CYBS-Cybersecurity
CYBS 3113. Operating Systems Fundamentals.3 Credit Hours.
Prerequisite: CYBS 3123. This course introduces major concepts and techniques for designing and implementing operating systems, including memory management, process management, information management, and computer security. Principles of performance evaluation. Class projects require the design and implementation of software systems. A UNIX family operating system will be used. (Sp)
CYBS 3123. Introduction to Unix Systems.3 Credit Hours.
Prerequisite: Junior standing. This course provides an introduction to the UNIX operating system. Topics include files and directories, electronic mail, security, advanced file systems, network utilities, network file sharing, text utilities, shell programming, regular expressions, UNIX internals, UNIX system administration, UNIX variations, and systems programming. Programming assignments involve the UNIX shell script language. (F)
CYBS 3213. Foundations of Cybersecurity.3 Credit Hours.
Prerequisite: Junior standing. This course introduces cybersecurity, principles, and technologies. It deals with security issues related to systems and software. Topics include cyber threats and vulnerabilities, information security frameworks and policies, cryptography, penetration testing, and in-depth defense. The goal is to develop a foundation for further study in cybersecurity. (F)
CYBS 3223. Applied Statistics for Computing.3 Credit Hours.
Prerequisite: CYBS 3123 or concurrent enrollment in CYBS 3123. This course focuses on hardware (HW) security and covers security and trust from the HW perspective. It introduces students to HW components, including SoC and PCB, and examines security and trust issues in such HW components. Topics include digital lock, circuit theory, ASICs and FPGAs, HW security threats, malware, and attacks, along with specific countermeasures against HW attacks. (Irreg.)
CYBS 3313. Introduction to Cyber Ethics and Law.3 Credit Hours.
Prerequisite: Junior Standing. Legal and ethical issues with networked IT, including privacy, surveillance, digital piracy, and military use. First unit introduces ethical frameworks applicable to cybersecurity, sources of applicable law and regulation. Second unit introduces issues relating to cybercrime: intellectual property, user privacy, information assurance, and harmful online content. Third unit introduces issues with IT in government operations. (Sp)
CYBS 3323. Hardware Security.3 Credit Hours.
Prerequisite: CYBS 3123 or concurrent enrollment in CYBS 3123. This course focuses on hardware (HW) security and covers security and trust from the HW perspective. It introduces students to HW components, including SoC and PCB, and examines security and trust issues in such HW components. Topics include digital lock, circuit theory, ASICs and FPGAs, HW security threats, malware, and attacks, along with specific countermeasures against HW attacks. (Irreg.)
CYBS 3440. Mentored Research Experience.3 Credit Hours.
0 to 3 hours. Prerequisites: ENGL 1113 or equivalent, and permission of instructor. May be repeated; maximum credit 12 hours. For the inquisitive student to apply the scholarly processes of the discipline to a research or creative project under the mentorship of a faculty member. Student and instructor should complete an Undergraduate Research & Creative Projects (URCP) Mentoring Agreement and file it the with the URCP office. Not for honors credit. (F, Sp, Su)
CYBS 3743. Cyberforensics Fundamentals.3 Credit Hours.
Prerequisite: CYBS 3213. This course introduces students to cyber forensics and cyber-crime scene analysis fundamentals. The various laws and regulations dealing with computer forensic analysis are discussed. Students are introduced to the emerging international standards for cyber forensic analysis and a formal methodology for conducting computer forensic investigations. (Sp)
CYBS 3813. Network Fundamentals.3 Credit Hours.
Prerequisite: Junior standing. Introduces the fundamentals of computer networks, including network architectures, network topologies, network protocols, layering concepts (for example, ISO/OSI, TCP/IP reference models), wired and wireless network protocols, communication paradigms (point-to-point vs. multicast/broadcast, connectionless vs. connection-oriented), and networking APIs (sockets). Protocols in all layers will be introduced. In this course, socket programming is also introduced. (Sp)
CYBS 3913. Database Fundamentals.3 Credit Hours.
Prerequisite: Junior standing. Introduction to the concepts behind relational database systems, modeling with Entity-Relationship diagrams and how these are used for data design. SQL to define, manipulate, and test the database, programmatic access, and practical issues. Strong foundation in database security, auditing principles, practices and methodologies. Topics: application security models, security architecture, access controls, auditing, trust management, privacy, threat vectors, and attack methods. (Sp)
CYBS 3990. Independent Study.1-3 Credit Hours.
1 to 3 hours. Prerequisite: permission of instructor and junior standing. May be repeated once with change of content. Independent study may be arranged to study a subject not available through regular course offerings. (F, Sp, Su)
CYBS 4103. Developing Secure Software.3 Credit Hours.
