Ivy Tech is certified by the NSA as a Center for Cyber Security in education for two year colleges. We are also one of the few two year colleges that offer this program. Ivy Tech Community College created the Center for Cyber Security to meet the demands for high-quality cyber security education and training. Through our nationally recognized center, Ivy Tech students receive the education and training they need for jobs that secure our community, state and nation’s computers, networks and critical infrastructure. The quality of Ivy Tech’s programs is recognized by several governmental entities, attesting to the quality of the curriculum, instruction and administrative support.
Here is an overview of the certificates and degrees we award at Ivy Tech Community College. "Associate of Science" is a direct-transfer degree into a 4-year institution. Click on the credential to view the official statewide curriculum.
Cyber Security/Information Assurance AAS
60 credit hoursClasses on the left are required coursework for our technical and associate degrees. Classes on the right are technical selectives our students get the choose from. Official curriculum guides can be found here.
Required Coursework
CompTIA A+
Intro to Cyber Security
Digital Forensics
Project Management
Network Protocol Analysis
Perimeter Defense
Ethical Hacking
Informatics Fundamentals
Linux/Virtual Tech
Hardware/Software Support
CompTIA Security+
Routing and Switching
Networking Fundamentals
Computing Logic
Selective I
CompTIA Network+ Certification
Cisco CCENT Certification
CompTIA Linux+ Certification
Selective II
Intro to Software Development
Linux Administration
Enterprising Computing
Internship
Advanced Digital Forensics
Business Continuity in an Information World
Special Topics
Advanced Special Topics
Here is a breakdown of the key concepts and objectives students must learn in their coursework at Ivy Tech Community College.
INFM 109: Informatics Fundamentals
Nature of information • Knowledge domains • Overview of Microsoft Word • Overview of Microsoft Excel • History of computing • Operating systems • Networking • Storage technologies • Storage techniques • Internet basics • Security • System Development Life Cycle • Information Systems Fundamentals • Database TechnologyITSP 135: Hardware/Software Support
System assembly • Device installation and maintenance • Operating systems • Needs assessment • Networking basics • Security essentials • Forensics fundamentals • System documentation • Troubleshooting theory • Issue resolution • Desktop imaging • Virtualization Mobile OSs • Professional communication TCP/IP • BIOS • SOHO • Mobile computingNETI 105: Network Fundamentals
Cisco IOS • Protocols • Integrity and Availability • Routing • IP Addressing • Security • Local Area Network (LAN) • TCP/IP Model • Maintaining and Upgrading • Standards and the OSI Model • Network Cabling • Transmission Basics and Networking Media • Network Hardware • Troubles Shooting • Network Operating Systems • WANs and Remote Connectivity • Physical and Logical Topologies • Wide Area Network (WAN)SDEV 120: Computing Logic
Algorithms and Algorithm Development • Logic Development • Math Concepts • Numbering Systems: Binary, Decimal, Hexadecimal • Basic Programming Control Structures • Flowcharting and Pseudocode • Relational and Logical Operators • Order of Precedence • Truth Tables and Decision Trees • Data Validation • Scripting • Work Ethic • Software Development Life Cycle • Deductive and Inductive Logic • Set Theory • Logic Structures • Fuzzy Logic and Ladder Logic • Logic Gate Theory • Puzzles and Games • Graphing • Unified Modeling LanguageCSIA 105: Intro to Cyber Security/Info Assurance
Security reviews • Effectiveness of security programs • Investigation of security breaches • Monitoring systems for accuracy and abnormalities • Privacy • Accountability controls • Audit trails and logs • Software design standards • Denial of service, spoofing, and hijacking • Networking • Defense in depth • Cryptography • Security Technologies • Legal, ethical and professional issues in Information Security • Attribution • Destruction of mediaCSIA 210: Network Protocol Analysis
Headers • Payloads • ARP • RARP • IPv4 • IPv6 • RIPv1/ v2 • OSPF • EIGRP • BGP • DHCPv4 /v6 • APIPA • Host/interface address determination • Stateless and stateful address auto configuration • ISATAP • 6to4 • Teredo • OSI Model • TCP/IP Model • Wire Shark • TCPdump • NmapNETI 115: Routing and Switching
VLANs • STP • RSTP • PVSTP • 802.1q • RIPv1 • RIPv2 • RIPng • DHCP • Single-area OSPF • DNS • Static/Default routing • Cisco IOS • NAT • IPv4 • IPv6SVAD 111: Linux/Virtualization Tech Fundamentals
Command Line • NIC Configuration • LAN Settings • Users • Groups • File management • Shell scripts • File systems • File permissions • File ownership • Find system files • Virtualization • TroubleshootingCSIA 135: Digital Forensics
Software tools • Forensic processes • Forensic procedures • Incident response • PC hardware • File system architecture • Digital evidence, acquisition and storage • Windows registry • Legal procedures • Data recoveryCSIA 215: Perimeter Defense
Firewall • DMZ • Intrusion Prevention Detection Systems • Security policies and procedures • Authorization, Authentication, and Accounting • LAN Security • NAT • VPN • WLAN • Confidentiality, Integrity, and Availability • Packets • FilteringCPIN 269: Project Management
Data flow diagrams • Structure charts • Flow charts • Data Dictionaries • Prototyping • Object-oriented • Case tools • Team dynamics • Project management • Conversion methods • Total cost of ownership • Return on investmentCPIN 279: Exploration/Evaluation
Interviews • Team participation • Time management • Portfolios • Career paths • Communication skills • Life-long learning • Electronic presentationsCSIA 225: Ethical Hacking
Footprinting • Enumeration • Threats and defense mechanisms • Web applications • Data servers • Linux, Macintosh and mobile systems • Secure network infrastructurePrograms learned:
Autopsy
EnCase
Kali
This is only for the Indianapolis/Central Indiana campus and surrounding service sites of Avon, Lawrence, Noblesville, Greencastle, Mooresville, Franklin, and Shelbyville.
Total Students
Part Time Status
Retention
Sophomores
Last Semester's Awarded Credentials
Contact the School of IT Career Experiences Specialist, Jessica Jagger, today via phone, LinkedIN, or email.