Admission Requirements: The Cyber Security program is designed for individuals with prior work and/or educational experience relevant to the field. Candidates must meet one or more of the following criteria, as determined by the Cyber Center Director, before entering the program:
- Professional background in IT Networking. Individual may be required to demonstrate required skills.
- Industry Certifications in the field of Networking and/or Security. Candidates will be required to provide evidence of successful completion of each certification being considered.
- Completion of courses in Cisco CCNA Networking and Microsoft Server Operating Systems.
Those with a criminal history will not be able to find employment in cyber security. Students must complete a background check prior to entering the program.
- CompTIA Security+
- Certified Ethical Hacker
- Cisco Certified Network Associate - Security
Program Coordination: This certificate shares five courses (18 credits) with the Cyber Security Technician CSC and four courses (11 credits) with the Information Systems Technology Network Engineer A.A.S.
This program is offered part-time and completely online.
Minimum credits: 41
Length: 4 semesters
- Information Security Analyst: $51,280-143,770 Job growth: 18% from 2014 to 2024
- Computer Systems Analyst: $51,910-135,450 Job growth: 21%
- *Median salaries & job growth nationwide as of 2015. BLS.gov
Division: Arts, Sciences, & Business
Contact: 434-797-8402 or 434-797-8462
DCC is the first rural community college in Virginia to be recognized by the Department of Homeland Security and National Security Agency as a National Center of Academic Excellence in Cyber Defense Two-Year Education. Courses are aligned with DHS and NSA curriculum standards.
Graduates of this program will be able to:
- Identify security risks to computing resources.
- Assess potential threats to computing resources.
- Develop effective countermeasures aimed at protecting data and computer assets.
- Develop solutions for networking and security problems, balancing business concerns, technical issues and security.
- Identify infrastructure components and the roles they serve, and design infrastructures including devices, topologies, protocols, systems software, management and security.
- Explain the concepts of confidentiality, availability and integrity in information assurance, including physical, software, devices, policies and people.
|Lecture Hours||Lab Hours||Hours in Class||Credits|
|ADJ 161 Introduction to Computer Crime||3||0||3||3|
|ITE 221 PC Hardware and OS Architecture||3||0||3||3|
|ITN 260 Network Security Basics||3||0||3||3|
|SDV100 College Success Skills||1||0||1||1|
|ITN 261 Network Attacks, Computer Crime & Hacking||3||0||3||3|
|ITN 262 Network Communication, Security & Authentication||4||0||4||4|
|ENG 111 College Composition I||3||0||3||3|
|ITN 263 Internet/Intranet Firewalls & E-Commerce Security||4||0||4||4|
|ITN 276 Computer Forensics I||4||0||4||4|
|ITN 254 Virtual Infrastructure: Installation & Configuration||4||0||4||4|
|ITN 267 Legal Topics in Network Security||3||0||3||3|
|ITN 2 Computer Forensics II||3||0||3||3|