New course description This course introduces fundamental technologies used in information systems. Students will develop a foundation in cybersecurity by learning the fundamental concepts behind cybersecurity. In addition, students will learn cybersecurity principles used in the design of systems to protect information and assets against persistent and constantly evolving threats.
The major focus of this course will be the relational and NoSQL models of database types. Topics include relational modeling, NoSQL databases and their application, Structured Query Language (SQL), application development using databases, access controls, security principles, common vulnerabilities, mitigations and emerging trends. Students will prepare a small application using a commercial database management system. Pre-requisite: CIS 245, CYBR 250
This course focuses on the knowledge required to operate a security program within an organization. Various components of secure operations, including policies, regulatory compliance, ethics, cryptography, human factors, and risk management are identified and applied to scenarios. Students will practice constructing a comprehensive security program that incorporates those secure operations components and concepts, including contingency plans and security awareness education. Pre-requisite: CYBR 250
This course explores secure base operating systems on server, desktop, virtual, and mobile platforms. Topics include the practical application of security tools, utilities, and configurations for protecting computer operating systems at both the user and corporate level. Course subject is also related to protecting stand-alone and virtualized servers, cloud computing security, and the protection of mobile platforms such as smart phones, tablets and handheld computers. Pre-requisite: CYBR 250
This course explores cybersecurity considerations of web applications, such as how and why web applications are vulnerable, and how to mitigate those weaknesses through secure development and deployment practices using the Open Web Application Security Project (OWASP) Top 10 vulnerabilities as a focus. Students will exploit sample web application vulnerabilities and document the process. Pre-requisite: CYBR 309 and CYBR 340
This course examines basic methods of investigation, information acquisition, and management of Internet and computer forensic cases. Topics include record-searching, note taking and report writing, and using scientific methodology in Cyber investigations. Coverage also includes basic tools and techniques for forensic analysis of computers, networks systems, and mobile devices. Pre-requisite: CYBR 340
This course provides an introduction to penetration testing and incident response tactics, techniques, and procedures. Topics include ethical and legal implications of penetration testing, network information gathering, system vulnerability analysis, common tools and techniques used in penetration testing, traffic analysis, incident response, and related defensive measures. Pre-requisite: CIS 245, CYBR 340
This course presents a sampling of real-world security issues that confront a modern business. In it, students learn practices used in the underworld of cybercrime in order to reduce their risks. One area of particular emphasis is compliance with laws and regulation in the areas of cyber systems and business policies. Another is analyzing business and economic risks associated with cyber systems. This course is suitable for students majoring in cybersecurity, Information Systems or Business, or anyone interested in understanding how, why, when, and where cybercrime may occur.
This course explores the management of security and privacy in the healthcare industry. Coverage includes an extensive study of HIPAA and other applicable laws, and methods for compliance with those laws. Discussion also includes the security of health information systems. This course is suitable for students majoring in Cybersecurity, Information Systems or Healthcare, or anyone interested in learning more about security and privacy in the healthcare industry.
This course provides students with the knowledge and skills related to detecting and analyzing vulnerabilities and threats and taking steps to mitigate associated risks. Topics include incident response plans, managing cybersecurity incidents, log file analysis, anomaly detection, network security monitoring, host based and network-based intrusion detection and prevention, malware analysis and threat intelligence. Prerequisites: CYBR 420, CYBR 430.
This course continues students’ study of intrusion detection and response by providing students with the advanced knowledge and skills related to detecting and analyzing vulnerabilities and threats and responding to cybersecurity incidents. Topics include threat hunting and advanced threat intelligence, security automation, playbooks, machine learning for detection and response, log aggregation and correlation, incident response in the cloud, threat emulation, writing custom intrusion detection system rules and advanced malware analysis. Prerequisites: CYBR 420, CYBR 440.
