AAS Cyber Security

Overview

About this Degree

Cyber Security prepares students for employment in a variety of in-demand positions related to cyber and information security. The required courses in the program cover current cyber coursework including network security and defense, ethical hacking, and digital forensics.

Pursue Your Goals

A Cyber Security Associate Degree can be a first great step in qualifying for an entry-level position in the field of cyber security. Your studies can help you train to be analytical and detail-oriented. According to the Bureau of Labor Statistics, computer and information technology jobs are set to grow at 11% over the next 10 years, much faster than the average for all occupations.

Common cyber security careers in this field include:

  • Cyber Security Analyst
  • Information Technology Security Analyst
  • Network Security Analyst

Courses

Transfer Credit In

Courses from other accredited institutions can be transferred and used to earn your degree at CNM. Previous CIS or other CTE may be evaluated for credit at CNM.

Transfer Credit Out

CNM Online associate degrees transfer to participating four-year colleges in New Mexico. Some restrictions apply.

------------

All courses are 3 credits, except for the Laboratory Science Requirement at 4 credits, and the Capstone Course at 1 credit.

Fundamentals of Information Literacy and Systems 
BCIS 1110
Examination of information systems and their impact on commerce, education, and personal activities. Utilization of productivity tools for communications, data analysis, information management, and decision-making. 

CS for All: Introduction to Computer Modeling
CSCI 1108
Introduction to Computational Science using modeling and simulation. Apply the fundamentals of computational thinking to solve a realistic problem of interdisciplinary environment. Employing lab activities integrated into the course, students will learn the agent-based programming language to formulate their problem modules, experiment to find solutions, and evaluate the results. Students will practice cycling through the formulation, experiment, and evaluation process for a realistic conclusion.

Introduction to Business
BUSA 1110
Fundamental concepts and terminology of business including areas such as management, marketing, accounting, economics, personnel, and finance; and the global environment in which they operate.

Business Professionalism
BUSA 1130
Focuses on developing professional behavior appropriate for the business environment. Topics include: life management, goal setting, workplace etiquette, job search skills, interviewing, teamwork and team building, motivation, leadership, business communication and workplace interaction.

IT Essentials: Hardware 
CIS 1410 
Covers PC hardware and peripherals, mobile device hardware, networking and troubleshooting hardware, and network connectivity issues. The basics of computer hardware technologies are introduced in a lab-oriented environment and will assist in preparation for the CompTIA A+ Hardware certification.

Introduction to Cyber Security 
CIS 1858 
This course is an overview of the field of Cyber Security and cyber areas.  It will cover terminology, principles, best practices, and ethics which will provide a foundation for understanding detailed aspects of the weaknesses, attacks, and defenses used to attack or protect critical infrastructure. The course is designed as a starting point for IT, business and health care management professionals to help develop a cyber security mindset in both professional and personal lives.

Python Programming I 
CIS 1250 
Introduces the Python programming language. The course provides a basic overview of the language and includes setting up the Python environment. We cover the various use of Python, including scripting, classes and objects and building Graphic User Interfaces. Students will research other technical fields where Python scripting is used. Time will be spent building programs using Python’s comprehensive standard library.

Network Essentials 
CIS 1415 
Focuses on the installation and administration of network communication systems. Students will learn the general theory of network communications and basic setup, configuration, and management of network communication protocols on networking devices, including servers, routers, and switches.

IT Essentials: Software 
CIS 1610 
Covers common features and functionality of known operating systems, system management, file management, common security threats and vulnerabilities. The basics of computer software technologies are introduced in a lab-oriented environment and will assist in preparation for the CompTIA A+ Software certification.

Linux Essentials 
CIS 1680 
Introduces the Linux operating system with emphasis on command line application. Students will learn management of the Linux file system, processes, storage devices, users, and groups. Learning objectives also include configuration of boot activity, network, and printers. 

Laboratory Science Requirement
See the Catalog for more information.

Computer Security
CIS 2670 
Focuses on an overview of network and computer security. Topics included are general security concepts, communication security, infrastructure security, operational and organizational security.

Linux Administration 
CIS 2680 
Hands-on instruction of Linux system administration with an emphasis on security and performance. Prepares students to work as professional Linux system administrators. Learn the key principles to install and manage virtual machines, both their performance and security. Learn advanced networking concepts, including clustering and high availability.

Communications Requirement
See the Catalog for more information.

Humanities Requirement
See the Catalog for more information.

Social and Behavioral Science Requirement
See the Catalog for more information.

Mathematics Requirement
See the Catalog for more information.

Network Defense Basics 
CIS 2853 
This course will provide fundamental skills needed to analyze the internal and external security threats against a computer network. Students will learn how to evaluate network and internet security issues and design, and how to implement successful security policies and firewall strategies to defend against system and network vulnerabilities.

Ethical Hacking 
CIS 2857 
This course examines the tools, techniques, and technologies used in the technical securing of information assets. Students will receive in-depth information about the software and hardware components of Information Security and Assurance. Students will be immersed into the Hacker Mindset so they will be able to defend against cyber security attacks.

Digital Forensics 
CIS 2860 
Presents students a structured approach to computer forensics and evidence analysis. Students will acquire the necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation.

Capstone Course 
CIS 2999 
Focuses on assessment of student learning outcomes for program of study.

Technical Communications 
ENGL 1210 
This is an introductory study of written and verbal communications used in the technical professions with emphasis in the planning, execution, and editing of professional and technical documents and other communication media. This course is not a substitute for ENGL 2210 and generally applies to particular associate degree programs or as an elective credit. Students are encouraged to speak with an advisor about the applicability of this course. 

Professional and Technical Communication 
ENGL 2210 
Professional and Technical Communication will introduce students to the different types of documents and correspondence that they will create in their professional careers.  This course emphasizes the importance of audience, document design, and the use of technology in designing, developing, and delivering documents.  This course will provide students with experience in professional correspondence and communicating technical information to a non-technical audience.

Program Approved Elective 
See the Catalog for more information.

Careers & Outcomes

Jobs in the Field

  • Security System Administrator

  • Cyber Data Analyst

  • Information Security Associate

  • Programmer

  • Computer Support Specialist

  • Information and Assurance Engineer

  • Network Support Engineer

  • Web Developer

Learning Outcomes

Upon successful completion of this program, you'll be able to:

  • Create a threat model for a given scenario, identifying assets, threats, and mitigations.

  • Apply principles of secure system design to host and network security scenarios.

  • Use derived requirements such as authentication and access control to secure systems and networks.

  • Perform forensic analysis of systems and create a report of results.

Get Started

The CNM Online application process is easy and straightforward.
REQUEST INFORMATION GET STARTED