This course introduces operating system fundamentals and compares a variety of operating systems. Servers and networking basics are included.
This course provides technical knowledge of computer hardware and system software. The material covered in the course presents the background needed for systems analysis, design, configuration, procurement and management.
Introduction to Information Systems Security
This course provides a broad overview of the principles, policies and technologies for securing computer and information systems. Topics include a survey of computer system vulnerabilities, cryptographic techniques, access control policies and mechanisms, qualitative and quantitative risk assessment and management, and the implications of security technology in the realm of risk management. Designing and implementing computer security policies and standards, formulating contingency plans and analyzing system security architectures, as well as compliance and ethics are examined.
This course covers fundamental, vendor-independent networking concepts. The course is aligned with the CompTIA Network+ certification exam. Various tools are used to analyze networks.
Management Information Systems
This course covers the principles of managing information systems in the context of an enterprise. Topics include coverage of information technology in management, information systems in decision-making, planning of information systems, systems development, controls and security measures, and electronic commerce.
This course covers the principles and practices of secure operation and management of information systems. Principles and practices of analysis and monitoring of systems security are also addressed.
This course provides a comprehensive, hands-on look at TCP/IP. Coverage includes the latest TCP/IP stack, as well as SMTP and IPv6. Practical skills are learned with hands-on projects using various tools.
This course presents the fundamental concepts of database systems. The course covers the relational model, structured query language (SQL), data modeling, database design and database administration.
Systems Analysis and Design
This course introduces the concepts, tools and techniques used in the analysis, design and deployment of information systems which support business requirements. Topics include requirements determination, data and process modeling, various development methodologies, project management, data and user interface design, security, implementation and maintenance, and documentation.
This course provides a comprehensive review of industry approaches, practices and standards on how to handle risks to organizations' business-critical assets. Topics include identifying and analyzing threats, qualitative versus quantitative risk management, standards and processes to mitigate risk, risk control and risk policy. Through a practical approach, this course explores key topics that enable students to uncover and remediate potential infractions.
This course provides a comprehensive overview of disaster recovery and countermeasures for networks and businesses. Assess risks in the enterprise, determine critical business components, develop an enterprise disaster recovery system, and develop disaster policies, procedures, departmental roles and communication processes for enterprise network. It will provide a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster. Learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster. Produce a disaster recovery document of procedures and policies to implement training, testing and rehearsal of a disaster recovery.
This course introduces the techniques, methodologies and tools used in building and maintaining secure networks. Lab exercises address assessing protocol, network and code vulnerabilities. The course is aligned with the CompTIA Security+ certification examination.
Human Decision and Security Engineering
Providing an exploration of the human aspects of Cybersecurity, this course will educate students on human motivation and interaction, how security controls may be bypassed by a person's intentional or unintentional acts, and methods for reducing the cyber risks associated with people. Topics include human behavior and interaction, motivation and influence, and social engineering. Emphasis is on the human element of cyber incidents in relation to protecting information and technology assets.
Security Trends and Legal Issues
This course examines the legal environment pertinent to security professionals. Topics include the role of government, relevant civil and criminal law, constitutional rights and privacy issues, intellectual property, and compliance. In addition, current trends in cybersecurity are explored.
This course explores the ways in which cryptography can be used to protect communications traffic and sensitive data. Course topics include symmetric vs. asymmetric (public-key) ciphers; hash algorithms; message authentication codes; mathematical underpinnings of cryptography; cryptanalysis; public-key infrastructure; and implementation trade offs. Students gain hands-on experience in state-of-the-art technologies through completion of weekly lab exercises. The primary focus of the course is on building critical-thinking and problem-solving skills.
This course explores the methods and tools utilized for collecting and preserving electronic digital evidence for the computer forensic process. Topics include the forensic examination, crime categories, analysis, laws governing forensics and report writing. Experience with forensics tools and techniques are provided.
This course provides an integrative experience in the cyber security program through a review and integration of the major security domains. Building on coursework in the program, current trends and a comprehensive view of the field are used to provide a framework for the assessment, interpretation, and evaluation of security scenarios. A broad review of the materials that were presented within the program will be covered through hands-on experiences. A term-long project is a final deliverable of the course.