Center for Cybersecurity Education Course Descriptions
CYBS 6350: Data Protection
Provides students with a working knowledge of fundamental data protection techniques for protecting data at rest, data in motion, and data in processing. Techniques include encryption algorithms and systems (symmetric, asymmetric, standard, digital certificates, and hashes), Steganography, data masking, and data obfuscation. The course will also examine access controls, availability, authentication, confidentiality, data integrity, and non-repudiation as well as defenses against DDOS and other data attacks. Security by diversity and security in depth will be presented as fundamental requirements. Formerly TECH 6350 Cryptography.
CYBS 6355: Compliance and Legal Issues
This course examines legal, privacy and compliance environments facing organizations globally. Students will build an understanding of the complexities of these compliance and legal obligations starting with a general foundation of laws and industry standards that apply across most organizations that handle sensitive data. Examination of industry verticals will expand the student's knowledge of particular federal and state regulatory and industry-based obligations. Course also examines the relevant laws and regulations with regard to law enforcement and civil investigation of digital crimes. Replaces TECH 6355 Trusted Systems.
CYBS 7350: Operational Cybersecurity Management
This course focuses on operational Cybersecurity management issues such as business continuity planning, disaster recovery, identity management, change management, metrics, accreditation, certification, and validation. Examines in detail effective risk assessment programs, disaster recovery planning, how to interpret the sources and levels of risk, how to apply appropriate defensive systems, employing security in depth and diversity concepts, and back-up and recovery procedures. Replaces TECH 7350 Managing Information Security.
CYBS 7351: Strategic Cybersecurity Management
Students are required to examine Cybersecurity at a program and architectural level regarding issues such as risk management, audit, privacy, Information Security Management System (ISMS), and identity management within an organizational context. Students will be able to define a risk assessment, security awareness, metrics and education strategy and will present it to the executive board. Prerequisite: CYBS 6350.
CYBS 7355: Penetration Testing & Vulnerability Assessment
This course provides an in-depth understanding of penetration (pen) testing and "ethical hacking", including requirements and reporting. Students will examine the business impact of testing and will conduct security testing (including network and web application penetration testing) in the lab environment that includes: intelligence gathering, identifying and exploiting vulnerabilities, conducting post-exploitation exercises, and reporting results. Students will be required to create a comprehensive report summarizing the findings including recommendations to mitigate the risks identified. Topics will include social engineering, web application testing, managing a security test, and tools of attack. Prerequisite: CYBS 7350. Replaces TECH 7355 Information Security Risk Mitigation.
CYBS 7359: Digital Forensics
This course provides an in-depth analysis of the use of industry tools, technologies, and practices involved in gathering, protecting and analyzing digital evidence. The class uses industry tools to perform forensic analysis and examines how various operating systems store data on storage media such as hard disk drives and other digital media. The course will highlight how computers are used in crimes and how to focus on a digital investigation. Prerequisite: CYBS 6355 and 7350. Equivalent to TECH 7358 and TECH 7359 (Fall 2008 through Summer 2012).
CYBS 8395: Cybersecurity Practicum
The Practicum is taken in the last semester of the program and is designed to integrate all earlier course work. Under the guidance of the professor, each student completes an applied research project on an approved topic. Approval is required in order to enroll. This course is open only to MS students in Cybersecurity.