Cybersecurity: Penetration Testing - Degree
Associate of Applied Science Degree Program | mhcc.edu/Cybersecurity
Dr. Wayne Machuca: 503-491-7631 | Room AC2776 | Wayne.Machuca@mhcc.edu | Students with last name A-F
Katrinia McNeal: 503-491-7502 | Room AC2683 | Katrinia.McNeal@mhcc.edu | Students with last name G-N
Jeff Sperley: 503-491-7357 | Room AC2783 | Jeff.Sperley@mhcc.edu | Students with last name O-Z
The reality is that defenders cannot protect themselves from attacks if they do not know how the attacks will be conducted. The Cybersecurity and Networking: Penetration Testing focus area takes students through a similar degree path as the core degree, but ends their experience with an Ethical Hacking and Penetration Testing-focused core that gets students working hands-on with exploits and vulnerabilities. Students will learn how to work with clients to launch an approved attack against small and medium-sized networks/systems in order to learn more about its vulnerabilities and conducts a risk assessment of IT infrastructure.
Students will also learn about how to responsibly work with ‘hacker tools,’ build sandbox environments, conduct research, and build their communication skills by learning how to craft final reports. Cyber and digital ethics are strictly enforced throughout this program.
Students will also engage with coursework that will prepare them for a range of industry certifications, including security-related ones such as CompTIA’s Security+ and EC-Council’s Certified Ethical Hacker (CEH). Please note: All core (CIS, ISTM) courses must be completed within 5 years of starting the program.
At the completion of this program, students should be able to:
- Apply a penetration testing framework and methodology to find and act upon vulnerabilities in a given system
- Be able to find, choose, and use the appropriate utility or series of steps for a given task or exploit in penetration testing activities
- Produce a formal written assessment at the end of penetration testing activities to be given and used by a client
- Perform preventative hardware and software maintenance
- Troubleshoot and correct computer hardware and software problems
- Conceptualize, design and diagram possible solutions for a given networking environment
- Work with others as part of a computer security team
- Assemble, reconfigure and upgrade personal computers
- Perform basic network and operating system administration, configuration and system security for both wired and wireless networks
- Configure and troubleshoot access to resources, hardware devices and drivers, storage use and network connections
- Analyze internet security issues and apply them to network design problems
- Communicate effectively and professionally in the information technology environment
For the most part, courses that fulfill general education requirements can be taken in any term. Students should work with the faculty adviser(s) to create a custom academic plan based on course placement levels, career goals, and full time/part time status.
Admitted students may also log on to Navigate to start the process of building an academic plan based on this major and can notify an adviser for review.
|ISTM100A||Preparation For An Education in I.T. and Cybersecurity 1 (Course offered online)||1|
|ISTM183C||Fundamentals of CyberSecurity||3|
|CIS151||Introduction to Networks||4|
|WR121||English Composition (Course offered online)||4|
|ISTM100B||Preparation For An Education in I.T. and Cybersecurity 2 (Course offered online)||1|
|ISTM183A||Preparation for A+ Essentials||3|
|ISTM133P||Introduction to Python (Course offered online)||4|
|CIS152||Switching, Routing and Wireless Essentials||4|
|Select one of the following:||4-6|
|Beginning Algebra II (Course offered online)|
|Quantitative Reasoning I|
|ISTM100C||Preparation For An Education in I.T. and Cybersecurity 3 (Course offered online)||1|
|ISTM183B||Preparation for A+ Practical Application (Course offered online)||3|
|ISTM140L||Preparation for Linux+ (Course offered online)||4|
|ISTM171||Introduction to Cloud and Virtualization Technologies (Course offered online)||3|
|CIS153||Enterprise Networking, Security, and Automation||4|
|ISTM197IIT||Internet Infrastructure and Technologies (Course offered online)||3|
|ISTM189||Wireless Security (Course offered online)||3|
|CIS279S||Windows Server OS||4|
|ISTM233P||Python for Cyber Security (Course offered online)||4|
|CIS284S||Preparation for Security+ (Course offered online)||4|
|Health and Physical Education requirement||3|
|ISTM285E||Advanced Ethical Hacking||3|
|ISTM285W||Web Application Penetration Testing||3|
|ISTM283F||Practical Digital Forensics||3|
|Capstone Project Development 1 |
or Coop Ed-Computer Applications
|Human Relations Requirement||3-4|
Students planning to transfer to a four-year university should take CIS297, while those planning to enter the workforce after graduation should take WE280CAD.
While not required, students are highly encouraged to take courses over the summer to help reduce some of the larger term loads. Students should speak with a department advisor about which courses are offered in the summer.