Cybersecurity: Penetration Testing - Degree
Associate of Applied Science Degree Program | mhcc.edu/Cybersecurity
Tobin Shields: 503-491-7424 | Room AC2786 | Tobin.Shields@mhcc.edu
The reality is that defenders cannot protect themselves from attacks if they do not know how the attacks will be conducted. The Cybersecurity and Networking: Penetration Testing focus area takes students through a similar degree path as the core degree, but ends their experience with an Ethical Hacking and Penetration Testing-focused core that gets students working hands-on with exploits and vulnerabilities. Students will learn how to work with clients to launch an approved attack against small and medium-sized networks/systems in order to learn more about its vulnerabilities and conducts a risk assessment of IT infrastructure.
Students will also learn about how to responsibly work with ‘hacker tools,’ build sandbox environments, conduct research, and build their communication skills by learning how to craft final reports. Cyber and digital ethics are strictly enforced throughout this program.
Students will also engage with coursework that will prepare them for a range of industry certifications, including security-related ones such as CompTIA’s Security+ and EC-Council’s Certified Ethical Hacker (CEH). Please note: All core (CIS, ISTM) courses must be completed within 5 years of starting the program.
At the completion of this program, students should be able to:
- Apply a penetration testing framework and methodology to find and act upon vulnerabilities in a given system
- Be able to find, choose, and use the appropriate utility or series of steps for a given task or exploit in penetration testing activities
- Produce a formal written assessment at the end of penetration testing activities to be given and used by a client
- Perform preventative hardware and software maintenance
- Troubleshoot and correct computer hardware and software problems
- Conceptualize, design and diagram possible solutions for a given networking environment
- Work with others as part of a computer security team
- Assemble, reconfigure and upgrade personal computers
- Perform basic network and operating system administration, configuration and system security for both wired and wireless networks
- Configure and troubleshoot access to resources, hardware devices and drivers, storage use and network connections
- Analyze internet security issues and apply them to network design problems
- Communicate effectively and professionally in the information technology environment
For the most part, courses that fulfill general education requirements can be taken in any term. Students should work with the faculty adviser(s) to create a custom academic plan based on course placement levels, career goals, and full time/part time status.
Admitted students may also log on to Navigate to start the process of building an academic plan based on this major and can notify an adviser for review.
|CIS151||Introduction to Networks||4|
|ISTM183A||Preparation for A+ Essentials||3|
|ISTM183C||Fundamentals of CyberSecurity||3|
|WR121||English Composition (Course offered online)||4|
|CIS152||Routing and Switching Essentials||4|
|ISTM183B||Preparation for A+ Practical Application (Course offered online)||3|
|ISTM133P||Introduction to Python (Course offered online)||4|
|Human Relations requirement (HUM202 recommended)||3-4|
|CIS197HTM||Web Authoring: HTML5 and CSS3 (Course offered online)||3|
|ISTM140L||Preparation for Linux (Course offered online)||4|
|ISTM171||Introduction to Cloud and Virtualization Technologies (Course offered online)||3|
|MTH111||Pre-Calculus I: Elementary Functions (Course offered online)||5|
|CIS279S||Windows Server OS||4|
|ISTM189||Wireless Security (Course offered online)||3|
|Introduction to Business (Course offered online)
or Business Project Management
|3 - 4|
|CIS284S||Preparation for Security+ (Course offered online)||4|
|Health and Physical Education requirement||3|
|ISTM283F||Practical Digital Forensics||3|
|ISTM285E||Advanced Ethical Hacking||3|
|ISTM285W||Web Application Penetration Testing||3|
|ISTM233P||Python for Cyber Security (Course offered online)||4|
|Capstone Project Development 1
or Coop Ed-Computer Applications
Students planning to transfer to a four-year university should take CIS297, while those planning to enter the workforce after graduation should take WE280CAD.
Course offered online
Cultural Literacy course