Cybersecurity

Apply
  • calendar
    Program Duration: 2 Year Program
  • graduation cap
    Degree Type: Associate in Arts (A.A.)
  • clock
    Total Credit Hours: 60
Closeup of a computer keyboard.

About This Program

As the number of computers being used to store sensitive information for personal, business, and government purposes increases, the need for securing computers and other systems that store this information becomes more obvious. Information security professionals are needed to provide security for these infrastructures. The Associate of Applied Science (A.A.S) program in Cybersecurity is designed for students who are interested in pursuing careers in cybersecurity, network/systems administration, and system programmers. This program will also consist of courses that help to prepare students for these industry certification exams.

Quick Information

Apply Now

Program Entry Requirements

Students are required to satisfy placement at the time of admission. Students who have had prior computer-related experience may be placed in more advanced courses after consultation with and the approval of the department chairperson.  Also, students who possess business computer application skills may test out of CIS 103: Computer Applications & Concepts. Students who are identified as needing developmental course work must satisfactorily complete the appropriate English and mathematics courses as part of their degree program.

 

General Education Requirements

All general education requirements necessary for graduation are met through the courses in the program as indicated above. Students who wish to take courses that differ from the general education courses indicated above must complete a course substitution request form. To access the form, login to the MyCCP portal, and in the Student tab, under Electronic Forms, click on the Records and Registration Forms link, then choose Request For Course Substitution Of Graduation Requirement link. A more detailed explanation of the College's general education requirements is also available.

Program of Study and Graduation Requirements

A total of 61 credit hours as prescribed must be satisfactorily completed with a grade point average of 2.0 ("C" average).

Featured Transfer Opportunities

Bloomsburg University

Public university in central Pennsylvania offering diverse programs.

Jefferson University

Healthcare and science-focused institution in Philadelphia.

View all transfer opportunities

Person working at computer

Launch Your Career in Cybersecurity

  • Database Administrator – est. salary $107,562
  • Information Security Analyst – est. salary  $113,936*
  • Network and Computer Systems Administrator – est. salary $97,557
  • Security Management Specialist – est. salary $87,360
**EMSI Data, 2022; The greater Philadelphia region, PA; a percentage of people in these jobs may have a bachelor's degree or higher.

Career Outlook

$113,936

Median Salary of an Information Security Analyst

395

Number of Jobs in the Region

+23.5%

10-year Job Outlook in the Region for Information Security Analyst

Featured Career

Information Security Analysts

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure.

Starting Pay: $85,142

Person working at laptop

Typical Tasks

  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Monitor use of data files and regulate access to safeguard information in computer files.