Graduate Cyber Security Course Descriptions

Courses

CY-501. Cyber Assurance and Security. 3.00 Credits.

This course introduces the fundamental concepts associated with cybersecurity. Students will learn how vulnerabilities within Information Technology can be exploited and how to identify these threats, learn what organizations can do to protect themselves, and to get an understanding as to how business and technology must work in concert to protect an organization's most valuable asset, its data.

CY-502. Information System Security Professional. 3.00 Credits.

This course covers information systems security, including access control, application security, business continuity, cryptography, risk management, legal issues, physical security, telecommunications and network security. This course prepares for the CISSP certification exam and is ideal as a bridge for non technical degree holders into the MS in Cybersecurity.

CY-510. Cyber Security Planning & Risk Analysis. 3.00 Credits.

In this course we will study the concepts in cyber security design and implementation for computer systems (both hardware and software). Security architecture, organization policies, standards, procedures, and security system implementation, including diagnostic testing of databases and networks. Throughout this course, practical skills will also be acquired through a series of interactive risk assessment workshops and case studies.

CY-511. Architecture Essentials. 3.00 Credits.

This course introduces the student to the various types of architecture styles that are associated with supporting systems, application, and networks. Students will become familiar with the reasons why certain architecture styles are selected, and learn each styles strength and weakness as it pertains to cybersecurity. Prerequisites: CY-501.

CY-512. Operating Systems Design & Development. 3.00 Credits.

Organizations depend on computer information systems and technology to operate efficiently. This course first instructs students in current methods of analyzing business situations and systems to model complete and coherent definitions of systems requirements. Next, learning focuses on methods for developing logical and physical designs of these systems. Finally, these designs form the bases of systems development and implementation. The course emphasizes software engineering best practices in creating secure, robust, reliable, and appropriate systems regardless of technology, size, scope, type, and geographic distribution. Prerequisites: CY-501.

CY-513. Information Security Management. 3.00 Credits.

This course introduces students to methods and practices to develop policies and plans for managing personnel, systems and processes related to information security in an organization. This course will first introduce methods to identify information assets, prioritize threats to information assets, and define an information security strategy and architecture. The course will then introduce methods and practices to develop system specific plans against various threats. Most importantly, students will learn about legal and public relations implications of security and privacy issues. Last but not the least, the course will present a disaster recovery plan for recovery of information assets after cybersecurity incidents. Prerequisites: CY-501 AND CY-511.

CY-520. Cyber Security Ethical & Legal Concerns. 3.00 Credits.

In this course we will study Cybersecurity law, policy and compliance, legal rights and liabilities associated with computer security; the application of ethical principles (respect for persons, beneficence, and justice) in cyber security; Information privacy; Rights enforceable by private parties; Liabilities associated by private parties and governments; Legal aspects of records management; Un-authorized computer use; Computer Fraud and Abuse Act; Trade Secrets; Economic Espionage Act; Civil Law Claims; Privacy; Export Control; Constitutional Rights; USA-PATRIOT Act; HIPAA, Gramm-LeachBliley; Digital Rights Management.

CY-530. Cryptography. 3.00 Credits.

This course gives a historical introduction to Cryptology, the science of secret codes. It begins with the oldest recorded codes, taken from hieroglyphic engravings, and ends with the encryption schemes used to maintain privacy during Internet credit card transactions. Since secret codes are based on mathematical ideas, each new kind of encryption method leads in this course to the study of new mathematical ideas and results. The first part of the course deals with permutation-based codes: substitutional ciphers, transpositional codes, and Vigenere ciphers. In the second part of the course, the subject moves to bit stream encryption methods. These include block cipher schemes such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES). Public key encryption is the subject of the final part of the course. We learn the mathematical underpinnings of Diffie-Hellman key exchange, RSA and elliptic curve cryptography. Software packages and tools will also be studied. Hybrid or Online Course.

CY-540. International Communication & Networking. 3.00 Credits.

