Cybersecurity (CYBR)
To register for courses and see a real-time listing of classes and sections offered, view the add/drop system.
CYBR 1700. Cybersecurity Essentials. (3 Credits)
Introduces cybersecurity and its essential role in society in a nontechnical way. Explores cybersecurity topics, including protecting accounts, securing data, and avoiding phishing scams. Discusses current hacking and cybersecurity events. Identifies best practices for personal cybersecurity. Provides basic introduction to cybersecurity tools.
Lab access fee of $45 applies.
Lab access fee of $45 applies.
CYBR 2650. Cloud Computing and Security. (3 Credits)
Prerequisite(s): IT 2600 or CS 2600; (IT 1600 recommended)
Explores cloud computing technologies with a specific focus on ensuring robust security measures within cloud environments. Covers key concepts such as virtual machine deployment, management, and automation, alongside critical topics including disaster recovery, high availability, virtual networks, and performance optimization. Combines theoretical understanding with practical hands-on experience, equipping students with the knowledge and skills needed to navigate complexities of securing cloud environments.
Explores cloud computing technologies with a specific focus on ensuring robust security measures within cloud environments. Covers key concepts such as virtual machine deployment, management, and automation, alongside critical topics including disaster recovery, high availability, virtual networks, and performance optimization. Combines theoretical understanding with practical hands-on experience, equipping students with the knowledge and skills needed to navigate complexities of securing cloud environments.
CYBR 2700. Information Security Fundamentals. (3 Credits)
Prerequisite(s): IT 2600 or CS 2600; (IT 1600 recommended)
Explores introductory information and cybersecurity concepts: security technologies, methodologies, and tools. Includes security models, risk assessment, threat analysis, attack types, encryption technologies, security implementation, access controls, business continuity, and security policies. Discusses current topics, trends, and career opportunities in information security. Includes lab assignments covering information security principles. Lab access fee of $45 for computers applies.
Explores introductory information and cybersecurity concepts: security technologies, methodologies, and tools. Includes security models, risk assessment, threat analysis, attack types, encryption technologies, security implementation, access controls, business continuity, and security policies. Discusses current topics, trends, and career opportunities in information security. Includes lab assignments covering information security principles. Lab access fee of $45 for computers applies.
CYBR 2750. Scripting for Cybersecurity. (3 Credits)
Prerequisite(s): CYBR 2700
Introduces students to essential scripting languages utilized by cybersecurity professionals for automation and tool development. Focuses on PowerShell, Python, and Bash and their use to provide enhanced capabilities in continuous monitoring, detection, and security analysis. Explores the power of automation in PowerShell, defensive cyber operations using Python, and the vital role of Bash in executing essential security analysis tasks. Includes hands-on exercises and real-world applications crucial for professionals in security analysis, threat hunting, and incident response job roles.
Introduces students to essential scripting languages utilized by cybersecurity professionals for automation and tool development. Focuses on PowerShell, Python, and Bash and their use to provide enhanced capabilities in continuous monitoring, detection, and security analysis. Explores the power of automation in PowerShell, defensive cyber operations using Python, and the vital role of Bash in executing essential security analysis tasks. Includes hands-on exercises and real-world applications crucial for professionals in security analysis, threat hunting, and incident response job roles.
CYBR 2800. Computer Forensic Fundamentals. (3 Credits)
Prerequisite(s): INFO 1120 or IT 1600 or CS 1400 or CJ 1010
Explores procedures for identification, preservation, and extraction of electronic evidence. Emphasizes auditing and investigation of network and host system intrusions, analysis and documentation of information gathered, and preparation of expert testimonial evidence. Examines forensic tools and resources for system administrators and information system security officers. Includes ethics, law, policy, and standards concerning digital evidence. Includes hands-on learning and a research paper or project.
Lab access fee of $45 for computers applies.
Explores procedures for identification, preservation, and extraction of electronic evidence. Emphasizes auditing and investigation of network and host system intrusions, analysis and documentation of information gathered, and preparation of expert testimonial evidence. Examines forensic tools and resources for system administrators and information system security officers. Includes ethics, law, policy, and standards concerning digital evidence. Includes hands-on learning and a research paper or project.
Lab access fee of $45 for computers applies.
