
Course Number Course Name Requisites Notes Area Credits
HU Humanities, Fine Arts & Design HU 3
Specialization Specialization Coursework 3–4

Term 11

A sequence of suggested courses that should be taken during Term 11
Course Number Course Name Requisites Notes Area Credits
Specialization Specialization Coursework 0–3
Specialization Specialization Coursework 0–3
Course Area Key

Gateway Course = Generally the first major-specific course in a pathway.

Critical Course = A course that is highly predictive of future success in a pathway.

Disclaimer

Students must earn a grade of C or better for all courses required within the program.

Course Sequence total credits may differ from the program information located on the MCCCD curriculum website due to program and system design.

View MCCCD’s official curriculum documentation for additional details regarding the requirements of this award (https://aztransmac2.asu.edu/cgi-bin/WebObjects/MCCCD.woa/wa/freeForm13?id=183070).

At Maricopa, we strive to provide you with accurate and current information about our degree and certificate offerings. Due to the dynamic nature of the curriculum process, course and program information is subject to change. As a result, the course list associated with this degree or certificate on this site does not represent a contract, nor does it guarantee course availability. If you are interested in pursuing this degree or certificate, we encourage you to meet with an advisor to discuss the requirements at your college for the appropriate catalog year.

Previous Catalog Years

The pathway map presented above is for the current catalog year and is the intended pathway map for new students. All previous catalog years for this pathway map are available at the link below.

Previous catalog years for Associate in Applied Science (AAS) in Cybersecurity