(Slashlisted with CYBS 5103) Prerequisite: CYBS 3813 and CYBS 3913. This course covers topics at the intersection of security and software engineering. This course introduces software engineering processes and standards for building secure software applications. It discusses secure software life cycle development principles to include security in every phase. It also explores security issues and vulnerabilities in software applications due to a lack of secure software engineering processes. No student may earn credit for both 4103 and 5103. (F)
CYBS 4123. System Administration.3 Credit Hours.
(Slashlisted with CYBS 5123) Prerequisite: CYBS 3123. This course provides a comprehensive introduction to system administration. Topics include virtualization, authentication and authorization, directory services, system management, and system security and set up of modern compute and storage clouds, networking systems, file systems, logging and analysis, and networking. Includes topics related to scripting for all administrative functions. Emphasis is placed on enterprise-level systems. No student may earn credit for both 4123 and 5123. (F)
CYBS 4133. Ethical Hacking and Penetration Testing.3 Credit Hours.
(Slashlisted with CYBS 5133) Prerequisite: CYBS 3113. This course covers concepts related to ethical hacking and penetration testing methods to assess, exploit, and report security vulnerabilities on systems and their resources. The course will emphasize the ethical application of penetration testing methods and hacking tools. No student may earn credit for both 4133 and 5133. (F)
CYBS 4203. Cybersecurity Risk Management and Assessment.3 Credit Hours.
(Slashlisted with CYBS 5203) Prerequisite: CYBS 3213. This course develops competency in information security policies and plans, including controls for physical hardware, software, and networks. The course introduces security risk detection strategies, countermeasures, damage assessment, and control. The course introduces the students to performing information system risk analysis and management audits. Tools for analyzing log files of various kinds will also be introduced. No student may earn credit for both 4203 and 5203. (F)
CYBS 4293. Introduction to Cloud Computing and Security.3 Credit Hours.
(Slashlisted with CYBS 5293) Prerequisite: CYBS 3113. Course covers the concepts behind cloud computing, including storage and computing. We will also learn about virtualization, software as a service, and deployment models. We will learn about cybersecurity risks on cloud infrastructure and countermeasures using access policies, distributed access control, key management, and others. Covers topics in the cloud computing security guidelines set forth in international standards organizations. No student may earn credit for both 4293 and 5293. (Sp)
CYBS 4323. IoT Security and Privacy.3 Credit Hours.
(Slashlisted with CYBS 5323) Prerequisite: CYBS 3323. This course prepares students to securely develop and operate Internet of Things (IoT) devices considering security and privacy. The course covers concepts of IoT architectures with a focus on security and privacy issues. No student may earn credit for both 4323 and 5323. (F)
CYBS 4333. Incidence Response Management.3 Credit Hours.
(Slashlisted with CYBS 5333) Prerequisite: CYBS 3123. This course provides a comprehensive treatment of cyber incidents and how to manage them, including understanding attacker motivation, attack methods, and the anatomy of the attacks. Additionally, topics related to incidence readiness, remote triage tools, memory analysis, malware analysis, disk forensics, network intrusion detection tools, and others will be discussed. No student may earn credit for both 4333 and 5333. (Sp)
CYBS 4473. Network Security.3 Credit Hours.
(Slashlisted with CYBS 5473) Prerequisite: CYBS 3113. The course deals with understanding all aspects of cybersecurity that involve the network. Topics will include network transport-level security, wireless network security, electronic mail security, IP security, firewalls, VPNs, Secure HTTP, person-in-the-middle attack scenarios, and SSL/TLS and SSH (SP). Learn about various tools for analyzing network data at various levels of the TCP/IP stack and operating security operations centers. No student may earn credit for both 4473 and 5473. (F)
CYBS 4583. Machine Learning for Cybersecurity.3 Credit Hours.
(Slashlisted with CYBS 5583) Prerequisite: CYBS 3213 and CYBS 3223. Various machine learning concepts, deep learning, time-series analysis, data mining, and other machine-learning concepts. Tools and libraries to analyze data sets, build predictive models, and evaluate the fit of the models. Common learning algorithms, including dimensionality reduction, classification, principal-component analysis, k-NN, k-means clustering, gradient descent, regression, logistic regression, regularization, multiclass data, algorithms, boosting and decision trees. Applies concepts to problems. No student may earn credit for both 4583 and 5583. (Sp)
CYBS 4883. Cryptography Fundamentals.3 Credit Hours.
(Slashlisted with CYBS 5883) Prerequisite: CYBS 3213. This course introduces cryptography and its related tools. Specifically, in this course, cryptographic algorithms, protocols, and techniques will be introduced. The course will also introduce students to public key encryption, key exchange protocols, digital signatures, hashing-based encryption, and Data Encryption Standards. This course will also introduce cryptographic implementation in software and web application programming. No student may earn credit for both 4883 and 5883. (F)
CYBS 4953. Operating and Maintaining Cyber Ranges.3 Credit Hours.