CYBR 2810R. Internship. (1-3 Credits)
Prerequisite(s): Department Approval.
Provides opportunities to apply classroom theory on the job. Requires work as paid employees in a job that relates to their careers while enrolled at the university. Requires students to meet at least monthly with the Departmental Internship Coordinator. Requires completers to meet individually set goals. May be repeated for a maximum of three credits toward graduation. May be graded credit/no credit.
Provides opportunities to apply classroom theory on the job. Requires work as paid employees in a job that relates to their careers while enrolled at the university. Requires students to meet at least monthly with the Departmental Internship Coordinator. Requires completers to meet individually set goals. May be repeated for a maximum of three credits toward graduation. May be graded credit/no credit.
CYBR 2850. Cybersecurity Project. (3 Credits)
Prerequisite(s): CYBR 2700
Pre- or Corequisite(s): CYBR 2750
Integrates theoretical knowledge gained throughout the program into a hands-on, real-world project. Engages students in collaborative, team-based activities to plan, implement, secure, and document a comprehensive solution for either a real or simulated company. Emphasizes the practical application of cybersecurity principles, tools, and techniques, developing essential project management and communication skills. Provides an opportunity for students to showcase their expertise, creativity, and problem-solving capabilities.
Pre- or Corequisite(s): CYBR 2750
Integrates theoretical knowledge gained throughout the program into a hands-on, real-world project. Engages students in collaborative, team-based activities to plan, implement, secure, and document a comprehensive solution for either a real or simulated company. Emphasizes the practical application of cybersecurity principles, tools, and techniques, developing essential project management and communication skills. Provides an opportunity for students to showcase their expertise, creativity, and problem-solving capabilities.
CYBR 2900R. Current Topics in Cybersecurity. (1-3 Credits)
Prerequisite(s): Departmental Approval.
Explores the dynamic landscape of cybersecurity with a focus on current and emerging topics and trends. Provides exposure to cutting-edge developments in the field. Provides an opportunity for students to prepare for industry-recognized IT and Cybersecurity certification exams. Varies each semester to ensure relevance and currency. May be repeated for a maximum of 3 credits toward graduation. May be Graded Credit/No Credit.
Explores the dynamic landscape of cybersecurity with a focus on current and emerging topics and trends. Provides exposure to cutting-edge developments in the field. Provides an opportunity for students to prepare for industry-recognized IT and Cybersecurity certification exams. Varies each semester to ensure relevance and currency. May be repeated for a maximum of 3 credits toward graduation. May be Graded Credit/No Credit.
CYBR 3350. Intellectual Property and Cyber Law. (3 Credits)
Prerequisite(s): ENGL 2010 and (INFO 1120 or CS 1030 or LEGL 3000) and University Advanced Standing
Explores the legal and policy issues associated with the Internet and cyberspace. Studies case law, statutes, regulations, and constitutional provisions that affect people and businesses interacting through computers and the Internet. Covers intellectual property (trademarks, copyrights, patents, trade secrets, and unfair competition) and examines legal requirements to create, register and protect intellectual property rights. Focuses on e-commerce, online contracts, cybercrimes, torts, and privacy issues pertaining to technology.
Lab access fee of $45 for computers applies.
Explores the legal and policy issues associated with the Internet and cyberspace. Studies case law, statutes, regulations, and constitutional provisions that affect people and businesses interacting through computers and the Internet. Covers intellectual property (trademarks, copyrights, patents, trade secrets, and unfair competition) and examines legal requirements to create, register and protect intellectual property rights. Focuses on e-commerce, online contracts, cybercrimes, torts, and privacy issues pertaining to technology.
Lab access fee of $45 for computers applies.
CYBR 3700. Ethical Hacking and Countermeasures. (3 Credits)
Prerequisite(s): IT 1510, CYBR 2700, and University Advanced Standing
Examines advanced information security concepts through an applied viewpoint. Extends the student's understanding of security issues through hands-on application of real-world techniques and use of current security software. Includes legal/ethical issues, use of security tools, network reconnaissance, password/brute-force attacks, firewall configuration, honeypot deployment, intrusion analysis/detection, server hardening, and penetration testing. Provides insight into current trends in advanced security issues.
Lab access fee of $45 for computers applies.
