SlideShare a Scribd company logo
1 of 2
Download to read offline
CYBER/COMPUTER/INFO SECURITY 
Whatcom Community College and Western 
Washington University have partnered to offer 
a new baccalaureate degree in Computer and 
Information Systems Security (CISS), available for 
students to start now. 
Exciting new opportunity in 
COMMUNITY COLLEGE 
Partial support for this work was provided by the National Science Foundation’s Scholarship for Service (SFS) program under Award No. 1241624. Any opinions, findings, and 
conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. 
Start at WCC 
Associate in Applied Science-Transfer (AAS-T) in 
Cybersecurity (91 Credits) 
Whatcom’s Cybersecurity AAS-T program prepares 
students to enter into the workforce in a variety 
of IT positions, including high-demand security-related 
fields, or apply to continue their education at 
Western to earn the CISS Bachelor of Science degree. 
Mid-level Positions - $26.60/hour and up: 
u Computer Support Specialist 
u Network Support Specialist 
u Information Security Analyst/Specialist 
u Network and Computer Systems Administrator 
u Computer Network Architect 
u Other Computer/IT Occupations 
Continue on at WWU 
Bachelor of Science (B.S.) in Computer and 
Information Systems Security 
(Additional 92 Credits) 
Graduates of Western’s CISS bachelor’s degree 
will be prepared to fill the urgent need for trained 
personnel in professional, high-wage positions. 
Advanced Positions-$40.81/hour and up: 
u Network and Computer Systems 
Security Administrator 
u Computer Network Architect 
u Computer and Information Systems Manager 
u Secure Software Development Specialist 
u Digital Forensic Specialist 
For more information about this exciting opportunity and to 
start developing the right plan for you, make an appointment 
with an academic advisor today! 
WWC: WWU: 
Dave Knapp Jenny Hebert 
(360) 383-3080 (360) 650-7780 
dknapp@whatcom.ctc.edu jenny.hebert@wwu.edu
Associate in Applied Science – 
Transfer (AAS-T) - Cybersecurity 
Whatcom Community College’s Cybersecurity AAS-T program prepares students to transfer to four-year degree programs at certain colleges and universities in a variety of high-demand security-related fields, including cybersecurity, computer information systems security, computer forensics, information security engineering and information security analysis. Students with prior experience are encouraged to meet with the program coordinator for placement in the program. 
PREREQUISITE: CIS 105 with a C (2.0) grade or better is required for admission to the core requirements. 
GENERAL EDUCATION REQUIREMENTS/RELATED INSTRUCTION 
Course ID Course Title Credits 
CS 140 Computer Programming Fundamentals I 5 
CS 145 Computer Programming Fundamentals II 5 
CIS 106 Open Source Operating Systems 5 
CIS 110 Introduction to Computer Security 3 
CIS 116 Virtualization 3 
CIS 205 Computer Operating Systems II 5 
CIS 214 Network Security I 5 
CIS 215 Network Security II 5 
CIS 216 Industrial Control Systems Security 5 
CIS 226 Cisco Networking I 5 
CIS 227 Cisco Networking II 5 
CIS 228 Cisco Networking III 5 
CIS 229 Cisco Networking IV 5 
Total 61 
Course ID Course Title Credits 
ENGL& 101 English Composition I 5 
MATH& 141 Precalculus I 5 
MATH& 142 Precalculus II 5 
Math& 151 Calculus I 5 
Choose two courses from: 
BUS& 201 Business Law 5 
PHIL 130 Introduction to Ethics 5 
PHYS& 221 Engineering Physics I 5 
POLS& 202 American Government 5 
Total 30 
TOTAL CREDITS 91 
Bachelor of Science (B.S.) - Computer and Information Systems Security 
Western Washington University’s College of Science and Engineering new baccalaureate degree pathway in Computer and Information Systems Security will prepare graduates to fill the urgent need for trained personnel in professional roles such as computer network security administrator, secure software development specialist or digital forensic practitioner. 
Students must first complete the AAS-T degree in Cybersecurity at WCC with a GPA of 2.5 or better and apply to be accepted to both WWU and the CISS degree program. 
REQUIRED COMPUTER INFORMATION SYSTEMS 
SECURITY (CISS) COURSES 
Course ID Course Title Credits 
CISS 247 Computer Systems I 5 
CISS 301 Formal Languages and Functional Programming 5 
CISS 349 Computer System Administration 4 
CISS 360 Operating Systems Concepts 3 
CISS 461 Computer Security 4 
CISS 495 Computer Security Project 3 
Total 24 
REQUIRED SUPPORT COURSES 
Course ID Course Title Credits 
ENG 302 Introduction to Technical Writing 5 
ISTM 201 Science Literacy 3 
MATH 125 Calculus and Analytic Geometry II 5 
MATH 341 Probability and Statistical Inference 4 
PHYS 162 Physics and Calculus II 5 
Total 22 
CISS ELECTIVES (choose four courses) 
Course ID Course Title Credits 
CISS 346 Secure Software Development 4 
CISS 421 Computer Forensics 4 
CISS 422 Dynamic Analysis of Software 4 
CISS 423 Software Reverse Engineering 4 
CISS 464 Penetration Testing 4 
CISS 469 Advanced Network System Security 4 
CISS 478 Cryptographic Techniques 4 
Total 16 
RECOMMENDED GUR COURSES 
Course ID Course Title Credits 
JOUR 190 Introduction to Mass Media 5 
JOUR 375 Diversity, Mass Media & Social Change 4 
LBRL 325 Surveillance, Voyeurism and the Culture of Suspicion 4 
MGMT 271 Law and the Business Environment 4 
PHIL 360 Society, Law and Morality 3 
PLSC 250 The American Political System 5 
PLSC 346 Politics of Inequality 5 
Total 30 
TOTAL CREDITS 92 
CORE REQUIREMENTSCOMMUNITY COLLEGE 
8/14

