SlideShare a Scribd company logo
1 of 2
Download to read offline
Program Overview 
Whatcom is a significant national player in cybersecurity education and a critical partner in local workforce development. The College continues to invest in the program to match emerging industry demand for trained professionals. 
Whatcom’s acclaimed Computer Information Systems (CIS) program started in 1996 and has continually evolved to reflect industry demand and standards, including the addition of a cybersecurity degree in 2013. Indicating Whatcom’s foresight, National Science Foundation (NSF) grants backed the program’s development. Enrollment has increased 50 percent in the past five years from 110 to 167 students; one out of four are veterans. 
W 
CC is home of CyberWatch West 
Whatcom is the lead institution and home of CyberWatch West, a regional cybersecurity education network funded by a $3-million NSF grant. An NSF-Advanced Technology Education center, CyberWatch West is one of only four centers in the nation dedicated to cybersecurity education. This designation acknowledges Whatcom’s expertise in the field and Technology Department Chair Corrinne Sande’s national leadership in cybersecurity education. 
Program Highlights 
• Cisco-certified Networking Academy 
• Named a National Center of Academic Excellence in Information Assurance/ Cyber Defense in 2014 – one of the first community colleges in the United States to earn this distinction, with curriculum mapped to the National Security Agency’s latest requirements. 
• Home of CyberWatch WestCOMMUNITY COLLEGE 
Computer Information Systems/Cybersecurity 
• Two pathways: a two-year Associate in Science degree in CIS and a two-year Associate in Applied Science - Transfer in Cybersecurity. 
• Students graduating with a CIS degree are ready to work in roles such as network technicians, network or system administrators, or computer support. 
• Students who graduate with the Cybersecurity degree can either begin their careers or transfer to Western Washington University to earn a Computer Information Systems and Security (CISS) baccalaureate degree. 
• The baccalaureate partnership is one of the nation’s few community college-to-university cybersecurity degree collaborations and may soon expand to the University of Washington. 
• Typical starting salaries: 
$16.22/hour 
, certificates 
$26.60/hour, AAS-T degree 
$40.81/hour, CISS bachelor’s degree 
Degree Highlights
• 
In summer 2014, Whatcom’s CIS and Cybersecurity labs and classrooms were remodeled and more than doubled in size to 5,378 sq ft. 
• 
The upgraded facilities include two lecture spaces, three enlarged labs, a networking/ server room and a lab tech space. 
• 
Improved lab layout allows for increased interaction among instructors and students. 
O 
ther Information 
To learn more about how Whatcom’s CIS and Cybersecurity programs are positively impacting the regional technology workforce and our community, please contact WCC’s Public Information Office: 360.383.3310 or pio@whatcom.ctc.edu. 
COMMUNITY COLLEGE 
“Whatcom has quietly been establishing a reputation as a significant national player in technology education and building a level of expertise that’s setting a standard for community college cybersecurity programs. With Whatcom as a partner, we can develop core competencies of the future technology workforce and attract people and companies to our region.” 
—Mark Knittel, owner, Bellingham-based Ovation Technical Services. Chairman of TAG’s Board of Directors, Member of WCC’s CIS Advisory Committee 
W 
CC’s Role in Economic & Workforce Development 
The tech industry in Whatcom County is growing at a remarkable pace: 164 percent growth in the past 20 years compared to King County’s 66 percent and the state’s 58 percent growth.* 
WCC plays several roles in supporting economic and workforce development, including building the talent pipeline, upgrading skills of incumbent workers and informing the business community’s knowledge of cybersecurity issues. 
To ensure curriculum anticipates industry need, the College is actively engaged with business leaders – many of whom serve on our program advisory committee – and professional organizations such as the Technology Alliance Group for Northwest Washington (TAG). 
Whatcom’s expertise will benefit Bellingham’s growing technology industry by providing a well-trained workforce and helping to solidify the region’s reputation as an up-and-coming technology center. 
Program Outcomes: 
What Students Learn 
• Identify threats and implement countermeasures to ensure network system security 
• Implement and troubleshoot a variety of network topologies and protocols 
• Set up and maintain medium-sized routed and switched networks 
• Perform the basics of computer and network security 
• Communicate professionally with customers and co-workers 
• Additional skills/knowledge, depending on focus of study 
*Source: U.S. Census Bureau, TAG 
10-2014