This course provides a monitored structure for application of the skills and knowledge acquired throughout the Cybersecurity program. Emphasis is placed on the use of real-world security problems, issues, and situations. Course assignments will require the use of protection, detection, deterrence, and response techniques in addressing threats, vulnerabilities, and risks found in businesses today. Students may enter this course when they have completed 24 credit hours of the required major courses. Prerequisite: 24 credit hours of the required major courses.
This course presents an examination of effective security methodologies based on comprehensive assessment of threats and implementation of a layered system of physical and electronic protection. Threat identification, countermeasures, and prevention are explored.
This course provides an introduction to the fundamental components of security architecture. Topics include computer organization; hardware, software and firmware components; open and distributed systems; and protection mechanisms. Discussion also includes certification and accreditation; formal security models; and evaluation criteria. Assigned projects include designing a model secure system.
This course provides an exploration of the human aspects of Cybersecurity. Topics include human behavior and interaction, motivation and influence, and social engineering. Emphasis on the human element of cyber incidents in relation to protecting information and technology assets.
This course provides a technical study of offensive and defensive techniques for protecting cyber assets. Topics include security testing, risk mitigation techniques, and threat response. Discussion also includes penetration testing theory, techniques, and tools; networks, systems, and application vulnerability scanning; risk analysis and response; and intrusion detection and response. Emphasis is placed on identification of system vulnerabilities and threats and techniques for preventing attacks.
This course explores common techniques, tools, and technologies for committing white-collar cyber crimes. Topics include fraud prevention, anti-money laundering, investigative methodologies, and protecting privacy. Case students will demonstrate real-world scenarios of white collar crimes, how to prevent or deter them, detection methods, and response techniques.
This course provides an exploration of how organizations manage risks to information technology assets. Discussion includes the application of methodologies and models for managing such risks. Topics also include recognition of security threats and vulnerabilities and the analysis of associated risks. A systematic approach for acquiring and analyzing information to support decision-making in the protection of assets and the allocation of security resources is presented.
This course explores risks associated with Industrial Control Systems (ICS) within and across critical infrastructure and key resource sectors. Topics include a comparative analysis of IT and control system architecture, security vulnerabilities, and mitigation strategies unique to the control system domain. This includes activities to reduce the likelihood of success and severity of impact of a cyber-attack against critical infrastructure control systems through risk-mitigation activities.
This course explores the concepts of governance and how it applies to information systems. Discussion includes the importance of compliance with laws, regulations, policies, and procedures as a means of minimizing risk through mandated security and control measures. Through this course, students also gain an understanding of Information Technology (IT) Auditing processes and principles.
This course provides cybersecurity students with an advanced study of computer, network, and device forensics as a part of investigations. Students will conduct hands-on forensic research to identify how digital media and/or digital networks were compromised and the method(s) of intrusion employed. Students will be able to review what data is stored on a device, how the device services are consumed, and what methods attackers (and forensic analysts) deploy to retrieve information without an owner’s permission. Pre-requisite: CIS 607.
This course provides the student with an opportunity to identify the processes associated with business continuity planning and disaster recovery. Business continuity topics such as project scope and planning, assessing risk, developing policy and procedures, conducting business impact analyses, recovery strategies, recovery plan development, and implementation are explored. Disaster recovery will be discussed in terms of recovery plan development, implementation, and restoration.
This course builds on CYBR 525 and explores advanced concepts, methods and techniques in preparing and conducting penetration tests on computers, networks, and devices. Students will employ various tools as well as unravel complex methods for exploiting client-side, service side and privilege escalation attacks. They will use advanced tools, techniques, and technologies for determining vulnerabilities in information systems and applications. Students will construct a final report outlining discovered vulnerabilities, make suggested recommendations to remediate and/or mitigate those vulnerabilities. Pre-requisite: CYBR 525.
This course presents an in-depth study of current trends in Cybersecurity threats. Discussion includes the identification and management of threats and vulnerabilities within an effective enterprise security program. Prior Cybersecurity education is synthesized through projects and assignments. Prerequisite: Must have 30 hours towards major requirements completed.