CYBS1000
|
Cybersecurity Fundamentals
|
This course provides students with a broad foundation of information technology using lectures as well as hands-on lab exercises. Students who are interested in starting a career in IT, as well as those interested in the basics of IT for professional...
|
CYBS2202
|
Fundamentals of Network Security
|
An overview of the underlying concepts of computer network security including local area network (LAN), server administration, routers, switches, firewalls and tools to monitor internal/external network security, availability, and performance
|
CYBS2203
|
Secure Programming
|
This course is designed for programmers who are responsible for designing, building, and implementing secure applications integrating with a relational database. The emphasis is on the security of a single program accessed through a network or web se...
|
CYBS2210
|
CompTIA A+
|
This course introduces students to computer hardware and software, as well as Windows operating systems, networking concepts, mobile devices, IT security and troubleshooting. This course will help students prepare to take the CompTIA A+ Core Series c...
|
CYBS2220
|
CompTIA Network +
|
The course will provide the knowledge and skills required to troubleshoot, configure, and manage common network wireless and wired devices, establish basic network design and connectivity, understand and maintain network documentation, identify netwo...
|
CYBS2230
|
CompTIA Security +
|
The Comp TIA Security+ course will provide students with the knowledge and skills required to identify risk, to participate in risk mitigation activities, and to provide infrastructure, application, information, and operational security. In addition,...
|
CYBS2240
|
Cisco Cybersecurity Operations
|
This course covers security concepts, common network and application operations attacks, and types of data needed to investigate security incidents. It addresses how to monitor alerts and breaches and understand and follow established procedures for...
|
CYBS3030
|
Programming for Cybersecurity
|
The purpose of this course is to introduce the students to the fundamental concepts of programming as needed by the cybersecurity professional. Students will learn the basic concepts of program design, data structures, programming, problem solving, p...
|
CYBS3070
|
IT Systems Architecture
|
This course introduces IT infrastructure issues for students majoring in cybersecurity. It covers topics related to both computer and systems architecture and communication networks, with an overall focus on the services and capabilities that IT infr...
|
CYBS3250
|
Cloud+ Security
|
This course will provide students with the knowledge and skills required to incorporate and manage cloud technologies as part of broader systems operations. Students will learn to weave together solutions that meet specific business needs and work in...
|
CYBS3300
|
Windows and Linux Server Security
|
This course provides an in-depth examination of Windows and Linux servers. Students will learn to manage servers, configure operating systems, and implement virtualization. They will apply network security techniques, manage disaster recovery, and im...
|
CYBS3350
|
Hackathon
|
Hackathons provide participants with a means to use their design, development, analysis, and presentation skills to create novel solutions for challenges that people and organizations face. This course will prepare you to participate in one or more o...
|
CYBS3500
|
Secure Web Application Development
|
The course will cover web application development with particular emphasis on security and usability. Students will receive a strong background in JavaScript to build their web applications. Other topics include a review of basic HTML, CSS, framework...
|
CYBS3600
|
Database Administration
|
This course provides students with an intensive introduction to the world of a database administrator (DBA) within an enterprise. Students will explore typical DBA tasks regarding setting up the database environment, designing and implementing an eff...
|
CYBS3620
|
Computer Systems Forensics
|
This course is an in-depth study of computer system forensics including methodologies used for analysis of computer security breaches. Forensics is the use of science and technology to investigate and establish facts in criminal or civil courts of la...
|
CYBS3750
|
Ethical Hacking
|
In this course students will learn vulnerability scanning, passive and active reconnaissance, and vulnerability management. This course provides an in-depth examination of network attacks, wireless attacks, application-based attacks, and attacks on c...
|
CYBS3998
|
Special Topics in Cybersecurity
|
This course will cover specialized or emerging topics in cybersecurity that are not covered elsewhere in the Cybersecurity program as well as provide the opportunity to keep the program current by introducing new and in-demand topics in cybersecurity...
|
CYBS4900
|
Seminar in Cybersecurity
|
This course serves to synthesize the knowledge gained from each course in the cybersecurity program. The course provides students with an integration of acquired knowledge of theory to practical application. The goal is to apply principles of interag...
|
CYBS6000
|
Research and Writing for the IT Professional
|
This course will help you understand the ethical, social, and professional constraints of audience, style, and content for research writing situations. This course teaches you to utilize resources, such as search engines and databases for locating se...
|
CYBS6005
|
Cyber Threat Intelligence
|
Cyber threat intelligence (CTI) provides valuable information to organizations to prepare for and protect against cyber-attacks. This course provides students with an introduction to the fundamental concepts and tools of cyber threat intelligence. In...
|
CYBS6010
|
Legal and Ethical Issues for IT Administrators
|
This course provides a detailed discussion of the legal and ethical issues associated with cybersecurity. Students will explore the legal, social, ethical, and professional issues involved in the exploitation of computer technology. Topics covered in...
|
CYBS6015
|
CompTIA CySA+ Security
|
CompTIA CySA+ focuses on the student’s ability to proactively capture, monitor, and respond to network traffic findings, and emphasizes software and application security, automation, threat hunting, and IT regulatory compliance. CySA+ applies behavio...
|
CYBS6020
|
Cloud Computing Platforms, Applications, and Data Security
|
This course provides students with an overview of vendor-independent cloud computing technology concepts and methods. Several cloud providers along with their tools will be referenced. Students will learn specifics about software as a service (SaaS),...
|
CYBS6025
|
CompTIA PenTest+
|
This course presents the most up-to-date penetration testing and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. This course requires a candidate to demonstrate the most relevant pe...
|
CYBS6030
|
Wireless and Mobile Device Security
|
This course focuses on the security strengths and weaknesses of mobile devices. Students will explore mobile application analysis tools to identify deficiencies in mobile app network traffic, file system storage, and inter-app communication channels....
|
CYBS6035
|
Critical Infrastructure Security
|
This course focuses on the identification and analysis of critical infrastructure systems including security and threat assessments. There are sixteen critical infrastructure sectors that are considered vital to the security of the United States. The...
|
CYBS6040
|
CompTIA Server+
|
This course develops the skills of IT professionals, including installing, managing, and troubleshooting servers in data centers as well as on-premise and hybrid environments. Students will learn to install, configure, and manage server hardware and...
|
CYBS6045
|
Blockchain Fundamentals
|
This course introduces students to the important concepts of blockchain technology. We will discuss the fundamental cryptographic basics of the technology and the protocols and decentralized peer-to-peer networks, distributed ledgers, and trust model...
|
CYBS6050
|
Intelligence Analysis Fundamentals
|
This course will examine the process of intelligence analysis. It will focus on critical thinking, the analytical process, the nature of bias, the avoidance of bias in qualitative analysis, as well as dealing with uncertainty. Students will explore h...
|
CYBS6055
|
Computer Forensics and Investigations
|
This course develops the technical knowledge required to conduct digital forensic investigations. Topics include current forensics and analysis tools, investigation methods, and professional problem-solving techniques. The course guides the student t...
|
CYBS6060
|
Special Topics in Cybersecurity
|
This course provides an opportunity for students to explore other areas directly related to the cybersecurity curriculum that deal with issues that are not included in the program of study. These special topics would be offered based on student inter...
|
CYBS7000
|
Cybersecurity Capstone
|
This course is the culmination of theory, principles, methodologies, and technologies associated with cybersecurity. The course integrates and extends knowledge, skills, perspectives gained through previous coursework while bridging coursework with s...
|