Cybersecurity (CYB)

CYB-101 INTRODUCTION TO INFORMATION SECURITY (3 Credits)

This course is an elective to introduce students in any major to the Information Security field. Students will be introduced to main domains of Information Security and Information Assurance as represented in the COMPTIA Certification exam Security Plus. Upon successful completion of this course as documented through writing, objective testing, case studies, laboratory practice, and/or classroom discussion, the student will be able to: Define information security and explain why it is important Identify types of attackers, analyze vulnerabilites, attacks and suggest appropriate defenses. Descrive various software security applications and vulnerability scanning tools. Explain the different types of logical and physical access control. Understand and explain authentication, authorization and accounting as it relates to compter security. Define and explain risk, risk management, and penetration testing.

CYB-102 ETHICAL & PROFESSIONAL SKILLS IN CYBERSECURITY (3 Credits)

This course introduces students to project management and risk assessment in Cybersecurity as well as the ethical questions surrounding these skills. It provides a comprehensive understanding of the principles and processes of risk management and how to apply these to a variety of scenerios. The course also prepares students for two professional licenses in Risk Assessment and Project Management.

CYB-180 SPECIAL TOPICS IN CYBERSECURITY (3 Credits)

An intensive study of an aspect of computer science not fully treated in a regularly scheduled course.

Corequisite(s): CS-132

CYB-333 INFORMATION SECURITY (3 Credits)

This course is designed to introduce students to the development of information security policies and planning. Information systems, and the tools and techniques needed to establish, monitor and maintain information security will be examined.

Prerequisite(s): TAKE CS-131 CYB-101

CYB-355 COMPUTER CRIME (3 Credits)

The media reports terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in software and email, corporate espionage on business networks, and crackers breaking into systems on the Internet. Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up with their methods. This course will focus on computer crimes, what they are, how to prevent them, and how to detect, investigate and prosecute them if they do occur. Computer crime laws will also be covered. Other topics will include evidence collection during a computer crime investigation as well as the preparation and execution of a search warrant.

Prerequisite(s): TAKE CS-254

CYB-360 COMPUTER FORENSICS (3 Credits)

A police officer makes a gruesome discovery, a body is found. Located near the corpse is a cellular telephone, a digital camera and a computer. The officer is unsure on how to proceed. On the other side of town, a search warrant of a business is being conducted. A server and the computers networked to it are believed to contain evidence of a crime. The detectives are trying to decide on what to seize and how to take it. More and more crimes involve digital evidence that requires seizing, imaging and analysis. The evidence needs to be reviewed for possible investigative leads and for possible presentation in court. This course will focus on how to properly seize, image and examine digital evidence. It will include creating and verifying the duplicate image of digital evidence, analyzing the data to locate evidence, and recovering evidence.

Corequisite(s): Take CYB-355

CYB-365 INVESTIGATIVE SOFTWARE TOOLS (3 Credits)

Intelligence led policing and intelligence based investigative strategies are coming to the forefront of law enforcement. Private industry is alwso becoming increasingly aware of the strategic intelligence model as it applies to corporate planning, competitce practices and maintaining corporate integrity. This course is designed to introduce students to several key software tools that are widely used and considered essential for intelligence research and criminal investigations. These software tools will include, but not be limited to, Analyst Notebook, iBase, and Idea. Students will be given a thorough understanding of how to apply these tools in the course of the intelligence process and/or during the course of a criminal investigation. The course will culminate with students preparing a project using all the software tools introduced during the course.

CYB-380 SPECIAL TOPICS IN CYBERSECURITY (3 Credits)

An intensive study of an aspect of computer science not fully treated in a regularly scheduled course.

Corequisite(s): CS-132

CYB-380A SP TOP IN CYBERSECURITY: ADVANCED CYBERSECURITY (3 Credits)

An intensive study of an aspect of computer science not fully treated in a regularly scheduled course.

Corequisite(s): CS-380C

CYB-380B SP TOP IN CYBERSECURITY:CYBERSECURITY INVESTIGATION (3 Credits)

An intensive study of an aspect of computer science not fully treated in a regularly scheduled course.

Corequisite(s): CYB-101

CYB-410 INTRO TO CRYPTOGRAPHY (3 Credits)

In this course, the key terms, concepts and principles of cryptography are defined and explained. Application of cryptographic techniques to ensure confidentiality, integrity, authentication, access control, and non-repudiation issues will also be covered. Other topics will include the history of classical cryptographic and cryptanalytic techniques, modern symmetric and asymmetric algorithms, Federal Information Processing Standard (FIPS) algorithms, random and pseudo-random number generators and cryptographic hash functions. Issues involving cryptographic application at various OSI layers in networking communications will also be discussed.

Corequisite(s): MATH-207 CS-254