Cyber Security is a field that involves protecting the confidentiality, integrity and availability of information. The Quincy College Cyber Security program is an interdisciplinary Associates Degree program incorporating business, networking, law, and computer programming courses for individuals preparing for a career in Cyber Security.
At the completion of this program, the student should be able to:
Demonstrate security assessment techniques.
Mitigate cyber threats identified using the risk management process.
Explain the ethical responsibilities organizations have to protect an individual’s private data and describe how to secure that data.
Demonstrate knowledge of cybersecurity principles and methods.
Design a secure network using firewalls, encryption, and other technologies.
Configure and secure a Linux-based web server.
Describe how to conduct an investigation, secure an incident, and prepare for an evidence search.
Use forensic data acquisition tools.
Describe the theory of operation for file systems and network intrusion detection/protection systems.
Analyze various configuration, data, and log files.
Academic Division of Professional Programs
Computer Science: Cyber Security Courses
Introduction to Programming
This course is designed to provide the background necessary for an understanding of computers and computer languages. Programming assignments introduce the student to methods of problem solving, programming logic, development of algorithms, coding in C, debugging and documenting programs. Topics include an overview of computer organization, simple data structures, and file management.
Introduction to the concepts, technology, and implementation of computer communication. Topics discussed are distributed systems requirements, network architecture, communications protocols, local and wide area networks, data transmission, digital multiplexing, data switching, and characteristics of transmission media, modems, design of information flow, and message and packet switching.
Developing computer technology has led to the development of new law relative to both the acquisition of information and doing business in cyberspace. This course will explore the legal issues arising from those changes. While focused primarily on business applications, the material covered will include contracts and torts related to the Internet, intellectual property rights, security, and privacy rights of the Internet user. Court decisions, statutes and administrative rulings will be presented.
Computer Systems Security
This course introduces student to the concepts of computer and network security with applications. Topics include authentication, securing Web and file transfer applications, cryptography, firewalls and other devices and network topologies. Prerequisite: CSI 217 and CSI 244 or permission of instructor.
An introductory course in business ethics focusing on what business relationships are and ought to be with the various constituencies in which business operates. Through the use of case analysis, the student will develop a means of arriving at decisions that he or she can feel are “right,” “proper,” and “just.” Placement at ENG 101 level strongly advised.
Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and exciting skill. This course first introduces the fundamental building blocks that form a modern network, such as protocols, topologies, hardware, and network operating systems. It then provides in-depth coverage of the most important concepts in contemporary networking, such as TCP/IP, Ethernet, wireless transmission, and security. The course will prepare a student to select the best network design, hardware, and software for his or her environment. Students will also acquire the skills to build a network from scratch and maintain, upgrade, and troubleshoot an existing network. Prerequisite: CSI 244.
UNIX with Linux
Introduction to UNIX operating system. Practical explorations of the basics of UNIX system concepts, architecture, and administration. Uses Linux, a PC-compatible clone of UNIX to reinforce shell programming concepts and utilities with real-world applications.
Linux System Administration
This course introduces students to the principles of computer system administration in a Linux environment. It builds on the knowledge learned in UNIX With Linux (CSI 226). System administration topics include managing user accounts, storage, and software configuration; web hosting; performance analysis; and security. Prerequisites: CSI 226.
Computer forensics is the discipline that combines elements of computer science and law to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law. This course includes hands-on exercises in computer forensics analysis and validation, data acquisition, and network forensics. Forensics methods for personal computers, mobile devices, IoT devices, email, social media, and cloud computing are discussed. Prerequisites: CSI 226, CSI 242, & CSI 245
This course explores the concepts of operating systems and their relationship to computer architecture. Topics include concurrent processing, scheduling, memory management, file systems, device management, and resource allocation. Prerequisite: CSI 116.