Prerequisite: CYBS 4473. Students will learn to use and build a cyber range for various assessments of threats and exploits. They will learn to build configurations for different business operations and the formation of red and blue team exercises. Students will have real-world experiences in handling situations without the real-world risk associated with practicing on live production equipment and systems. (Sp)
CYBS 4963. Cybersecurity Capstone.3 Credit Hours.
Prerequisite: Senior Standing. Provides the students with an experience to exhibit their knowledge and skills in all areas of cybersecurity. Students will work in small groups to identify and scope a cybersecurity problem and/or challenges. Required to write a proposal about their project and asked to create a work plan to develop solution to solve the problem/challenge. Create a final report and presentation. (Sp)
CYBS 4990. Independent Study.1-3 Credit Hours.
1 to 3 hours. Prerequisite: permission of instructor and senior standing. May be repeated once with change of content. Contracted independent study for topic not currently offered in regularly scheduled courses. (F, Sp, Su)
CYBS 5103. Developing Secure Software.3 Credit Hours.
(Slashlisted with CYBS 4103) Prerequisite: Graduate Standing. This course covers topics at the intersection of security and software development. This course introduces software development processes and standards for building secure software applications. It discusses secure software life cycle development principles to include security in every phase. It also explores security issues and vulnerabilities in software applications due to a lack of secure software development processes. No student may earn credit for both 4103 and 5103. (F)
CYBS 5113. Introduction to Cybersecurity Leadership.3 Credit Hours.
Prerequisite: Graduate standing. This course provides an in-depth exploration of insider threats within organizations and the strategies for managing and mitigating these risks. Students will learn about the motivations behind insider threats, detection methods, prevention techniques, and deterrence mechanisms. (F, Sp, Su)
CYBS 5123. System Administration.3 Credit Hours.
(Slashlisted with CYBS 4123) Prerequisite: Graduate Standing. This course provides a comprehensive introduction to system administration. Topics include virtualization, authentication and authorization, directory services, system management, and system security and set up of modern compute and storage clouds, networking systems, file systems, logging and analysis, and networking. Includes topics related to scripting for all administrative functions. Emphasis is placed on enterprise-level systems. No student may earn credit for both 4123 and 5123. (F)
CYBS 5133. Ethical Hacking and Penetration Testing.3 Credit Hours.
(Slashlisted with CYBS 4133) Prerequisite: Graduate Standing. This course covers concepts related to ethical hacking and penetration testing methods to assess, exploit, and report security vulnerabilities on systems and their resources. The course will emphasize the ethical application of penetration testing methods and hacking tools. No student may earn credit for both 4133 and 5133. (F)
CYBS 5203. Cybersecurity Risk Management and Assessment.3 Credit Hours.
(Slashlisted with CYBS 4203) Prerequisite: Graduate Standing. This course develops competency in information security policies and plans, including controls for physical hardware, software, and networks. The course introduces security risk detection strategies, countermeasures, damage assessment, and control. The course introduces the students to performing information system risk analysis and management audits. Tools for analyzing log files of various kinds will also be introduced. No student may earn credit for both 4203 and 5203. (F)
CYBS 5213. Behavioral Cybersecurity.3 Credit Hours.
Prerequisite: Graduate standing. This course explores the interdisciplinary field of behavioral cybersecurity, emphasizing the role of human personality in cybersecurity practices. It aims to address the growing challenges posed by the digital age. Course will examine the application of psychological methods, profiling techniques, and the use of game theory in understanding human behavior. (F, Sp, Su)
CYBS 5233. Cybersecurity Ethics, Policy, and Law.3 Credit Hours.
Prerequisite: Graduate standing. This course explores the intersection of ethics, policy, and law within the realm of cybersecurity. Students will engage with case studies, legal frameworks, and ethical dilemmas to critically analyze and navigate the complex landscape of digital security. The goal is to develop a foundation for applying ethical considerations in any organizational structure. (F, Sp, Su)
CYBS 5243. Threat Hunting and Incident Response.3 Credit Hours.
Prerequisite: Graduate standing. This course provides an in-depth exploration of threat hunting and incident response in cybersecurity. It moves beyond traditional defensive measures to actively seek out and mitigate novel cyber threats. Students will learn how to plan, execute, and recover from hunts, customize frameworks for specific use cases, and respond to incidents, including ransomware attacks. (F, Sp, Su)
CYBS 5253. Cybercrime and Cybersecurity.3 Credit Hours.
Prerequisite: Graduate standing. This course delves into the intricacies of cybersecurity and cybercrime, offering a comprehensive overview of the challenges and strategies associated with protecting digital assets. Students will explore various threats, risk management approaches, and the critical roles of people, processes, and technology in cybersecurity. (F)
CYBS 5293. Introduction to Cloud Computing and Security.3 Credit Hours.