More Related Content

What's hot (14)

Study Master of cyber security with Scholarship
Study Master of cyber security with ScholarshipStudy Master of cyber security with Scholarship
Study Master of cyber security with Scholarship
 
M.Tech. Cyber Security & Incident Response
M.Tech. Cyber Security & Incident ResponseM.Tech. Cyber Security & Incident Response
M.Tech. Cyber Security & Incident Response
 
Technology Plan
Technology PlanTechnology Plan
Technology Plan
 
Technology ppt
Technology pptTechnology ppt
Technology ppt
 
E rate and technology plan
E rate and technology planE rate and technology plan
E rate and technology plan
 
E rate and district tech blog
E rate and district tech blogE rate and district tech blog
E rate and district tech blog
 
KISD E-RATE INFORMATIONAL MEETING
KISD E-RATE INFORMATIONAL MEETINGKISD E-RATE INFORMATIONAL MEETING
KISD E-RATE INFORMATIONAL MEETING
 
Week 2 blog presentation
Week 2 blog presentationWeek 2 blog presentation
Week 2 blog presentation
 
Public students benifit
Public students benifitPublic students benifit
Public students benifit
 
E rate and abr technology plan
E rate and abr technology planE rate and abr technology plan
E rate and abr technology plan
 
Public students benifit
Public students benifitPublic students benifit
Public students benifit
 
Star chart presentation
Star chart presentationStar chart presentation
Star chart presentation
 
Qatechmillage
QatechmillageQatechmillage
Qatechmillage
 
Qatechmillage
QatechmillageQatechmillage
Qatechmillage
 

Viewers also liked

Power Play in Paraguay
Power Play in ParaguayPower Play in Paraguay
Power Play in Paraguay
Robert Ward
 
Trocito De Navidad
Trocito De NavidadTrocito De Navidad
Trocito De Navidad
ESPEJO 25
 
Orquídeas
OrquídeasOrquídeas
Orquídeas
Kerly
 
Cem enhancing the user experience
Cem enhancing the user experienceCem enhancing the user experience
Cem enhancing the user experience
Mohammad Khatib
 
Pasarela gris de los políticos
Pasarela gris de los políticosPasarela gris de los políticos
Pasarela gris de los políticos
Beltzblack
 
Ed Wagner: Integrated care: what are the key factors for success
Ed Wagner: Integrated care: what are the key factors for successEd Wagner: Integrated care: what are the key factors for success
Ed Wagner: Integrated care: what are the key factors for success
Nuffield Trust
 
Direccionesalbumespicasa 120311180622-phpapp02
Direccionesalbumespicasa 120311180622-phpapp02Direccionesalbumespicasa 120311180622-phpapp02
Direccionesalbumespicasa 120311180622-phpapp02
María Valbuena
 

Viewers also liked (20)

Migraciones
MigracionesMigraciones
Migraciones
 
Yana - disabled assistance by google watch
Yana - disabled assistance by google watchYana - disabled assistance by google watch
Yana - disabled assistance by google watch
 
Orquídeas
OrquídeasOrquídeas
Orquídeas
 
Declaración cadena alimentaria reducción del desperdicio alimentario
Declaración cadena alimentaria reducción del desperdicio alimentarioDeclaración cadena alimentaria reducción del desperdicio alimentario
Declaración cadena alimentaria reducción del desperdicio alimentario
 
Power Play in Paraguay
Power Play in ParaguayPower Play in Paraguay
Power Play in Paraguay
 
Fragmento hortelanos de ciudad
Fragmento hortelanos de ciudadFragmento hortelanos de ciudad
Fragmento hortelanos de ciudad
 
