Cybersecurity Adv. Cert. - Curriculum
Cybersecurity, advanced certificate, typical course sequence
|Course||Sem. Cr. Hrs.|
|Choose four of the following courses:||12|
This course is designed to provide students with the advanced concepts needed to establish network security strategies to ensure adequate protection for the corporate environment and yet provide accessibility for the corporate community. (This course is restricted to students in the COMPSEC-MS program.) Lecture 3 (Spring).
Advanced Computer Forensics
This course provides students with the latest techniques and methods needed for extracting, preserving and analyzing volatile and nonvolatile information from digital devices. Students will gain exposure to the spectrum of available computer forensics tools along with developing their own tools for “special need” situations. The core forensics procedures necessary for ensuring the admissibility of evidence in court, as well as the legal and ethical implications of the process, will be covered on both Unix and Windows platforms, under multiple file systems. Therefore, students must possess a knowledge of available filesystems on both platforms. (Prerequisites: This course is restricted to BS/MS students in Computing Security and students in the COMPSEC-MS program.) Lecture 3 (Fall).
Information Security Risk Management
This course will provide students with an introduction to the principle of risk management and its three key elements: risk analysis, risk assessment and vulnerability assessment. Students will also learn the differences between quantitative and qualitative risk assessment, and details of how security metrics can be modeled/monitored/controlled and how various types of qualitative risk assessment can be applied to the overall assessment process. Several industry case studies will be studied and discussed. Students will work together in teams to conduct risk assessments based on selected case studies or hypothetical scenarios. Finally, they will write and present their risk assessment reports and findings. (Prerequisites: This course is restricted to BS/MS students in Computing Security and students in the COMPSEC-MS program.) Lecture 3 (Spring).
Computer System Security
The importance of effective security policies and procedures coupled with experience and practice is emphasized and reinforced through research and practical assignments. Organization and management of security discipline and response to threats is studied. Case studies of effective and failed security planning and implementation will be examined and analyzed. The issues influencing proper and appropriate planning for security and response to attacks will be studied. To be successful in this course students should be knowledgeable in networking, systems, and security technologies. (Prerequisites: This course is restricted to BS/MS students in Computing Security and students in the COMPSEC-MS program.) Lab 2, Lecture 3 (Fall).
Computer Viruses and Malicious Software
Computer malware is a computer program with malicious intent. In this course, students will study the history of computer malware, categorizations of malware such as computer viruses, worms, Trojan horses, spyware, etc. Other topics include, but are not limited to, basic structures and functions of malware, malware delivery mechanism, propagation models, anti-malware software, its methods and applications, reverse engineering techniques. Students will conduct research to understand the current state of the computer malware defense and offense. (Prerequisites: This course is restricted to BS/MS students in Computing Security and students in the COMPSEC-MS program.) Lec/Lab 3 (Fall).
Students will examine the areas of intrusion detection, evidence collection, network auditing, network security policy design and implementation as well as preparation for and defense against attacks. The issues and facilities available to both the intruder and data network administrator will be examined and evaluated with appropriate laboratory exercises to illustrate their effect. The students will be provided with an understanding of the principles and concepts of wired and wireless data network security. Students will perform a series of laboratory or homework experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption. Students will engage in attack/defend scenarios to test their deployments against other teams. Students should be knowledgeable in networking technologies. (Prerequisites: This course is restricted to BS/MS students in Computing Security and students in the COMPSEC-MS program.) Lecture 3 (Spring).
|Total Semester Credit Hours||