X

Plan of Study – Cybersecurity

Note: A Semester Hour (s.h.) is a unit of academic credit representing an hour of class (such as lecture class) or three hours of laboratory work each week for an academic semester. Most courses are two, three or four semester hours.

Cybersecurity: Bach Sci

Cybersecurity: Bachelor of Science

Required Courses
Study of the evolution of computers and the operating functions of the hardware, systems software, application software, data communications, and ethics of data storage and retrieval; exploration of the integration and application of information processing in the business environment and in the global society; hands-on experience with word processing, electronic spreadsheets, graphics, database management, and electronic mail.
This course, built in collaboration with Google, provides a gentle, but thorough, introduction to programming using Python. Students will learn the core concepts and techniques needed to create programs and perform basic data analysis. By the end of this course, students will be ready to pursue further study in computer science and unlock more advanced programming courses.
This course continues on from Programming for Everyone I. In the first half of the course, students will learn how to use their Python skills to treat the Internet as a source of data. The second half of the course will teach students the fundamentals of Structured Query Language (SQL) and database design. By the end of the course, students will have improved their programming skills and learn how to build a range of applications. Pre-requisite: CSC 2500.
Introduction to the fundamentals of Cloud Computing, Infrastructure and Networking, and an exploration of how the cloud is used in a range of situations, including IT, App Development and Machine Learning. Google Cloud Platform (GCP) is used. Prerequisite: CSC 2500, CSC 2550.
This course teaches students how malicous actors use social skillls and technology to facilitate cyber-attacks and analyzes the tools and information needed to thwart those attacks. It is offered to students wanting to pursue one of the many available jobs in cybersecurity or those who simply wish to learn how to make the Internet safer and secure their own privacy. Optional synchronous sessions are offered.
Exploration of career paths in Cybersecurity, potential salary outcomes, and different roles. Identification of jobs and opportunities that are a good fit, and development of a plan of action toward securing a job. Prerequisite: CYS 2100.
Cybersecurity is one of the greatest daily threats companies face and they are constantly looking for new hires to help protect them. In this course, students get a firsthand look at methods of committing cybercrime and how governments detect, investigate, and implement laws and politics to deter and prevent them.
Technology is constantly evolving, and cybersecurity must keep pace with changing trends. In this class, students will learn about the changing landscape of cybersecurity, new forms of cyber-attack, and emerging technologies that are likely to be targeted. By the end of the course, students will be able to implement the most up-to-date practices in cybersecurity that protect against various kinds of attacks.
Exploration of how to secure digital assets in organizations by identifying and addressing potential network and security system vulnerabilities.
Development of hands-on techniques for attacking and penetrating networks and systems. Exploration of the tools used to launch these offensive tactics, and completion of a hands-on project ethically hacking a real system. Prerequisite: CYS 4100.
Examination of the tools and techniques used to conduct investigations into cybercrimes and the defensive skills necessary to ensure a breach doesn’t occur in the first place. Prerequisites: CYS 2100, CYS 4100.
Capstone course; Allows the application of knowledge to real-world challenges. Includes a comprehensive project integrating various aspects of cybersecurity, including log analysis, vulnerability assessment, incident response, ethical hacking, and cloud security which will develop critical thinking skills and prepare students for major cybersecurity certifications. Prerequisites: CYS 3020, CYS 3500, CYS 4110, CYS 4500 and Senior Standing.
This course will teach students how networks work, and how to set up and secure them. By the end of this course, students will be able to manage and maintain a range of different network types. Prerequisite: ITM 2500.
Study of the strategies and tools useful in the management of information systems projects. The processes and issues involved in formulating a project, including development of scope, design options, integration with other projects, and development of project plans. The effects of staffing, budget, schedule, and risk management on the project’s outcomes. Examples highlight the hands-on skills and solutions required. Industry standard software is used to implement case study solutions. Prerequisites: MGT 2360 and MIS 2700.

Required Support Courses

Required Support Courses
An introduction to the nature and principles of management; history, theories, practices, problems, and techniques; characteristics and qualities of managers; contemporary trends in management thought and practice.
Analysis of group and individual behavior in the organization; analysis of social structures which affect management policies and procedures. Prerequisite: MGT 2360.
The value of information technology to business and the contribution technology can make to the strategic goals of an organization. Technical foundation concepts such as networks, hardware, and software. Case studies are used to illustrate concepts. Hands-on exercises using industry-standard software are included.
Describes the major systems, central issues and historical development of modern psychology. Introduces basic principles in sensation, perception, cognition, learning, memory, language, emotion, motivation, personality organization, and social process.
     WRT 2440/WRT 3260 Choice (Choose from WRT 2440 (3 s.h.) or WRT 3260 (3 s.h.).)
Theory and application of technical writing principles. Topics include an introduction to the technical communication environment, ethical and legal considerations, the basics of writing and analyzing technical documents, collaborative writing, and design principles for documents and Web sites. Students create a variety of technical documents for inclusion in their final e-portfolios. Prerequisite: WRT 1020 or equivalent.
A study of the strategies and stylistic devices which lead to clear, concise, and complete business writing. Various types of business letters, memoranda, proposals, and reports are examined and developed. Prerequisite: WRT 1020.