Bunker Hill Community College Desktop Version

Bunker Hill Community College Mobile and Tablet Version

Cybersecurity Option

Associate in Science -  Computer Information Technology Department

The information below applies to students entering the program in fall 2017 and spring 2018. For the most accurate program requirements for your catalog year, please log in to BHCC Self Service to review your specific program requirements. Any questions? Prospective students should go to bhcc.edu/admissions and contact an admissions counselor. Current students should stop by or contact the LifeMap Commons on the Charlestown Campus - E-Building, Room E-235; Phone 617-228-2230 or email academicadvising@bhcc.mass.edu from your BHCC email.
Course Title Course Number Semester Taken Credits Prerequisites
College Writing I ENG111 3 ENG095 or placement and ESL098 or RDG095 or placement
College Writing II ENG112 3 ENG111
Individual and Society From Area 2 3
World View From Area 3 3
Quantitative Thought From Area 4 3 MAT097 or placement
Science and Technology From Area 5 4
Humanities From Area 6 3
Application/Concepts or Information Technology Problem Solving CIT110 or CIT113 satisfies learning communities requirement* 3 ESL098 or RDG095 or placement
Principles of Internet and Information Security CIT118 3 CIT110 or CIT113 or CIT120 or Chair approval
PC Hardware and Software CIT182 3 RDG095 or ESL098 or placement
Cisco Networking I CIT162 3 RDG095 or ESL098 or placement
Introduction to Computer Forensics CIT121 3 CIT110 or CIT113 or CIT120 or Chair approval
Windows Operating Systems CIT268 3 CIT110 or CIT113 or CIT120 or Chair approval
Networking Security CIT264 3 CIT162
Cisco Networking II CIT167 3 CIT162
Information Security and Assurance CIT219 3 CIT268
Python Programming CIT125 3 CIT113 or CIT110 or CIT120 or CMT121
Ethical Hacking CIT273 4 CIT268 or CIT270 or Chair approval
Information Security Seminar CIT275 3 Pre/co-req CIT273
Advanced Computer Forensics CIT221 3 CIT121 and CIT268
Wireless Technology CIT262 3 CIT162
Cisco Networking III CIT267 3 CIT167
Linux Administration/Lab CIT270 4 CIT162
Cisco Networking IV CIT274 3 CIT267
MS Windows Administration/Lab CIT282 4 CIT162 and pre/co-req CIT268
Advanced Python Programming CIT225 3 CIT125 or Chair Approval
Cyber Crime in Today’s Society CRJ245 3 ENG111 and CRJ101 and CRJ103 or Chair approval
Total Credits 65-68
Last Modified Date: July 9, 2018

Additional Information

Division: Professional Studies

Department: Computer Information Technology

Degree Type: Associate in Science

View Course Schedules

Note* CIT113 recommended for this program.  CIT182 is the equivalent to Cisco's IT Essentials A+ certification course. CIT-(162,167) are available as Fast-Track where each course runs for roughly one month each. After completion of CIT167 students may qualify for ICND1.

The Computer Information Technology Department (CIT) has a clear, well-articulated, three-pronged mission, which includes supporting the IT components of the college’s General Education offerings (across divisions, departments, and campuses, as well as through interdepartmental collaboration), preparing an IT workforce through certificate and associate degree offerings, and providing IT students with seamless transfer opportunities to related Baccalaureate Degree programs.

The Computer Technology Program offers many courses that apply to other options to afford students the opportunity to explore the many career tracks in Information Technology before selecting a career in Computer Support, Data Base or Networking. The Department’s goals are in concert with the College’s goals. Using input from its Industry Advisory Committees and internship course, the Department is continually updating and fine tuning its programs of study.

Option Overview

This option prepares students to support the security of networks, systems located on these networks, and the data/information contained within those systems; identifying, developing, implementing and maintaining security processes throughout organizations to reduce risks, respond to incidents and limit exposure and liability; identifying, notifying, and responding to security threats to networks.

Career Outlook

The option is designed to align with the National Institute of Technology and Standards’ (NITS) National Initiative for Cybersecurity Education Cybersecurity Workforce Framework to ensure consistent, current, and flexible training in the growing technology field of Information Security. Graduates of this option will qualify for positions as entry-level information security professionals.

Upon Completion of this Concentration Graduates will be able to:

  • Understand network protocols and routing.
  • Understand commonly used network services - DNS, mail, web, etc. as well as less common network services.
  • Perform packet analysis and be able to identify malformed packets.
  • Understand differences between various operating systems - which OS an event came from and which OS is vulnerable to a certain attack.
  • Define the types of malicious software found in modern networks.
  • Explain the threats and countermeasures for physical security and social engineering.
  • Perform footprinting, port scans, and enumeration on a network.
  • Perform very simple programming in C, HTML, and Perl, specifically oriented towards the needs of network security professionals.
  • Identify Microsoft Windows vulnerabilities and to harden systems.
  • Identify Linux vulnerabilities and to protect servers.
  • Describe and deploy security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots.
  • Describe the ethics associated with the use of hacking or penetration testing tools and techniques.

The GPSTEM Project  is funded by a $20,000,000 grant awarded by the U.S. Department of Labor, Grant #TC26450-14-60-A-25. This product was created y the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The U. S. Department of Labor makes no guarantees, warrantees, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability, or ownership.