Download presentation
Presentation is loading. Please wait.
1
Associate Degree in Cyber security
Cyber Security Jobs Associate Degree in Cyber security
2
CYBER SECURITY DEGREE LEVELS
While still a relatively new field, cyber security degrees are available at all levels, from associate degrees to PhD degrees. Students can pursue cyber security degrees online or in a campus-based environment. Each degree-level prepares students for specific opportunities, from entry-level employment to careers in academia. Before choosing a cyber security program, students should make sure it supports their goals.
3
Associate Degree in Cyber Security
Securing entry-level work as a computer support technician or a related position An additional qualification for those already working in the field A step on a path to a four-year cyber security degree Associate degree coursework covers the vulnerabilities of various hardware and software systems, network technologies, and key cyber security concepts such as security administration and intrusion detection. Many programs also prepare students for certification exams often required for full-time employment, ranging from basic CompTIA Security+ to ISC2 Certified Information Systems Security Professional (CISSP). Here are several courses offered in a typical associate degree in cyber security program.
4
digital FORENSICS Basic foundation in the concepts, terminologies and terms used to communicate and understand the history of computer forensics and cybercrime. Skills Gained Processing crime scenes Digital evidence controls Recovering image files investigations Network forensics
5
Comptia Network security+
Introduces the concepts and understanding of the field of computer security and how it relates to other areas of information technology. Skills Gained Hardening systems Securing networks Cryptography
6
Intranet firewalls and e-commerce
Provides a framework in the importance of database security; students learn how to protect a company’s technology infrastructure and intellectual property Skills Gained Understand database security models Advantages and disadvantages of access control models Defending against common attacks Knowledge of common integrity constraints Securing an E-commerce site
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.