More Related Content

Similar to Cybersecurity brochure flyer version-small

GSU IT Program Fact Sheet
GSU IT Program Fact SheetGSU IT Program Fact Sheet
GSU IT Program Fact SheetWilliam Roman
 
Saint leo university Cybersecurity
Saint leo university CybersecuritySaint leo university Cybersecurity
Saint leo university CybersecurityAbhishek Bajaj
 
Saint Leo University by Study Metro
Saint Leo University by Study MetroSaint Leo University by Study Metro
Saint Leo University by Study MetroAbhishek Bajaj
 
UMBC undergraduate computer science program
UMBC undergraduate computer science programUMBC undergraduate computer science program
UMBC undergraduate computer science programTim Finin
 
Everything you ever wanted ever know webinar
Everything you ever wanted ever know webinarEverything you ever wanted ever know webinar
Everything you ever wanted ever know webinarKevinAlt1
 
Query Individual AssignmentPrepare a query to report courses t.docx
Query Individual AssignmentPrepare a query to report courses t.docxQuery Individual AssignmentPrepare a query to report courses t.docx
Query Individual AssignmentPrepare a query to report courses t.docxmakdul
 
PMD PPT 7.21.21
PMD PPT 7.21.21PMD PPT 7.21.21
PMD PPT 7.21.21KevinAlt1
 
Saint leo university Computer science 3+1
Saint leo university Computer science 3+1Saint leo university Computer science 3+1
Saint leo university Computer science 3+1Abhishek Bajaj
 
Webinar slides nov 2021 brad sims for slideshare
Webinar slides nov 2021 brad sims for slideshareWebinar slides nov 2021 brad sims for slideshare
Webinar slides nov 2021 brad sims for slideshareCapitolTechU
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookCalvin Sam
 
Study Master of cyber security with Scholarship
Study Master of cyber security with ScholarshipStudy Master of cyber security with Scholarship
Study Master of cyber security with Scholarshipnewedgecs
 
