This course introduces the concepts and issues related to securing information systems and the development of policies to implement information security controls. Topics include the historical view of networking and security, security issues, trends, security resources, and the role of policy, people, and processes in information security. Upon completion, students should be able to identify information security risks, create an information security policy, and identify processes to implement and enforce policy.
SEC-160: Security Administration I
This course provides an overview of security administration with an emphasis on designing secure network architectures. Topics include networking technologies, TCP/IP fundamentals, network protocols, traffic analysis, monitoring strategies, and established security best practices. Upon completion, students should be able to use advanced network analysis tools to monitor network traffic and develop security measures to safeguard against various threats.
SEC-165: AI in Security Operations
This course covers the application of artificial intelligence in cybersecurity. Emphasis is placed on applying AI techniques to enhance security operations and integrating AI tools into organizational security practices. Upon completion, students should be able to use AI tools to automate and enhance security operations within workplace environments.
SEC-193A: Selected Topics in Security Concepts
This course provides an opportunity to explore areas of current interest in specific program or discipline areas. Emphasis is placed on subject matter appropriate to the program or discipline. Upon completion, students should be able to demonstrate an understanding of the specific area of study.
SEC-285: Systems Security Project
This course provides students with the opportunity to apply their knowledge and skills from the systems security program. Topics include crafting and implementing effective security policies, planning processes, defining procedures, ensuring business continuity, achieving compliance, conducting audits, performing security tests, and designing secure system architectures. Upon completion, students should be able to design and implement comprehensive security solutions.
CCT-121: Computer Crime Investigation
This course introduces the fundamental principles of computer crime investigation processes. Topics include crime scene/incident processing, information gathering techniques, data retrieval, collection and preservation of evidence, preparation of reports and court presentations. Upon completion, students should be able to identify cyber crime activity and demonstrate proper investigative techniques to process the scene and assist in case prosecution.
CCT-240: Data Recovery Techniques
This course introduces the unique skills and methodologies necessary to assist in the investigation and prosecution of cyber crimes. Topics include hardware and software issues, recovering erased files, overcoming encryption, advanced imaging, transient data, Internet issues and testimony considerations. Upon completion, students should be able to recover digital evidence, extract information for criminal investigation and legally seize criminal evidence.
CCT-250: Network Vulnerabilities I
This course introduces students to penetration testing, network vulnerabilities, and hacking. Topics include an overview of traditional network security, system hardening, and known weaknesses. Upon completion, students should be able to evaluate weaknesses of traditional and wireless network for the purpose of incident response, reconstruction, and forensic investigation.
CCT-251: Network Vulnerabilities II
This course advances students' knowledge of penetration testing, network vulnerabilities, and hacking. Topics include analyzing advanced techniques for circumventing network security hardware and software. Upon completion, students should be able to assemble test kits for multiple operating systems, scan and footprint networks, and perform advanced forensic investigation.
CCT-280: Cloud Penetration Testing
This course provides students the technical skills required to perform penetration tests in cloud environments. Topics include penetration testing commonly deployed in cloud environments such as operating systems, web servers, databases, and virtual containers/networks, while ensuring the integrity of user access multiple levels. Upon completion, students should be able to perform penetration tests to evaluate the overall security of cloud environments.