Maricopa Emergency Management System Alert

  CORONAVIRUS (COVID-19) UPDATE – SMCC PHYSICAL CAMPUS IS CLOSED: We're getting ready for the Fall Semester - classes start August 22. Have questions about what the Fall term will be like? Join us for a Student and Family Townhall meeting on August 12 at 3pm. We are ready to help you remotely! SMCC Help Me! Request form  |  Maricopa Coronavirus Website  |  Sign up for RAVE Alerts

Information Technology: Network and Cyber Security

The Associate of Applied Science (AAS) in Information Technology: Network and Cyber Security program is designed to focus on the necessary skills required to secure, protect and identify vulnerabilities in a network including various operating systems and network devices. Emphasis is placed on developing the theoretical, legal, ethical and practical skills needed to maintain security on mission-critical networking and server systems. The program is designed to meet the training needs of government and industry employees. The program covers a variety of information security technologies and structured languages. The Information Technology: Network and Cyber Security program also focuses on the skills needed for internationally recognized IT certifications and high demands in business, industry and government. A choice of two stackable Certificate of Completions (CCL) are also available in Network and Cyber Fundamentals and Network and Cyber Security.


Details iconImportant information you’ll need when applying for admission:
Field of Interest: 
Computer and Information Technology
Associate Degree
Academic Plan: 
Information Technology: Network and Cyber Security (DEG)
Academic Plan Code: 
Total credits required: 
Effective term: 
2018 Fall
Award notes

Students must earn a grade of C or better in all courses within the program.
Students should select from the following courses in consultation with a department advisor.

