Skip to main content

CYBS 1000 - Cybersecurity Fundamentals

This course provides students with a broad foundation of information technology using lectures as well as hands-on lab exercises. Students who are interested in starting a career in IT, as well as those interested in the basics of IT for professional or personal development, are welcome to take this course. Having successfully completed this course, students will be prepared for the CompTIA IT Fundamentals+ certification.

Credit: 3


CYBS 2202 - Fundamentals of Network Security

An overview of the underlying concepts of computer network security including local area network (LAN), server administration, routers, switches, firewalls, and tools to monitor internal/external network security, availability, and performance.

Credit: 3


CYBS 2203 - Secure Programming

Prerequisites: CSCI 2911, CSCI 2761.

This course is designed for programmers who are responsible for designing, building, and implementing secure applications integrating with a relational database. The emphasis is on the security of a single program accessed through a network or web service. Students will gain the knowledge and experience of programming and validating a secure and distributed application. Successful completion of this class will give students some of the basic tools in how to design and implement secure systems.

Credit: 3


CYBS 2210 - CompTIA A+

This course introduces students to computer hardware and software, as well as Windows operating systems, networking concepts, mobile devices, IT security and troubleshooting. This course will help students prepare to take the CompTIA A+ Core Series certification examinations (exam numbers 220-1001 and 220-1002).

Credit: 3


CYBS 2220 - CompTIA Network +

The course will provide the knowledge and skills required to troubleshoot, configure, and manage common network wireless and wired devices, establish basic network design and connectivity, understand and maintain network documentation, identify network limitations and weaknesses, and implement network security, standards, and protocols. The candidate will have a basic understanding of emerging technologies including unified communications, mobile, cloud, and virtualization technologies. The course is designed to help you prepare for the Comp TIA Network+ (N 10-007) Certification Exam.

Credit: 3


CYBS 2230 - CompTIA Security +

The Comp TIA Security+ course will provide students with the knowledge and skills required to identify risk, to participate in risk mitigation activities, and to provide infrastructure, application, information, and operational security. In addition, the student will apply security controls to maintain confidentiality, integrity, and availability, identify appropriate technologies and products, troubleshoot security events and incidents, and operate with an awareness of applicable policies, laws, and regulations. The course is designed to help you prepare for the Comp TIA Security+ SYO- 601 Certification Exam.

Credit: 3


CYBS 2240 - Cisco Cybersecurity Operations

This course covers security concepts, common network and application operations attacks, and types of data needed to investigate security incidents. It addresses how to monitor alerts and breaches and understand and follow established procedures for response to alerts converted to incidents. Through a combination of lectures, hands-on labs, and self-­study, you will learn the essential skills, concepts, and technologies to be a contributing member of a Cybersecurity Operations Center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification.

Credit: 3


CYBS 3030 - Programming for Cybersecurity

Prerequisites: CSCI 1611 or CSCI 2911; and CYBS 3500

The purpose of this course is to introduce the students to the fundamental concepts of programming as needed by the cybersecurity professional. Students will learn the basic concepts of program design, data structures, programming, problem solving, programming logic, and fundamental design techniques for event-driven programs.

Credit: 3


CYBS 3070 - IT Systems Architecture

Prerequisites: CYBS 2210

This course introduces IT infrastructure issues for students majoring in cybersecurity. It covers topics related to both computer and systems architecture and communication networks, with an overall focus on the services and capabilities that IT infrastructure solutions enable in an organizational context. It gives the students the knowledge and skills that they need for communicating effectively with professionals whose special focus is on hardware and systems software technology, and for designing organizational processes and software solutions that require in-depth understanding of the IT infrastructure capabilities and limitations.

Credit: 3


CYBS 3250 - Cloud+ Security

Prerequisites: CYBS 1000, CYBS 2210, and CYBS 2220

This course will provide students with the knowledge and skills required to incorporate and manage cloud technologies as part of broader systems operations. Students will learn to weave together solutions that meet specific business needs and work in a variety of different industries. The course focuses on new technologies that support the changing cloud market as more organizations depend on cloud-based technologies to run mission critical systems. It validates the skills needed to deploy and automate secure cloud environments that support the high availability of business systems and data.