Erau cybersecurity and security degrees
Erau cybersecurity and security degreesErau cybersecurity and security degrees
Erau cybersecurity and security degreesERAUWebinars
 
Module 3
Module 3 Module 3
Module 3 EX28
 
datacenter_data_sheet
datacenter_data_sheetdatacenter_data_sheet
datacenter_data_sheetTony Rogers
 
Ritchie Webinar 7.7.22.pptx
Ritchie Webinar 7.7.22.pptxRitchie Webinar 7.7.22.pptx
Ritchie Webinar 7.7.22.pptxKevin995584
 
CISSP Vs. CISA Which is better for you.pdf
CISSP Vs. CISA Which is better for you.pdfCISSP Vs. CISA Which is better for you.pdf
CISSP Vs. CISA Which is better for you.pdfInfosec Train
 

Similar to Cybersecurity brochure flyer version-small (20)

GSU IT Program Fact Sheet
GSU IT Program Fact SheetGSU IT Program Fact Sheet
GSU IT Program Fact Sheet
 
Saint leo university Cybersecurity
Saint leo university CybersecuritySaint leo university Cybersecurity
Saint leo university Cybersecurity
 
Saint Leo University by Study Metro
Saint Leo University by Study MetroSaint Leo University by Study Metro
Saint Leo University by Study Metro
 
itns
itnsitns
itns
 
UMBC undergraduate computer science program
UMBC undergraduate computer science programUMBC undergraduate computer science program
UMBC undergraduate computer science program
 
Everything you ever wanted ever know webinar
Everything you ever wanted ever know webinarEverything you ever wanted ever know webinar
Everything you ever wanted ever know webinar
 
Query Individual AssignmentPrepare a query to report courses t.docx
Query Individual AssignmentPrepare a query to report courses t.docxQuery Individual AssignmentPrepare a query to report courses t.docx
Query Individual AssignmentPrepare a query to report courses t.docx
 
PMD PPT 7.21.21
PMD PPT 7.21.21PMD PPT 7.21.21
PMD PPT 7.21.21
 
Saint leo university Computer science 3+1
Saint leo university Computer science 3+1Saint leo university Computer science 3+1
Saint leo university Computer science 3+1
 
Webinar slides nov 2021 brad sims for slideshare
Webinar slides nov 2021 brad sims for slideshareWebinar slides nov 2021 brad sims for slideshare
Webinar slides nov 2021 brad sims for slideshare
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
 
Infobroschuere
InfobroschuereInfobroschuere
Infobroschuere
 
Study Master of cyber security with Scholarship
Study Master of cyber security with ScholarshipStudy Master of cyber security with Scholarship
Study Master of cyber security with Scholarship
 
Datasheet
DatasheetDatasheet
Datasheet
 
Erau cybersecurity and security degrees
Erau cybersecurity and security degreesErau cybersecurity and security degrees
Erau cybersecurity and security degrees
 
Module 3
Module 3 Module 3
Module 3
 
Advanced cyber security course – CIQ
Advanced cyber security course – CIQAdvanced cyber security course – CIQ
Advanced cyber security course – CIQ
 
datacenter_data_sheet
datacenter_data_sheetdatacenter_data_sheet
datacenter_data_sheet
 
Ritchie Webinar 7.7.22.pptx
Ritchie Webinar 7.7.22.pptxRitchie Webinar 7.7.22.pptx
Ritchie Webinar 7.7.22.pptx
 
CISSP Vs. CISA Which is better for you.pdf
CISSP Vs. CISA Which is better for you.pdfCISSP Vs. CISA Which is better for you.pdf
CISSP Vs. CISA Which is better for you.pdf
 

More from Meg Weber

Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
Department of Homeland Security Guidance
Department of Homeland Security GuidanceDepartment of Homeland Security Guidance
Department of Homeland Security GuidanceMeg Weber
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secureMeg Weber
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityMeg Weber
 
DHS Guidelines
DHS GuidelinesDHS Guidelines
DHS GuidelinesMeg Weber
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance RecommendationsMeg Weber
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4Meg Weber
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risksMeg Weber
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcementMeg Weber
 
