Cybersecurity (BAS)(Plan Code: CISCYBAS)

Academic Plans, known as programs, include an overview description and a summary of program requirements. You can search the online catalog via the Academic Plan links on the right for a desired program or a specific course information. 

A minimum of 35 quarter units or 24 semester units (100-level or above) must be completed prior to program completion and needs to include five units minimum in each of the following categories: communication studies, quantitative skills, humanities, social science, and natural science as defined by Clark College. 

General Education Requirements (45 credits/units required)
Communication Skills
ENGL& 235Technical Writing5
CMST 310Organizational Communication5
Quantitative/Symbolic Reasoning
PHIL& 120Symbolic Logic5
CMST& 230Small Group Communication5
PHIL 420Ethics In Management5
Social Science
ECON 110Introduction to The Global Economy5
SOC 315Organizational Behavior5
Natural Science
ENVS 109Integrated Environmental Science5
ENVS 430Sustainability & Environmental Practices5
Qualifying AA/AAT/AAS General Education Requirements
Communication Skills
ENGL& 101English Composition I5
Computational Skills
Any generally transferable computational course with Intermediate Algebra as a prerequisite5
Human Relations
Course Options5
Major Area Requirements
NTEC 321Enterprise Networking Foundation5
NTEC 361Cybersecurity Programming & Scripting Foundation5
NTEC 364Iot Foundation: Connecting Things5
NTEC 365Big Data & Analytics Foundation5
NTEC 371Cybersecurity Foundation5
NTEC 472Cybersecurity Penetration Testing5
NTEC 473Cybersecurity Analyst5
NTEC 475Cybersecurity Operations5
NTEC 499Capstone Project5
Qualifying AA/AAT/AAS degree90
Total Credits/Units Required180

Program Outcomes

Program outcomes are overarching skills that are emphasized and reinforced throughout several courses in a specific program; they are measurable statements that define what students should know or be able to do by the end of a certificate or degree at Clark College. After successful completion of this program, students will be able to:

  • Plan, implement, administer, and support enterprise information technologies and systems.
  • Analyze the security vulnerabilities of an organization’s information technology resources.
  • Plan and implement security measures and practices for an organization’s information technology resources.
  • Evaluate organization needs, and use those to plan the implementation of information technology systems.

Program maps are a suggested academic plan and should not be used in the place of regular academic advising appointments. Your student entry method, placement, course availability, and program requirements are subject to change and transfer credit(s) may change your map/plan.
To view the current suggested map for your program please visit our website