Search form

Advance Computing Security Clusters

A matriculated student in the B.S. in Computing Security needs to take 6 elective courses. It is required to take 4 courses from one cluster and 2 courses from other 2 different clusters.

Students can create customized clusters for their special interests provided compositions of clusters are vested by one faculty, one student academic advisor, and approved by the department chair. Courses in a customized cluster should be on the list of approved advanced elective courses of Computing Security. To be counted as a cluster course, a GCCIS course not on the list of advanced elective courses of Computing Security needs to be approved by the chair on a case by case basis, or simply such a course can be counted as a free elective for students. A course prepended with an asterisk is a required course for the cluster.  

System Security:

  •   CSCI 455 Principles of Computer Security
  • *CSEC 461 Computer System Security
  •  CSEC 465 Network & System Security Audit
  •  CSEC 468 Risk Management for Information Security
  •  CSEC 471 Penetration Testing Frameworks & Methodologies
  •  CSEC 473 Cyber Defense Techniques
  •  CSEC 477 Disaster Recovery Planning and Business Continuity
  •  CSEC 478 Advanced Mobile Device Forensics
  •  CSEC 479 Advanced Mobile Device Security

Network Security:

  • *CSEC 462 Network Security and Forensics
  •  CSEC 463 Sensor Network Security
  •  CSEC 465 Network & System Security Audit
  •  CSEC 468 Risk Management for Information Security
  •  CSEC 469 Wireless Security
  •  CSEC 471 Penetration Testing Frameworks & Methodologies
  •  CSEC 473 Cyber Defense Techniques
  •  CSEC 477 Disaster Recovery Planning and Business Continuity
  •  CSEC 478 Advanced Mobile Device Forensics
  •  CSEC 479 Advanced Mobile Device Security

Forensics:

  • *CSEC 462 Network Security and Forensics
  • *CSEC 464 Computer System Forensics
  •  CSEC 465 Network & System Security Audit
  •  CSEC 467 Mobile Device Security and Forensics
  •  CSEC 474 Unix-based System Forensics
  •  CSEC 475 Windows System Forensics
  •  CSEC 478 Advanced Mobile Device Forensics

Malware:

  •  CSCI 455 Principles of Computer Security
  •  CSEC 465 Network & System Security Audit
  • *CSEC 466 Introduction to Malware
  •  CSEC 470 Covert Communications
  •  CSEC 476 Malware Reverse Engineering
  •  CSEC 479 Advanced Mobile Device Security

Secure Software Development:

  • CSCI 455 Principles of Computer Security
  • CSCI 642 Secure Coding (Graduate courses)
  • CSEC 465 Network & System Security Audit
  • *SWEN 261 Introduction to Software Engineering
  • SWEN 331 Engineering Secure Software
  • SWEN 467 Hardware Software Co-Design for Cryptographic Applications

Database and Application Security:

  • CSCI 455 Principles of Computer Security
  • *CSCI 622 Secure Data Management
  • CSEC 465 Network & System Security Audit
  • CSEC 468 Risk Management for Information Security
  • *CSEC 731 Web Server and Application Security Audits

Security Evaluation:

  • *CSCI 531 Introduction to Security Measurement
  • *CSCI 532 Introduction to Intelligent Security Systems
  • CSEC 461 Computer System Security
  • CSEC 462 Network Security and Forensics
  • CSEC 465 Network & System Security Audit
  • CSEC 468 Risk Management for Information Security
  • CSEC 471 Penetration Testing Frameworks & Methodologies
  • CSEC 478 Advanced Mobile Device Forensics
  • CSEC 479 Advanced Mobile Device Security

Theory:

  • *CSCI 455 Principles of Computer Security
  • CSCI 464 Xtreme Theory
  • CSCI 531 Introduction to Security Measurement
  • CSCI 662 Foundations of Cryptography
  • CSCI 762 Advanced Cryptography
  • *CSEC 470 Covert Communications