This program will be replaced by: AAS/3197 Cybersecurity

Program prerequisites
Course #Course TitleCredits
CIS105Survey of Computer Information Systems (3) OR Permission of Program Director0-3
Required courses
Course #Course TitleCredits
Certificate of Completion (CCL) in Information Technology: Network and Cyber Security (5530) (42-45) OR
CIS126DLLinux Operating System (3) OR
CIS126RHRed Hat System Administration I (3)3
MST150++Microsoft Windows (any MST 150-level suffixed course)3
CNT140AAIntroduction to Networks4
CNT150AACisco - Routing and Switching Essentials4
CNT160AAScaling Networks (4) OR
CNT170AACisco-Connecting Networks (4)4
CIS270Essentials of Network and Information Security (3) OR
ITS110Information Security Fundamentals (3)3
CIS156Python Programming: Level I3
CIS238DLLinux System Administration (3) OR
CIS238RHRed Hat System Administration II (3)3
CNT202Cisco Secure Firewall Appliance Configuration4
ITS240Ethical Hacking and Network Defense3
CNT205Cisco Certified Network Associate Security4
Restricted Electives
Course #Course TitleCredits
General education requirements
General Education RequirementCredits: 22-27
General Education CoreCredits: 12-17
First-Year CompositionCredits: 6
Any approved general education course in the First-Year Composition area.6
Oral CommunicationCredits: 3
Any approved general education course in the Oral Communication area.3
Critical ReadingCredits: 0-3
Any approved general education course in the Critical Reading area OR Equivalent as indicated by assessment.0-3
MathematicsCredits: 3-5
Any approved general education course in the Mathematics area.3-5
General Education DistributionCredits: 10
Humanities and Fine ArtsCredits: 3
Any approved general education course in the Humanities, Arts and Design area.3
Social and Behavioral SciencesCredits: 3
Any approved general education course in the Social-Behavioral Sciences area.3
Natural SciencesCredits: 4
Any approved general education course in the Natural Sciences area.4
  • Experiment with file and directory systems, file and directory permissions, text editors, file processing, and basic shell programming of the Linux operating system. (CIS126DL, CIS126RH )
  • Install, configure, administer, use, and maintain a UNIX/Linux operating system. (CIS126DL, CIS126RH, CIS238DL, CIS238RH)
  • Execute day-to-day administration tasks in a UNIX/Linux-based network. (CIS126DL, CIS126RH, CIS238DL, CIS238RH)
  • Solve problems in industry utilizing the Python programming language. (CIS156)
  • Manage the Linux Operating Systems including sophisticated manipulation of file structures, backup systems, printing processes, troubleshooting, user account management, hard disk maintenance and configuration, process monitoring and prioritizing, kernel customization, and system resource control. (CIS238DL, CIS238RH)
  • Perform day-to-day administration tasks in a UNIX/Linux-based network. (CIS126DL, CIS126RH, CIS238DL, CIS238RH)
  • Configure and test basic networks and network standards protocols, communication fundamentals in Data networks and the Internet. Includes study of the Open Systems Interconnection (OSI) model, using a top down approach, cabling and cabling tools, basic Cisco router, configuration, Ethernet technologies, Internet Protocol (IP) addressing, and overview of Internet Protocol version 6 (IPv6). (CNT140AA)
  • Formulate and test appropriate equations to solve basic Internet Protocol (IP) addressing and subnetting problems associated with designing a network. (CNT140AA)
  • Install, configure, customize, maintain and troubleshoot Cisco routers utilizing Advanced Internet Protocol (IP) addressing techniques, Variable Length Subnet Masking (VLSM), distance vector and Link State dynamic routing protocols, Routing Information Protocol version 1 (RIPv1) and version 2 (RIPv2), Enhanced Interior Gateway Routing Protocol (EIGRP), Single-area Open Shortest Path First (OSPF), and understanding the structure and behavior of routing tables. (CNT150AA)
  • Design and implement a converged switched network including switch configuration for basic functionality, implementing Virtual Local Area Networks (VLAN), VLAN Trunking Protocol (VTP), and Inter-VLAN routing in a converged network and implementing a Wireless LAN (WLAN). (CNT160AA)
  • Solve common issues with OSPF, EIGRP, and STP in both IPv4 and IPv6 networks and Implement a WLAN in a small-to-medium network. (CNT160AA)
  • Implement and configure common data link protocols and apply WAN security concepts, principles of traffic management, access control and addressing services using Wide-Area Network (WAN) technologies and network services required by converged applications in Enterprise Networks (CNT170AA)
  • Configure and troubleshoot a remote-access network to interconnect central sites of branch offices, home offices and control access to the central site. (CNT170AA)
  • Formulate Internet Protocol Security (IPSec) and Virtual Private Network (VPN) operations. (CNT170AA)
  • Design and manage security policies, security technologies, secure firewall design, installation, configuration and maintenance, AAA (Authentication, Authorization, and Accounting) and VPN (Virtual Private Network) implementation using firewalls. (CNT202)
  • Design security solutions to reduce risk of revenue loss and vulnerability. (CNT205)
  • Minimize threats to the security of information systems by using authentication methods, access control, cryptography, Public Key Infrastructure (PKI), hardening of operating systems, infrastructure security, network security (including remote access and wireless), and the use of basic security tools. (ITS110, CIS270)
  • Examine the techniques for defending LAN and WAN networks including firewalls, IDSs and VPNs. (ITS110, CIS270)
  • Define workstations, servers, network storage devices, routers, switches, gateways, guards, Virtual Private Networks (VPNs), firewalls, Internet Protocol Security (IPSec), Intrusion Detection Systems (IDSs), mobile devices, peripheral devices and security peripherals. (BPC170, CIS105, CIS270, ITS110)
  • Explain a broad, cross-section of information security concepts including authentication methods, access control, cryptography, public key infrastructure (PKI), network attack and defense methods, operating systems and network device hardening, securing remote access and wireless technologies including viruses and worms (CIS105, CIS270, ITS110)
  • Minimize threats to the security of information systems by using basic tools for information security, including communication security, infrastructure security, organizational security and basic cryptography. (CIS270, ITS110)
  • Evaluate computer network vulnerabilities and counter security strategies and to effectively protect computer networks from risks ranging from malicious infiltration to cyber-warfare; using ethical, relevant tools and methodologies. (ITS240)
  • Perform and explain day-to-day administration tasks in a Microsoft Windows-based network. (MST150++)
  • Apply basic security techniques such as password protection and access control lists (ACLs). (MST150++)

At Maricopa, we strive to provide you with accurate and current information about our degree and certificate offerings. Due to the dynamic nature of the curriculum process, course and program information is subject to change. As a result, the course list associated with this degree or certificate on this site does not represent a contract, nor does it guarantee course availability. If you are interested in pursuing this degree or certificate, we encourage you to meet with an advisor to discuss the requirements at your college for the appropriate catalog year.