This program can be completed in its entirety at Kent State Ashtabula.
Ashtabula Campus Contact
Academic Advising
Enrollment Management & Student Services
Suite 110A Main Hall
Phone: 440-964-4217
Email: acadvising@kent.edu
This program can be completed in its entirety at Kent State Ashtabula.
Academic Advising
Enrollment Management & Student Services
Suite 110A Main Hall
Phone: 440-964-4217
Email: acadvising@kent.edu
The Associate of Applied Business degree in Cybersecurity provides students with an applied approach to information security concepts. With an ever-growing threat to sensitive and critical data in the field of information technology, understanding the impact of security issues on businesses and individuals is critical.
The Associate of Applied Business degree in Cybersecurity provides students with an applied approach to information security concepts. With an ever-growing threat to sensitive and critical data in the field of information technology, understanding the impact of security issues on businesses and individuals is critical. The degree program gives students the tools they need to address current security issues including risk identification, security testing and monitoring, and enterprise risk management. Because the degree is built upon a solid knowledgebase, additional topics include networking, hardware and operating systems, Cisco networking technologies, cyber defense methods, cyber ethics, incident management and security policies.
The university affirmatively strives to provide educational opportunities and access to students with varied backgrounds, those with special talents and adult students who graduated from high school three or more years ago.
Kent State campuses at Ashtabula, East Liverpool, Geauga, Salem, Stark, Trumbull and Tuscarawas, and the Twinsburg Academic Center, have open enrollment admission for students who hold a high school diploma, GED or equivalent.
Some programs may require that students meet certain requirements before progressing through the program. For programs with progression requirements, the information is shown on the Coursework tab.
For more information on admissions, contact the Regional Campuses admissions offices.
Graduates of this program will be able to:
Code | Title | Credit Hours |
---|---|---|
Major Requirements (courses count in major GPA) | ||
IT 11004 | SURVEY OF INFORMATION TECHNOLOGY | 3 |
IT 11005 | INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY | 3 |
IT 11009 | COMPUTER ASSEMBLY AND CONFIGURATION | 4 |
IT 13000 | APPLIED SECURITY ESSENTIALS | 3 |
IT 21002 | NETWORK SETUP AND CONFIGURATION | 3 |
IT 21007 | CYBER ETHICS IN INFORMATION TECHNOLOGY | 3 |
IT 21110 | NETWORK ROUTING AND SWITCHING | 3 |
IT 21200 | ETHICAL HACKING | 3 |
IT 21300 | INTRODUCTION TO SECURITY INCIDENT MANAGEMENT | 3 |
IT 22000 | SURVEY OF IT CYBERSECURITY | 3 |
IT 23000 | INTRODUCTION TO OPERATING SYSTEM SECURITY | 3 |
IT 24000 | DEVELOPING AND IMPLEMENTING SECURITY POLICIES | 3 |
Additional Requirements (courses do not count in major GPA) | ||
UC 10001 | FLASHES 101 | 1 |
Kent Core Composition | 3 | |
Kent Core Mathematics and Critical Reasoning | 3 | |
Kent Core Humanities and Fine Arts | 3 | |
Kent Core Social Sciences | 3 | |
Kent Core Basic Sciences | 3 | |
Information Technology (IT) Electives | 7 | |
Minimum Total Credit Hours: | 60 |
Minimum Major GPA | Minimum Overall GPA |
---|---|
2.000 | 2.000 |
This roadmap is a recommended semester-by-semester plan of study for this major. However, courses designated as critical (!) must be completed in the semester listed to ensure a timely graduation.
Semester One | Credits | |
---|---|---|
IT 11004 | SURVEY OF INFORMATION TECHNOLOGY | 3 |
IT 11005 | INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY | 3 |
UC 10001 | FLASHES 101 | 1 |
Information Technology (IT) Elective | 3 | |
Kent Core Requirement | 3 | |
Kent Core Requirement | 3 | |
Credit Hours | 16 | |
Semester Two | ||
IT 11009 | COMPUTER ASSEMBLY AND CONFIGURATION | 4 |
IT 13000 | APPLIED SECURITY ESSENTIALS | 3 |
IT 21002 | NETWORK SETUP AND CONFIGURATION | 3 |
Kent Core Requirement | 3 | |
Credit Hours | 13 | |
Semester Three | ||
IT 21007 | CYBER ETHICS IN INFORMATION TECHNOLOGY | 3 |
IT 21110 | NETWORK ROUTING AND SWITCHING | 3 |
IT 21200 | ETHICAL HACKING | 3 |
IT 21300 | INTRODUCTION TO SECURITY INCIDENT MANAGEMENT | 3 |
Kent Core Requirement | 3 | |
Credit Hours | 15 | |
Semester Four | ||
IT 22000 | SURVEY OF IT CYBERSECURITY | 3 |
IT 23000 | INTRODUCTION TO OPERATING SYSTEM SECURITY | 3 |
IT 24000 | DEVELOPING AND IMPLEMENTING SECURITY POLICIES | 3 |
Information Technology (IT) Elective | 4 | |
Kent Core Requirement | 3 | |
Credit Hours | 16 | |
Minimum Total Credit Hours: | 60 |
What's Next
Be one step closer to joining our Golden Flashes family at Ashtabula!