General Education & Transfer
Associate of Applied Science • 60 Credit Hours
The Associate in Science Degree in Transfer Studies provides graduates with enhanced work skills without requiring the larger commitment of time or money necessary for a bachelor’s degree.
Many businesses and industries seek well-rounded employees whose maturity level and communication and decision-making skills are a step above those of traditional high school graduates. The Associate in Science Degree in Transfer Studies provides graduates with enhanced work skills without requiring the larger commitment of time or money necessary for a bachelor’s degree. This degree is ideal for currently employed high school graduates who need a college degree to advance in their positions.
Information Security Analysts
2019 Median Pay
$99,730 per year
Number of Jobs
112,300 in 2018
Much faster than average employment.
For the most current salary information, please refer to the Bureau of Labor Statistics “Occupational Outlook Handbook” found online at bls.gov/ooh/.
The college adheres to an open admission policy which means applications with a high school diploma or GED are eligible for admission. Applicants with neither a high school diploma nor GED may be admitted on a conditional basis.
Employment of information security analysts is projected to grow 32 percent from 2018 to 2028, much faster than the average for all occupations.
Demand for information security analysts is expected to be very high, as these analysts will be needed to create innovative solutions to prevent hackers from stealing critical information or causing problems for computer networks.
Information security analysts must stay up to date on IT security and on the latest methods attackers are using to infiltrate computer systems.
Analysts need to research new security technology to decide what will most effectively protect their organization. MCTC’s Network Systems Cybersecurity option provides the fundamental cybersecurity knowledge and skills with specific network security training crucial for entry into information security positions in public corporations and government entities.