group of students talking Degree Sheet

B.T. in Applied Technology:
Cyber Security and Information Assurance

The Bureau of Labor Statistics reports that employment of information security analysts is projected to grow 32 percent from 2018 to 2028, which is much faster than the average for all occupations. Demand for information security analysts is expected to continue to increase, as these analysts will be needed to create innovative solutions to prevent hackers from stealing critical information or causing problems for computer networks, and median annual wage was $99,730 in May 2019. 

Cybersecurity coursework for the BTAT Cybersecurity and Information Assurance Option is based on the Committee on National Security Systems National Training Standard and Department of Homeland Security Essential Body of Knowledge for IT Security. The curriculum fully maps to the six major domains of the CompTIA Security+, includes coverage on recent compliance laws and standards, as well as being comparable to Exam 70-741: Networking with Windows Server 2016.

Sample coursework includes: 

  • IT 1411 Orientation to Computer Technology                                                
  • IT 2143 Introduction to Networking 
  • IT 2153 Network Operating Systems I 
  • IT 3333 Cybersecurity Investigations 
  • IT 4353 Information Assurance and Security Management                            
  • IT 4373 Information Assurance Regulations and Ethics                                 
  • IT 4443 Fundamentals of Information and Cybersecurity      
  • CJ 4413 Evidentiary Standards                                   
  • CJ 3013 Criminal Procedures                          

Network administration skills will include: 

Appraising structure of the worldwide Domain Name System (DNS) to include policies, delegated administration, and performance monitoring and tuning & selecting and assessing components of the Transmission Control Protocol/Internet Protocol suite by utilizing subnet and IPv4 addresses on Windows computers with both GUI and command-line tools, as well as Autoconfiguring IPv6 addresses and transitioning from IPv4 to IPv6 

Assessing a Dynamic Host Configuration Protocol management tool, the Internet Protocol Address Management, Internet Protocol address spaces and DNS servers and zones & evaluating remote access and the varied methods to configure networks and centralized authentication and authentication policies using Network Policy Server and Remote Authentication Dial In User Service. 

Cybersecurity abilities will include: 

Applying the Daubert Standard to forensic evidence, performing reconnaissance and probing using common tools, documenting a workstation configuration using forensic tools, performing a vulnerability assessment, enabling Windows active directory and user access controls, using group policy objects, performing packet capture and traffic analysis, and utilizing denial of service tools,  

Uncovering new digital evidence using bootable forensic utilities, creating a forensic system case file for analyzing forensic evidence, analyzing images to identify suspicious or modified files, recognizing the use of steganography in image files, performing a web site and database attack by exploiting identified vulnerabilities, creating a data recovery plan, using encryption to enhance confidentiality and integrity, automating email evidence discovery using P2 Commander, decoding an FTP protocol session for forensic evidence, conducting network traffic analysis tool evaluation, and conducting an incident response investigation for a suspicious logins. 

This program is available online.