{"id":1188,"date":"2022-11-04T14:23:50","date_gmt":"2022-11-04T18:23:50","guid":{"rendered":"https:\/\/middlesexcollege.edu\/academics\/?page_id=1188"},"modified":"2022-11-29T16:39:11","modified_gmt":"2022-11-29T21:39:11","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/middlesexcollege.edu\/academics\/computer-science\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\n<p>The Cybersecurity A.A.S. degree program prepares students for entry-level careers in positions such as Cybersecurity Specialist, Cyber Crime Analyst, Incident Analyst, Junior Penetration Tester, IT Technician, Information Systems Security Analyst, and Network Security Analyst.<\/p>\n\n\n\n<p><strong>Graduates of the program will be able to:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Explain the various aspects of information security such as threat vulnerabilities, types of attacks, profiles of hackers, and intentions of information security breaches.<\/li>\n\n\n\n<li>Demonstrate an understanding of computer systems and networks using tools to identify, manage, and resolve information security related problems and attacks.<\/li>\n\n\n\n<li>Demonstrate professional and ethical codes of conduct when applying security methodologies and\/or using tools to address security related issues.<\/li>\n\n\n\n<li>List and describe information security vulnerabilities in wireless networks, and implement countermeasures to mitigate or eliminate threats.<\/li>\n\n\n\n<li>Analyze and discuss forensic techniques that are used to collect, preserve, and report digital evidence.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"bb-primary-1 wp-block-heading\">Course Requirements<\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button btn btn--size-3\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/middlesexcc.lightcastcc.com\/programs\/cybersecurity-ass\/185536?radius=&amp;region=20%20Mile%20Radius%20Around%20MCC\">Explore Careers and Salaries<\/a><\/div>\n<\/div>\n\n\n\r\n<div class=\"wp-block-buttons\">\r\n  <div class=\"wp-block-button btn btn--size-3\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.course-catalog.com\/mcc\/C\/2024-2025\/degree\/128\">Course Requirements<\/a><\/div>\r\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The Cybersecurity Program provides students with the knowledge and skills that are much sought after by financial and educational institutions, governments, healthcare providers, and more in developing strategies for securing networks and mitigating risks against cyber attacks.<\/p>\n","protected":false},"author":1,"featured_media":1214,"parent":223,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1188","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity | Middlesex College<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/middlesexcollege.edu\/academics\/computer-science\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity | Middlesex College\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity Program provides students with the knowledge and skills that are much sought after by financial and educational institutions, governments, healthcare providers, and more in developing strategies for securing networks and mitigating risks against cyber attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/middlesexcollege.edu\/academics\/computer-science\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Academics\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-29T21:39:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/middlesexcollege.edu\/academics\/wp-content\/uploads\/sites\/8\/2022\/11\/cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"336\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/middlesexcollege.edu\\\/academics\\\/computer-science\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/middlesexcollege.edu\\\/academics\\\/computer-science\\\/cybersecurity\\\/\",\"name\":\"Cybersecurity | Middlesex College\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/middlesexcollege.edu\\\/academics\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/middlesexcollege.edu\\\/academics\\\/computer-science\\\/cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/middlesexcollege.edu\\\/academics\\\/computer-science\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/middlesexcollege.edu\\\/academics\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/11\\\/cybersecurity.jpg\",\"datePublished\":\"2022-11-04T18:23:50+00:00\",\"dateModified\":\"2022-11-29T21:39:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/middlesexcollege.edu\\\/academics\\\/computer-science\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/middlesexcollege.edu\\\/academics\\\/computer-science\\\/cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/middlesexcollege.edu\\\/academics\\\/computer-science\\\/cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/middlesexcollege.edu\\\/academics\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/11\\\/cybersecurity.jpg\",\"contentUrl\":\"https:\\\/\\\/middlesexcollege.edu\\\/academics\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/11\\\/cybersecurity.jpg\",\"width\":960,\"height\":336},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/middlesexcollege.edu\\\/academics\\\/computer-science\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Computer