The Core is an opportunity to inquire into the fundamental aspects of being and our relationship with God, nature and our fellow human beings.
Popular Searches
The following courses are required for completion of the Master of Science in Cybersecurity.
Facilitates the development of interpersonal and team skills leaders need to function effectively. Focus is on the integrated behavioral competencies that organizations value today; self awareness, communication, collaboration, and relationship-building. Students will plan and implement new behaviors relevant to individuals who hold leadership positions, as well as those who informally assume leadership roles as they work with others to achieve business goals. 3 credits.
On Campus/Online
Examines the social, political, legal and regulatory environments that constitute the background in which a for-profit business firm conducts its activities in domestic and global contexts. Corporate social responsibility and the ethical dimensions of decisions that impact stakeholder groups and corporate sustainability in a competitive environment are discussed. Prerequisites: 3 credit hours of core courses. 3 credits.
Introduces the student to programming. Upon completion of this class, the student will be able to write non-trivial programs dealing with business. Topics include language components, control flow constructs, strings, input/output, database handling, classes, modules, and regular expressions. The course includes hands-on labs requiring students to bring a PC to class. 3 credits.
Online
Provides a working knowledge of fundamental data protection techniques for protecting data at rest, data in motion, and data in processing. Techniques include encryption algorithms and systems (symmetric, asymmetric, standard, digital certificates, and hashes), Steganography, data masking, and data obfuscation. Examines access controls, availability, authentication, confidentiality, data integrity, and non-repudiation as well as defenses against DDOS and other data attacks. Security by diversity and security in depth are presented as fundamental requirements. Prerequisite: CYBS 5F70. Equivalent to TECH 6350. 3 credits.
Examines legal, privacy, and compliance environments facing organizations globally. Students build an understanding of the complexities of security, compliance and legal obligations starting with a general foundation of laws and industry standards that apply across most organizations that handle sensitive data. Examination of industry verticals expand students’ knowledge of particular federal and state regulatory and industry-based obligations. It also examines how security and compliance obligations can be used to establish the security, compliance, and risk management programs for an enterprise. Equivalent to TECH 6355. Prerequisite: CYBS 5F70. Co-requisite: CYBS 6350. 3 credits.
Focuses on developing skills relative to an understanding of the business risks that exist when proper cybersecurity access controls are not effectively implemented. Students will study breach cases and have the opportunity to interface with security experts to gain an in-depth understanding of current risks, threats, and vulnerabilities organizations face. Lab simulations will be completed and each lab will be analyzed for its meaning and purpose in increasing security knowledge. Students will create a cybersecurity breach report and as a team project create an access control plan with recommendations for overcoming or minimizing cyber breach situations through the use of proper controls, the control framework, lab experiences, and other resources explored in the course. Co-requisite: CYBS 6350. Equivalent to TECH 7350. 3 credits.
In-depth understanding of penetration (pen) testing and "ethical hacking", including requirements and reporting. Examination of the business impact of testing and will conduct security testing (including network and web application penetration testing) in the lab environment including: intelligence gathering, identifying and exploiting vulnerabilities, conducting post-exploitation exercises, and reporting results. Students are required to create a comprehensive report summarizing the findings including recommendations to mitigate the risks identified. Topics will include social engineering, web application testing, managing a security test, and tools of attack. Prerequisite: CYBS 7350 and CYBS 7357. 3 credits.
Provides a comprehensive explanation of network security basics including how hackers access networks and the use of network security tools to provide countermeasures. Strategies for meeting the challenges from expanded network boundaries are developed through active hands-on exercises in networked lab environments. Prerequisites: CYBS 5F70 and CYBS 6350. 3 credits.
This course provides an in-depth analysis of the use of industry tools, technologies, and practices involved in gathering, protecting and analyzing digital evidence. The class uses industry tools to perform forensic analysis and examines how various operating systems store data on storage media such as hard disk drives and other digital media. Highlights how computers are used in crimes and how to focus on a digital investigation. Prerequisite: CYBS 6355, 7350 and 7357. 3 credits.
Taken in the last semester and designed to integrate all earlier coursework. Under the guidance of the professor, each student completes a practical exercise in a simulated cybersecurity management role. Approval is required to enroll. Open only to MS students in Cybersecurity. Prerequisites: CYBS 6350, CYBS 7350 and CYBS 7357. 3 credits.