Examines advanced information security concepts through an applied viewpoint. Extends the student's understanding of security issues through hands-on application of real-world techniques and use of current security software. Includes legal/ethical issues, use of security tools, network reconnaissance, password/brute-force attacks, firewall configuration, honeypot deployment, intrusion analysis/detection, server hardening, and penetration testing. Provides insight into current trends in advanced security issues.
Lab access fee of $45 for computers applies.
CYBR 3750. Malware Reverse Engineering. (3 Credits)
Prerequisite(s): [(CS 2370 and CS 2900) or (CYBR 2700 )] and University Advanced Standing.
Examines advanced techniques used in malware analysis. Focuses on static and dynamic analysis of unknown binaries utilizing reverse engineering tools and procedures. Explores advanced anti-malware analysis processes and anti-reverse engineering methods. Covers advanced obfuscation practices, such as employing packers, and anti-debugging processes.
Examines advanced techniques used in malware analysis. Focuses on static and dynamic analysis of unknown binaries utilizing reverse engineering tools and procedures. Explores advanced anti-malware analysis processes and anti-reverse engineering methods. Covers advanced obfuscation practices, such as employing packers, and anti-debugging processes.
CYBR 4150. Data Security Analytics. (3 Credits)
Prerequisite(s): CYBR 2700 and INFO 2410 and University Advanced Standing; (INFO 3130 and INFO 3410 recommended)
Introduces students to the concept of data analytics as applied to cyber security. Includes collection, aggregation, data mining, and analysis of various data sources. Utilizes data analytics tools that correlate data in order to identify security events that may go undiscovered by traditional detection and log analysis methods.
Lab access fee of $45 for computers applies.
Introduces students to the concept of data analytics as applied to cyber security. Includes collection, aggregation, data mining, and analysis of various data sources. Utilizes data analytics tools that correlate data in order to identify security events that may go undiscovered by traditional detection and log analysis methods.
Lab access fee of $45 for computers applies.
CYBR 4250. Database Security and Auditing. (3 Credits)
Prerequisite(s): (INFO 3410 or CYBR 3700) and University Advanced Standing
Utilizes theories, scenarios, and step-by-step examples. Provides a strong foundation in database security and auditing. Covers the following topics in depth: the importance of database security in contemporary business environments, security, profiles, password policies, privileges and roles, virtual private databases, auditing, SQL injection, and database management security issues.
Lab access fee of $45 for computers applies.
Utilizes theories, scenarios, and step-by-step examples. Provides a strong foundation in database security and auditing. Covers the following topics in depth: the importance of database security in contemporary business environments, security, profiles, password policies, privileges and roles, virtual private databases, auditing, SQL injection, and database management security issues.
Lab access fee of $45 for computers applies.
CYBR 4350. Web and Application Security. (3 Credits)
Prerequisite(s): (CYBR 2700 or CS 2550) and University Advanced Standing
Pre- or Corequisite(s): INFO 3300 or CS 3520
Covers the security of web and mobile applications from offensive and defensive standpoints. Explores common vulnerabilities of web and mobile applications and various tools and techniques for identifying and mapping the attack surface of such applications. Explores various techniques and attack vectors for exploiting security flaws in web and mobile applications. Implements secure coding best practices, defensive architecture, and Content Security Policy to mitigate security flaws and protect the applications, the web client, the communication channel, and the server.
Lab access fee of $45 for computers applies.
Pre- or Corequisite(s): INFO 3300 or CS 3520
Covers the security of web and mobile applications from offensive and defensive standpoints. Explores common vulnerabilities of web and mobile applications and various tools and techniques for identifying and mapping the attack surface of such applications. Explores various techniques and attack vectors for exploiting security flaws in web and mobile applications. Implements secure coding best practices, defensive architecture, and Content Security Policy to mitigate security flaws and protect the applications, the web client, the communication channel, and the server.
Lab access fee of $45 for computers applies.
CYBR 4450. Internet of Things Security. (3 Credits)
Prerequisite(s): IT 1510, CYBR 2700, and University Advanced Standing.