Búsqueda de Nichos de mercado rentables en Internet
Búsqueda de Nichos de mercado rentables en InternetBúsqueda de Nichos de mercado rentables en Internet
Búsqueda de Nichos de mercado rentables en Internet
 
Trocito De Navidad
Trocito De NavidadTrocito De Navidad
Trocito De Navidad
 
Orquídeas
OrquídeasOrquídeas
Orquídeas
 
Cem enhancing the user experience
Cem enhancing the user experienceCem enhancing the user experience
Cem enhancing the user experience
 
Un Cuentode Paulo Coelho
Un Cuentode Paulo CoelhoUn Cuentode Paulo Coelho
Un Cuentode Paulo Coelho
 
La utilització educativa de la videoconferència
La utilització educativa de la videoconferènciaLa utilització educativa de la videoconferència
La utilització educativa de la videoconferència
 
Presentacion Energiza A Sus Socios
Presentacion Energiza A Sus SociosPresentacion Energiza A Sus Socios
Presentacion Energiza A Sus Socios
 
Jee (main) 2013 new final
Jee (main) 2013 new finalJee (main) 2013 new final
Jee (main) 2013 new final
 
Pasarela gris de los políticos
Pasarela gris de los políticosPasarela gris de los políticos
Pasarela gris de los políticos
 
Homework 6 due dec3
Homework 6 due dec3Homework 6 due dec3
Homework 6 due dec3
 
Ed Wagner: Integrated care: what are the key factors for success
Ed Wagner: Integrated care: what are the key factors for successEd Wagner: Integrated care: what are the key factors for success
Ed Wagner: Integrated care: what are the key factors for success
 
Unidad didáctica 1. Curso Web 2.0
Unidad didáctica 1. Curso Web 2.0Unidad didáctica 1. Curso Web 2.0
Unidad didáctica 1. Curso Web 2.0
 
My own professional learning network
My own professional learning networkMy own professional learning network
My own professional learning network
 
Direccionesalbumespicasa 120311180622-phpapp02
Direccionesalbumespicasa 120311180622-phpapp02Direccionesalbumespicasa 120311180622-phpapp02
Direccionesalbumespicasa 120311180622-phpapp02
 

Similar to WCC Programs Overview

KISD E-Rate Overview
KISD E-Rate OverviewKISD E-Rate Overview
KISD E-Rate Overview
EnidL
 
Suny IT NITYAS Consortia Implementation(5)
Suny IT NITYAS Consortia Implementation(5)Suny IT NITYAS Consortia Implementation(5)
Suny IT NITYAS Consortia Implementation(5)
Rob Wilson
 
Beaumont isd final copy
Beaumont isd final copyBeaumont isd final copy
Beaumont isd final copy
Prairie View
 
Week 2 ramondetta presentation e rate tech
Week 2 ramondetta presentation e rate techWeek 2 ramondetta presentation e rate tech
Week 2 ramondetta presentation e rate tech
lramondetta
 

Similar to WCC Programs Overview (20)

CSET - Building the Cybersecurity Workforce Pipeline.pdf
CSET - Building the Cybersecurity Workforce Pipeline.pdfCSET - Building the Cybersecurity Workforce Pipeline.pdf
CSET - Building the Cybersecurity Workforce Pipeline.pdf
 
KISD E-Rate Overview
KISD E-Rate OverviewKISD E-Rate Overview
KISD E-Rate Overview
 
Cisco and LATTC
Cisco and LATTCCisco and LATTC
Cisco and LATTC
 
Rural Info Tech Alliance: Growing and Keeping IT Talent
Rural Info Tech Alliance: Growing and Keeping IT TalentRural Info Tech Alliance: Growing and Keeping IT Talent
Rural Info Tech Alliance: Growing and Keeping IT Talent
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian Reach
 
Suny IT NITYAS Consortia Implementation(5)
Suny IT NITYAS Consortia Implementation(5)Suny IT NITYAS Consortia Implementation(5)
Suny IT NITYAS Consortia Implementation(5)
 
Computer Networking Specialist
Computer Networking SpecialistComputer Networking Specialist
Computer Networking Specialist
 
15 16 professional learning day 10-16-15 new program awareness sessions....
15 16 professional learning day 10-16-15 new program awareness sessions....15 16 professional learning day 10-16-15 new program awareness sessions....
15 16 professional learning day 10-16-15 new program awareness sessions....
 
