Cybersecurity Associate in Science Degree (AS) InformationView Course Requirements My Academic Plan- 2 year (MAP2) My Academic Plan- 3 year (MAP3)
Documents & Links
by the Department of Economic Opportunity
- PSC Cyber Security Center Page
- Cisco Security RSS Feeds
- Fortinet Security Blog
- Krebs on Security
- Naked Security Blog
- SAN AppSec Blog
- Secure List
- Security Bloggers Network
- Tao Security
- Threatpost Blog
- ZDnet Zero Day Blog
Search For Another Program
Introduction to the Cybersecurity Associate in Science Degree (AS) Program
This program covers a broad expanse of technological concepts and provides individuals with the skills required to implement effective and comprehensive information security controls to protect the confidentiality, integrity, and availability of information and information systems.
Coursework includes securing network technologies and operating systems, security management, and industry best practices.
Additionally, students will acquire the skills and hands-on experience with hardware and software that allow them to pursue various industry certifications.
Each student should contact the Information Technology Department for assistance in planning the program of study.
Is This For You?
People who work in this field are focused and analytic in their thinking, enjoying problem-solving and trying out new ideas. They enjoy hands-on projects and tend to Coursework. Often they prefer to work by themselves or in small groups and can work well with little supervision. They enjoy a challenge and work that allows them to use their abilities to their best.
Beyond Graduation . . .
There is a demand for qualified security professionals in all businesses that use computers as part of the normal course of business, as employers continue to invest in cybersecurity to protect their information and infrastructure. Many new and emerging careers in the Information Technology (IT) field are in the area of data and information security.
Related Career Opportunities
Graduates from the Information Technology (IT) Security program will work in business, finance, insurance, and industrial firms; federal, state, and local governments; and education and healthcare sectors.
Computer Security Specialists
Plan, coordinate, and implement the employer’s information security in order to protect the organization’s data and infrastructure. They educate users about computer security, install security software, monitor networks for security breaches, respond to cyber attacks, and in some cases, gather data and evidence used in prosecuting cyber crime.
Review and analyze computer data and documents for performance indicators to locate code problems, and correct errors by correcting codes. They consult with management to ensure agreement on system principles. They may also develop, document and revise system design procedures, test procedures, and quality standards.
- Data Recovery Planner
- Network Designer
- Security Administrator
- Software Quality Assurance Tester
- Web Administrator
Okaloosa / Walton Counties
Information Security Analysts
All Florida Counties
Information Security Analysts