Covers the architecture of Internet of Things (IoT) systems (devices and applications) and the security of these systems from offensive and defensive standpoints. Addresses common IoT vulnerabilities and threats and explores various techniques/tools and attack vectors for exploiting IoT security flaws. Discusses best practices for securing and hardening IoT systems. Includes offensive and defensive hands-on lab activities covering the hardware, software, applications, and network components of of IoT systems.
Covers the architecture of Internet of Things (IoT) systems (devices and applications) and the security of these systems from offensive and defensive standpoints. Addresses common IoT vulnerabilities and threats and explores various techniques/tools and attack vectors for exploiting IoT security flaws. Discusses best practices for securing and hardening IoT systems. Includes offensive and defensive hands-on lab activities covering the hardware, software, applications, and network components of of IoT systems.
CYBR 4550. Threat Hunting and Incident Response. (3 Credits)
Prerequisite(s): CYBR 3700 and Advanced University Standing
Provides students with knowledge and practical skills to hunt down threats within networks and end points and to identify, contain, and recover from intrusions and data breaches. Utilizes a combination of lectures, hands-on labs, and case studies to explain the tactics, techniques, and procedures that are employed by threat actors to achieve their goals. Covers the consumption and creation of Cyber Threat Intelligence (CTI) to enhance detection and response capabilities.
Provides students with knowledge and practical skills to hunt down threats within networks and end points and to identify, contain, and recover from intrusions and data breaches. Utilizes a combination of lectures, hands-on labs, and case studies to explain the tactics, techniques, and procedures that are employed by threat actors to achieve their goals. Covers the consumption and creation of Cyber Threat Intelligence (CTI) to enhance detection and response capabilities.
CYBR 4590R. Current Topics in Cybersecurity. (3 Credits)
Prerequisite(s): CYBR 2700 and University Advanced Standing
Provides exposure to emerging technologies and topics of current interest in cybersecurity. Varies each semester depending upon the changes in the cybersecurity discipline or to address a focused area within the cybersecurity discipline. May be repeated for a maximum of 9 credits toward graduation.
Provides exposure to emerging technologies and topics of current interest in cybersecurity. Varies each semester depending upon the changes in the cybersecurity discipline or to address a focused area within the cybersecurity discipline. May be repeated for a maximum of 9 credits toward graduation.
CYBR 4650. Industrial Control Systems Security. (3 Credits)
Prerequisite(s): IT 1510, CYBR 2700, and University Advanced Standing.
Introduces students to the basics of industrial control systems (ICS) including their architectures, types, and various components. Covers how the components of ICS work together and how Supervisory Control and Data Acquisition (SCADA) are organized and managed. Utilizes a combination of lectures, case studies, and hands-on labs to explain the security of ICS including common ICS vulnerabilities and a variety of attack vectors against ICS and SCADA. Covers best practices for securing ICS and implements countermeasures to protect against cyberattacks explored in class.
Introduces students to the basics of industrial control systems (ICS) including their architectures, types, and various components. Covers how the components of ICS work together and how Supervisory Control and Data Acquisition (SCADA) are organized and managed. Utilizes a combination of lectures, case studies, and hands-on labs to explain the security of ICS including common ICS vulnerabilities and a variety of attack vectors against ICS and SCADA. Covers best practices for securing ICS and implements countermeasures to protect against cyberattacks explored in class.
CYBR 4700. Enterprise Cybersecurity Management. (3 Credits)
Prerequisite(s): CYBR 2700 and University Advanced Standing
Pre- or Corequisite(s): INFO 3430
Provides perspective of key issues involved in IT activities across the organizational and technical security landscape. Examines management methodologies, staffing, and operational issues. Teaches use of financial analysis and decision-making methodologies to aid investment decisions at the operational, functional, and strategic levels. Illustrates use of risk assessment and contingency planning as applied to business continuity and disaster recovery strategies. Includes the use of Service Level Agreement for managing both internal and external relationships.
Lab access fee of $45 for computers applies.
Pre- or Corequisite(s): INFO 3430
Provides perspective of key issues involved in IT activities across the organizational and technical security landscape. Examines management methodologies, staffing, and operational issues. Teaches use of financial analysis and decision-making methodologies to aid investment decisions at the operational, functional, and strategic levels. Illustrates use of risk assessment and contingency planning as applied to business continuity and disaster recovery strategies. Includes the use of Service Level Agreement for managing both internal and external relationships.