Credit: 3


CYBS 3300 - Windows and Linux Server Security

Prerequisites: CYBS 1000 and CYBS 2210

This course provides an in-depth examination of Windows and Linux servers. Students will learn to manage servers, configure operating systems, and implement virtualization. They will apply network security techniques, manage disaster recovery, and implement backup procedures. Students will also diagnose and resolve server hardware, software, security, and connectivity issues. The course focuses on multi-vendor products and is based on information technology industry standards. The course explores the skills of professionals who install, manage, and troubleshoot servers in data centers and cloud computing environments.

Credit: 3


CYBS 3350 - Hackathon

Prerequisites: CYBS 3500

Hackathons provide participants with a means to use their design, development, analysis, and presentation skills to create novel solutions for challenges that people and organizations face. This course will prepare you to participate in one or more of these challenges, giving you the opportunity to use your tech and people skills to provide a positive impact on society.

Credit: 3


CYBS 3500 - Secure Web Application Development

Prerequisites: CYBS 2203 and CSCI 3301

The course will cover web application development with particular emphasis on security and usability. Students will receive a strong background in JavaScript to build their web applications. Other topics include a review of basic HTML, CSS, frameworks, other web development languages, and database back ends.

Credit: 3


CYBS 3600 - Database Administration

Prerequisites: CSCI 3301

This course provides students with an intensive introduction to the world of a database administrator (DBA) within an enterprise. Students will explore typical DBA tasks regarding setting up the database environment, designing and implementing an efficient database structure, managing database security, privacy, and performance, and planning for expansion and business continuity.

Credit: 3


CYBS 3620 - Computer Systems Forensics

Prerequisites: CSCI 3640 and LAW 3720 (concurrent enrollment allowed).

This course is an in-depth study of computer system forensics including methodologies used for analysis of computer security breaches. Forensics is the use of science and technology to investigate and establish facts in criminal or civil courts of law. The student will be introduced to digital forensics and practiced by local, state, and federal law enforcement. Assignments will reinforce the theory presented in the lecture and will provide students with hands-on experience using well-known, publicly available, digital forensic tools. Students will work on one of two separate networks dedicated to cybersecurity teaching and research.

Credit: 3


CYBS 3750 - Ethical Hacking

Prerequisites: CYBS 2210, CYBS 2220, CYBS 2230, CYBS 2240

In this course students will learn vulnerability scanning, passive and active reconnaissance, and vulnerability management. This course provides an in-depth examination of network attacks, wireless attacks, application-based attacks, and attacks on cloud computing systems. Students will learn to identify scripts in multiple software deployments, analyze various scripts and code samples, explain the tools used in a penetration test, and perform post-exploitation procedures. Students will also explore penetration testing skills for traditional physical environments, cloud computing environments, web applications, and the Internet of Things (IoT).

Credit: 3


CYBS 3990 - Internship

Prerequisites: At least a 2.7 GPA for undergraduate level

Internships provide students with applied, experiential learning opportunities so that they can make connections between academic study and the practical application of that study in a professional work environment. Academic internships are supervised by a faculty member and an on-site professional supervisor. All academic internships must be approved in advance by the department or program. Unless stipulated otherwise by the department or program, credit hours are defined by the university's credit hour policy (for example, a 3-credit internship will require a minimum of 120 hours onsite). Internships may be repeated for a total of 9 credit hours.

Credit: 3


CYBS 3998 - Special Topics in Cybersecurity

Prerequisites: A grade of C- or better in any WCIL1 course, or HON 1000, or a score of 630+ in SAT Evidence Based Reading or Writing, or a score of 28+ in ACT English.

This course will cover specialized or emerging topics in cybersecurity that are not covered elsewhere in the Cybersecurity program as well as provide the opportunity to keep the program current by introducing new and in-demand topics in cybersecurity. This course can be repeated twice by the student if the topic of the course is different.

Credit: 3


CYBS 4900 - Seminar in Cybersecurity

Prerequisites: Instructor Permission.

This course serves to synthesize the knowledge gained from each course in the cybersecurity program. The course provides students with an integration of acquired knowledge of theory to practical application. The goal is to apply principles of interagency cooperation, critical thinking, and systems approaches to solve practical problems in the cybersecurity environment. Students will assess the impact of their education experience on their professional competency and values, critical thinking, problem solving, communication, information utilization, and collaboration skills. Topics include problem solving, case study and analysis, teamwork, and professional writing.

