For an Online Cybersecurity Degree, your classes may include:
Introduction to Information Assurance and Information Security
This class is designed to provide students with an overview of network security principles and implementation techniques. Topics covered include authentication issues; examples of attacks and malicious code that may be used against networks, and the countermeasures against these; examples of perimeter and interior attacks; and protecting network services. Additional topics may include risk management and assessment, understanding and developing security policy, and protective technologies, such as firewall, intrusion detection systems and the use of encryption.
Telecommunications and Network Infrastructure Security
This course covers network security principles and implementation techniques. Topics covered include examples of attacks and countermeasures for securing email, definitions and principles underpinning all IT security, security management, and security architectures. Fundamental concepts, principles, and practical networking and internet working issues relevant to the design, analysis, and implementation of enterprise-level trusted networked information systems are also covered.
Information Systems Control and Auditing
The course covers the essential subjects and topics in information systems control, including types of audits, types of audit risks, frameworks for management and application controls, audit software and tools, concurrent auditing techniques, data integrity, system effectiveness, IT services delivery, life cycle management, information asset protection, IT governance, business continuity, and system efficiency. Also covered are processes for creating information systems audit and reviewing audit reports.
Principles and Methods in Cryptographic Security
This course covers the mathematical background to cryptography and is designed to provide a comprehensive review of contemporary cryptographic technologies, as applied to computer and network operations. Topics include determining the appropriate cryptographic targets and methods, digital key management, cryptographic vulnerabilities, and implementation of effective cryptographic methodologies to secure enterprise-wide information systems.
Ethical Hacking and Penetration Testing
一道本不卡免费高清This course covers techniques that hackers use to circumvent security and penetrate computers and computer networks. Topics covered include legal framework for conduction penetration testing, foot-printing, social engineering, host reconnaissance, session hijacking methods, denial of service, exploits of web server vulnerabilities, breach of database security, password crackers, Intrusion Prevention Systems (IPS) and firewalls circumvention, routers and switches services disruption, scanning and penetration of wireless networks, and overflow attacks methods and prevention. Other topics covered include creating, using, and preventing Trojan Horses, viruses, and other backdoor hostile codes.
IT Governance for Information Security Managers
This course covers enterprise IT governance framework, enterprise security governance framework, business-based investment decisions, maturity practices, compliance issues, IT security strategies, privacy regulations, computer misuse, and incident investigation procedures.
Applications of Discrete Mathematics and Statistics in IT
In this course, students will examine the essential mathematics and logic skills required in Information Technology areas such as networking, systems administration, security, programming, database management, and computer hardware. Students will have the opportunity to build on their mathematical ability to prepare for the challenges they are likely to encounter as an IT professional. Students in this course will studydiscrete mathematics and statistics necessary for application development and systems analysis. Students will also examinehow to apply statistical techniques to improve the performance of IT systems. Real-world scenarios and problems from the IT industry are included throughout this course.
System Architecture and Integration
一道本不卡免费高清In this course, students will analyze the system integration requirements and apply appropriate frameworks, methodologies, and techniques that are used to manage, administer, acquire, develop, implement, and integrate enterprise systems.
Comprehensive IT Project
In this lower division capstone course, students will examine IT project management and systems architecture. Topics covered include project management concepts of time, scope, and costs, as well as systems architecture, sourcing, acquisition, development, and deployment processes.
Information Technology Security
一道本不卡免费高清This survey course covers information security concepts and mechanisms. Information security concepts reviewed may include data protection techniques, software security, information assurance process, enterprise network security, and attack types/countermeasures.
Data Structures and Implementation
一道本不卡免费高清This course is designed to introduce students to basic data structures and algorithms which are to be used as tools in designing solutions to real-life problems. Students will explorethe specification, usage, implementation and analysis of basic data structures and algorithms.
Program Capstone for IT
This course offers students the opportunity to demonstrate their level of understanding regarding the application of information technology concepts, technologies, and methodologies. Students are expected to employ their knowledge about hardware, systems, applications, and security management.
Course content subject to change.