Cyber Security
Protect your future. Fortify the nation鈥檚 future prosperity.
Learn聽to analyze, protect, and improve the crucial networks and processes that power modern life.
High-profile cyber-attacks have highlighted the critical need for well-trained cybersecurity professionals in both the public and private sectors. Our Cyber Security degree blends theoretical knowledge with practical, hands-on experience through labs, real-life projects, and cyber ranges, preparing you for a successful career.聽
Graduates from our program can pursue jobs such as cybersecurity analysts, cybersecurity engineers, cyber threat analysts, threat hunters, ethical hackers, and digital forensic analysts.
Growing Industry
Join one of the fastest growing industries in the nation!聽
Required Courses
- Ethical Hacking
- Information Security
- Network Security
- Computer Systems Security
- Cyber Threat Intelligence
- Digital Forensics
- Cyber Law and Policy
- CIS 100: Introduction to Computer Science (3 credits)
- CIS 200: Linear Data Structures (3 credits)
- CIS 210: Non-Linear Data Structures (3 credits)
- Choose at least two other CIS courses (except CIS 201)
- CIS 100: Introduction to Computer Science (3 credits)
- CIS 160: Introduction to Cyber Security (3 credits)
- CIS 230: Operating Systems (3 credits)
- CIS 260: Computer Communications & Networks (3 credits)
- CIS 261: Information Security (3 credits)
- CIS 360: Computer Systems Security (3 credits)
- CIS 100: Introduction to Computer Science (3 credits)
- STAT 139: Statistics for Social Sciences (3 credits)
- CIS 150: Introduction to Data Science (3 credits)
- CIS 200: Linear Data Structures (3 credits)
- CIS 280: Data Visualization & Communication (3 credits)
- CIS 350: Relational Database Systems (3 credits)
- CIS 352: Big Data Analytics (3 credits)
- CIS 371: Machine Learning (3 credits)
Core Courses:
Plus one of the following courses:
Learning Outcomes
- Describe the fundamental concepts and design principles of the cyber security discipline, including cyber defense tools, methods, and components, as well as apply cyber defense methods to prepare a system to defend against attacks
- Identify the elements of a cryptographic system and describe which cryptographic protocols, tools, and techniques are appropriate for a given situation and how cryptography can be used, strengths and weaknesses, modes of operations, and issues that must be addressed in an implementation (e.g., key management), etc.
- Describe the key concepts of computer networks and network defense, as well as explain how network defense tools are used to defend against attacks and mitigate vulnerabilities
- Program in a high-level language and write scripts to automate cybersecurity tasks
- Describe how to conduct a digital forensic investigation for all aspects of a computer system in a systematic approach. Students will be capable of designing and implementing incident response plans. They will be trained in forensic analysis and investigation techniques for dealing with cybersecurity incidents
- Perform ethical hacking strategies and propose solutions to the discovered problems
- Have a thorough understanding of various cybersecurity frameworks and standards, such as NIST and CIS
- Be prepared for professional certifications from our academic partners Ec-Council and ISC2
- Perform the aforementioned outcomes in an ethical, legal, and professional manner
Find a Career in Cybersecurity
Partners
海角乱伦社区 University鈥檚 Cyber Security program is proud to be partnered with EC-Council Academia, allowing our students access to a wealth of resources and certification opportunities at heavily discounted rates, emphasizing our commitment to ensuring our students are not just educated but also career-ready.
The purpose of this RSCO will be to provide opportunities to gain knowledge regarding cyber security in all related facets of technology. The club will do this by taking advantage of the knowledge and experience of the membership base. A primary goal of the club is to encourage hands-on learning and experimentation with cybersecurity tools and software. Instead of just learning about these topics, we encourage the ethical use of these tools in closed environments.
4+1 Programs in Cyber and Data
Students in the 4+1 programs can save time and money by earning both a bachelor鈥檚 and a master鈥檚 in five years. As a 4+1 student, you will complete graduate-level coursework in your junior and/or senior years, earning master鈥檚 degree credits as an undergraduate student (included in your undergraduate flat billing). You will still graduate on time with your class before seamlessly transitioning to the graduate program to finish your master鈥檚 in one year or less.
The following 海角乱伦社区 master鈥檚 programs include 4+1 options:
Christopher Mansour, Ph.D.
Chair, Department of Computing and Information Science
Office: Library 402
Meet the Faculty
Computing and Information Science
Maria Garase
Interim Dean, The School of Intelligence, Computing, and Global Politics; Dean, The School of Social & Behavioral Sciences; Associate Professor, Criminology & Criminal Justice
Christopher Mansour, Ph.D.
Chair, Computing and Information Science (Cyber Security and Data Science) Department, Associate Professor