With the prevalence of mobile computing, the advantages of cloud computing, the ubiquity of computing in general, and the issues of securing big data caused by the world-wide explosion of eBusiness and eCommerce today, secure computing environments and appropriate information management have become critical issues to all sizes and types of organizations. Therefore, there is a vital and growing need for all computing professionals to have a foundation in the issues critical to information security and how they apply to their specific disciplines. The minor consists of two required courses and three electives chosen by the student from the computing security advanced course clusters. There are many elective course choices to provide flexibility. Therefore, the minor provides any computing major outside of the computing security degree program with basic knowledge of the issues and technologies associated with computing security and allows students the opportunity to select a set of security electives that are complementary to their majors. Before beginning the minor in students must possess prerequisite knowledge that can be obtained from various programming sequences and courses in calculus and discrete math.
Notes about this minor:
- This minor is closed to students majoring in computing security or any BS/MS degree option that includes the BS in computing security.
- Posting of the minor on the student's academic transcript requires a minimum GPA of 2.0 in the minor.
- Notations may appear in the curriculum chart below outlining pre-requisites, co-requisites, and other curriculum requirements (see footnotes).
|Students must complete one of the following two-course programming sequences:|
|CSCI-141||Computer Science I|
|CSCI-142||Computer Science II|
|ISTE-120||Computational Problem Solving in the Information Domain I|
|ISTE-121||Computational Problem Solving in the Information Domain II|
|ISTE-100||Computational Problem Solving in the Network Domain I|
|ISTE-101||Computational Problem Solving in the Network Domain II|
|IGME-105||Game Software Development I|
|IGME-106||Game Software Development II|
|CPET-121||Computational Problem Solving I|
|CPET-321||Computational Problem Solving II|
|Students must complete a two-course calculus sequence†:|
|MATH-181||Project-based Calculus I|
|MATH-182||Project-based Calculus II|
|Student must complete one of the following courses in discrete mathematics:‡|
|MATH-190||Discrete Mathematics for Computing|
|MATH-192||Discrete Mathematics and Introduction to Proof|
|CSEC-101||Fundamenals of Computing Security|
|Choose one of the following:|
|CSEC-362||Cryptography and Authentification|
|CSCI-462||Introduction to Cryptography|
|Choose three of the following:|
|CSEC-380||Principles of Web Application Security|
|CSEC-461||Computer System Security|
|CSEC-462||Network Security and Forensics|
|CSEC-465||Network and System Security Audits|
|CSEC-466||Introduction to Malware|
|CSEC-467||Mobile Device Security and Forensics|
|CSEC-468||Risk Management for Information Security|
|CSEC-471||Penetration Testing Frameworks and Methodologies|
|CSEC-472||Authentication and Security Models|
|CSEC-473||Cyber Defense Techniques|
|CSEC-474||Unix Based System Forensics|
|CSEC-475||Windows System Forensics|
|CSEC-476||Malware Reverse Engineering|
|CSEC-477||Disaster Recovery Planning|
|CSCI-455||Principles of Computer Security|
|CSCI-531||Introduction to Security Measurement|
|CSCI-532||Introduction to Intelligent Security Systems|
|SWEN-331||Engineering Secure Software|
|SWEN-467||Hardware/Software Co-design for Cryptographic Applications|
† An equivalent calculus sequence may be determined by the minor adviser.
‡ An equivalent discrete mathematics sequence may be determined by the minor adviser.