CYB-5100
×
CYB-5100 Cybersecurity FoundationsCybersecurity Foundations covers fundamental concepts of the interdisciplinary field of cybersecurity by taking into consideration both technical and management aspects. Students analyze cyber threats and vulnerabilities and examine common cyber defense technologies, processes, and procedures. Students are exposed to how cybersecurity can be enforced, in networks, operating systems, and software development lifecycle (SDLC). The course also introduces students to the human, legal, privacy, and ethical aspects of cybersecurity. The goal is to prepare students for advanced study in cybersecurity. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Cybersecurity Foundations | 3 |
CYB-5200
×
CYB-5200 Network Defense and SecurityNetwork Defense and Security offers in-depth coverage of secure network design concepts, intrusion detection and prevention systems, network monitoring and mapping tools, web filtering, packet filtering, and advanced malware protection. Proactive methodologies for assessing and analyzing both host-based and network-based vulnerabilities are examined. Appropriate network defense measures and technologies are identified and evaluated. The course also examines the nomenclature of mobile and wireless networks and security of mobile systems and devices. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Network Defense and Security | 3 |
CYB-5300
×
CYB-5300 Operating Systems SecurityThis course explores the fundamentals of modern operating systems (OS), including basic operating system structure, file systems and storage, memory management techniques, process scheduling and resource management, and threads. Course activities evaluate OS-level mechanisms as well as policies designed to detect and defend against cyberattacks. Lab activities explore applications of OS security techniques such as authentication and memory protection. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Operating Systems Security | 3 |
CYB-5400
×
CYB-5400 Cryptography and Data SecurityCryptography and Data Security is the study of information hiding and verification. It focuses on how cryptographic protocols, algorithms, tools, and techniques work, how to appropriately apply them to prevent or delay unauthorized access to sensitive information, and how to enable verifiability of every component in a communication. Different attacks on cryptographic systems are analyzed and the role of cryptography in data protection, data integrity, privacy, and authentication is thoroughly investigated. Students learn to protect data at rest, in process, and in transition. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Cryptography and Data Security | 3 |
CYB-5500
×
CYB-5500 Software and Applications SecurityThis course covers the foundations of software and applications security. It provides exposure to key programming and software development processes, underlining for students the risks associated with insecure software. Fundamental coding concepts, principles, and techniques that make software more secure and resilient are explored. The course analyzes software vulnerabilities and attacks, such as buffer overflows, SQL (Structured Query Language) injection, and session hijacking. It also applies appropriate prevention and mitigation methods including advanced testing and program analysis techniques. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Software and Applications Security | 3 |
CYB-5600
×
CYB-5600 Cyber Forensics and InvestigationThis course covers the fundamental concepts, tools, and techniques of digital forensics and cyber investigation. Topics include the identification, preservation, collection, examination, analysis, and presentation of digital evidence for administrative, civil, and criminal investigations. Applications of appropriate tools and technologies used for securing, handling, and preserving digital evidence are explored. The legal and ethical aspects associated with digital forensics and cyber investigation are examined in depth. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Cyber Forensics and Investigation | 3 |
CYB-5700
×
CYB-5700 Cyber Risk Management and Incident ResponseThis course delves into practical methods and techniques used for assessing and managing cybersecurity risks to an organization. Both quantitative and qualitative risk assessment methodologies are covered. Common cybersecurity risk assessment/management models and frameworks are evaluated and applied. Another major area of focus is cyber incident response and contingency planning consisting of incident response planning, disaster recovery planning, and business continuity planning. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Cyber Risk Management and Incident Response | 3 |
CYB-5800
×
CYB-5800 Cybersecurity Strategy, Governance, and EthicsThis course provides the knowledge and skills necessary to design a cybersecurity strategy in a modern enterprise, including managing people, processes, and technology. Students analyze security organizational dynamics, cybersecurity policy, and governance oversight including audit and control functions to ensure compliance and efficacy. Students also learn to navigate the human, legal, privacy, and ethical aspects of cybersecurity. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Cybersecurity Strategy, Governance, and Ethics | 3 |
CYB-6900
×
CYB-6900 Special Topics in CybersecurityThis course explores emerging trends and latest technological advances related to cybersecurity and cyberspace. Special, state-of-the-art cybersecurity-related topics are explored, such as cloud computing security, security of the Internet of things (IoT), security of industrial IoT (IIoT) and cyber-physical systems (CPS), prevention and detection of insider threats, supply chain security, and blockchain technology for IT security. Topics are modified from time to time to reflect the rapidly evolving changes in the field of cybersecurity. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Special Topics in Cybersecurity | 3 |
CYB-7000
×
CYB-7000 Capstone in CybersecurityCapstone in Cybersecurity is an integrative, multidisciplinary course that applies the knowledge, skills, and postures gained throughout the program to real-world cybersecurity contexts. Students analyze current cybersecurity problems and develop recommendations to solve issues and/or mitigate the impact. Students apply best practices and appropriate technologies to design, implement, manage, assess, and further enhance information security in a modern enterprise. Students also demonstrate self-awareness and industry knowledge that integrates their academic and professional career journeys into actionable post-degree next steps. Credits: 3 Delivery Methods: Online Please contact the schools for availability. Preview the Online Syllabus | Capstone in Cybersecurity | 3 |
Total Credit Hours: 30