This program can be completed in its entirety at Ñý¼§Ö±²¥ State Stark.
Stark Contact
Advising Services
Office of Student Services
132 Main Hall
330-244-3251
ksustarkadvisors@kent.edu
This program can be completed in its entirety at Ñý¼§Ö±²¥ State Stark.
Advising Services
Office of Student Services
132 Main Hall
330-244-3251
ksustarkadvisors@kent.edu
The Associate of Applied Business degree in Cybersecurity at Ñý¼§Ö±²¥ State University provides students with an applied approach to information security concepts.
The Associate of Applied Business degree in Cybersecurity provides students with an applied approach to information security concepts. With an ever-growing threat to sensitive and critical data in the field of information technology, understanding the impact of security issues on businesses and individuals is critical. The degree program gives students the tools they need to address current security issues including risk identification, security testing and monitoring, and enterprise risk management. Because the degree is built upon a solid knowledgebase, additional topics include networking, hardware and operating systems, Cisco networking technologies, cyber defense methods, cyber ethics, incident management and security policies.
The university affirmatively strives to provide educational opportunities and access to students with varied backgrounds, those with special talents and adult students who graduated from high school three or more years ago.
Ñý¼§Ö±²¥ State campuses at Ashtabula, East Liverpool, Geauga, Salem, Stark, Trumbull and Tuscarawas, and the Twinsburg Academic Center, have open enrollment admission for students who hold a high school diploma, GED or equivalent.
Some programs may require that students meet certain requirements before progressing through the program. For programs with progression requirements, the information is shown on the Coursework tab.
For more information on admissions, contact the Regional Campuses admissions offices.
Graduates of this program will be able to:
Code | Title | Credit Hours |
---|---|---|
Major Requirements (courses count in major GPA) | ||
IT 11004 | SURVEY OF INFORMATION TECHNOLOGY | 3 |
IT 11005 | INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY | 3 |
IT 11009 | COMPUTER ASSEMBLY AND CONFIGURATION | 4 |
IT 13000 | APPLIED SECURITY ESSENTIALS | 3 |
IT 21002 | NETWORK SETUP AND CONFIGURATION | 3 |
IT 21007 | CYBER ETHICS IN INFORMATION TECHNOLOGY | 3 |
IT 21110 | NETWORK ROUTING AND SWITCHING | 3 |
IT 21200 | ETHICAL HACKING | 3 |
IT 21300 | INTRODUCTION TO SECURITY INCIDENT MANAGEMENT | 3 |
IT 22000 | SURVEY OF IT CYBERSECURITY | 3 |
IT 23000 | INTRODUCTION TO OPERATING SYSTEM SECURITY | 3 |
IT 24000 | DEVELOPING AND IMPLEMENTING SECURITY POLICIES | 3 |
Additional Requirements (courses do not count in major GPA) | ||
UC 10001 | FLASHES 101 | 1 |
3 | ||
3 | ||
3 | ||
3 | ||
3 | ||
Information Technology (IT) Electives | 7 | |
Minimum Total Credit Hours: | 60 |
Minimum Major GPA | Minimum Overall GPA |
---|---|
2.000 | 2.000 |
This roadmap is a recommended semester-by-semester plan of study for this major. However, courses designated as critical (!) must be completed in the semester listed to ensure a timely graduation.
Semester One | Credits | |
---|---|---|
IT 11004 | SURVEY OF INFORMATION TECHNOLOGY | 3 |
IT 11005 | INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY | 3 |
UC 10001 | FLASHES 101 | 1 |
Information Technology (IT) Elective | 3 | |
Ñý¼§Ö±²¥ Core Requirement | 3 | |
Ñý¼§Ö±²¥ Core Requirement | 3 | |
Credit Hours | 16 | |
Semester Two | ||
IT 11009 | COMPUTER ASSEMBLY AND CONFIGURATION | 4 |
IT 13000 | APPLIED SECURITY ESSENTIALS | 3 |
IT 21002 | NETWORK SETUP AND CONFIGURATION | 3 |
Ñý¼§Ö±²¥ Core Requirement | 3 | |
Credit Hours | 13 | |
Semester Three | ||
IT 21007 | CYBER ETHICS IN INFORMATION TECHNOLOGY | 3 |
IT 21110 | NETWORK ROUTING AND SWITCHING | 3 |
IT 21200 | ETHICAL HACKING | 3 |
IT 21300 | INTRODUCTION TO SECURITY INCIDENT MANAGEMENT | 3 |
Ñý¼§Ö±²¥ Core Requirement | 3 | |
Credit Hours | 15 | |
Semester Four | ||
IT 22000 | SURVEY OF IT CYBERSECURITY | 3 |
IT 23000 | INTRODUCTION TO OPERATING SYSTEM SECURITY | 3 |
IT 24000 | DEVELOPING AND IMPLEMENTING SECURITY POLICIES | 3 |
Information Technology (IT) Elective | 4 | |
Ñý¼§Ö±²¥ Core Requirement | 3 | |
Credit Hours | 16 | |
Minimum Total Credit Hours: | 60 |
What's Next
Be one step closer to joining our Golden Flashes family at Stark!