Academic Advising/
Student Services
330-675-8860
trumbulladvisor@kent.edu
330-675-8860
trumbulladvisor@kent.edu
ºÚÁϳԹÏÍø's Associate of Applied Business in Cybersecurity provides students with the technical skills and knowledge necessary to protect organizations from cyber threats and ensure data security. The program covers critical topics such as network security, ethical hacking, digital forensics, and risk management, preparing students to tackle the growing challenges in the cybersecurity field. Through hands-on experience and industry-relevant coursework, students learn to identify vulnerabilities, prevent cyberattacks, and respond to security breaches. Graduates are well-equipped for entry-level positions in IT security, network administration, and information security, with a solid foundation for further education or certification in the cybersecurity field.
The Associate of Applied Business degree in Cybersecurity provides students with an applied approach to information security concepts. With an ever-growing threat to sensitive and critical data in the field of information technology, understanding the impact of security issues on businesses and individuals is critical. The degree program gives students the tools they need to address current security issues including risk identification, security testing and monitoring, and enterprise risk management. Because the degree is built upon a solid knowledgebase, additional topics include networking, hardware and operating systems, Cisco networking technologies, cyber defense methods, cyber ethics, incident management and security policies.
The university affirmatively strives to provide educational opportunities and access to students with varied backgrounds, those with special talents and adult students who graduated from high school three or more years ago.
ºÚÁϳԹÏÍø campuses at Ashtabula, East Liverpool, Geauga, Salem, Stark, Trumbull and Tuscarawas, and the Twinsburg Academic Center, have open enrollment admission for students who hold a high school diploma, GED or equivalent.
Some programs may require that students meet certain requirements before progressing through the program. For programs with progression requirements, the information is shown on the Coursework tab.
For more information on admissions, contact the Regional Campuses admissions offices.
Graduates of this program will be able to:
Code | Title | Credit Hours |
---|---|---|
Major Requirements (courses count in major GPA) | ||
IT 11004 | SURVEY OF INFORMATION TECHNOLOGY | 3 |
IT 11005 | INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY | 3 |
IT 11009 | COMPUTER ASSEMBLY AND CONFIGURATION | 4 |
IT 13000 | APPLIED SECURITY ESSENTIALS | 3 |
IT 21002 | NETWORK SETUP AND CONFIGURATION | 3 |
IT 21007 | CYBER ETHICS IN INFORMATION TECHNOLOGY | 3 |
IT 21110 | NETWORK ROUTING AND SWITCHING | 3 |
IT 21200 | ETHICAL HACKING | 3 |
IT 21300 | INTRODUCTION TO SECURITY INCIDENT MANAGEMENT | 3 |
IT 22000 | SURVEY OF IT CYBERSECURITY | 3 |
IT 23000 | INTRODUCTION TO OPERATING SYSTEM SECURITY | 3 |
IT 24000 | DEVELOPING AND IMPLEMENTING SECURITY POLICIES | 3 |
Additional Requirements (courses do not count in major GPA) | ||
UC 10001 | FLASHES 101 | 1 |
3 | ||
3 | ||
3 | ||
3 | ||
3 | ||
Information Technology (IT) Electives | 7 | |
Minimum Total Credit Hours: | 60 |
Minimum Major GPA | Minimum Overall GPA |
---|---|
2.000 | 2.000 |
This roadmap is a recommended semester-by-semester plan of study for this major. However, courses designated as critical (!) must be completed in the semester listed to ensure a timely graduation.
Semester One | Credits | |
---|---|---|
IT 11004 | SURVEY OF INFORMATION TECHNOLOGY | 3 |
IT 11005 | INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY | 3 |
UC 10001 | FLASHES 101 | 1 |
Information Technology (IT) Elective | 3 | |
Kent Core Requirement | 3 | |
Kent Core Requirement | 3 | |
Credit Hours | 16 | |
Semester Two | ||
IT 11009 | COMPUTER ASSEMBLY AND CONFIGURATION | 4 |
IT 13000 | APPLIED SECURITY ESSENTIALS | 3 |
IT 21002 | NETWORK SETUP AND CONFIGURATION | 3 |
Kent Core Requirement | 3 | |
Credit Hours | 13 | |
Semester Three | ||
IT 21007 | CYBER ETHICS IN INFORMATION TECHNOLOGY | 3 |
IT 21110 | NETWORK ROUTING AND SWITCHING | 3 |
IT 21200 | ETHICAL HACKING | 3 |
IT 21300 | INTRODUCTION TO SECURITY INCIDENT MANAGEMENT | 3 |
Kent Core Requirement | 3 | |
Credit Hours | 15 | |
Semester Four | ||
IT 22000 | SURVEY OF IT CYBERSECURITY | 3 |
IT 23000 | INTRODUCTION TO OPERATING SYSTEM SECURITY | 3 |
IT 24000 | DEVELOPING AND IMPLEMENTING SECURITY POLICIES | 3 |
Information Technology (IT) Elective | 4 | |
Kent Core Requirement | 3 | |
Credit Hours | 16 | |
Minimum Total Credit Hours: | 60 |
What's Next
Be one step closer to joining our Golden Flashes family at Trumbull!