Credit: 3


CYBS 6000 - Research and Writing for the IT Professional

Course Restrictions: Restricted to students in the Master of Science in Cybersecurity program. Restricted to Graduate students.

This course will help you understand the ethical, social, and professional constraints of audience, style, and content for research writing situations. This course teaches you to utilize resources, such as search engines and databases for locating secondary information and presents the strategies of effective data gathering. You will practice an academic writing style which is appropriate to the field of information technology utilizing American Psychological Association (APA) guidelines for writing, formatting, and using citations. You will produce a formal research paper in this course and present it in a virtual setting.

Credit: 3


CYBS 6005 - Cyber Threat Intelligence

Course Restrictions: Restricted to students in the Master of Science in Cybersecurity program. Restricted to Graduate students

Cyber threat intelligence (CTI) provides valuable information to organizations to prepare for and protect against cyber-attacks. This course provides students with an introduction to the fundamental concepts and tools of cyber threat intelligence. In this course, you will determine the benefits of threat intelligence within an organization. You will examine the intelligence cycle to include planning, collection, processing and exploitation, analysis, dissemination, and feedback. Your intelligence findings will enable you to understand a threat actor's targets, motives, and attack behaviors.

Credit: 3


CYBS 6010 - Legal and Ethical Issues for IT Administrators

Course Restrictions: Restricted to students in the Master of Science in Cybersecurity program. Restricted to Graduate students

This course provides a detailed discussion of the legal and ethical issues associated with cybersecurity. Students will explore the legal, social, ethical, and professional issues involved in the exploitation of computer technology. Topics covered include ethical theories related to information technology, computer and network security, privacy, cybercrimes, protection of intellectual property, and ethical behavior for working in the cybersecurity industry.

Credit: 3


CYBS6015 - CompTIA CySA+ Security

Course Restrictions: Restricted to students in the Master of Science in Cybersecurity program. Restricted to Graduate students

CompTIA CySA+ focuses on the student’s ability to proactively capture, monitor, and respond to network traffic findings, and emphasizes software and application security, automation, threat hunting, and IT regulatory compliance. CySA+ applies behavioral analytics to networks to improve the overall state of security through identifying and combating malware and advanced persistent threats (APTs), resulting in an enhanced threat visibility across a broad attack surface. This course will validate an IT professional’s ability to proactively defend and continuously improve the security of an organization.

Credit: 3


CYBS 6020 - Cloud Computing Platforms, Applications, and Data Security

Course Restrictions: Restricted to students in the Master of Science in Cybersecurity program. Restricted to Graduate students

This course provides students with an overview of vendor-independent cloud computing technology concepts and methods. Several cloud providers along with their tools will be referenced. Students will learn specifics about software as a service (SaaS), platform as a service (PaaS), infrastructure as a service (IaaS), server and desktop virtualization and more. Specific topics include cloud-related security risks and threats, cloud architecture and design, and operations and support.

Credit: 3


CYBS 6025 - CompTIA PenTest+

Prerequisites: Familiarity in CompTIA Network+, CompTIA Security+ highly recommended

Course Restrictions: Restricted to students in the Master of Science in Cybersecurity program. Restricted to Graduate students

This course presents the most up-to-date penetration testing and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. This course requires a candidate to demonstrate the most relevant pen- testing skills for the cloud, hybrid environments, web applications, Internet of Things (IoT), and traditional on-premises.

Credit: 3


CYBS 6030 - Wireless and Mobile Device Security

Course Restrictions: Restricted to students in the Master of Science in Cybersecurity program. Restricted to Graduate students

This course focuses on the security strengths and weaknesses of mobile devices. Students will explore mobile application analysis tools to identify deficiencies in mobile app network traffic, file system storage, and inter-app communication channels. This course presents strategies for managing the administration of wireless, mobile, cloud, and unique technological environments, such as social networking and the Internet of Things (IoT).

