Cybersecurity: Penetration Testing - Degree

Associate of Applied Science Degree Program |

Faculty Advisers

Dr. Wayne Machuca: 503-491-7631 | Room AC2776 | | Students with last name A-F
Katrinia McNeal: 503-491-7502 | Room AC2683 | | Students with last name G-N
Jeff Sperley: 503-491-7357 | Room AC2783 | | Students with last name O-Z

The reality is that defenders cannot protect themselves from attacks if they do not know how the attacks will be conducted. The Cybersecurity and Networking: Penetration Testing focus area takes students through a similar degree path as the core degree, but ends their experience with an Ethical Hacking and Penetration Testing-focused core that gets students working hands-on with exploits and vulnerabilities. Students will learn how to work with clients to launch an approved attack against small and medium-sized networks/systems in order to learn more about its vulnerabilities and conducts a risk assessment of IT infrastructure.

Students will also learn about how to responsibly work with ‘hacker tools,’ build sandbox environments, conduct research, and build their communication skills by learning how to craft final reports. Cyber and digital ethics are strictly enforced throughout this program.

Students will also engage with coursework that will prepare them for a range of industry certifications, including security-related ones such as CompTIA’s Security+ and EC-Council’s Certified Ethical Hacker (CEH). Please note: All core (CIS, ISTM) courses must be completed within 5 years of starting the program.

Program Outcomes

At the completion of this program, students should be able to:

  • Apply a penetration testing framework and methodology to find and act upon vulnerabilities in a given system
  • Be able to find, choose, and use the appropriate utility or series of steps for a given task or exploit in penetration testing activities
  • Produce a formal written assessment at the end of penetration testing activities to be given and used by a client
  • Perform preventative hardware and software maintenance
  • Troubleshoot and correct computer hardware and software problems
  • Conceptualize, design and diagram possible solutions for a given networking environment
  • Work with others as part of a computer security team
  • Assemble, reconfigure and upgrade personal computers
  • Perform basic network and operating system administration, configuration and system security for both wired and wireless networks
  • Configure and troubleshoot access to resources, hardware devices and drivers, storage use and network connections
  • Analyze internet security issues and apply them to network design problems
  • Communicate effectively and professionally in the information technology environment

For the most part, courses that fulfill general education requirements can be taken in any term. Students should work with the faculty adviser(s) to create a custom academic plan based on course placement levels, career goals, and full time/part time status.

Admitted students may also log on to Navigate to start the process of building an academic plan based on this major and can notify an adviser for review.

Plan of Study Grid
First QuarterCredits
ISTM100A Preparation For An Education in I.T. and Cybersecurity 1 (Course offered online) 1
ISTM183C Fundamentals of CyberSecurity 3
CIS151 Introduction to Networks 4
WR121 English Composition (Course offered online) 4
Second Quarter
ISTM100B Preparation For An Education in I.T. and Cybersecurity 2 (Course offered online) 1
ISTM183A Preparation for A+ Essentials 3
ISTM133P Introduction to Python (Course offered online) 4
CIS152 Switching, Routing and Wireless Essentials 4
Select one of the following: 4-6
Beginning Algebra II (Course offered online)  
Quantitative Reasoning I  
Third Quarter
ISTM100C Preparation For An Education in I.T. and Cybersecurity 3 (Course offered online) 1
ISTM183B Preparation for A+ Practical Application (Course offered online) 3
ISTM140L Preparation for Linux+ (Course offered online) 4
ISTM171 Introduction to Cloud and Virtualization Technologies (Course offered online) 3
CIS153 Enterprise Networking, Security, and Automation 4
ISTM197IIT Internet Infrastructure and Technologies (Course offered online) 3
Fourth Quarter
ISTM283CC Cyber Competition 3
ISTM189 Wireless Security (Course offered online) 3
CIS279S Windows Server OS 4
CIS276 SQL 4
Fifth Quarter
ISTM284E Ethical Hacking 3
ISTM233P Python for Cyber Security (Course offered online) 4
ISTM283B Firewall Implementation 3
CIS284S Preparation for Security+ (Course offered online) 4
Health and Physical Education requirement 3
Sixth Quarter
ISTM285E Advanced Ethical Hacking 3
ISTM285W Web Application Penetration Testing 3
ISTM283F Practical Digital Forensics 3
Capstone Project Development 1
or Coop Ed-Computer Applications
Human Relations Requirement 3-4
 Total Credits93-96