Courses - Cybersecurity Analysis

Blue Background

The courses in our program are mapped to the National Cybersecurity Workforce Framework, as part of the National Initiative for Cybersecurity Careers and Studies. 


Required Courses (4)

Blue Background
SEC 3010 Securing the Cyber World

Provides a global perspective on cybersecurity and the impact of cyber threats. Addresses a variety of topics that are all part of the cyber ecosystem, to include current threat trends, defense in-depth techniques, attack case studies, risk management, disaster recovery, security policy, and awareness training. Examines current best practices, compliance requirements, and evolving security architectures.

SEC 3020 Cybersecurity Policy, Law & Ethics

Provides an overview of security policies, laws, regulations, and ethical considerations that can be used to help protect and improve an organization’s security posture. Explores related topics including ethics, security policy requirements, compliance, implementation issues and security policy controls. Examines modern cybersecurity regulations and frameworks, and the various policies and procedures that may be used in  an organization’s security strategy.

SEC 3030 Human Factors in Cybersecurity

Explores human aspects of cybersecurity  – including security training and awareness, cyber ethics,  hacktivism, hacker culture – with emphasis on human motivations and responses. Examines common human-centered attacks, such as phishing, social engineering, and other psychological manipulation.

SEC 3040 Writing & Communications in a Technical Field

Develops strong writing competencies for technical fields, including communication of complex information to a variety of audiences through various print and online media. Teaches students to write, organize, edit, and design information with clarity and accuracy. Covers organizing, managing, communicating, and facilitating technical information. Topics will include conciseness, simplicity, information arrangement and presentation, and readability.


Elective Courses (Select 2)

Blue Background
SEC 4010 Digital Forensics & Cybercrime

Examines cybercrimes and the digital forensics processes and techniques needed to discover, prosecute, and mitigate cybercrime. Explores the threats of cybercrime and mitigating countermeasures. Topics include discovering, preserving, and presenting digital evidence for legal prosecution; digital forensics tools and techniques; and anti-forensics techniques.

SEC 4020 Mobile Security & Forensics

Explores mobile device architecture and cyber threats. Examines the security strengths and weaknesses of mobile devices and platforms, as well as corporate mobile security policies and procedures. Topics include mobile device operating system software architecture, mobile application architecture, mobile device and application vulnerability assessment testing, and mobile device forensic analysis.

SEC 4030 Ethical Hacking

Explores the tools and techniques used to assess the security posture of a target system. Topics include footprinting, reconnaissance, vulnerability discovery, and malware. Covers vulnerability discovery in a variety of systems, including web applications, mobile platforms, and cloud computing. Aligns with the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

IT 3500 Data Analytics & Decision-Making

Introduces the analytics process from question formulation to data gathering, processing, and decision making. Utilizes statistical software and applies analytical methods through exercises, case study examination, and a team project. Highlights and explores differences between methods using large data sets and case studies from various industries to illustrate and understand concepts. Prerequisite: ISSS 4420.


* The information contained on this website is for informational purposes only. The Undergraduate Record and Graduate Record represent the official repository for academic program requirements.

Blue Background