This program is designed for those who want to work in the cyber security field of computer information technology.
In addition to General Education Outcomes, students should be able to:
- Identify the scope of security problems, identify risk assessment, and describe malicious logic and security policies.
- Identify major concepts of theories used in Cloud computing and architecture
- Describe Cloud ROI models, deployment models, and Cloud computing implementation.
- Identify hacker attack techniques and methodologies, network worms, viruses, and malicious code, computer crimes, organizational intelligence regarding their technologies, and information technology warfare.
- Identify major concepts used in cyber security, and psychological influences of cyber security.
- Describe the mentality of a hacker and a hacker’s manifesto.
- Identify major concepts regarding network security and abnormal networking behavior and its causes.
- Describe network defense fundamentals, concepts related to managing firewalls, and the use of Intrusion Detection Systems.
According to the Bureau of Labor Statistics, U.S. Department of Labor, employment of information security analysts is projected to grow 37 percent from 2012 to 2022, much faster than average for all occupations. Demand for information security analysts is expected to be very high as these analysts will be needed to come up with innovative solutions to prevent hackers from stealing critical information or creating havoc on computer networks. Most information security analysts can work for computer companies, consulting firms, federal or state government agencies, or business and financial companies.
Job Titles: Software Developer, Software Designer, Applications Specialist, Network Administrator, Network Engineer
- West Virginia projected job market increase 24% by 2024 (Onet, 2018)
- Possible Certifications: COMPTIA N+, COMPTIA LINUX, Microsoft Office Specialist, CISCO CCENT
CIP: 11.1003 NCES CIP Title Associated with Major: Information Security Analysts.