No application fees through 2024 for certificates and degrees!
The courses in our program are mapped to the National Cybersecurity Workforce Framework, as part of the National Initiative for Cybersecurity Careers and Studies.
Provides a global perspective on cybersecurity and the impact of cyber threats. Addresses a variety of topics that are all part of the cyber ecosystem, to include current threat trends, defense in-depth techniques, attack case studies, risk management, disaster recovery, security policy, and awareness training. Examines current best practices, compliance requirements, and evolving security architectures.
Provides an overview of security policies, laws, regulations, and ethical considerations that can be used to help protect and improve an organization’s security posture. Explores related topics including ethics, security policy requirements, compliance, implementation issues and security policy controls. Examines modern cybersecurity regulations and frameworks, and the various policies and procedures that may be used in an organization’s security strategy.
Explores human aspects of cybersecurity – including security training and awareness, cyber ethics, hacktivism, hacker culture – with emphasis on human motivations and responses. Examines common human-centered attacks, such as phishing, social engineering, and other psychological manipulation.
Develops strong writing competencies for technical fields, including communication of complex information to a variety of audiences through various print and online media. Teaches students to write, organize, edit, and design information with clarity and accuracy. Covers organizing, managing, communicating, and facilitating technical information. Topics will include conciseness, simplicity, information arrangement and presentation, and readability.
Examines cybercrimes and the digital forensics processes and techniques needed to discover, prosecute, and mitigate cybercrime. Explores the threats of cybercrime and mitigating countermeasures. Topics include discovering, preserving, and presenting digital evidence for legal prosecution; digital forensics tools and techniques; and anti-forensics techniques.
Explores mobile device architecture and cyber threats. Examines the security strengths and weaknesses of mobile devices and platforms, as well as corporate mobile security policies and procedures. Topics include mobile device operating system software architecture, mobile application architecture, mobile device and application vulnerability assessment testing, and mobile device forensic analysis.
Explores the tools and techniques used to assess the security posture of a target system. Topics include footprinting, reconnaissance, vulnerability discovery, and malware. Covers vulnerability discovery in a variety of systems, including web applications, mobile platforms, and cloud computing. Aligns with the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.
Introduces the analytics process from question formulation to data gathering, processing, and decision making. Utilizes statistical software and applies analytical methods through exercises, case study examination, and a team project. Highlights and explores differences between methods using large data sets and case studies from various industries to illustrate and understand concepts. Prerequisite: ISSS 4420.
* The information contained on this website is for informational purposes only. The Undergraduate Record and Graduate Record represent the official repository for academic program requirements.