Transfer to University of Charleston
Note: The “2+2” term is used to refer to a transfer agreement through which a student completes an Associate degree at one institution and finishes a Bachelor degree at another institution. Due to individual student factors, part-time or full-time status, need for transitional education coursework, scheduling and availability of courses, or other factors, all students may not be able to complete these degrees in 2 (Associate) or 4 (Bachelor) years. The term “2+2” does not imply a guarantee that a student will be able to complete all course requirements in 4 years.
The term 2+2 articulation agreements contain very requirements that have been agreed upon and approved by the administration and faculty at both institutions. Because of this, petitions for course substitutions will not usually be considered or approved to allow a student to graduate under a 2+2 program.
Students are encouraged to contact a member of the Cyber Security faculty at the University of Charleston early in their program of study at WVNCC to obtain information and counseling concerning their Cyber Security transfer program. However, to be eligible to transfer, you must have a 60-hour Associate’s degree in Cyber Security with a minimum GPA of 2.0, in order to transfer into the University of Charleston’s Cyber Security program.
In addition to General Education Outcomes, transfer students should be able to:
- Identify the scope of security problems, identify risk assessment, and describe malicious logic and security policies.
- Identify major concepts of theories used in Cloud computing and architecture
- Describe Cloud ROI models, deployment models, and Cloud computing implementation.
- Identify hacker attack techniques and methodologies, network worms, viruses, and malicious code, computer crimes, organizational intelligence regarding their technologies, and information technology warfare.
- Identify major concepts used in cyber security, and psychological influences of cyber security.
- Describe the mentality of a hacker and a hacker’s manifesto.
- Identify major concepts regarding network security and abnormal networking behavior and its causes.
- Describe network defense fundamentals, concepts related to managing firewalls, and the use of Intrusion Detection Systems.