Lab access fee of $45 for computers applies.
CYBR 4750. Cybersecurity Capstone. (3 Credits)
Prerequisite(s): CYBR 3700 and CYBR 4350 and (CYBR 4150 or CYBR 4550), and University Advanced Standing
Pre- or Corequisite(s): CYBR 4700
Senior-level, capstone experience course. Enhances student cybersecurity knowledge in a self-directed research or practical project that showcases student's mastery of cybersecurity topics. Provides an opportunity to conduct research and/or implement systems that incorporate topics from previous courses. Requires students to present their work at the end of the semester.
Pre- or Corequisite(s): CYBR 4700
Senior-level, capstone experience course. Enhances student cybersecurity knowledge in a self-directed research or practical project that showcases student's mastery of cybersecurity topics. Provides an opportunity to conduct research and/or implement systems that incorporate topics from previous courses. Requires students to present their work at the end of the semester.
CYBR 4760. Case Studies in Cyber Security. (3 Credits)
Prerequisite(s): CYBR 2700 and University Advanced Standing
Discusses current trends, issues, and global events related to cybersecurity. Includes topics on data breaches, cyber warfare, and emerging threats. Emphasizes the changing and transformative nature of cybersecurity threats, including geographical, institutional, and cultural evolution. Examines real-world examples of the application of cybersecurity principles and requires critical analysis of each case. Hosts guest lecturers from industry to provide students with perspectives on the state of cybersecurity.
Lab access fee of $45 for computers applies.
Discusses current trends, issues, and global events related to cybersecurity. Includes topics on data breaches, cyber warfare, and emerging threats. Emphasizes the changing and transformative nature of cybersecurity threats, including geographical, institutional, and cultural evolution. Examines real-world examples of the application of cybersecurity principles and requires critical analysis of each case. Hosts guest lecturers from industry to provide students with perspectives on the state of cybersecurity.
Lab access fee of $45 for computers applies.
CYBR 4800. Advanced Mobile Devices Forensics. (3 Credits)
Prerequisite(s): CYBR 2800 and University Advanced Standing
Discusses devices that can store digital information such as cell phones, tablets, digital camera/camcorders, thumb drives and memory cards. Focuses on lab investigations of one or more digital media through image acquisition, data analysis, and assembly of a final written report of findings. Provides opportunities to use multiple software tools in device acquisition and analysis. Covers processes and procedures through mock investigations.
Lab access fee of $45 for computers applies.
Discusses devices that can store digital information such as cell phones, tablets, digital camera/camcorders, thumb drives and memory cards. Focuses on lab investigations of one or more digital media through image acquisition, data analysis, and assembly of a final written report of findings. Provides opportunities to use multiple software tools in device acquisition and analysis. Covers processes and procedures through mock investigations.
Lab access fee of $45 for computers applies.
CYBR 4810R. Internship. (1-6 Credits)
Prerequisite(s): (CYBR 3700 and one 4000 course in Cybersecurity), Department approval, and University Advanced Standing.
Provides opportunities to apply upper-division classroom theory while students work as employees in a job that relates to their careers. Requires the student to meet periodically with a Departmental Internship Coordinator. Determines credit based on the number of hours a student works during the semester and completion of individually set goals. Requires prior written Department Chair approval to apply more than three credits toward a Bachelor of Science Degree in Cybersecurity. May be graded credit/no credit.
Provides opportunities to apply upper-division classroom theory while students work as employees in a job that relates to their careers. Requires the student to meet periodically with a Departmental Internship Coordinator. Determines credit based on the number of hours a student works during the semester and completion of individually set goals. Requires prior written Department Chair approval to apply more than three credits toward a Bachelor of Science Degree in Cybersecurity. May be graded credit/no credit.
CYBR 4850. Digital Forensics Investigations. (3 Credits)
Prerequisite(s): CYBR 2800 and University Advanced Standing
Covers one or more investigations from start to finish. Integrates knowledge and skills from previous CJ, FSCI, and IT courses in this culminating experience.
Lab access fee of $45 for computers applies.
Covers one or more investigations from start to finish. Integrates knowledge and skills from previous CJ, FSCI, and IT courses in this culminating experience.
Lab access fee of $45 for computers applies.
