Press enter or spacebar to select a desired language.
Moore Co. Campus, Clayton-Glass Library
Saturday: Closed
Smyrna Campus Library
Saturday: Closed
Fayetteville Campus Library
Saturday: Closed
McMinnville Campus Library
Saturday: Closed
Press enter or spacebar to select a desired language.

Cyber Defense

Cyber Defense Header

Majoring in Cyber Defense

The A.A.S. in Computer Information Technology with a Cyber Defense concentration is designed for students desiring a two-year non-transfer degree program to prepare them to enter the workforce, sustain their career, or seek career-growth opportunities in the field of entry-level cybersecurity. This program does encourage the pursuit of professional certifications. The focus would be on Certifications from CompTIA.

Program Courses

CITC 1300 (Beginning HTML & CSS) ∙ CITC 1301 (Intro to Programming and Logic) ∙ CITC 1302 (Introduction to Networking) ∙ CITC 1303 (Database Concepts) ∙ CITC 1317 (Introduction to Scripting Languages) ∙ CITC 1321 (A+ Hardware) ∙ CITC 1322 (A+ Software) ∙ CITC 1332 (UNIX/Linux Operating System) ∙ CITC 1334 (Project Management and Design) ∙ CITC 1351 (Principles of Information Assurance) ∙ CITC 2326 (Network Security) ∙ CITC 2352 (Digital Forensics) ∙ CITC 2363 (Internet/Intranet Firewalls and eCommerce Systems) ∙ CITC 2399 (CO/OP Internship in Information Technology I, II, III or IV) ∙

Cyber Defense Software

This is a list of software used in the Cyber Defense classes. This is not an all-inclusive list. Since the Cyber Defense field changes daily, so does the software used to defend various attacks. 

It is recommended that if you download this software, immediately check to see if there are any updates first. Then follow the installation instructions. Some of these are free and some will require payment for the more complex versions. I always recommend that the Trail version is used first and then if you like the results, you can make the decision to purchase an updated version. 


CompTIA Certification Requirements

CompTIA web site

CompTIA A+ 220-1001 & 220-1002

If you could only choose one certification to earn as an aspiring IT pro, you really can't go wrong with CompTIA's A+ certification. Validating a professional's ability to troubleshoot and solve problems for everything from networking and operating systems to mobile devices and security, having an A+ certification shows employers you've got what it takes to succeed as an in-demand IT expert. This course will help you ace the CompTIA A+ 220-1001 and 220-1002 exams, covering mobile devices, networking technology, security, and more.

  • Prep to ace the CompTIA A+ 220-1001 & 220-1002 exams
  • Familiarize yourself w/ mobile devices, networking technology, hardware, virtualization & cloud computing
  • Explore installing & configuring operating systems, expanded security & software troubleshooting

CompTIA Network+ N10-007

The CompTIA Network+ is an internationally recognized certification, validating an individual’s fundamental IT networking knowledge and skills. This course covers the certification's objectives in order to help you get ready for the exam. Jump in, and you'll tackle key concepts, like network Installation, routing, operations, and more.

Deepen your understanding of network architectures, naming, devices & more

  • Jump into the Ethernet basics
  • Explore TCP/IP applications & network protocols
  • Learn about virtualization & cloud computing

CompTIA Security+ SYS-501

Covering the latest trends and techniques in risk management, risk mitigation, threat management, and intrusion detection, CompTIA Security+ is the first security certification IT professionals should earn. This foundational credential establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. This course will help you add this powerful certification to your resume by preparing you to ace the Security+ SY0-501 exam.

  • Learn how to provide operational, information, application & infrastructure level security
  • Explore securing networks to maintain availability, integrity & confidentiality of critical information
  • Learn how to operate within a set of rules, policies & regulations wherever applicable
  • Comprehend risk identification and mitigation