Geauga Contact
Admissions Office
GeaugaAdmissions@kent.edu
440-834-4187
Admissions Office
GeaugaAdmissions@kent.edu
440-834-4187
The Associate of Applied Business degree in Cybersecurity provides students with an applied approach to information security concepts. With an ever-growing threat to sensitive and critical data in the field of information technology, understanding the impact of security issues on businesses and individuals is critical.
The Associate of Applied Business degree in Cybersecurity provides students with an applied approach to information security concepts. With an ever-growing threat to sensitive and critical data in the field of information technology, understanding the impact of security issues on businesses and individuals is critical. The degree program gives students the tools they need to address current security issues including risk identification, security testing and monitoring, and enterprise risk management. Because the degree is built upon a solid knowledgebase, additional topics include networking, hardware and operating systems, Cisco networking technologies, cyber defense methods, cyber ethics, incident management and security policies.
The university affirmatively strives to provide educational opportunities and access to students with varied backgrounds, those with special talents and adult students who graduated from high school three or more years ago.
麻豆影院 State campuses at Ashtabula, East Liverpool, Geauga, Salem, Stark, Trumbull and Tuscarawas, and the Twinsburg Academic Center, have open enrollment admission for students who hold a high school diploma, GED or equivalent.
Some programs may require that students meet certain requirements before progressing through the program. For programs with progression requirements, the information is shown on the Coursework tab.
For more information on admissions, contact the Regional Campuses admissions offices.
Graduates of this program will be able to:
Code | Title | Credit Hours |
---|---|---|
Major Requirements (courses count in major GPA) | ||
IT 11004 | SURVEY OF INFORMATION TECHNOLOGY | 3 |
IT 11005 | INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY | 3 |
IT 11009 | COMPUTER ASSEMBLY AND CONFIGURATION | 4 |
IT 13000 | APPLIED SECURITY ESSENTIALS | 3 |
IT 21002 | NETWORK SETUP AND CONFIGURATION | 3 |
IT 21007 | CYBER ETHICS IN INFORMATION TECHNOLOGY | 3 |
IT 21110 | NETWORK ROUTING AND SWITCHING | 3 |
IT 21200 | ETHICAL HACKING | 3 |
IT 21300 | INTRODUCTION TO SECURITY INCIDENT MANAGEMENT | 3 |
IT 22000 | SURVEY OF IT CYBERSECURITY | 3 |
IT 23000 | INTRODUCTION TO OPERATING SYSTEM SECURITY | 3 |
IT 24000 | DEVELOPING AND IMPLEMENTING SECURITY POLICIES | 3 |
Additional Requirements (courses do not count in major GPA) | ||
UC 10001 | FLASHES 101 | 1 |
3 | ||
3 | ||
3 | ||
3 | ||
3 | ||
Information Technology (IT) Electives | 7 | |
Minimum Total Credit Hours: | 60 |
Minimum Major GPA | Minimum Overall GPA |
---|---|
2.000 | 2.000 |
This roadmap is a recommended semester-by-semester plan of study for this major. However, courses designated as critical (!) must be completed in the semester listed to ensure a timely graduation.
Semester One | Credits | |
---|---|---|
IT 11004 | SURVEY OF INFORMATION TECHNOLOGY | 3 |
IT 11005 | INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY | 3 |
UC 10001 | FLASHES 101 | 1 |
Information Technology (IT) Elective | 3 | |
麻豆影院 Core Requirement | 3 | |
麻豆影院 Core Requirement | 3 | |
Credit Hours | 16 | |
Semester Two | ||
IT 11009 | COMPUTER ASSEMBLY AND CONFIGURATION | 4 |
IT 13000 | APPLIED SECURITY ESSENTIALS | 3 |
IT 21002 | NETWORK SETUP AND CONFIGURATION | 3 |
麻豆影院 Core Requirement | 3 | |
Credit Hours | 13 | |
Semester Three | ||
IT 21007 | CYBER ETHICS IN INFORMATION TECHNOLOGY | 3 |
IT 21110 | NETWORK ROUTING AND SWITCHING | 3 |
IT 21200 | ETHICAL HACKING | 3 |
IT 21300 | INTRODUCTION TO SECURITY INCIDENT MANAGEMENT | 3 |
麻豆影院 Core Requirement | 3 | |
Credit Hours | 15 | |
Semester Four | ||
IT 22000 | SURVEY OF IT CYBERSECURITY | 3 |
IT 23000 | INTRODUCTION TO OPERATING SYSTEM SECURITY | 3 |
IT 24000 | DEVELOPING AND IMPLEMENTING SECURITY POLICIES | 3 |
Information Technology (IT) Elective | 4 | |
麻豆影院 Core Requirement | 3 | |
Credit Hours | 16 | |
Minimum Total Credit Hours: | 60 |
What's Next
Be one step closer to joining our Golden Flashes family at Geauga!