Associate Degree in Cyber security Cyber Security Jobs Associate Degree in Cyber security
CYBER SECURITY DEGREE LEVELS While still a relatively new field, cyber security degrees are available at all levels, from associate degrees to PhD degrees. Students can pursue cyber security degrees online or in a campus-based environment. Each degree-level prepares students for specific opportunities, from entry-level employment to careers in academia. Before choosing a cyber security program, students should make sure it supports their goals.
Associate Degree in Cyber Security Securing entry-level work as a computer support technician or a related position An additional qualification for those already working in the field A step on a path to a four-year cyber security degree Associate degree coursework covers the vulnerabilities of various hardware and software systems, network technologies, and key cyber security concepts such as security administration and intrusion detection. Many programs also prepare students for certification exams often required for full-time employment, ranging from basic CompTIA Security+ to ISC2 Certified Information Systems Security Professional (CISSP). Here are several courses offered in a typical associate degree in cyber security program.
digital FORENSICS Basic foundation in the concepts, terminologies and terms used to communicate and understand the history of computer forensics and cybercrime. Skills Gained Processing crime scenes Digital evidence controls Recovering image files E-mail investigations Network forensics
Comptia Network security+ Introduces the concepts and understanding of the field of computer security and how it relates to other areas of information technology. Skills Gained Hardening systems Securing networks Cryptography
Intranet firewalls and e-commerce Provides a framework in the importance of database security; students learn how to protect a company’s technology infrastructure and intellectual property Skills Gained Understand database security models Advantages and disadvantages of access control models Defending against common attacks Knowledge of common integrity constraints Securing an E-commerce site