Credit: 3


CYBS 6035 - Critical Infrastructure Security

Course Restrictions: Restricted to students in the Master of Science in Cybersecurity program. Restricted to Graduate students

This course focuses on the identification and analysis of critical infrastructure systems including security and threat assessments. There are sixteen critical infrastructure sectors that are considered vital to the security of the United States. These include (1) commercial facilities, (2) critical manufacturing, (3) communication, (4) chemical, (5) defense, (6) dams, (7) emergency services, (8) food and agriculture, (9) energy, (10) financial, (11) government, (12) healthcare and public health, (13) nuclear, (14) information technology, (15) transportation, and (16) water and wastewater. This class will utilize a case-study approach to analyze security threats within each sector.

Credit: 3


CYBS 6040 - CompTIA Server+

Course Restrictions: Restricted to students in the Master of Science in Cybersecurity program. Restricted to Graduate students.

This course develops the skills of IT professionals, including installing, managing, and troubleshooting servers in data centers as well as on-premise and hybrid environments. Students will learn to install, configure, and manage server hardware and server operating systems. They will implement proper server hardening and security controls, and demonstrate an understanding of key disaster recovery, high availability, and backup concepts.

Credit: 3


CYBS 6045 - Blockchain Fundamentals

Course Restrictions: Restricted to students in the Master of Science in Cybersecurity program. Restricted to Graduate students.

This course introduces students to the important concepts of blockchain technology. We will discuss the fundamental cryptographic basics of the technology and the protocols and decentralized peer-to-peer networks, distributed ledgers, and trust models that define a blockchain. We will explore the hashing and cryptography foundations used in blockchain as well as the governance of blockchain technology and its related challenges.

Credit: 3


CYBS 6050 - Intelligence Analysis Fundamentals

Course Restrictions: Restricted to students in the Master of Science in Cybersecurity program. Restricted to Graduate students.

This course will examine the process of intelligence analysis. It will focus on critical thinking, the analytical process, the nature of bias, the avoidance of bias in qualitative analysis, as well as dealing with uncertainty. Students will explore how intelligence analysis compares and contrasts between the Intelligence Community, domestic law enforcement, homeland security agencies, and the private sector. Students will develop the ability to research, evaluate, discuss, and write about a variety of information intelligence concepts.

Credit: 3


CYBS 6055 - Computer Forensics and Investigations

Course Restrictions: Restricted to students in the Master of Science in Cybersecurity program. Restricted to Graduate students

This course develops the technical knowledge required to conduct digital forensic investigations. Topics include current forensics and analysis tools, investigation methods, and professional problem-solving techniques. The course guides the student through every step of the computer forensics investigation, from lab setup to testifying in court.

Credit: 3


CYBS 6060 - Special Topics in Cybersecurity

Course Restrictions: Restricted to students in the Master of Science in Cybersecurity program. Restricted to Graduate students

Repeatable for up to 6 credits if topic changes.

This course provides an opportunity for students to explore other areas directly related to the cybersecurity curriculum that deal with issues that are not included in the program of study. These special topics would be offered based on student interest and current events. Course content will vary and may be repeated as topics change.

Credit: 3


CYBS 6990 - Internship

Prerequisite: At least a 2.7 GPA for undergraduate level and a 3.0 for graduate.

Course Restrictions: Restricted to students in the Master of Science in Cybersecurity program. Restricted to Graduate students

Internships provide students with applied, experiential learning opportunities so that they can make connections between academic study and the practical application of that study in a professional work environment. Academic internships are supervised by a faculty member and an on-site professional supervisor. All academic internships must be approved in advance by the department or program. Unless stipulated otherwise by the department or program, credit hours are defined by the university's credit hour policy. Internships may be repeated for a total of 9 credit hours.

Credit: 1-3


CYBS 7000 - Cybersecurity Capstone

Prerequisites: Complete all courses in the Master of Science in Cybersecurity program; or Program Director Approval.

Course Restrictions: Restricted to students in the Master of Science in Cybersecurity program. Restricted to Graduate students

This course is the culmination of theory, principles, methodologies, and technologies associated with cybersecurity. The course integrates and extends knowledge, skills, perspectives gained through previous coursework while bridging coursework with students’ careers after graduation. Assignments will focus on preparing the student for further career advancement in the field of cybersecurity. Students are expected to demonstrate their mastery by generating serious, in-depth, scholarly, and professional level output.

Credit: 3