Maricopa Emergency Management System Alert

COVID-19 Update: The EMCC campus is open for classes, appointments, and walk-in services. Masks are required for everyone inside ALL buildings at EMCC.  All student support services are still available online. Students are encouraged to contact their instructors for additional information.

Cyber Engineering

The Certificate of Completion (CCL) in Cyber Engineering program is designed to focus on the necessary skills required to secure, protect and identify vulnerabilities in a network, including various operating systems and network devices. Emphasis is placed on developing the theoretical, legal, ethical and practical skills needed to maintain security on mission-critical networking and server systems. The program is designed to meet the training needs of government and industry employees. The program covers a variety of information security technologies and structured languages. The Cyber Engineering program also focuses on the skills needed for internationally recognized IT certifications and high demands in business, industry, and government. An Associate in Applied Science (AAS) in Cybersecurity is also available.


Details iconImportant information you’ll need when applying for admission:
Field of Interest
Computer and Information Technology
Cyber Engineering (CER)
Total Credits Required
Effective term
Fall 2021

Students must earn a grade of C or better in all courses within the program.

Courses within any of the following prefixes must be taken within five (5) years prior to completion of the program to be applied toward this award: AIM, BPC, CIS, CLD, CNT, CSC, ITS, and MST.

What You'll Learn
  • Explain the fundamental components, concepts, and application of cybersecurity principles. (BPC270, CIS105, CIS126DL, CIS126RH, CIS156, CIS162++, CIS227, CIS238DL, CIS238RH, CIS250, CIS262++, CIS270, CIS271DB, CIS272DB, ITS110, MST150++)
  • Describe cyber defense tools, methods, and components. (CIS156, CIS190, CIS270, CIS271DB, CIS272DB, CNT140AB, ITS110, ITS240)
  • Apply cyber defense methods to prepare a system to repel attacks. (CIS156, CIS270, CIS271DB, CIS272DB, ITS110, ITS240)
  • Analyze common security failures and identify specific design principles that have been violated. (CIS270, CIS271DB, CIS272DB, ITS110)
  • Understand the interaction between security and system usability and the importance for minimizing the effects of security mechanisms. (CIS270, CIS271DB, CIS272DB, ITS110)
  • Apply appropriate protocols, tools, and techniques to maximize security in the network environment. (CIS119DO, CIS156, CIS162++, CIS190, CIS227, CIS262++, CIS270, CIS271DB, CIS272DB, CIS276++, CNT140AB, ITS110, ITS240)
  • Describe the fundamental concepts, technologies, components, vulnerabilities, and issues related to networks. (CIS105, CIS119DO, CIS190, CIS238RH, CIS238DL, CIS270, CIS271DB, CIS272DB, CIS276++, CNT140AB, ITS110)
  • Identify and describe basic security issues of operating systems. (BPC270, CIS105, CIS126DL, CIS126RH, CIS238DL, CIS238RH, CIS270, CIS271DB, CIS272DB, ITS110, ITS240, MST150++)
  • Identify perpetrators, their resources, and their motivations in cyberspace. (CIS111, CIS270, CIS271DB, CIS272DB, ITS110, ITS120, ITS240)
  • Compare and contrast offensive and defensive resources used in cybersecurity ecosystems/environment. (CIS270, CIS271DB, CIS272DB, ITS110, ITS240)
  • Delineate differences between the moral, behavioral, ethical, and legal ramifications found in the cybersecurity world. (CIS105, CIS111, CIS156, ITS120)
  • Apply knowledge of regulatory and legal requirements to ensure compliance. (CIS111, ITS120, ITS240)
  • Apply risk analysis methodologies to identify potential vulnerabilities, associated impacts, and recommend appropriate responses. (CIS111, CIS238DL, CIS238RH, CIS270, CIS271DB, CIS272DB, ITS110, ITS120, ITS240)
Career Opportunities
Required courses
Course #Course TitleCredits
The following courses are required and included in the CCL in Cybersecurity Fundamentals
BPC270A+ Exam Prep: Operating System Configuration and Support (3) OR
MST150++Any Microsoft Windows course (3)3
CIS105Survey of Computer Information Systems3
CIS111Ethics in Information Technology (3) OR
ITS120Legal, Ethical and Regulatory Issues (3)3
CIS126DLLinux Operating System (3) OR
CIS126RHRed Hat System Administration I (3)3
CIS156Python Programming: Level I3
CIS190Introduction to Networking (3) OR
CNT140ABIntroduction to Networks (4)3-4
CIS270Essentials of Network and Information Security (3)
CIS271DBInformation Security Essentials (3) AND
CIS272DBInformation Security Principles (3)
ITS110Information Security Fundamentals (3)3-6
ITS240Ethical Hacking and Network Defense3
The following courses are required in the CCL in Cyber Engineering
CIS119DOIntroduction to Oracle: SQL (3) OR
CIS276++Any SQL Database course (3)3
CIS162++Any C Programming: Level I course3
CIS227Assembler Language3
CIS238DLLinux System Administration (3) OR
CIS238RHRed Hat System Administration II (3)3
CIS250Management of Information Systems3
CIS262++Any C Programming: Level II course3

At Maricopa, we strive to provide you with accurate and current information about our degree and certificate offerings. Due to the dynamic nature of the curriculum process, course and program information is subject to change. As a result, the course list associated with this degree or certificate on this site does not represent a contract, nor does it guarantee course availability. If you are interested in pursuing this degree or certificate, we encourage you to meet with an advisor to discuss the requirements at your college for the appropriate catalog year.