In this course we will learn how International Telecommunications Networks are designed, built, and maintained. Within the context of cyber security we will study transmission modes, coding schemes, modulation, multiplexing, data sets, common carriers, tariffs, monitoring, troubleshooting, and network design. As part of the course, we will design an International Telecommunications Network and identify associated risks and vulnerabilities. Hybrid or Online Course.

CY-550. Mobile Computing and Wireless. 3.00 Credits.

In this course we will study concepts in nomadic computing and mobility; challenges in design and deployment of wireless and ad-hoc networks; MAC issues, routing protocols and mobility management for ad-hoc networks and networks of the future. Hybrid or Online Course.

CY-595. Non Credit Research Intern Grad Level. 0.00 Credits.

This internship course allows students to acquire practical technical experience through working on specific cybersecurity or blockchain research or teaching projects in consultation with the advisor. Prerequisites: CY-502 OR CY-510 OR CY-530.

CY-598. Exp Learning Intern without CPT. 0.00 Credits.

Depending on the topic, students will develop, test, and/or conduct coded programming; students may also conduct computer laboratory research. Sections topics may include SIEM Splunk, Blockchain & Cyber Security Research. Course Type(s): Lab Courses.

CY-599. Experiential Learning Intern With CPT. 0.00 Credits.

Depending on the topic, students will develop, test, and/or conduct coded programming; students may also conduct computer laboratory research. Sections topics may include SIEM Splunk, Blockchain & Cyber Security Research. Course Type(s): Lab Courses.

CY-610. Ethical Hacking and Penetration Testing. 3.00 Credits.

This course is designed for students to be trained in understanding vulnerabilities in networks, operating systems, database management systems and web servers. Students will learn how exploits are designed by an adversary attacker to penetrate into vulnerable systems. Students will also learn how the hacker can move into a compromised system and remove her/his footprints. The course will introduce students to tools used for network scanning, finger printing, and password cracking. Tools include Nmap, Nessus and Kali Linux. Prerequisites: CY-510 OR CY-530 OR CY-540.

CY-620. Malware Analysis and Defense. 3.00 Credits.

In this course students will study malicious software detection and defenses including tripwire, Bit9, and other techniques such as signature and hash algorithms. Reverse engineering, decompilers (IDA-pro and Ghidra) and debuggers will be used in the investigation of malware. Viruses, worms, Trojan horses, logic bombs, malicious web server scripts, mobile code issues, and methodologies used by anti-virus/spyware vendors will be studied. Prerequisites: CY-510 OR CY-530 OR CY-540.

CY-622. Advanced Offensive Cyber Security. 3.00 Credits.

This course is designed for students to be trained in Advanced Offensive Security tactics and techniques. This includes the full hacking lifecycle from enumeration/vulnerability discovery, to exploitation, followed by post exploitation activities. Students will learn how to strategically enumerate network devices and exploit various resources, fuzz applications and network protocols to identify bugs/vulnerabilities, execute advanced Man-in-the-Middle attacks, along with conducting post exploitation activities on both Linux and Windows machines. Additionally, students will be introduced to Python - including Python fundamentals and development of custom tools/exploits, along with PowerShell usage from a penetration testers perspective. Lastly, students will be introduced to Splunk to provide a better understanding of the network traffic generated as result of our activities, along with how security teams can identify/alert/investigate all resulting traffic. Online with optional Synchronous remote class. Prerequisites: CY-510 OR CY-530 OR CY-540.

CY-624. Cybersecurity in Healthcare. 3.00 Credits.

This course will establish an avenue of communication and allow open dialogue to demystify the unknown between healthcare and cybersecurity. It will create an engaging concept that will promote the awareness of cybersecurity in healthcare, encompassing both health science and technology. Students will learn cybersecurity technology as it affects the healthcare industry the role of individuals considering a cybersecurity profession in healthcare and will be introduced to the HCISPP certification and its significance in the workforce. The course will bridge both healthcare and technology through learning the core concepts of healthcare informatics and security of healthcare information systems, understanding HIPAA, conscious reading and comprehension of current healthcare cybersecurity journals, knowledge of government organizations that develop and promote policy and guidelines to help healthcare companies protect their critical information technology infrastructures, and through student dialogues, cognizance of each person's role in the protection of healthcare information against unauthorized access to healthcare data. Prerequisites: CY-502 OR CY-510 OR CY-530.

