facebook twitter YouTube
Cyber Security

Are you computer savvy? Are you looking for a way to start your career as an information technology professional? If you want to receive the training necessary to work for businesses and organizations who need to protect valuable information and computer systems from hackers and viruses, our Cyber Security Associate of Applied Science is for you.

The courses you will take in the Cyber Security Associate of Applied Science degree program cover computer technology, networking fundamentals and ethical issues. You will learn how to protect electronic data through both offensive and defensive tactics. Firewalls, Virtual Private Networks and computer forensics are an integral part of the program. Computer maintenance courses are also offered, providing you with needed hardware knowledge. You will take courses covering Linux platforms, Microsoft operating systems and software suites, and Cisco networking systems. These courses will give you the knowledge you need to design security programs for a variety of organizations.

Area companies needing qualified security professionals include financial institutions such as banks, insurance companies, and accounting firms; educational institutions such as public school districts, private schools and colleges; area hospitals and medical offices; law offices; telecommunication companies such as cable, wireless carriers, and phone companies; municipal government offices; manufacturers; IT firms such as resellers, ISPs, software developers; and many other industries in the greater East Texas area.

The Cyber Security program requires that students demonstrate basic reading, writing and mathematical skills before enrolling.

Cyber Security Program Outcomes:

Graduates of the Associate of Applied Science in Cyber Security will:

  • Apply computer security and information assurance concepts covering threats and vulnerabilities, and will integrate prevention methods at hardware, software, and human levels.
  • Apply network security and information assurance concepts covering threats and vulnerabilities, and will integrate prevention methods at the hardware level.
  • Carry out duties and tasks with respect and consideration of legal factors, standard operating policies, and standard industry practices.
  • Conduct activities within safety protocols published by vendors and regulating agencies that minimize physical risk and damage to property or person.










Texas State Technical College Homepage Link Texas State Technical College Homepage Link Request Information En Espanol