This course is a study of the operating system. Topics include concepts of system structure, memory management, process management, and recovery procedures.
This course covers issues related to the design of operating systems, as well as process management, memory management, file management, input/output device management, and distributed systems.
This course provides an essential introduction to the basics of information and computer security. Topics include information security goals and principles, access control, malicious software, basic applied cryptography, basic network security, and privacy issues in computing systems.
Fundamental understanding of information security concepts and principles. Topics covered include cybersecurity pitfalls, best practices, information security controls, and the importance of information security and assurance in contemporary information systems deployed in organizations.
Use of data analytics techniques to find patterns in network traffic and system logs. Interpreting logs generated from various operating systems, network devices, and security controls to gain a broader perspective on the security posture of the network. Identify early signs of cyber-intrusion and data exfiltration activities through the analysis of system logs and network traffic.
This course serves as a broad introduction to information technology concepts. Topics to be covered include an introduction to database systems, networking, operating systems, and web development. Security, societal issues, and cloud concepts will be included throughout.
Students will engage in real world projects related to cybersecurity. Projects include working with a client on cybersecurity related tasks, tutoring cybersecurity students, and participating in the Cyber Defense Team. May be repeated for a maximum of 4 hours of credit; only 1 hour will count toward the major or minor. Graded S/U.
Hardening and protecting computer networks using advanced cybersecurity techniques and tools. Identify malicious network traffic using next-generation firewalls and intrusion detection systems. Understanding of network security protocols and their roles in providing network security.
Vulnerabilities associated with the use of cloud computing technologies, internet of things (IoT), and mobile devices. How to securely provision, operate, and maintain technology to support cloud-based systems, internet of things, and mobile devices. Introduction to industrial networks and SCADA systems and an understanding of the security, reliability, and stability requirements for such systems.
Secure-coding principles and their application. The secure programming topics described in the “OWASP Secure-Coding Guidelines” will be covered. Techniques for building secure software using the secure software development lifecycle and defensive coding principles.
This course is an exploration of server system security and vulnerabilities, including server architectures and operating systems, and server administration. It provides the detailed technical coverage necessary to administer and protect information and servers by presenting the knowledge of server platform computer hardware components, server network devices and interfaces, as well as the structure and usage of common server operating system software from an information security perspective. Ongoing maintenance and operational issues of servers will also be included.
This course is the capstone in Cybersecurity. Included is a study of current techniques for specification, design, implementation, documentation, and testing of cybersecurity solutions for information systems. Additional topics include business, professional, ethical, and social concerns of technology. Students will work in teams on a major project that integrates previous CYS coursework. May be repeated once with departmental approval.
This course is the capstone in Information Science and Technology. It includes a study of current techniques for specification, design, implementation, documentation, and testing of technology systems. Additional topics include business, professional, ethical, and social concerns of technology. Students will work in teams on a major project that integrates previous IST coursework.
Work under the supervision of a faculty on cybersecurity-related research. Students are required to engage in research requiring at least one contact hour, or equivalent, per week for every hour of credit. Significant student results will be submitted to a conference or a journal. Projects are selected in consultation with a CSC faculty member. May be repeated for a maximum of 6 hours of credit.