CY-625. Advances in Management of Cyber Security. 3.00 Credits.

This course is designed for the graduate level cyber security and business student who wants to deepen the knowledge of the management aspects of cyber security. This course takes a "view from the top" and presents exactly what future managers need to know about cyber security. Harvard Business cyber cases and a cyberattack simulation are used in this course. Hybrid or Online course. Prerequisites: CY-510 OR EQUIVALENCES APPROVED BY INSTRUCTOR.

CY-626. Cyber Risk Management and Insurance. 3.00 Credits.

This course deals with the role of the risk manager advising on business interruption arising from failures of management information and telecommunications systems. It addresses the complexity of technology, interaction of the web and back office, and security failures. It covers the use of cyber insurance and risk transfer strategies to protect assets, people, and business operations. Course Type(s): Online Course.

CY-630. Disaster Recovery. 3.00 Credits.

In this course students will learn how to identify cyber security vulnerabilities and implement appropriate countermeasures to mitigate risks. Techniques will be taught for creating a continuity plan and methodology for building an infrastructure that supports its effective implementation. Throughout this course, skills in disaster recovery planning will be acquired through a series of interactive workshops and case studies. Students will design and develop a disaster recovery plan. Prerequisites: CY-510 OR CY-530 OR CY-540.

CY-635. Advanced Research in Cyber Security. 3.00 Credits.

This is an advanced research course in cyber security topics / subject areas. Students work with a faculty member on a research topic or area of special interest, for example: bitcoin mining, blockchain technology, malware analysis, mobile & wireless, systems defense, penetration testing, disaster recovery in the cloud, or cyber security CSO-level risk management / security architecture. The course requires much more discipline than a standard course because it does not meet regularly. This course permits the student to explore a specific issue or topic in cyber security or to work independently, as a researcher, to develop a specific skill competency under the direction of a faculty mentor. This course could include a paid or non-paid internship in the University Cyber Security Center or a service learning component. Prerequisites: CY-510 OR CY-530 OR CY-540.

CY-640. Cybercrime and Digital Forensics. 3.00 Credits.

The topics covered in this course include cyber-crime investigation, digital forensics, forensic duplication and analysis, network surveillance, intrusion detection and response, incident response, anti-forensics techniques, anonymity and pseudonymity, cyber law, computer security policies and guidelines, court report writing and presentations, and case studies. The course will include lecture and demonstrations and is designed around a virtual lab environment that provides for robust and realistic hands-on experience in working with a range of information assurance topics. Students will be assigned projects to apply information security practices and technologies to solve real-world cyber security problems. Prerequisites: CY-510 OR CY-530 OR CY-540; Course Type(s): Hybrid Course.

CY-645. Blockchain Technologies. 6.00 Credits.

Students will learn what blockchain is and how it works, from a business as well as technical standpoint. They will gain insight into how blockchain will affect the future of industry / organizations. Upon course completion students will have knowledge of the following: what is blockchain and the real world problems that blockchain can solve; how blockchain works and the underlying technology of transactions, blocks, proof-of-work, and consensus building; how blockchain exists in the public domain (decentralized, distributed) yet maintain transparency, privacy, anonymity, security, and history; recognize how blockchain is incentivized without any central controlling or trusted agency; platforms such as Ethereum to build applications on blockchain; how cryptocurrency works and why people value a 'digital' currency; and how to design and implement blockchain for applications in the financial services, manufacturing, and retail industries. Course Type(s): Hybrid Course.

CY-650. Cyber Security Capstone. 3.00 Credits.

This course is the capstone experience for graduate students in the Master's degree in Cyber Security and provides students with the opportunity to carry out in depth research on a specific topic in cyber security. The student's project will reflect the integration and application of the cyber security knowledge gained over the course of the program. Course Type(s): Capstone. Note: CY-650 cannot be substituted and must be taken a trimester or two before graduation. Hybrid or Online course. Course Type(s): Capstone.