CYB 105 Cybersecurity Fundamentals I (A)
This initial course delivers a comprehensive overview of the essential concepts students must know as they pursue their education in cybersecurity. Students will learn the fundamental principles of cybersecurity and the concepts and tactics required to identify and mitigate attacks against enterprise networks and mission-critical infrastructure. Students will gain an understanding of the fundamental tenets of network security, and review the general concepts in maintaining a secure network-computing environment. 3 Cr. Every Semester.
CYB 203 Programming in Python (B)Prerequisite: CSC 120.
Provides a coverage of the Python language. Includes these topics: syntax, primitive types, control structures, lists, tuples, sets, dictionaries, functions, recursion, object-oriented programming, files and exception handling, GUI programming. Requires extensive programming and supervised laboratory sessions. 4 Cr. Fall.
CYB 205 Cybersecurity Fundamentals II (A)Prerequisite: CYB 105.
This course is a continuation of the Cybersecurity Fundamentals I course. This course continues to build on the essential cybersecurity concepts needed to pursue education in cybersecurity. Students will learn the challenges and fundamental principles of securing cloud based IT systems, and the concepts and tactics required to identify and mitigate attacks against traditional, hybrid, and cloud based infrastructures. Students will also gain an understanding of the concepts and processes of Security Operations and the role it plays in protecting organizations. 3 Cr. Spring.
CYB 401 Ethical Hacking (B)Prerequisite: CIS 419.
In general, this course exposes students to ethical hacking methodologies. It introduces students to cybersecurity concepts to discover and report vulnerabilities in wide variety of systems. Students in this course will use hacking methodologies and tools used by hackers used to perform attacks to learn best defense from these same hackers. The course is an in-depth study of wide range of different techniques and tools used for system hackings along with techniques used for defending systems against such kinds of attacks using hands-on lab exercises. Even though the skills and the techniques learned in the course can be used for malicious purposes, the course teaches the students how to use these techniques and tools to perform an ethical hack to defend themselves and their institutes. 3 Cr.
CYB 403 Enterprise Security and Firewalls (B)Prerequisites: CYB 205 and CIS 419.
This course will teach the theory and practical application of critical components of Firewall design, implementation, configuration, and management. Next Generation Firewalls combine many cybersecurity technologies such as: threat prevention, intrusion detection, traffic handling, advanced content filtering, VPN and event logging and reporting. A lab environment will provide experience in the implementation of enterprise security tools. 3 Cr.
CYB 405 Database and Web Security (A)Prerequisites: CYB203 or CSC203 The course provides students a basic foundation in database security.
It is a study of principles and practices of implementing computer database security in modern businesses and industries. The following topics are covered in the course: database security principles, database auditing, security implementation and database reliability. The course also covers advanced topics such as database management security issues such as securing the DBMS, enforcing access controls, and related issues. 3 Cr.
CYB 418 Information Assurance & Incident Response (A)Prerequisites: CIS 202 AND CIS 303 AND CIS 419.
This course provides students with the fundamental models and concepts in information assurance and cyber security that address the organizational needs to securely protect information assets from harm. Students will examine what is needed to manage an effective information security program and new module details incident response and detection strategies. This course will introduce students to topics including the need for Information Security, Security Management, Risk Management, Incident Response and Contingency Planning and strategies. This course is designed to provide an overview of the latest issues in information assurance and potential managerial and technical controls to improve the confidentiality, integrity, and availability of data and information. 3 Cr.