Cybersecurity

Degrees and Certificates

See the Bachelor Completion Program for information to assist the working student.

Classes

CS/CSEC 452: Internship in Computer Science

Credits 3

This course offers computer science majors the opportunity to work in the field of computer science for a minimum of 120 hours during the semester. Students must complete all paperwork to register for the Internship at least one semester before; students will meet with the Career Center and complete the application that will be sent to their advisor and site supervisor. This application will then be filed in the Career Center. Students must register for the class with the Registrar as well. They will be required to write a paper that is relevant to the Internship and maintain a journal that reflects their experience; the site supervisor will complete an evaluation form on their performance. This is a Pass/Fail course. (as needed)

CS/CSEC 460: Senior Project Development Practicum/Cybersecurity

Credits 3

Advanced CS majors will engage in and complete the design and implementation of one of the following types of systems: Information Systems, Real-Time Systems, Distribution Systems, etc. Students in the Cybersecurity program will develop projects related to the management of information security in information systems. (spring)

CS/CSEC 490: Independent Study

Credits 1 4

With the approval of the instructor, a student may arrange to pursue a course of independent study in a specific area of Computer Science, Information Assurance, Information Security, Cryptography, programming, adVanced graphics, database data mining or business intelligence or modeling and simulation. The course will involve tutorial meetings with the instructor, independent reading and work, and an in-depth research project. The course is normally taken by seniors, juniors or transfer students and may be taken in situations when a schedule conflict prevents a student from taking a regularly-scheduled Computer Science elective. (as needed)

CSEC 225: Principles of Information Assurance and Security

Credits 3
This course is an introduction to the various technical and administrative aspects of Information Assurance and Security. The course covers the basic notions of confidentiality, integrity, availability, authentication models, protection models, security kernels, secure programming, audit, intrusion detection and response, operational security issues physical security issues, personnel security, policy formation and enforcement, access controls, in formation flow, legal and social issues, identification and authentication in local and distributed systems, classification and trust modeling, risk assessment.

CSEC 315: Digital Forensics and Investigations

Credits 3
This course introduces students to the techniques and tools of computer forensic investigations. Students will receive step-by-step explanations on how to use the most popular forensic tools. The course maps to the objecttives of the International Association of Computer Investigative Specialists (IACIS) certification to provide credible, standardsbased information. Topics include coverage of the latest technology including PDAs. cell phones, and flash drives. Many hands-on activities are included, will allow student to practice skills as they learn.

CSEC 325: Network Security

Credits 4
The Network Security course provides a comprehensive overview of network security. General Security Concepts covers authentication methods along with common network attacks and how to safeguard against them. Communication Security includes remote access, e-mail, the Web, directory and file transfer, and wireless data. Infrastructure Security explores various network devices and media, and the proper use of perimeter topologies such as DMZs, Extranets, and Intranets to establish network security. Cryptography basics are provided, including the differences between asymmetric and symmetric algorithms, and the different types of PKI certify cates and their usage. Operational/Organizational Security is discussed as it relates to Physical security, Disaster Recovery, and Business Continuity, as well as coverage of Computer Forensics and how it relates to further avenues of specialization for the security student.

CSEC 335: Penetration Testing I

Credits 3
This course will immerse students into an interactive environment where they will be shown how to scan, test, hack, and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks. (No real network is harmed during this training.) Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. This course provides students with in-demand skills of a professional security tester.

CSEC 355: Operating Systems Security

Credits 3
In this course, we take an in-depth look at operating system security concepts and techniques. We examine theoretical concepts that make the world of security unique. Also, this course adopts a practical hands-on approach when examining operating system security techniques. Along with examining different security strategies, this course explores the advancement of security implementation, as well as timeless problem-solving strategies. (fall)

CSEC 365: Cryptography Technologies

Credits 4
Cryptography is the science of protecting in formation. In addition to encryption for protecting information against unintentional dis closure, cryptology also addresses protections such as: Proving identity of origin through authentication, integrity of content through checksums and digital signatures, protocols to secure distributed computation, secret sharing, and electronic payments, watermarking or fingerprinting of information, electronic gam bling. This course will attempt to cover the various kinds of protections that can be given to information, and the variety of tools that can be used to provide these services. In addition, applications to real systems will be dis cussed, using examples from electronic commerce systems, the world wide web, and distributed file systems. (spring)

CSEC 425: Managing Information Security in Information Systems

Credits 3
Management of Information Security is de signed for senior level information systems and business students who want to learn the management aspects of information security. This text takes a "view from the top" and presents exactly what future managers need to know about information security. This is a capstone course in information security. (fall)

CSEC 435: Secure Software Development

Credits 3
This course provides students with a comprehensive understanding of the Secure Development Process. The student learns how to apply secure programming concepts and techniques, to identify key characteristics of secure code, to use design patterns for secure code, to build in a secure requirement process in the software life cycle from the beginning to the end, and to write, test, and debug pro grams using secure programming techniques. Topics include design principles, code snip pets, and explanation of each step as the student works through the course material. Stu dents demonstrate their knowledge through hands-on programs, exercises and case study assignments. (fall)