Cybersecurity Certificate Requirements

Graduate Certificate in Cybersecurity

Coursework (6 Classes / 18 Credit Hours)
CYBS 6350: Data Protection
CYBS 6355: Compliance and Legal Issues
CYBS 7350: Operational Cybersecurity Management
CYBS 7355: Penetration Testing & Vulnerability Assessment
CYBS 7357: Network Security                                                                                                                                                  CYBS 7359: Digital Forensics

Center for Cybersecurity Education Course Descriptions

CYBS 6350: Data Protection

Provides a working knowledge of fundamental data protection techniques for protecting data at rest, data in motion, and data in processing. Techniques include encryption algorithms and systems (symmetric, asymmetric, standard, digital certificates, and hashes), Steganography, data masking, and data obfuscation. Examines access controls, availability, authentication, confidentiality, data integrity, and non-repudiation as well as defenses against DDOS and other data attacks. Security by diversity and security in depth are presented as fundamental requirements. Prerequisite: TECH 5F70. Equivalent to TECH 6350.

CYBS 6355: Compliance and Legal Issues

Examines legal, privacy, and compliance environments facing organizations globally. Students build an understanding of the complexities of security, compliance and legal obligations starting with a general foundation of laws and industry standards that apply across most organizations that handle sensitive data. Examination of industry verticals expand students’ knowledge of particular federal and state regulatory and industry-based obligations. It also examines how security and compliance obligations can be used to establish the security, compliance, and risk management programs for an enterprise.  Equivalent to TECH 6355.

CYBS 7350: Operational Cybersecurity Management

Focuses on developing skills relative to an understanding of the business risks that exist when proper cybersecurity access controls are not effectively implemented.  Students will study breach cases and have the opportunity to interface with security experts to gain an in-depth understanding of current risks, threats, and vulnerabilities organizations face.  Lab simulations will be completed and each lab will be analyzed for its meaning and purpose in increasing security knowledge.   Students will create a cybersecurity breach report and as a team project create an access control plan with recommendations for overcoming or minimizing cyber breach situations through the use of proper controls, the control framework, lab experiences, and other resources explored in the course. Co-requisite: CYBS 6350. Equivalent to TECH 7350.

 CYBS 7355: Penetration Testing and Vulnerability Assessment

In-depth understanding of penetration (pen) testing and "ethical hacking", including requirements and reporting. Examination of the business impact of testing and will conduct security testing (including network and web application penetration testing) in the lab environment including: intelligence gathering, identifying and exploiting vulnerabilities, conducting post-exploitation exercises, and reporting results. Students are required to create a comprehensive report summarizing the findings including recommendations to mitigate the risks identified. Topics will include social engineering, web application testing, managing a security test, and tools of attack. Prerequisite: CYBS 7350. Replaces TECH 7355 Information Security Risk Mitigation.

CYBS 7357: Network Security

In-depth understanding of penetration (pen) testing and "ethical hacking", including requirements and reporting. Examination of the business impact of testing and will conduct security testing (including network and web application penetration testing) in the lab environment including: intelligence gathering, identifying and exploiting vulnerabilities, conducting post-exploitation exercises, and reporting results. Students are required to create a comprehensive report summarizing the findings including recommendations to mitigate the risks identified. Topics will include social engineering, web application testing, managing a security test, and tools of attack. Prerequisites: CYBS 5F70 and CYBS 6350. 

CYBS 7359: Digital Forensics

This course provides an in-depth analysis of the use of industry tools, technologies, and practices involved in gathering, protecting and analyzing digital evidence. The class uses industry tools to perform forensic analysis and examines how various operating systems store data on storage media such as hard disk drives and other digital media. Highlights how computers are used in crimes and how to focus on a digital investigation. Prerequisite: CYBS 6355 and 7350. Equivalent to TECH 7358 and TECH 7359.

News

9 Things You Should Know About Groundhog 2018

For the UD community, the beginning of the spring semester also means that another significant event is on the near horizon: Groundhog 2018. It's the 55th Groundhog celebration at UD, and this year, we think, might just be the best one yet. From refreshers on the standard information to some exciting new additions we're trying out this year, here's what you need to know about the night the Groundhog will dance with the promise of spring.

+ Read More

Annual MLK Day Symposium Fosters Discussion on Spirituality of Nonviolence and Inclusion

After spending nearly a decade in the banking industry, Sister Josephine (Toni) Garrett, C.S.F.N., BA '03, began searching for ways to build upon her Catholic faith, and on Monday, Jan. 15, 2018, she fostered a discussion on discipleship and discernment as she delivered the university's annual Martin Luther King Day Symposium lecture titled "I've Been to the Mountaintop: Reflections on a Spirituality of Nonviolence and Inclusion."

+ Read More

UD Gathers Renowned Catholic Journalists to Examine the Modern Papacy

The University of Dallas is honored to bring together three of the most prominent voices in Catholic journalism in the United States for the 2018 Eugene McDermott Lectureship titled "The Papacy in the 21st Century: Where Are We, and Where Are We Going?" Ross Douthat (New York Times) and Austen Ivereigh (Crux), with John Allen Jr. (Crux) serving as moderator, will examine the modern papacy, situating Pope Francis' pontificate in the context of recent papal history, the broader Catholic tradition and the future of Catholicism.

+ Read More