Every organization thrives on the data that keeps it afloat. Just like a house that protects the contents and the people within from environmental, person and physical threats, data needs protection as well. Just ask Target, Anthem, some universities, etc.
The Cybersecurity program at Lord Fairfax Community College strives to prepare individuals to assess the threats and tackle the methods so as to thwart possible negative outcomes before they occur. Each student in the program is prepared with the knowledge and skills to choose how to become a future Cyber warrior who can analyze and defend against adversaries within the United States shores. Your choice can be through additional advanced study at an institution of higher learning or by entering directly into the cybersecurity career workforce. Either choice requires perseverance, dedication and a passion for the highly technical skills necessary to be successful for this career path. Are you ready for it? Can you hack it? Can you be the next Cyber Warrior that prevents a major cyber attack? Will you discover the right encryption algorithm to keep data safe for decades to come? Let’s find out. That may be you.
CAE2Y Designated Degree Program
The AAS in Cybersecurity degree program is designated by the National Security Agency and the Department of Homeland Security as a program of quality that satisfy specific knowledge and skill objectives as evaluated by those government agencies.
Equal Opportunity Program
The Cybersecurity program supports equality and diversity. There are various career opportunities in cybersecurity for women and minorities, so women and minorities are strongly encourage to apply.
Lord Fairfax Community College (LFCC) offers two pathways to develop the skills and knowledge needed to embark on a successful career within the field of cybersecurity:
Associate of Applied Science (AAS) in Cybersecurity (CAE2Y)
The AAS degree program can be completed in two years with two primarily objectives for graduates: 1) transferring to four year bachelor degree programs or 2) choosing direct employment into the cybersecurity field.
Cybersecurity Career Studies Certificate (CSC)
The CSC can be completed in one year and/or its courses can be transferred to the AAS degree program, if so chosen at a later time. The CSC is a separate path designed to add a skill set to students who may have a degree or to those who want an additional skill set.
Both programs (AAS and CSC) are currently offered at the Middletown and Fauquier Campuses.
Associate of Science in Science: Cybersecurity Engineering Specialization (ASCYSE)
This is new degree beginning Fall 2020 which looks at the security of hardware, and SCADA related systems (electrical, water, ecological, PLCs, etc.). The degree is transferable to George Mason University’s Bachelor of Science in Cybersecurity Engineering. Additional description is on the LFCC program page.
General Program Educational Objectives (PEOs). (Also on the LFCC main program page)
Within three to five years after graduation, graduates of the Associate of Applied Science in Cybersecurity program at LFCC are expected to achieve the following:
- Direct Job Placement in Cybersecurity Discipline
Graduates are gainfully employed in a cybersecurity role
- Advanced Skills for Cybersecurity Positions of Higher Complexity and Career Growth
Graduates gain additional education for positions in high demand cybersecurity roles
- Advanced Degree/Credential Attainment
Graduates can obtain the advanced degree so as to contribute positively to the community.
ABET Criterion 3 Program Student Outcomes Criteria (also on LFCC main program page)
Graduates of the program will have an ability to:
- Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
- Apply security principles and practices to maintain operations in the presence of risks and threats.
- Communicate effectively in a variety of professional contexts.
- Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
- Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
Additional Student Learning Outcomes
Graduates of the program will also have the ability to:
- Manipulate data into meaningful information.
- Manipulate protocol header data by creating simple scripts/programs to automate and perform simple operations (e.g. bounds checking, input validation, attack mitigation)
- Describe current threats and explain how to continuously monitor the threats that may be present in the cyber realm.
- Identify the options available to mitigate threats within a system.
- Apply basic security design fundamentals that help create systems that are trustworthy.
- Describe the basic concepts of information assurance fundamentals.
- Explain where and how cryptography is used.
- Describe the basic components in an information technology system and their roles in system operation.
- Identify network components and describe how they interact.
- Explain information assurance (IA) in context and the rules and guidelines that controls IA principles.
- Perform basic security maintenance operations involved in system administration.
Below are links to three key organizations for cybersecurity. Click on their logo to be redirect to their websites.