Catalog of Courses for Cyber Security Analysis (Undergraduate)
Provides a global perspective on cyber security and the impact of cyber threats. Addresses a variety of topics that are all part of the cyber ecosystem, to include current threat trends, defense in-depth techniques, attack case studies, risk management, disaster recovery, security policy, and awareness training. Examines current best practices, compliance requirements, and evolving security architectures.
Provides overview of cyber security (CS) policies, laws, regulations, and ethical considerations that can be used to help protect and improve an organization's security posture. Explores related topics including ethics, CS policy requirements and controls, compliance, and implementation issues. Examines modern CS regulations and frameworks, and the various policies and procedures that may be used in an organization's security strategy.
Explores human aspects of cyber security -- including security training and awareness, cyber ethics, hacktivism, hacker culture -- with emphasis on human motivations and responses. Examines common human-centered attacks, such as phishing, social engineering, and other psychological manipulation.
Develops strong writing competencies for technical fields, including communication of complex information to a variety of audiences through various print and online media. Teaches students to write, organize, edit, and design information with clarity and accuracy. Covers organizing, managing, communicating, and facilitating technical information. Topics include conciseness, simplicity, information arrangement, presentation, and readability.
Examines cybercrimes and the digital forensics processes and techniques needed to discover, prosecute, and mitigate cybercrime. Explores the threats of cybercrime and mitigating countermeasures. Topics include discovering, preserving, and presenting digital evidence for legal prosecution; digital forensics tools and techniques; and anti-forensics techniques.
Explores mobile device architecture and cyber threats. Examines the security strengths and weaknesses of mobile devices and platforms, as well as corporate mobile security policies and procedures. Topics include mobile device operating system software architecture, mobile application architecture, mobile device and application vulnerability assessment testing, and mobile device forensic analysis.
Explores the tools and techniques used to assess the security posture of a target system. Topics include footprinting, reconnaissance, vulnerability discovery, and malware. Covers vulnerability discovery in a variety of systems, including web applications, mobile platforms, and cloud computing. Aligns with the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.