Program Information
Learn more about the Networking and Security program.
General Help
Ask general questions at our support center.
Course Sequence
- Jump to the Course Sequence
- Print Course Sequence
The Certificate of Completion (CCL) in Cyber Operations program is designed to focus on the necessary skills required to secure, protect and identify vulnerabilities in a network, including various operating systems and network devices. Emphasis is placed on developing the theoretical, legal, ethical and practical skills needed to maintain security on mission-critical networking and server systems. The program is designed to meet the training needs of government and industry employees. The program covers a variety of information security technologies and structured languages. The Cyber Operations program also focuses on the skills needed for internationally recognized IT certifications and high demands in business, industry, and government. An Associate in Applied Science (AAS) in Cybersecurity is also available.
Details
Important information you’ll need when applying for admission:
- Field of Interest
- Computer and Information Technology
- Type
- Certificate of Completion (CCL)
- Academic Plan
- Cyber Operations (CER)
- Academic Plan Code
- 5165
- Total Credits Required
- 41-42
- Catalog Year
- 2024-2025
- Effective Term
- Fall 2021
- Notes
Students must earn a grade of C or better in all courses within the program.
Courses within any of the following prefixes must be taken within five (5) years prior to completion of the program to be applied toward this award: AIM, BPC, CIS, CLD, CNT, CSC, ITS, and MST.
What You’ll Learn
This pathway map will help you gain the expertise needed to:
- Explain the fundamental components, concepts, and application of cybersecurity principles.
- Describe cyber defense tools, methods, and components.
- Apply cyber defense methods to prepare a system to repel attacks.
- Analyze common security failures and identify specific design principles that have been violated.
- Understand the interaction between security and system usability and the importance for minimizing the effects of security mechanisms.
- Apply appropriate protocols, tools, and techniques to maximize security in the network environment.
- Describe the fundamental concepts, technologies, components, vulnerabilities, and issues related to networks.
- Identify and describe basic security issues of operating systems.
- Identify perpetrators, their resources, and their motivations in cyberspace.
- Compare and contrast offensive and defensive resources used in cybersecurity ecosystems/environment.
- Delineate differences between the moral, behavioral, ethical, and legal ramifications found in the cybersecurity world.
- Apply knowledge of regulatory and legal requirements to ensure compliance.
- Apply risk analysis methodologies to identify potential vulnerabilities, associated impacts, and recommend appropriate responses.
Career Opportunities
Successful completion of this certificate may lead to employment in a variety of different occupations and industries. Below are examples of related occupations with associated Maricopa County-based annual median wages* for this certificate. Education requirements vary for the occupations listed below, so you may need further education or degrees in order to qualify for some of these jobs and earn the related salaries. Please visit with an academic advisor and/or program director for additional information. You can click on any occupation to view the detail regarding education level, wages, and employment information.
Computer and Information Systems Managers
$165,888 Show expanded career information for Computer and Information Systems Managers
Computer Network Architects
$122,287 Show expanded career information for Computer Network Architects
Computer Network Support Specialists
$68,090 Show expanded career information for Computer Network Support Specialists
Information Security Analysts
$116,259 Show expanded career information for Information Security Analysts
Network and Computer Systems Administrators
$96,595 Show expanded career information for Network and Computer Systems Administrators
Course Sequence by Term
The following is the suggested course sequence by term. Please keep in mind:
- Students should meet with an academic advisor to develop an individual education plan that meets their academic and career goals. Use the Degree Progress Report Tool in your Student Center to manage your plan.
- The course sequence is laid out by suggested term and may be affected when students enter the program at different times of the year.
- Initial course placement is determined by current district placement measures and/or completion of 100-200 level course and/or program requirements.
- Degree and transfer seeking students may be required to successfully complete a MCCCD First Year Experience Course (FYE) within the first two semesters at a MCCCD College. Courses include FYE101 and FYE103. Course offerings will vary by college. See an academic, program, or faculty advisor for details.
Full-time Sequence
Full-time status is 12 credits to 18 credits per semester.
Note: Because you are viewing this pathway map on a mobile device, some columns below have been hidden. To view all columns, please rotate your device or view this page on a device with a larger screen.
