Latest News
Prerequisite: Graduate Standing, Consent of Coordinator
An overview of information security concepts; a basic introduction to information assurance principles and information security systems and specific issues pertaining to risk assessment and cyber threats; a brief examination of the laws governing information security including public policy and ethical standards.
Prerequisite: Restricted to majors
To understand and deal with real-world cyber threats, this course explores the latest development in the area of cyber security, and provides theory and hands-on practice in playing with cyber security software and network systems in a laboratory environment.
Prerequisite: Restricted to majors
Provides theory and hands-on practice in data analytics and threat intelligence in cybersecurity systems. Explores way to perform analytical tasks automatically, and solve cryptography, intrusion detection, automation, log creation, log management and other problems in cybersecurity.
This course presents a high level introduction of Cyber Forensics including the different approaches in computer forensics investigation. It will also cover the ethics as it is mapped to the objectives of the Center of Academic Excellence in Cyber Security.
Prerequisite: Graduate Standing, CYB 528, Consent of Coordinator
The course examines advanced cases in digital forensics, and applies advanced methodologies and proven practices applied in digital investigations.
Prerequisite: Graduate Standing, Consent of Coordinator
This course examines the legal concepts, principles and theories of public policy as they apply to information technology. A review of the American system with its federal and state levels will be studied to provide students with the necessary legal background in which the world of Information Technology functions. A special emphasis will be placed on compliance issues, Cyber laws and regulations.
Prerequisite: Graduate Standing, Consent of Coordinator
The goal of this course is a study of the challenges involved in the design and implementation of a secure operating system. Identify security threats and monitor operating system security implementations; learn how to configure operating systems to meet security standards using best practices.
Prerequisite: Graduate Standing, Consent of Coordinator
A comprehensive survey of the computer communication field including data communication concepts and categories, communications switching and routine, network configuration and management. Topics also include layered network models and protocol.
Prerequisite: Graduate Standing, Consent of Coordinator
To evaluate advanced “hacks” and methods of defense fortification. This course provides more advanced network defense concepts and techniques. It covers more detailed theoretical concepts in networking. State-of-the-art techniques and tools will be used to learn how to protect network.
Prerequisite: Graduate Standing, Consent of Coordinator
Students will examine the concepts and topics in network security and information assurance. Through this course students will conduct a CTF (Capture The Flag) exercise, and learn more about security threats, secure socket layer, SSH, Tunneling, PGP, encryption algorithm, vulnerabilities and other related topics.
Prerequisite: Graduate Standing, Consent of Coordinator
The course covers more advanced security lifecycle of products and services; it will go beyond requirements and policy development and progressing through the actual development, deployment, and operations. This course will also provide advanced methods regarding the issues associated with protecting information assets.
Prerequisite: Graduate Standing, Consent of Coordinator
Students will learn the four service models cloud service models: IaaS- Infrastructure as a Service, PaaS- Platform as a Service, SaaS- Software as a Service, and BpaaS- Business Process as a Service. This course will also cover topics related to big data, and challenges resulting from the implementation of high computing performances.
Prerequisite: Graduate Standing, Consent of Coordinator
The students will learn how to build a software project and manage it professionally. Additionally, they will be expected to devise a plan with a schedule of finished products, a tracking system to monitor the building process of the project, and a risk management assessment.
Prerequisite: Graduate Standing, Consent of Coordinator
This is a capstone course and each student is required to submit and present a semester long project. Students will develop their own cyber security research project, devise hypotheses related to their study, gather data to support their hypotheses, and present the results.
Prerequisite: Graduate Standing, Consent of Coordinator
This course provides theory and hands on practice in data analytics and threat intelligence in cybersecurity systems. We also explore ways to perform analytical tasks automatically, and solve cryptography, intrusion detection, automation, log creation, log management and other problems in cybersecurity.
Prerequisite: Graduate Standing, Consent of Coordinator
Graduate students who have completed their course work but not their thesis, project, or comprehensive examination, or who have other requirements remaining for the completion for their degree, may attain continuous enrollment by enrolling in this course.
Offered Fall, Spring