CYBR 6300. Principles of Cybersecurity. (3 Credits)
Prerequisite(s): Acceptance into the Master of Science in Cybersecurity or Departmental Approval.
Provides foundational knowledge of cybersecurity for graduate-level studies. Covers information security theories, terminology, and implementation. Includes networking and system fundamentals, cryptography, malware, authentication, authorization, access control, physical security, attacker profiles, appropriate threat responses, and the human elements of cybersecurity. Introduces multiple aspects of cybersecurity and various career paths within the field.
Provides foundational knowledge of cybersecurity for graduate-level studies. Covers information security theories, terminology, and implementation. Includes networking and system fundamentals, cryptography, malware, authentication, authorization, access control, physical security, attacker profiles, appropriate threat responses, and the human elements of cybersecurity. Introduces multiple aspects of cybersecurity and various career paths within the field.
CYBR 6330. Cybersecurity Operations
. (3 Credits)
Prerequisite(s): Acceptance into the Master of Science in Cybersecurity or Departmental Approval.
Focuses on operational aspects of cybersecurity. Includes incident response, network monitoring, change management, configuration management, and resource protection. Emphasizes the role of cybersecurity in the enterprise. Integrates sound cybersecurity principles into various aspects of IT operations. Includes information on secure server administration and open source security software. Teaches cybersecurity standards for government and industry sources and the application of those standards.
Focuses on operational aspects of cybersecurity. Includes incident response, network monitoring, change management, configuration management, and resource protection. Emphasizes the role of cybersecurity in the enterprise. Integrates sound cybersecurity principles into various aspects of IT operations. Includes information on secure server administration and open source security software. Teaches cybersecurity standards for government and industry sources and the application of those standards.
CYBR 6350. Law/Ethics/Privacy in Cybersecurity. (3 Credits)
Prerequisite(s): Acceptance into the Master of Science in Cybersecurity or Departmental Approval.
Explores legal, ethical, and privacy issues as they apply to cybersecurity. Includes the legalities and ethics of hacking, corporate information security and use policies, and the government's role in cybersecurity. Emphasizes the roles and responsibilities of individual cybersecurity practitioners as well as corporate entities, including vulnerability disclosure and correcting software defects. Teaches privacy policies and regulations as they relate to cybersecurity and information systems.
Explores legal, ethical, and privacy issues as they apply to cybersecurity. Includes the legalities and ethics of hacking, corporate information security and use policies, and the government's role in cybersecurity. Emphasizes the roles and responsibilities of individual cybersecurity practitioners as well as corporate entities, including vulnerability disclosure and correcting software defects. Teaches privacy policies and regulations as they relate to cybersecurity and information systems.
CYBR 6370. Penetration Testing and Vulnerability Assessment. (3 Credits)
Prerequisite(s): CYBR 6300 or departmental approval.
Explores advanced topics in ethical hacking, penetration testing, vulnerability assessment, and other offensive network and system techniques. Teaches network scanning, target identification, application exploitation, antivirus evasion, physical security, social engineering, phishing, and privilege escalation. Contains hands-on labs providing experience from the perspective of an attacker.
Explores advanced topics in ethical hacking, penetration testing, vulnerability assessment, and other offensive network and system techniques. Teaches network scanning, target identification, application exploitation, antivirus evasion, physical security, social engineering, phishing, and privilege escalation. Contains hands-on labs providing experience from the perspective of an attacker.
CYBR 6420. Web and Mobile Application Security. (3 Credits)
Prerequisite(s): CYBR 6300
Examines Web application vulnerabilities and remediation techniques. Explores various tools and techniques used to perform Web application assessments. Includes cross-site scripting, SQL injection, session management, and Web server configuration. Emphasizes practical skills developed through extensive hands-on exercises.
Examines Web application vulnerabilities and remediation techniques. Explores various tools and techniques used to perform Web application assessments. Includes cross-site scripting, SQL injection, session management, and Web server configuration. Emphasizes practical skills developed through extensive hands-on exercises.
CYBR 6660. Advanced Network Forensics. (3 Credits)
Prerequisite(s): CYBR 6300
Provides a standard methodology for conducting digital forensic analysis in a network environment. Teaches the importance of network forensic principles and development of an understanding of the technologies, protocols, laws, regulations, ethics, and procedures for network forensics. Incorporates demonstrations and laboratory exercises covering the identification, acquisition, authentication, preservation, analysis, and reporting of evidence for prosecution purposes.
