Cybersecurity, B.S.

The Bachelor of Science in Cybersecurity program provides students with the necessary knowledge, skills, and professional training to pursue careers in the rapidly growing field of Cybersecurity. The program offers a balance between the theoretical and deep technical skills of Cybersecurity. The program is suitable for students who have received an Associate's degree in Business, Homeland Security, Criminal Justice, Computer Science or a related major and have a desire to join the Cybersecurity workforce or conduct Cybersecurity research. The program prepares our graduates to face the futuristic security-related challenges emerging from our internet-connected world, the rapid adoption of mobile devices, and the ever-increasing role of software applications in our daily life. Our curriculum for the Bachelor in Cybersecurity program blends contemporary knowledge with advanced research concepts to deliver a cutting-edge program mapped with the NSA/DHS guidelines and knowledge units.

The requirement for admission to this degree track is a minimum cumulative grade point average (CGPA) of 2.75. 

Foundation courses15
CS 101Computer Science I3
CS 206Concepts of Operating Systems3
CS 407Introduction to Unix/Linux System Administration and Shell Programming3
SECU 210Introduction to Intelligence3
SECU 222Computer Security I3
Core Courses27
CS 252Programming for All in Python and Computer Science Principles3
CS 410Telecommunications & Networks3
SECU 221Contemporary International Security Topics3
SECU 224Ethics in National Security3
SECU 309Introduction to Computer & Network Security3
SECU 322Computer Security II3
SECU 345Computer Forensics I3
SECU 430Computer Hacking Forensic Investigator3
SECU 460Security and Privacy of Information and Information Systems3
Security Studies Track Courses 21
SECU 323Risk Management3
SECU 339Cyber Incident Handling3
SECU 340Ethical Hacking I3
SECU 400Cybersecurity and Event Management3
SECU 415Intrusion Detection and Prevention Systems3
SECU 422Computer Security III3
SECU 154Careers in Professional Security Studies3
Business Security Track Courses21
ACCT 450Corporate Governance & Internal Control Frameworks3
FINC 305Introduction to Data Science3
FINC 430Principles of Machine Learning3
MGMT 321Ethics and Corporate Social Responsibility3
MGMT 350Decision Intelligence in Supply Chains3
MKTG 231Principles of Marketing3
MKTG 422E-commerce3
Electives, Take at least four courses12
SECU 151Security Systems & Design3
SECU 152Loss Prevention Technique3
SECU 153Occupational Safety and Health3
SECU 155Introduction to International Security3
SECU 214Crime Scene Investigation3
SECU 215Behavioral Analysis and Criminal Profiling3
SECU 220Current Security Problems3
SECU 280Security Organization & Administration3
SECU 310Forensic Investigations3
SECU 311Bloodstain Pattern Analysis3
SECU 315Big Data Analysis and Visualization in U.S. National Security3
SECU 321Seminar on National Security3
SECU 398Research Methods in Professional Security Studies3
SECU 465Resource Manangement in Security3
SECU 2305Special Topics: National Security Policy3
SECU 4305Special Topics: Domestic Terrorism3
Total Credits Required:75
Plan of Study Grid
Freshman
Semester 1Credits
CS 101 Computer Science I 3
CS 206 Concepts of Operating Systems 3
 Credits6
Semester 2
SECU 210 Introduction to Intelligence 3
CS 252 Programming for All in Python and Computer Science Principles 3
 Credits6
Sophomore
Semester 1
CS 407 Introduction to Unix/Linux System Administration and Shell Programming 3
SECU 222 Computer Security I 3
 Credits6
Semester 2
CS 410 Telecommunications & Networks 3
SECU 221 Contemporary International Security Topics 3
SECU Elective 3
 Credits9
Junior
Semester 1
SECU 224 Ethics in National Security 3
SECU 309 Introduction to Computer & Network Security 3
SECU 322 Computer Security II 3
SECU Elective 3
 Credits12
Semester 2
SECU 345 Computer Forensics I 3
SECU 430 Computer Hacking Forensic Investigator 3
SECU 460 Security and Privacy of Information and Information Systems 3
SECU Elective 3
 Credits12
Senior
Semester 1
Business/Computer/Security Track Course 3
Business/Computer/Security Track Course 3
Business/Computer/Security Track Course 3
Business/Computer/Security Track Course 3
 Credits12
Semester 2
Business/Computer/Security Track Course 3
Business/Computer/Security Track Course 3
Business/Computer/Security Track Course 3
SECU Elective 3
 Credits12
 Total Credits75

STUDENT LEARNING OUTCOMES

CYBER DEFENSE (CD) KNOWLEDGE UNITS LEARNING OUTCOMES

1. Understand the major concepts in modern operating systems and the basic security issues in OS design and implementation (how the first principles of security apply to operating systems). [CAE-CD 1]
2. Evaluate leadership, theory, tools, skills, and practices as they apply to safeguard the security and privacy of today and tomorrow’s cyberinfrastructure. [CAE-CD 2]
3. Design solutions for complex problems in a secure and robust manner using a programming language. [CAE-CD 3]
4. Identify and articulate potential system attacks and the actors that might perform them.
[CAE-CD 4]
5. Identify and articulate appropriate measures to be taken should a system compromise occur. [CAE-CD 5]
6. Identify and articulate cyber defense tools, methods and components. [CAE-CD 6]
7. Understand cyber defense methods to prepare a system to repel attacks. [CAE-CD 7]
8. Demonstrate proficiency in the use of scripting languages to write simple scripts (e.g., to automate system administration tasks). [CAE-CD 8]
9. Identify and compare/contrast bad actors in cyberspace, including their resources, capabilities/techniques, motivations, and aversion to risk. [CAE-CD 9]
10. Describe different types of attacks and their characteristics [CAE-CD 10]
11. Describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies. [CAE-CD 11]
12. Understand the interaction between security and system usability and the importance of minimizing the effects of security mechanisms [CAE-CD 12]
13. Evaluate the architecture of a typical, complex system and identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed. [CAE-CD 13]
14. Identify the elements of a cryptographic system. [CAE-CD 14]
15. Describe how various cryptographic algorithms and protocols work. [CAE-CD 15]
16. Describe which cryptographic protocols, tools and techniques are appropriate for a given situation. [CAE-CD 16]
17. Describe how crypto can be used, strengths and weaknesses, modes, and issues that have to be addressed in implementation (e.g., key management), etc. [CAE-CD 17]
18. Apply and analyze hardware components of modern computing environments and their individual functions. [CAE-CD 18]
19. Describe the fundamental concepts, technologies, components and issues related to communications and data networks. [CAE-CD 19]
20. Describe a basic network architecture given a specific need and set of hosts/clients. [CAECD 20]
21. Describe the responsibilities related to the handling of information about vulnerabilities. [CAE-CD 21]
22. Apply the knowledge gained to successfully install and securely configure, operate and maintain a commodity OS, to include: setting up user accounts, configuring appropriate authentication policies, configuring audit capabilities, performing back-ups, installing patches and updates, reviewing security logs, and restoring the system from a backup. [CAE-CD 22]
23. Apply security principles to the design and development of database systems and database structures. [CAE-CD 23]
24. Apply the knowledge of network technologies to design and construct a working network. [CAE-CD 24]
25. Analyze a trace of packets to identify the establishment of a TCP connection. [CAE-CD 25]