The Bachelor’s degree in Cyber Security is focused on students learning the methodologies, skills and logic to protect the privacy and security of data people have entrusted to various organizations. Students will understand hacking, threats to personal records, major economic damages, and infrastructure breaches and learn how to counter or prevent such happenings.
Student Learning Outcomes:
- Understand complex cybersecurity problems and apply principles of cybersecurity design and best practice—including intelligence, damage assessment, recovery and computer forensics, risk assessment and management, and human factors—to prevent and/or mitigate cyberattacks.
- Demonstrate foundational knowledge of information technologies, and their impact on organizational processes and decision-making.
- Design, implement, administer, and evaluate solutions in computer networks and database management systems using cybersecurity best practices.
- Assess and apply security principles and practices to maintain operations and protect information infrastructure in the presence of cyber risks and threats.
- Recognize and analyze professional responsibilities and make informed judgments in cybersecurity practice based on legal and ethical principles.
- Operate and communicate effectively as a member or leader of a cybersecurity team.
Core Cyber Security Requirements: 70 credits
CY 100 Introduction to Cyber Security
CY 150 IT Fundamentals
CY 210 Computer Networks
CY 250 Web Programming
CY 310 System Analysis
CY 325 Operating Systems
CY 350 Programming for Cybersecurity
CY 360 Network Defense & Countermeasures
CY 370 Linux for Cybersecurity
CY 385 Digital Forensics & Incidence Response
CY 410 Cloud Security
CY 420 Wireless & Mobile Security
CY 430 Advanced Web Security
CY 450 Cybersecurity Practicum
CY 475 Advanced Data Security
CY 495 Internship
IS 222 Programming Logic & Design
IS 310 Systems Analysis
IS 330 Information Technology Infrastructure
MA 221 Statistics I
CS 100 Introduction to Cybersecurity
CY 210 Computer Networks
CY 310 Ethical Hacking and Penetration Testing
CY 360 Network Defense and Countermeasures
CY 385 Digital Forensics and Incident Response
CY 460 Cybersecurity Practice and Policy
Earn your B.A. in Cybersecurity online. LEARN MORE >>
CY 100 Introduction to Cybersecurity 3 cr.
Provides the knowledge necessary to improve security by identifying and prioritizing potential threats and vulnerabilities of a computer network. Introduces policies, legal aspects and compliance. Content: Cyber Stalking, fraud, and abuse. Denial of service. Hacking techniques. Industrial Espionage in cyberspace. Encryption. Network scanning and vulnerability scanning. Cyber terrorism and information warfare. Prerequisite: None.
CY 150 IT Fundamentals 4 cr.
Covers the fundamentals of IT device installation, configuration, maintenance, and networking with thorough instruction built on the CompTIA A+ 220-901 and 220-902 exam objectives. Content: Computer anatomy. BIOS/UEFI tools. Motherboard. RAMs. Expansion cards. Storage. CPUs. Ports and interfaces. Designing and customization. Configurations. Printers and multifunction devices. Networking. Mobile devices. Troubleshooting. Prerequisite: None.
CY 210 Computer Networks 4 cr.
Takes students from an entry-level knowledge in computer networks to advanced concepts in Ethernet and TCP/IP networks, presenting how and why networking technologies are used. Content: Layers. Cabling. Wireless Networking. LANs Interconnecting. TCP/IP. Router Configuration. Switch Configuration. Routing Protocols. Internet Technologies. Troubleshooting. Network Security. Cloud Computing and Virtualization. Codes and Standards. Prerequisite: CY 150.
CY 250 Web Programming 3 cr.
CY 310 Ethical Hacking and Penetration Testing 3 cr.
Introduces the concepts, terminology, challenges, theory, practices, and the essential practical skills needed to conduct reliable security audits. It covers the entire penetration testing lifecycle. Contents: Standards. Cryptography. Reconnaissance. Malware. Windows Hacking. Mac Hacking. Web Hacking. Vulnerability Scanning. Linux Hacking. Kali Linux. General Techniques. Metasploit. Metasploit in Ruby. General Hacking Knowledge. Prerequisite: CY 250.
CY 325 Operating Systems 3 cr.
Presents design issues and fundamental principles in contemporary operating systems, providing a solid understanding of the key structures and mechanisms used in computers and mobile devices. Content: Computer System. Process description and control. Threads. Concurrency. Memory management. Virtual memory. Uniprocessor, multiprocessor, multicore, and real-time scheduling. I/O Management and disk scheduling. File management. Prerequisite: CY 150.
