Skip to Content

Course Search Results

  • 3.00 Credits

    Prerequisite(s): [(CS 2370 and CS 3100) or (CYBR 2700 )] and University Advanced Standing.. Examines advanced techniques used in malware analysis. Focuses on static and dynamic analysis of unknown binaries utilizing reverse engineering tools and procedures. Explores advanced anti-malware analysis processes and anti-reverse engineering methods. Covers advanced obfuscation practices, such as employing packers, and anti-debugging processes.
  • 3.00 Credits

    Prerequisite(s): CYBR 2700 and INFO 2410 and University Advanced Standing; (INFO 3130 and INFO 3410 recommended). Introduces students to the concept of data analytics as applied to cyber security. Includes collection, aggregation, data mining, and analysis of various data sources. Utilizes data analytics tools that correlate data in order to identify security events that may go undiscovered by traditional detection and log analysis methods.. Lab access fee of $45 for computers applies.
  • 3.00 Credits

    Prerequisite(s): (INFO 3410 or CYBR 3700) and University Advanced Standing. Utilizes theories, scenarios, and step-by-step examples. Provides a strong foundation in database security and auditing. Covers the following topics in depth: the importance of database security in contemporary business environments, security, profiles, password policies, privileges and roles, virtual private databases, auditing, SQL injection, and database management security issues.. . Lab access fee of $45 for computers applies.
  • 3.00 Credits

    Prerequisite(s): (CYBR 2700 or CS 2550) and University Advanced Standing. Pre- or Corequisite(s): INFO 3300 or CS 3520. Covers the security of web and mobile applications from offensive and defensive standpoints. Explores common vulnerabilities of web and mobile applications and various tools and techniques for identifying and mapping the attack surface of such applications. Explores various techniques and attack vectors for exploiting security flaws in web and mobile applications. Implements secure coding best practices, defensive architecture, and Content Security Policy to mitigate security flaws and protect the applications, the web client, the communication channel, and the server.. Lab access fee of $45 for computers applies.
  • 3.00 Credits

    Prerequisite(s): IT 1510, CYBR 2700, and University Advanced Standing.. Covers the architecture of Internet of Things (IoT) systems (devices and applications) and the security of these systems from offensive and defensive standpoints. Addresses common IoT vulnerabilities and threats and explores various techniques/tools and attack vectors for exploiting IoT security flaws. Discusses best practices for securing and hardening IoT systems. Includes offensive and defensive hands-on lab activities covering the hardware, software, applications, and network components of of IoT systems.
  • 3.00 Credits

    Prerequisite(s): CYBR 3700 and Advanced University Standing. Provides students with knowledge and practical skills to hunt down threats within networks and end points and to identify, contain, and recover from intrusions and data breaches. Utilizes a combination of lectures, hands-on labs, and case studies to explain the tactics, techniques, and procedures that are employed by threat actors to achieve their goals. Covers the consumption and creation of Cyber Threat Intelligence (CTI) to enhance detection and response capabilities.
  • 3.00 Credits

    Prerequisite(s): CYBR 2700 and University Advanced Standing. Provides exposure to emerging technologies and topics of current interest in cybersecurity. Varies each semester depending upon the changes in the cybersecurity discipline or to address a focused area within the cybersecurity discipline. May be repeated for a maximum of 9 credits toward graduation.
  • 3.00 Credits

    Prerequisite(s): IT 1510, CYBR 2700, and University Advanced Standing.. Introduces students to the basics of industrial control systems (ICS) including their architectures, types, and various components. Covers how the components of ICS work together and how Supervisory Control and Data Acquisition (SCADA) are organized and managed. Utilizes a combination of lectures, case studies, and hands-on labs to explain the security of ICS including common ICS vulnerabilities and a variety of attack vectors against ICS and SCADA. Covers best practices for securing ICS and implements countermeasures to protect against cyberattacks explored in class.
  • 3.00 Credits

    Prerequisite(s): CYBR 2700 and University Advanced Standing. Pre- or Corequisite(s): INFO 3430. Provides perspective of key issues involved in IT activities across the organizational and technical security landscape. Examines management methodologies, staffing, and operational issues. Teaches use of financial analysis and decision-making methodologies to aid investment decisions at the operational, functional, and strategic levels. Illustrates use of risk assessment and contingency planning as applied to business continuity and disaster recovery strategies. Includes the use of Service Level Agreement for managing both internal and external relationships.. Lab access fee of $45 for computers applies.
  • 3.00 Credits

    Prerequisite(s): CYBR 3700 and CYBR 4350 and (CYBR 4150 or CYBR 4550), and University Advanced Standing. Pre- or Corequisite(s): CYBR 4700. Senior-level, capstone experience course. Enhances student cybersecurity knowledge in a self-directed research or practical project that showcases student's mastery of cybersecurity topics. Provides an opportunity to conduct research and/or implement systems that incorporate topics from previous courses. Requires students to present their work at the end of the semester.