Science\",\"item\":\"https:\\\/\\\/middlesexcollege.edu\\\/academics\\\/computer-science\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/middlesexcollege.edu\\\/academics\\\/#website\",\"url\":\"https:\\\/\\\/middlesexcollege.edu\\\/academics\\\/\",\"name\":\"Academics\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/middlesexcollege.edu\\\/academics\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity | Middlesex College","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/middlesexcollege.edu\/academics\/computer-science\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity | Middlesex College","og_description":"The Cybersecurity Program provides students with the knowledge and skills that are much sought after by financial and educational institutions, governments, healthcare providers, and more in developing strategies for securing networks and mitigating risks against cyber attacks.","og_url":"https:\/\/middlesexcollege.edu\/academics\/computer-science\/cybersecurity\/","og_site_name":"Academics","article_modified_time":"2022-11-29T21:39:11+00:00","og_image":[{"width":960,"height":336,"url":"https:\/\/middlesexcollege.edu\/academics\/wp-content\/uploads\/sites\/8\/2022\/11\/cybersecurity.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/middlesexcollege.edu\/academics\/computer-science\/cybersecurity\/","url":"https:\/\/middlesexcollege.edu\/academics\/computer-science\/cybersecurity\/","name":"Cybersecurity | Middlesex College","isPartOf":{"@id":"https:\/\/middlesexcollege.edu\/academics\/#website"},"primaryImageOfPage":{"@id":"https:\/\/middlesexcollege.edu\/academics\/computer-science\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/middlesexcollege.edu\/academics\/computer-science\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/middlesexcollege.edu\/academics\/wp-content\/uploads\/sites\/8\/2022\/11\/cybersecurity.jpg","datePublished":"2022-11-04T18:23:50+00:00","dateModified":"2022-11-29T21:39:11+00:00","breadcrumb":{"@id":"https:\/\/middlesexcollege.edu\/academics\/computer-science\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/middlesexcollege.edu\/academics\/computer-science\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/middlesexcollege.edu\/academics\/computer-science\/cybersecurity\/#primaryimage","url":"https:\/\/middlesexcollege.edu\/academics\/wp-content\/uploads\/sites\/8\/2022\/11\/cybersecurity.jpg","contentUrl":"https:\/\/middlesexcollege.edu\/academics\/wp-content\/uploads\/sites\/8\/2022\/11\/cybersecurity.jpg","width":960,"height":336},{"@type":"BreadcrumbList","@id":"https:\/\/middlesexcollege.edu\/academics\/computer-science\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Computer Science","item":"https:\/\/middlesexcollege.edu\/academics\/computer-science\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/middlesexcollege.edu\/academics\/#website","url":"https:\/\/middlesexcollege.edu\/academics\/","name":"Academics","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/middlesexcollege.edu\/academics\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/middlesexcollege.edu\/academics\/wp-json\/wp\/v2\/pages\/1188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/middlesexcollege.edu\/academics\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/middlesexcollege.edu\/academics\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/middlesexcollege.edu\/academics\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/middlesexcollege.edu\/academics\/wp-json\/wp\/v2\/comments?post=1188"}],"version-history":[{"count":5,"href":"https:\/\/middlesexcollege.edu\/academics\/wp-json\/wp\/v2\/pages\/1188\/revisions"}],"predecessor-version":[{"id":1251,"href":"https:\/\/middlesexcollege.edu\/academics\/wp-json\/wp\/v2\/pages\/1188\/revisions\/1251"}],"up":[{"embeddable":true,"href":"https:\/\/middlesexcollege.edu\/academics\/wp-json\/wp\/v2\/pages\/223"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/middlesexcollege.edu\/academics\/wp-json\/wp\/v2\/media\/1214"}],"wp:attachment":[{"href":"https:\/\/middlesexcollege.edu\/academics\/wp-json\/wp\/v2\/media?parent=1188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}