Provides a standard methodology for conducting digital forensic analysis in a network environment. Teaches the importance of network forensic principles and development of an understanding of the technologies, protocols, laws, regulations, ethics, and procedures for network forensics. Incorporates demonstrations and laboratory exercises covering the identification, acquisition, authentication, preservation, analysis, and reporting of evidence for prosecution purposes.
CYBR 6740. Advanced Network Defense and Countermeasures. (3 Credits)
Prerequisite(s): CYBR 6300 or departmental approval.
Explores advanced topics in network defense, server hardening, vulnerability assessment, and mitigation scanning. Teaches students about network scanning, asset identification, Linux and Windows server hardening, anti-malware tools, intrusion detection, physical security, perimeter security, and cybersecurity awareness training. Contains hands-on labs providing experience from the perspective of a defender.
Explores advanced topics in network defense, server hardening, vulnerability assessment, and mitigation scanning. Teaches students about network scanning, asset identification, Linux and Windows server hardening, anti-malware tools, intrusion detection, physical security, perimeter security, and cybersecurity awareness training. Contains hands-on labs providing experience from the perspective of a defender.
CYBR 6750. Reverse Engineering and Malware Analysis. (3 Credits)
Prerequisite(s): CYBR 6300 or departmental approval.
Explores the analysis tools and techniques for identifying malicious programs and recovering compromised operating systems. Provides a standard methodology for reverse engineering and eradicating malware. Includes setting up isolated malware labs and utilizing a selected set of forensic tools, such as system and network monitoring utilities, disassemblers, and debuggers for analyzing malware characteristics and the impact that malware may have on compromised systems.
Explores the analysis tools and techniques for identifying malicious programs and recovering compromised operating systems. Provides a standard methodology for reverse engineering and eradicating malware. Includes setting up isolated malware labs and utilizing a selected set of forensic tools, such as system and network monitoring utilities, disassemblers, and debuggers for analyzing malware characteristics and the impact that malware may have on compromised systems.
CYBR 6770. Cybersecurity Management. (3 Credits)
Prerequisite(s): CYBR 6300 or Departmental approval.
Teaches management skills applicable to cybersecurity. Includes governance models, business continuity, disaster recovery, risk management, organizational security, cybersecurity life cycle management, and interactions between information technology and business units. Focuses on policies, procedures, and guidelines based on industry and government standards to fulfill legal, regulatory, and operational requirements.
Teaches management skills applicable to cybersecurity. Includes governance models, business continuity, disaster recovery, risk management, organizational security, cybersecurity life cycle management, and interactions between information technology and business units. Focuses on policies, procedures, and guidelines based on industry and government standards to fulfill legal, regulatory, and operational requirements.
CYBR 6780. Secure Coding. (3 Credits)
Prerequisite(s): CYBR 6300 or departmental approval.
Focuses on fundamentals of secure coding and current topics in application security. Includes the implementation of secure development lifecycle principles, identifying and mitigating issues in existing applications, and common security issues. Covers the most frequently encountered application security risks and how to address each of them. Includes web applications, mobile applications, and traditional desktop applications.
Focuses on fundamentals of secure coding and current topics in application security. Includes the implementation of secure development lifecycle principles, identifying and mitigating issues in existing applications, and common security issues. Covers the most frequently encountered application security risks and how to address each of them. Includes web applications, mobile applications, and traditional desktop applications.
CYBR 6900. Cybersecurity Capstone. (3 Credits)
Prerequisite(s): CYBR 6330, CYBR 6350, CYBR 6370, CYBR 6740, and CYBR 6770.
Provides culmination of cybersecurity in a self-directed research or practical project that showcases student's mastery of cybersecurity topics. Provides an opportunity to conduct research and/or implement systems that incorporate topics from previous courses. Requires students to present their work at the end of the semester.
Provides culmination of cybersecurity in a self-directed research or practical project that showcases student's mastery of cybersecurity topics. Provides an opportunity to conduct research and/or implement systems that incorporate topics from previous courses. Requires students to present their work at the end of the semester.