Welcome to the Cyber Risk Summit
Welcome to the Cyber Risk SummitWelcome to the Cyber Risk Summit
Welcome to the Cyber Risk SummitMeg Weber
 
WCC Programs Overview
WCC Programs OverviewWCC Programs Overview
WCC Programs OverviewMeg Weber
 
Audit summary from security solutions and ovation tech
Audit summary from security solutions and ovation techAudit summary from security solutions and ovation tech
Audit summary from security solutions and ovation techMeg Weber
 
Cyber risk scorecards
Cyber risk scorecardsCyber risk scorecards
Cyber risk scorecardsMeg Weber
 
Jb hunt case study
Jb hunt case studyJb hunt case study
Jb hunt case studyMeg Weber
 
Nemours case study nemours embraces app innovation with mobile iron
Nemours case study  nemours embraces app innovation with mobile ironNemours case study  nemours embraces app innovation with mobile iron
Nemours case study nemours embraces app innovation with mobile ironMeg Weber
 
State of indiana case study
State of indiana case studyState of indiana case study
State of indiana case studyMeg Weber
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMeg Weber
 

More from Meg Weber (20)

Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Department of Homeland Security Guidance
Department of Homeland Security GuidanceDepartment of Homeland Security Guidance
Department of Homeland Security Guidance
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
DHS Guidelines
DHS GuidelinesDHS Guidelines
DHS Guidelines
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance Recommendations
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
 
Welcome to the Cyber Risk Summit
Welcome to the Cyber Risk SummitWelcome to the Cyber Risk Summit
Welcome to the Cyber Risk Summit
 
WCC Programs Overview
WCC Programs OverviewWCC Programs Overview
WCC Programs Overview
 
Audit summary from security solutions and ovation tech
Audit summary from security solutions and ovation techAudit summary from security solutions and ovation tech
Audit summary from security solutions and ovation tech
 
Cyber risk scorecards
Cyber risk scorecardsCyber risk scorecards
Cyber risk scorecards
 
Jb hunt case study
Jb hunt case studyJb hunt case study
Jb hunt case study
 
Nemours case study nemours embraces app innovation with mobile iron
Nemours case study  nemours embraces app innovation with mobile ironNemours case study  nemours embraces app innovation with mobile iron
Nemours case study nemours embraces app innovation with mobile iron
 
State of indiana case study
State of indiana case studyState of indiana case study
State of indiana case study
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber Security
 

