CYBERSECURITY (SEC)

SEC 180 - FOUNDATIONS OF COMPUTER SECURITY

Prerequisite: None

A study of computer system security concepts and domains. The course delivers fundamental information security principles as well as real-world applications and examples.

Credit: 3


SEC 185 - CYBER ETHICS

Prerequisite: None

An introduction to basic culture, social, legal, and ethical issues inherent in the discipline of computing.

Credit: 3


SEC 190 - CYBERSECURITY MANAGEMENT

Prerequisites: None

A broad introduction to the field of cybersecurity management including strategies, policies, plans, and processes for a holistic approach to cybersecurity risks for an organization. Students are introduced to risk and impact analysis, mitigation controls, incident response planning and response team.

Credit: 3


SEC 280 - WINDOWS SECURITY

Prerequisite: SEC 180

Discovery of security strategies in Microsoft Windows platforms and applications. Students learn how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications.

Credit: 3


SEC 290 - COMMUNICATION AND NETWORK SECURITY

Prerequisite: SEC 180

A broad introduction to the field of communication and network security. Students are introduced to fundamentals of communication networks, security issues, countermeasures, defense in depth, security and privacy architectures, network security management and administration, IDS, IPS and SIEM.

Credit: 3


SEC 295 - DIGITAL FORENSICS AND INVESTIGATION

Prerequisite: SEC 180

A broad introduction to the field of digital forensics and investigation. Students are introduced to the fundamentals of system forensics, forensic methods, and computer crime. They will learn to conduct forensics on computer systems running Windows, Linux, and Mac, and explore investigative techniques involving emails, mobile devices, computer networks, and the role of forensics in incident and intrusion response.

Credit: 3


SEC 380 - LINUX SECURITY

Prerequisite: SEC 180, CS 221

Discovery of security strategies in Linux platforms and applications. The course discusses how to take advantage of the layers of security available in Linux and explores the use of both open source and proprietary tools when building a layered security strategy for Linux environments.

Credit: 3


SEC 381 - HACKER TOOLS AND TECHNIQUES

Prerequisite: SEC 180

An exploration of hacking techniques and countermeasures. Topics include network systems penetration tools and techniques for identifying vulnerabilities and security holes in operating systems and software applications. Also covered are techniques and technologies needed to defend against malicious attacks.

Credit: 3


SEC 480 - MOBILE SECURITY

Prerequisite: SEC 180

The course focuses on risk assessments, threats, and vulnerabilities of wireless networks. Students will identify and apply security measures that should be put in place to mitigate breaches.

Credit: 3


SEC 485 - ADVANCED COMPUTER SECURITY

Prerequisite: SEC 180

A study of security aspects in software development, computer hardware, operating systems, networks, databases, cloud computing, and data.

Credit: 3