Term 1
Course Number | Course Name | Requisites | Notes | Area | Credits |
---|---|---|---|---|---|
CIS105 | Survey of Computer Information Systems | CS | 3 | ||
CIS190 or CNT140AB |
Introduction to Networking or Introduction to Networks | 3–4 | |||
BPC270 or MST150++ |
A+ Exam Prep: Operating System Configuration and Support or Any Microsoft Windows course | 3 | |||
CIS126DL or CIS126RH |
Linux Operating System or Red Hat System Administration I | 3 |
Term 2
Course Number | Course Name | Requisites | Notes | Area | Credits |
---|---|---|---|---|---|
ITS110 | Information Security Fundamentals | Critical course Gateway course | 3 | ||
CIS111 or ITS120 |
Ethics in Information Technology or Legal, Ethical and Regulatory Issues | 3 | |||
CIS156 | Python Programming: Level I | 3 | |||
BPC170 | A+ Exam Prep: Computer Hardware Configuration and Support | 3 |
Term 3
Course Number | Course Name | Requisites | Notes | Area | Credits |
---|---|---|---|---|---|
ITS240 | Ethical Hacking and Network Defense | 3 | |||
CIS238DL or CIS238RH |
Linux System Administration or Red Hat System Administration II | 3 | |||
ITS291 | Computer Forensics Foundations | Critical course Gateway course | 4 |
Term 4
Course Number | Course Name | Requisites | Notes | Area | Credits |
---|---|---|---|---|---|
CIS290AC or CIS298AC |
Computer Information Systems Internship or Special Projects | 3 | |||
ITS292 | Advanced Computer Forensics | 4 |
Part-time Sequence
Part-time status is 11 credit hours or less.
Note: Because you are viewing this pathway map on a mobile device, some columns below have been hidden. To view all columns, please rotate your device or view this page on a device with a larger screen.
Term 1
Course Number | Course Name | Requisites | Notes | Area | Credits |
---|---|---|---|---|---|
CIS105 | Survey of Computer Information Systems | CS | 3 | ||
CIS190 or CNT140AB |
Introduction to Networking or Introduction to Networks | 3–4 |
Term 2
Course Number | Course Name | Requisites | Notes | Area | Credits |
---|---|---|---|---|---|
BPC270 or MST150++ |
A+ Exam Prep: Operating System Configuration and Support or Any Microsoft Windows course | 3 | |||
CIS126DL or CIS126RH |
Linux Operating System or Red Hat System Administration I | 3 |
Term 3
Course Number | Course Name | Requisites | Notes | Area | Credits |
---|---|---|---|---|---|
ITS110 | Information Security Fundamentals | Critical course Gateway course | 3 | ||
CIS111 or ITS120 |
Ethics in Information Technology or Legal, Ethical and Regulatory Issues | 3 |
Term 4
Course Number | Course Name | Requisites | Notes | Area | Credits |
---|---|---|---|---|---|
CIS156 | Python Programming: Level I | 3 | |||
ITS240 | Ethical Hacking and Network Defense | 3 |
Term 5
Course Number | Course Name | Requisites | Notes | Area | Credits |
---|---|---|---|---|---|
BPC170 | A+ Exam Prep: Computer Hardware Configuration and Support | 3 | |||
CIS238DL or CIS238RH |
Linux System Administration or Red Hat System Administration II | 3 |
Term 6
Course Number | Course Name | Requisites | Notes | Area | Credits |
---|---|---|---|---|---|
ITS291 | Computer Forensics Foundations | Critical course Gateway course | 4 | ||
CIS290AC or CIS298AC |
Computer Information Systems Internship or Special Projects | 3 |
Term 7
Course Number | Course Name | Requisites | Notes | Area | Credits |
---|---|---|---|---|---|
ITS292 | Advanced Computer Forensics | 4 |
Ready to get started?
Follow one of the options below to get started on your personal career pathway.
Become a Student
Click here for MCC’s easy-to-use Enrollment Steps.
Program Information
Learn more about and find contact information for the Networking and Security program.
General Help
Ask general questions over the phone at 480-461-7400 or via online chat.
Course Area Key
Gateway Course = Generally the first major-specific course in a pathway.
Critical Course = A course that is highly predictive of future success in a pathway.
- CS = Computer/Statistics/Quantitative Application
Disclaimer
Students must earn a grade of C or better for all courses required within the program.
Course Sequence total credits may differ from the program information located on the MCCCD curriculum website due to program and system design.
At Maricopa, we strive to provide you with accurate and current information about our degree and certificate offerings. Due to the dynamic nature of the curriculum process, course and program information is subject to change. As a result, the course list associated with this degree or certificate on this site does not represent a contract, nor does it guarantee course availability. If you are interested in pursuing this degree or certificate, meet with an academic advisor to discuss the requirements at your college for the appropriate catalog year.
View MCCCD’s official curriculum documentation for additional details regarding the requirements of this award (https://aztransmac2.asu.edu/cgi-bin/WebObjects/MCCCD.woa/wa/freeForm11?id=162493).
Previous Catalog Years
The pathway map presented above is for the current catalog year and is the intended pathway map for new students. All previous catalog years for this pathway map are available at the link below.
Previous catalog years for Certificate of Completion (CCL) in Cyber Operations