Cyber and Information Security - Associate of Applied Science
Curriculum Code #6470
Effective May 2026
Division of Engineering, Business and Information Technologies
The Associate of Applied Science degree program in Cyber and Information Security prepares students for employment in a variety of careers in Cyber Security. Examples of positions can include such titles as network security specialist, information security technician, and cybersecurity specialist. In addition to basic computer and networking skills, this degree provides a solid foundation in information assurance, cybercrime investigation, ethical hacking, digital forensics, network forensics, cyber operations, Internet of Things, data collection, software exploitation, analysis of malicious code, reverse engineering, data integrity, risk assessment and mitigation techniques. Lab work and assignments will present real world cyber security scenarios encountered in the work place. Industry standard software will be used for digital forensics studies. Lorain County Community College has articulation agreements with colleges and universities including programs offered by Lorain County Community College's University Partnership.
| First Year | ||
|---|---|---|
| Fall Semester | Hours | |
| CMNW 101 | A+ CERTIFICATION PREPARATION I | 4 |
| CISS 125 or CMNW 201 | OPERATING SYSTEM INTERFACES 1, 2 or A+ CERTIFICATION PREPARATION II | 3-4 |
| ENGL 161 | COLLEGE COMPOSITION I | 3 |
| SDEV 101 | INTRODUCTION TO THE LCCC COMMUNITY 4 | 1 |
| Select any OT 36 Mathematics Course 3 | 3 | |
| Hours | 14-15 | |
| Spring Semester | ||
| CISS 145 or CMNW 145 | LOCAL AREA NETWORKS 1 or NETWORK INSTALLATION & DIAGNOSTICS | 4 |
| CMNW 120 | CYBER-FOREN CYBER CRIME THE LAW | 4 |
| ENGL 164 | COLLEGE COMPOSITION II WITH TECHNICAL TOPICS 1 | 3 |
| PHLY 161 | INTRODUCTION TO ETHICS | 3 |
| Select any Social Science OT 36 Course 7 | 3 | |
| Hours | 17 | |
| Second Year | ||
| Fall Semester | ||
| BIOG 164 | EXPLORATIONS IN FIELD SCIENCE | 3 |
| CMNW 223 | NETWORK FORENSICS AND INVESTIGATIVE TECHNIQUES | 4 |
| CYBR 220 | PYTHON SCRIPTING AND PROGRAM CONCEPTS | 3 |
| CYBR 231 | ETHICAL HACKING AND COUNTERMEASURES | 4 |
| CYBR 287 | WORK-BASED LEARNING I - CYBR | 1 |
| Hours | 15 | |
| Spring Semester | ||
| CYBR 110 | FUNDAMENTALS OF INTERNET OF THINGS (IOT) | 4 |
| CYBR 244 | CYBERSECURITY STANDARDS, REGULATIONS AND COMPLIANCE | 3 |
| CYBR 288 | WORK-BASED LEARNING II - CYBR | 1 |
| Select one of the following: | 3-4 | |
| CYBER DEFENSE METHODS 1,5 | ||
| DATA COLLECTION ANALYSIS AND FORENSIC TOOLS | ||
| Select one of the following: | 4 | |
| IT SECURITY CONCEPTS 5 | ||
| CELL PHONE AND MOBILE DEVICE FORENSICS 6 | ||
| Hours | 15-16 | |
| Total Hours | 61-63 | |
- 1
Indicates that this course requires a college level prerequisite.
- 2
Students pursuing the Cyber and Information Security degree program have divisional approval to take CISS 125 without having completed CISS 121.
- 3
Student may select any Mathematics Ohio Transfer 36 course.
- 4
A student must register for the orientation course when enrolling for more than six credit hours per semester or any course that would result in an accumulation of 12 or more credit hours.
- 5
Students seeking the standard Cyber and Information Security degree should select CYBR 251 and CYBR 252.
- 6
Students seeking the Cyber Forensics track should select CMNW 120 and CMNW 224.
- 7
Student may select any Social Sciences Ohio Transfer 36 course.
Program Contact(s):
Lawrence Atkinson
440-366-7050
latkinso@lorainccc.edu
For information about admissions, enrollment, transfer, graduation and other general questions, please contact your advising team.
More program information can be found on our website.
Credit for Prior Learning (PLA) options may be available for your program. For more information, please visit our website: www.lorainccc.edu/PLA
Program Learning Outcomes
- Describe methods for investigating both domestic and international cybersecurity incidents.
- Develop short and long-term organizational cybersecurity strategies and policies.
- Implement cyber security goals, metrics, and safeguards consistent with industry best practices.
- Conduct security assessments to identify vulnerabilities in critical infrastructure systems.
- Evaluate a variety of cybersecurity tools.