Cybersecurity brochure flyer version-small

  • 1. CYBER/COMPUTER/INFO SECURITY Whatcom Community College and Western Washington University have partnered to offer a new baccalaureate degree in Computer and Information Systems Security (CISS), available for students to start now. Exciting new opportunity in COMMUNITY COLLEGE Partial support for this work was provided by the National Science Foundation’s Scholarship for Service (SFS) program under Award No. 1241624. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. Start at WCC Associate in Applied Science-Transfer (AAS-T) in Cybersecurity (91 Credits) Whatcom’s Cybersecurity AAS-T program prepares students to enter into the workforce in a variety of IT positions, including high-demand security-related fields, or apply to continue their education at Western to earn the CISS Bachelor of Science degree. Mid-level Positions - $26.60/hour and up: u Computer Support Specialist u Network Support Specialist u Information Security Analyst/Specialist u Network and Computer Systems Administrator u Computer Network Architect u Other Computer/IT Occupations Continue on at WWU Bachelor of Science (B.S.) in Computer and Information Systems Security (Additional 92 Credits) Graduates of Western’s CISS bachelor’s degree will be prepared to fill the urgent need for trained personnel in professional, high-wage positions. Advanced Positions-$40.81/hour and up: u Network and Computer Systems Security Administrator u Computer Network Architect u Computer and Information Systems Manager u Secure Software Development Specialist u Digital Forensic Specialist For more information about this exciting opportunity and to start developing the right plan for you, make an appointment with an academic advisor today! WWC: WWU: Dave Knapp Jenny Hebert (360) 383-3080 (360) 650-7780 dknapp@whatcom.ctc.edu jenny.hebert@wwu.edu
  • 2. Associate in Applied Science – Transfer (AAS-T) - Cybersecurity Whatcom Community College’s Cybersecurity AAS-T program prepares students to transfer to four-year degree programs at certain colleges and universities in a variety of high-demand security-related fields, including cybersecurity, computer information systems security, computer forensics, information security engineering and information security analysis. Students with prior experience are encouraged to meet with the program coordinator for placement in the program. PREREQUISITE: CIS 105 with a C (2.0) grade or better is required for admission to the core requirements. GENERAL EDUCATION REQUIREMENTS/RELATED INSTRUCTION Course ID Course Title Credits CS 140 Computer Programming Fundamentals I 5 CS 145 Computer Programming Fundamentals II 5 CIS 106 Open Source Operating Systems 5 CIS 110 Introduction to Computer Security 3 CIS 116 Virtualization 3 CIS 205 Computer Operating Systems II 5 CIS 214 Network Security I 5 CIS 215 Network Security II 5 CIS 216 Industrial Control Systems Security 5 CIS 226 Cisco Networking I 5 CIS 227 Cisco Networking II 5 CIS 228 Cisco Networking III 5 CIS 229 Cisco Networking IV 5 Total 61 Course ID Course Title Credits ENGL& 101 English Composition I 5 MATH& 141 Precalculus I 5 MATH& 142 Precalculus II 5 Math& 151 Calculus I 5 Choose two courses from: BUS& 201 Business Law 5 PHIL 130 Introduction to Ethics 5 PHYS& 221 Engineering Physics I 5 POLS& 202 American Government 5 Total 30 TOTAL CREDITS 91 Bachelor of Science (B.S.) - Computer and Information Systems Security Western Washington University’s College of Science and Engineering new baccalaureate degree pathway in Computer and Information Systems Security will prepare graduates to fill the urgent need for trained personnel in professional roles such as computer network security administrator, secure software development specialist or digital forensic practitioner. Students must first complete the AAS-T degree in Cybersecurity at WCC with a GPA of 2.5 or better and apply to be accepted to both WWU and the CISS degree program. REQUIRED COMPUTER INFORMATION SYSTEMS SECURITY (CISS) COURSES Course ID Course Title Credits CISS 247 Computer Systems I 5 CISS 301 Formal Languages and Functional Programming 5 CISS 349 Computer System Administration 4 CISS 360 Operating Systems Concepts 3 CISS 461 Computer Security 4 CISS 495 Computer Security Project 3 Total 24 REQUIRED SUPPORT COURSES Course ID Course Title Credits ENG 302 Introduction to Technical Writing 5 ISTM 201 Science Literacy 3 MATH 125 Calculus and Analytic Geometry II 5 MATH 341 Probability and Statistical Inference 4 PHYS 162 Physics and Calculus II 5 Total 22 CISS ELECTIVES (choose four courses) Course ID Course Title Credits CISS 346 Secure Software Development 4 CISS 421 Computer Forensics 4 CISS 422 Dynamic Analysis of Software 4 CISS 423 Software Reverse Engineering 4 CISS 464 Penetration Testing 4 CISS 469 Advanced Network System Security 4 CISS 478 Cryptographic Techniques 4 Total 16 RECOMMENDED GUR COURSES Course ID Course Title Credits JOUR 190 Introduction to Mass Media 5 JOUR 375 Diversity, Mass Media & Social Change 4 LBRL 325 Surveillance, Voyeurism and the Culture of Suspicion 4 MGMT 271 Law and the Business Environment 4 PHIL 360 Society, Law and Morality 3 PLSC 250 The American Political System 5 PLSC 346 Politics of Inequality 5 Total 30 TOTAL CREDITS 92 CORE REQUIREMENTSCOMMUNITY COLLEGE 8/14