Core Curriculum (2 courses, 6 hours)
A study of computer hardware and operating system software as it relates to the CIS professional. Systems networking is introduced. Rudimentary programming concepts are introduced using Python or a similar interpreted programming language.
The course is an introduction to the basic issues in computer security. While technical in nature, this course is introductory in its approach and managerial in its focus, such that the student is not required to have an extensive background in programming or technical applications.
This course covers fundamentals of data communication and computer networking, including the Open Systems Interconnection (OSI) model. Network architecture and configurations such as local area networks (LANs) and wide area networks (WANs) are addressed. Basics of network authentication and security are introduced.
Prerequisite: IT Fundamentals
Cyber Security Concentration Courses
These courses prepare the student with high-demand knowledge and background for securing, guarding, and managing risk of computer systems, software applications, networks, and other technology assets for organizations.
This course provides an introduction to the tools and techniques used by security professionals to secure corporate networks. Topics include virtual private networks (VPNs), firewalls, and intrusion detection and prevention systems (IDS/IPS). Defense in depth will be taught through the installation and configuration of firewalls, VPNs, and IDS/IPS. Students will be able to recognize and prevent malicious attacks on corporate networks.
This course provides an introduction to tools and techniques used by hackers to penetrate corporate networks, and methods used to guard against such attacks. Topics include vulnerabilities of operating systems, incident-handling methods, cryptography, and an overview of the process and methodologies used in penetration testing including ethical and legal implications.
This course addresses the fundamentals of computer system forensics. It will provide an overview of computer crimes, forensic methods, the role of computer forensics specialists, computer forensic evidence, and the application of forensic analysis skills. Emerging technology and future directions will be considered, along with forensics in systems such as email, mobile, Window, Mac, and Linux.
Focus on the legal and ethical environment relevant to advances in technology. Issues include intellectual property, jurisdiction, defamation, invasion of privacy, electronic contracts, computer crime, censorship, unsolicited E-mail, antitrust issues, and encryption. Recent developments, court decisions, federal and state statutes, treaties and international agreements, administrative rulings, and legal literature regarding Internet law, will be explored and explained.
A senior-level capstone course for the cyber security concentration. Students must plan an applied project in cyber security and perform necessary research, implementation, and presentation of results.
Prerequisite: IT Fundamentals