5XÉçÇø

Lerner Research Institute

The Cleveland Clinic Lerner Institute is located in Cleveland, Ohio. The Cleveland Clinic is a multinational research and hospital system that is home to over 240 labs that focus on basic, translational, and clinical research and is consistently ranked as one of the best hospital in the world by Newsweek.

 

5XÉçÇø

5XÉçÇø is located in Kent, Ohio and is the highest-ranked public university in northern Ohio. It is ranked the safest big college campus in Ohio & 25th in the country with over 25,000 students. Kent State is one of only five institutions in Ohio to be recognized as an R1 top-tier research university by the Carnegie Classification.

 

Cybersecurity - A.A.B.

Launch your career in cybersecurity with Kent State's program. Gain the skills needed to protect against cyber threats and secure networks in today's digital world.

Contact Us

Apply Now
Request Info
Schedule a Visit

Program Information for Cybersecurity - A.A.B.

Program Description

Full Description

The Associate of Applied Business degree in Cybersecurity provides students with an applied approach to information security concepts. With an ever-growing threat to sensitive and critical data in the field of information technology, understanding the impact of security issues on businesses and individuals is critical. The degree program gives students the tools they need to address current security issues including risk identification, security testing and monitoring, and enterprise risk management. Because the degree is built upon a solid knowledgebase, additional topics include networking, hardware and operating systems, Cisco networking technologies, cyber defense methods, cyber ethics, incident management and security policies.

Admissions for Cybersecurity - A.A.B.

Admission Requirements

The university affirmatively strives to provide educational opportunities and access to students with varied backgrounds, those with special talents and adult students who graduated from high school three or more years ago.

Kent State campuses at Ashtabula, East Liverpool, Geauga, Salem, Stark, Trumbull and Tuscarawas, and the Twinsburg Academic Center, have open enrollment admission for students who hold a high school diploma, GED or equivalent.

Some programs may require that students meet certain requirements before progressing through the program. For programs with progression requirements, the information is shown on the Coursework tab.

For more information on admissions, contact the Regional Campuses admissions offices.

Learning Outcomes

Program Learning Outcomes

Graduates of this program will be able to:

  1. Demonstrate core competency in cybersecurity-related topics.
  2. Describe the scope of the information security field and its impact on information technology.
  3. Identify and analyze security risks to determine potential impacts.
  4. Demonstrate ability to develop plans to mitigate security risks.
  5. Identify professional, legal and ethical behavior.
Coursework

Program Requirements

Major Requirements

Major Requirements (courses count in major GPA)
IT 11004SURVEY OF INFORMATION TECHNOLOGY 3
IT 11005INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY 3
IT 11009COMPUTER ASSEMBLY AND CONFIGURATION 4
IT 13000APPLIED SECURITY ESSENTIALS 3
IT 21002NETWORK SETUP AND CONFIGURATION 3
IT 21007CYBER ETHICS IN INFORMATION TECHNOLOGY 3
IT 21110NETWORK ROUTING AND SWITCHING 3
IT 21200ETHICAL HACKING 3
IT 21300INTRODUCTION TO SECURITY INCIDENT MANAGEMENT 3
IT 22000SURVEY OF IT CYBERSECURITY 3
IT 23000INTRODUCTION TO OPERATING SYSTEM SECURITY 3
IT 24000DEVELOPING AND IMPLEMENTING SECURITY POLICIES 3
Additional Requirements (courses do not count in major GPA)
UC 10001FLASHES 101 1
3
3
3
3
3
Information Technology (IT) Electives7
Minimum Total Credit Hours:60

Graduation Requirements

Minimum Major GPA Minimum Overall GPA
2.000 2.000
Roadmap

Roadmap

This roadmap is a recommended semester-by-semester plan of study for this major. However, courses designated as critical (!) must be completed in the semester listed to ensure a timely graduation.

Plan of Study Grid
Semester OneCredits
IT 11004 SURVEY OF INFORMATION TECHNOLOGY 3
IT 11005 INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY 3
UC 10001 FLASHES 101 1
Information Technology (IT) Elective 3
Kent Core Requirement 3
Kent Core Requirement 3
 Credit Hours16
Semester Two
IT 11009 COMPUTER ASSEMBLY AND CONFIGURATION 4
IT 13000 APPLIED SECURITY ESSENTIALS 3
IT 21002 NETWORK SETUP AND CONFIGURATION 3
Kent Core Requirement 3
 Credit Hours13
Semester Three
IT 21007 CYBER ETHICS IN INFORMATION TECHNOLOGY 3
IT 21110 NETWORK ROUTING AND SWITCHING 3
IT 21200 ETHICAL HACKING 3
IT 21300 INTRODUCTION TO SECURITY INCIDENT MANAGEMENT 3
Kent Core Requirement 3
 Credit Hours15
Semester Four
IT 22000 SURVEY OF IT CYBERSECURITY 3
IT 23000 INTRODUCTION TO OPERATING SYSTEM SECURITY 3
IT 24000 DEVELOPING AND IMPLEMENTING SECURITY POLICIES 3
Information Technology (IT) Elective 4
Kent Core Requirement 3
 Credit Hours16
 Minimum Total Credit Hours:60
Program Delivery
  • Delivery:
    • ​Fully online

Gennie Neuman Lambert (left) and Jenica Jenik (right) show students about theatre design, technology and production.

 In a world where creativity knows no boundaries, the vibrant halls of the College of the Arts make a canvas for artists of all abilities. Nearly 1,100 guests gathered at the Arts Without Limits 2024 event on Oct. 9 as the air buzzed with inspiration and new perspectives on artistic career paths.Though many artistically minded students may believe that they must sacrifice comfort for creativity, the Arts Without Limits event is designed to showcase the endless possibilities of future creative careers. Many partners such as the John S. and Marlene J. Brinzo Center for Entrepreneurship, Ken...

Panoramic view of Prague from a rooftop perspective
Return to Search Results

Theatre & Social Change / Medievalism in Czechia

Program Contact Information

Subscribe to