Cybersecurity
Cybersecurity, BAT
Degree Type Bachelor of Applied Technology
Total Credit Hours 120
Cybersecurity at Collin
With high-profile information breaches and identity thefts in the news regularly, the need to secure data and the systems that store it has never been more important. Play your part in keeping important information safe with a certificate or degree from Collin College's Information Systems Cybersecurity program.
Building on a strong networking and operating systems foundation that provides students with the prerequisite knowledge to be successful in cybersecurity, the BAT in Cybersecurity provides students with a hands-on program covering multiple aspects of cybersecurity including penetration testing, defensive operations, basic cryptography, privacy, cybercrime, and cyber policy.
ADMISSIONS REQUIREMENTS
Admission to the BAT-Cybersecurity Program is selective. Admission to the college does not guarantee admission to the BAT-Cybersecurity Program. Registration into upper division courses is by departmental permission only. Information and applications may be obtained from the BAT-Cybersecurity website: https://www.collin.edu/department/cybersecurity/index.html.
- Complete an associate degree in Information Security/Information Systems Cybersecurity (AAS) or closely related degree from an accredited educational institution
- Complete an application for admission to Collin College
- Submit official transcripts from all colleges/universities
- Once a CWID has been provided, complete a Request for Transfer Credit Evaluation (in CougarWeb under Home Tab)
- Complete departmental admissions requirements per departmental communication
- Attend the mandatory BAT-Cybersecurity student orientation prior to enrollment
- Submit a completed Ethical Obligation form prior to enrollment
The academic records of students completing the admissions requirements will be reviewed by the department for specific coursework that can be transferred into Collin College and applied toward the BAT-Cybersecurity degree program. Students will either be admitted into the BAT program or not admitted into the BAT program and directed to work with academic advisors to devise a plan for how to complete the required coursework necessary to be admitted to the BAT program.
Resources for Prospective Students
Lorem sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Admission & Applyingto the BAT-
Cybersecurity Program
How do I order my official transcript?
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
How do I access my unofficial transcript?
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
I have a hold on my transcript request. Why was my credit card charged?
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
Program Curriculum
First Year
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
Second Year
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
Third Year
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.3
Fourth Year
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
Entry-level Career Opportunities in Cybersecurity
- Security Analyst
- Security Architect
- Security Engineer
- Security Administrator
- Incident Analyst/Responder
- Penetration & Vulnerability Tester
One of the fastest growing, high-paid career fields.
Are you ready? Prepare yourself to be an offensive and defensive player to protect the cyber world. For a live look at how fast paced this field can be we’ve curated a cyber attack map.
Cyber Attack MapStudent Spotlight
First Last Name
Class of '23
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quam non elementum id nibh et est, lorem est vel. Elementum maecenas aenean nulla elit lectus. Platea sit ut in arcu nibh. Eu pretium iaculis neque pellentesque pellentesque id tristique nisl eget. Pharetra eleifend tellus porta sit. Felis feugiat integer a, amet, lacus cursus eget integer. Eget pulvinar eu nunc convallis fermentum. Cras fermentum ornare lectus at feugiat pellentesque scelerisque sed.
Read More