fbpx

CIT – Cyber Security

Departments

Helpful Links

Program Description

The Program – Computer Information Technology – Cyber Security

Design, build, and maintain IT networks, applications, and services based on security policies and standards related to information security. The concentration is based on the Cyber Security CIA triad of confidentiality, integrity, and availability of assets in use by people, corporations, and government.

Your Degree

Two-year full-time degree schedule; a mixture of core software applications, networking classes, and security training including extensive hands-on experience in the classroom environment. Training also includes project management, ethics, and communications; the program can be completed on a part-time basis.

What you’ll learn

  • Identify common IT professions and apply basic IT tools to solve problems.
  • Build software applications using current scripting and development languages.
  • Recognize and mitigate various types of risks, threats, and vulnerabilities in various environments.
  • Install, configure, and use various operating systems.
  • Troubleshoot hardware, operating systems, and network communications problems.
  • Demonstrate a thorough understanding of legal and ethical standards related to the IT profession.
  • Create a security framework based on the tenets of cybersecurity and current regulations related to business and industry.
  • Design, install, and manage secure, scalable small to medium size networks.
  • Install and configure various operating systems and harden these systems against cyber-attacks.
  • Demonstrate a thorough understanding of business impact analysis statements, business continuity plans, and disaster recovery plans for small to medium size organizations.
  • Describe TCP/IP protocols used to transfer data across networks in terms of their purpose, what types of packets are sent, and how they are used, and possible security issues.
  • Use security tools, logs, and packet captures to analyze security incidents and perform forensic analysis on devices.
  • Perform applicable mathematical calculations throughout the business environment.
  • Communicate professionally both in writing and verbally with co-workers, managers, stakeholders, and customers.
  • Integrate technology skills in making business decisions and performing business functions.
  • Use problem-solving and decision-making skills in preparing and implementing business solutions.
  • Demonstrate good work habits, interpersonal and virtual teamwork skills, and a high level of professionalism.
  • Exhibit inclusiveness where each perspective is considered while progressing toward common goals.

Career Opportunities

  • Cyber Security Analyst
  • Cyber Security Specialist
  • Incident Analyst/Responder
  • IT Auditor
  • Cyber Security Analyst
  • Penetration/Vulnerability Tester

Check out more career choices at Career Coach.

Application Process

  1. MTC Application for Admission and the nonrefundable application fee.
  2. Final high school transcript (or GED results) and college transcripts (if applicable).
  3. Successful completion of the Basic Skills Assessment (ACCUPLACER) and Technology Skills Test (TST) is required. Any college foundation courses recommended by placement assessment results are also required.

For More Information, Contact:

Admission Office
Marion Technical College
1467 Mt. Vernon Ave.
Marion, OH 43302
Email: enroll@mtc.edu
740.389.4636

Faculty

Sorry no post found.

//