Beaumont isd final copy
Beaumont isd final copyBeaumont isd final copy
Beaumont isd final copy
 
Saint Leo University by Study Metro
Saint Leo University by Study MetroSaint Leo University by Study Metro
Saint Leo University by Study Metro
 
NWTC Referendum presentation 3.9.15
NWTC Referendum presentation  3.9.15NWTC Referendum presentation  3.9.15
NWTC Referendum presentation 3.9.15
 
NWTC Referendum 3.9.15
NWTC Referendum 3.9.15NWTC Referendum 3.9.15
NWTC Referendum 3.9.15
 
Week 2 ramondetta presentation e rate tech
Week 2 ramondetta presentation e rate techWeek 2 ramondetta presentation e rate tech
Week 2 ramondetta presentation e rate tech
 
Erau cybersecurity and security degrees
Erau cybersecurity and security degreesErau cybersecurity and security degrees
Erau cybersecurity and security degrees
 
SSCP Certification Training in Dallas & Arlington, TX
SSCP Certification Training in Dallas & Arlington, TXSSCP Certification Training in Dallas & Arlington, TX
SSCP Certification Training in Dallas & Arlington, TX
 
DC_Info_v11-1
DC_Info_v11-1DC_Info_v11-1
DC_Info_v11-1
 
Elevate Your Future with the Best University for MCA in India
Elevate Your Future with the Best University for MCA in IndiaElevate Your Future with the Best University for MCA in India
Elevate Your Future with the Best University for MCA in India
 
Bright Spots: Project SECURE (Wake County)
Bright Spots: Project SECURE (Wake County)Bright Spots: Project SECURE (Wake County)
Bright Spots: Project SECURE (Wake County)
 
CWN By Arup
CWN By ArupCWN By Arup
CWN By Arup
 
Cybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and PracticeCybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and Practice
 

More from Meg Weber

Cybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallCybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-small
Meg Weber
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
Meg Weber
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks
Meg Weber
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
Meg Weber
 
Nemours case study nemours embraces app innovation with mobile iron
Nemours case study  nemours embraces app innovation with mobile ironNemours case study  nemours embraces app innovation with mobile iron
Nemours case study nemours embraces app innovation with mobile iron
Meg Weber
 

More from Meg Weber (20)

Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Department of Homeland Security Guidance
Department of Homeland Security GuidanceDepartment of Homeland Security Guidance
Department of Homeland Security Guidance
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
DHS Guidelines
DHS GuidelinesDHS Guidelines
DHS Guidelines
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance Recommendations
 
Cybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallCybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-small
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
 
Welcome to the Cyber Risk Summit
Welcome to the Cyber Risk SummitWelcome to the Cyber Risk Summit
Welcome to the Cyber Risk Summit
 
Audit summary from security solutions and ovation tech
Audit summary from security solutions and ovation techAudit summary from security solutions and ovation tech
Audit summary from security solutions and ovation tech
 
Cyber risk scorecards
Cyber risk scorecardsCyber risk scorecards
Cyber risk scorecards
 
Jb hunt case study
Jb hunt case studyJb hunt case study
Jb hunt case study
 
Nemours case study nemours embraces app innovation with mobile iron
Nemours case study  nemours embraces app innovation with mobile ironNemours case study  nemours embraces app innovation with mobile iron
Nemours case study nemours embraces app innovation with mobile iron
 
State of indiana case study
State of indiana case studyState of indiana case study
State of indiana case study
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber Security
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

