Earn valuable, in-demand job skills with a technical degree in a STEM field.

Explore MGCCC's STEM Programs

  • 3D Modeling and Design Technology

    Become a designer or CAD technician with instruction in computer aided design, architectural design, civil planning, 3D-modeling and manufacturing.

  • Automation/Mechatronics Technology

    The Automation/Mechatronics Technology prepares students to work with a variety of automated electro-mechanical, product assembly, process control, and product distribution systems that use programmable controls and other methodologies to accomplish system management.

  • Computer Networking Technology

    Join a program that provides students with the required skills and expertise to become computer networking technicians and/or network administrators.

  • Computer Networking Surveillance Technology Gaming Concentration

    Gain the skills needed to begin a career in the gaming industry’s surveillance field. Fight theft, fraud, and security threats through computer surveillance.

  • Computer Programming Technology

    Computer Programmers are in demand! This program offers courses in computer programming languages like Python, SQL, and BASIC, web development (HTML & CSS), data security, and more.

  • Database Administration Technology

    The Database Administration Technology curriculum is designed to prepare the student for entry-level employment in the database administration field.

  • Electronics Technology

    Become a competent electronics technician and be ready for entry-level employment in scientific research, engineering, and production.

  • IT Specialist Technology

    IT Support is the fastest growing industry in the world! A two-year degree prepares students for entry level positions across nearly every industry that needs computer systems support, data security, and network administrators.

  • Network Security Technology

    Network Security Technology is a two-year program that offers practical training in the areas of confidentiality, integrity, and availability in information security.