CY 350 Programming for Cybersecurity 3 cr.
Introduces several programming languages commonly used to recognize vulnerabilities in an application, how an attacker could exploit those vulnerabilities, and how to identify malicious code. Content: AI for Cybersecurity. Python for Machine Learning and Data Analysis. Metasploit Exploits with Ruby on Rails. Assembly. Java Apps. Manual control over memory with C. Prerequisite: CY 250.
CY 360 Network Defense and Countermeasures 3 cr.
Covers the essential network security concepts and techniques needed to protect, monitor, analyze, detect, and respond to unauthorized activity within the organization’s information systems and computer networks. Content: Attacks types. Firewalls. Intrusion detection systems. Encryption fundamentals. Virtual private networks. Operating system hardening. Defending against virus Attacks, Trojan Horses, Spyware, and Adware. Assessing System Security. Prerequisite: CY 210.
CY 370 Linux for Cybersecurity 4 cr.
Introduces fundamental Linux concepts with a primary focus on security. It also covers basic scripting toward understanding tools for penetration testing and cybersecurity threat detection. Content: Introduction to Linux OS. User and group accounts. File and data storage. Automation. Networks services. Process. Software management and log administration. Security tasks. Security policy development. Prerequisite: Junior standing.
CY 385 Digital Forensics and Incident Response 3 cr.
Covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation, which are the main activities in incident response and digital forensics. Content: Scope. Windows and Mac Operating and File Systems. Computer Hardware. Acquiring Evidence. Online Investigations. Investigation documentation. Admissibility of Digital Evidence. Network and mobile Forensics. Prerequisite: Junior standing.
CY 410 Cloud Security 3 cr.
Presents security best practices for multivendor cloud environments, applicable when moving legacy on-premises projects to the cloud or building a new infrastructure from the ground up. Content: Data asset management, identity and access management, vulnerability management, network security, and incident response in for Amazon Web Services, Microsoft Azure, and IBM Cloud. Prerequisite: CY 385.
CY 420 Wireless and Mobile Security 3 cr.
Describes the targets for attackers, the threats to mobile devices, including annoyance, stealing money, invading privacy, propagation, and malicious tools, and the source of attacks. Content: Dangers. Communication attacks. Phone hacking technologies. Password cracking. Attacks on Software Applications. Attacks on hardware vulnerabilities. Malware. Countermeasures. Providers. Android and IOs security. Mobile forensics. Prerequisite: CY 385.
CY 430 Advanced Web Security 3 cr.
Provides a comprehensive coverage of web security building a complete understanding of the most common web attacks and their countermeasures, particularly in relation to the client side. Content: Browser security model. Web app vulnerabilities. SQL Injection. DoS. TLS attacks. Same-origin policy. Cross-site scripting and request forgery. Authentication and access controls breaking. Information leakage. Prerequisite: CY 250.
CY 450 Cybersecurity Practicum 4 cr.
Provides students with practical work experience, key to the success in the internship, by revisiting the main cybersecurity concepts through a systematic hands-on approach, and preparing student to pass the CompTIA Security+ certification exam. Content: Software and Web security. Attacks on TCP/IP and DNS. Packet sniffing and spoofing. Firewall and VPN. Hacking and defense. Cryptography, PKI, and TLS programming. CompTIA Security+.
CY 460 Cybersecurity Practice and Policy 3 cr.
Prepares to master modern information security regulations and frameworks and learn specific best-practice policies for key industry sectors, including finance, healthcare, online commerce, and small business. Content: Cybersecurity policy organization, format and styles. Models and frameworks. Governance and risk management. Assets management and data loss preventions. CIA. PCI. NIST. GLBA. HIPAA. FISMA. Prerequisite: Junior status.
CY 475 Advanced Data Security 3 cr.
Acquaints students with the main mechanisms available to protect digital data, such as a sensitive data in a database, from unwanted actions of unauthorized users. Content: Advanced SQL security capabilities. Disk encryption. Software versus hardware-based protection mechanisms. Backups. Data masking. Data erasure. International laws and standards. Auditing. Microsoft, IBM, and Oracle recommendations. Prerequisite: Senior status.
CY 495 Internship 3 cr.
All students are required to complete a concluding professional experience. The internship will serve as a working capstone where students will integrate all they have learned within the context of a computer security internship. This internship is to culminate in a critical evaluation of the security environment in which they have been working. The evaluation will be required to discuss weaknesses and causes and offer meaningful solutions to resolve the problem. Prerequisite: Senior status.