WCC Programs Overview

  • 1. Program Overview Whatcom is a significant national player in cybersecurity education and a critical partner in local workforce development. The College continues to invest in the program to match emerging industry demand for trained professionals. Whatcom’s acclaimed Computer Information Systems (CIS) program started in 1996 and has continually evolved to reflect industry demand and standards, including the addition of a cybersecurity degree in 2013. Indicating Whatcom’s foresight, National Science Foundation (NSF) grants backed the program’s development. Enrollment has increased 50 percent in the past five years from 110 to 167 students; one out of four are veterans. W CC is home of CyberWatch West Whatcom is the lead institution and home of CyberWatch West, a regional cybersecurity education network funded by a $3-million NSF grant. An NSF-Advanced Technology Education center, CyberWatch West is one of only four centers in the nation dedicated to cybersecurity education. This designation acknowledges Whatcom’s expertise in the field and Technology Department Chair Corrinne Sande’s national leadership in cybersecurity education. Program Highlights • Cisco-certified Networking Academy • Named a National Center of Academic Excellence in Information Assurance/ Cyber Defense in 2014 – one of the first community colleges in the United States to earn this distinction, with curriculum mapped to the National Security Agency’s latest requirements. • Home of CyberWatch WestCOMMUNITY COLLEGE Computer Information Systems/Cybersecurity • Two pathways: a two-year Associate in Science degree in CIS and a two-year Associate in Applied Science - Transfer in Cybersecurity. • Students graduating with a CIS degree are ready to work in roles such as network technicians, network or system administrators, or computer support. • Students who graduate with the Cybersecurity degree can either begin their careers or transfer to Western Washington University to earn a Computer Information Systems and Security (CISS) baccalaureate degree. • The baccalaureate partnership is one of the nation’s few community college-to-university cybersecurity degree collaborations and may soon expand to the University of Washington. • Typical starting salaries: $16.22/hour , certificates $26.60/hour, AAS-T degree $40.81/hour, CISS bachelor’s degree Degree Highlights
  • 2. • In summer 2014, Whatcom’s CIS and Cybersecurity labs and classrooms were remodeled and more than doubled in size to 5,378 sq ft. • The upgraded facilities include two lecture spaces, three enlarged labs, a networking/ server room and a lab tech space. • Improved lab layout allows for increased interaction among instructors and students. O ther Information To learn more about how Whatcom’s CIS and Cybersecurity programs are positively impacting the regional technology workforce and our community, please contact WCC’s Public Information Office: 360.383.3310 or pio@whatcom.ctc.edu. COMMUNITY COLLEGE “Whatcom has quietly been establishing a reputation as a significant national player in technology education and building a level of expertise that’s setting a standard for community college cybersecurity programs. With Whatcom as a partner, we can develop core competencies of the future technology workforce and attract people and companies to our region.” —Mark Knittel, owner, Bellingham-based Ovation Technical Services. Chairman of TAG’s Board of Directors, Member of WCC’s CIS Advisory Committee W CC’s Role in Economic & Workforce Development The tech industry in Whatcom County is growing at a remarkable pace: 164 percent growth in the past 20 years compared to King County’s 66 percent and the state’s 58 percent growth.* WCC plays several roles in supporting economic and workforce development, including building the talent pipeline, upgrading skills of incumbent workers and informing the business community’s knowledge of cybersecurity issues. To ensure curriculum anticipates industry need, the College is actively engaged with business leaders – many of whom serve on our program advisory committee – and professional organizations such as the Technology Alliance Group for Northwest Washington (TAG). Whatcom’s expertise will benefit Bellingham’s growing technology industry by providing a well-trained workforce and helping to solidify the region’s reputation as an up-and-coming technology center. Program Outcomes: What Students Learn • Identify threats and implement countermeasures to ensure network system security • Implement and troubleshoot a variety of network topologies and protocols • Set up and maintain medium-sized routed and switched networks • Perform the basics of computer and network security • Communicate professionally with customers and co-workers • Additional skills/knowledge, depending on focus of study *Source: U.S. Census Bureau, TAG 10-2014