(Slashlisted with CYBS 4293) Prerequisite: Graduate Standing. Course covers the concepts behind cloud computing, including storage and computing. We will also learn about virtualization, software as a service, and deployment models. We will learn about cybersecurity risks on cloud infrastructure and countermeasures using access policies, distributed access control, key management, and others. Covers topics in the cloud computing security guidelines set forth in international standards organizations. No student may earn credit for both 4293 and 5293. (Sp)
CYBS 5303. Insider Threat and Risk Management.3 Credit Hours.
Prerequisite: Graduate standing. This course provides an in-depth exploration of insider threats within organizations and the strategies for managing and mitigating these risks. Students will learn about the motivations behind insider threats, detection methods, prevention techniques, and deterrence mechanisms. (F, Sp, Su)
CYBS 5323. IoT Security and Privacy.3 Credit Hours.
(Slashlisted with CYBS 4323) Prerequisite: Graduate Standing. This course prepares students to securely develop and operate Internet of Things (IoT) devices considering security and privacy. The course covers concepts of IoT architectures with a focus on security and privacy issues. No student may earn credit for both 4323 and 5323. (F)
CYBS 5333. Incidence Response Management.3 Credit Hours.
(Slashlisted with CYBS 4333) Prerequisite: Graduate Standing. This course provides a comprehensive treatment of cyber incidents and how to manage them, including understanding attacker motivation, attack methods, and the anatomy of the attacks. Additionally, topics related to incidence readiness, remote triage tools, memory analysis, malware analysis, disk forensics, network intrusion detection tools, and others will be discussed. No student may earn credit for both 4333 and 5333. (Sp)
CYBS 5383. Trust in Artificial Intelligence.3 Credit Hours.
Prerequisite: Graduate standing. This course explores the intersection of artificial intelligence (AI), management, and trust, delving into how these elements influence each other in modern organizations. It covers various aspects of trust in AI, including organizational, psychological, technological, and ethical dimensions. The course also examines the role of trust in human-machine interaction, AI's impact on innovation, and reducing costs. (F, Sp, Su)
CYBS 5443. Cyber Threat and Intelligence.3 Credit Hours.
Prerequisite: Graduate standing. This course explores the dynamic and complex nature of cyber threats and the role of intelligence in addressing them. It covers the spectrum of threat intelligence, from tactical to strategic levels, and delves into the methodologies and technologies used to gather, analyze, and apply intelligence to enhance cybersecurity. (F, Sp, Su)
CYBS 5453. Cybersecurity in a Cloud Environment.3 Credit Hours.
Prerequisite: Graduate standing. This course provides an in-depth look into the multifaceted aspects of cybersecurity within cloud computing environments. Covering fundamental concepts, architecture, software security, risk issues, and life cycle concerns, students will learn how to secure cloud services and infrastructure effectively. (F, Sp, Su)
CYBS 5473. Network Security.3 Credit Hours.
(Slashlisted with CYBS 4473) Prerequisite: Graduate Standing. The course deals with understanding all aspects of cybersecurity that involve the network. Topics will include network transport-level security, wireless network security, electronic mail security, IP security, firewalls, VPNs, Secure HTTP, person-in-the-middle attack scenarios, and SSL/TLS and SSH (SP). Learn about various tools for analyzing network data at various levels of the TCP/IP stack and operating security operations centers. No student may earn credit for both 4473 and 5473. (F)
CYBS 5483. Network Security & Resilience.3 Credit Hours.
Prerequisite: Graduate standing. This is a course designed to give students a deep understanding of the various aspects of securing computer networks and building resilience. It covers topics ranging from the motivations behind security threats to the technical and procedural steps necessary for ensuring the resilience of networks. (F, Sp, Su)
CYBS 5583. Machine Learning for Cybersecurity.3 Credit Hours.
(Slashlisted with CYBS 4583) Prerequisite: Graduate Standing. Various machine learning concepts, deep learning, time-series analysis, data mining, and other machine-learning concepts. Tools and libraries to analyze data sets, build predictive models, and evaluate the fit of the models. Common learning algorithms, including dimensionality reduction, classification, principal-component analysis, k-NN, k-means clustering, gradient descent, regression, logistic regression, regularization, multiclass data, algorithms, boosting and decision trees. Applies concepts to problems. No student may earn credit for both 4583 and 5583. (Sp)
CYBS 5883. Cryptography Fundamentals.3 Credit Hours.
(Slashlisted with CYBS 4883) Prerequisite: Graduate Standing. This course introduces cryptography and its related tools. Specifically, in this course, cryptographic algorithms, protocols, and techniques will be introduced. The course will also introduce students to public key encryption, key exchange protocols, digital signatures, hashing-based encryption, and Data Encryption Standards. This course will also introduce cryptographic implementation in software and web application programming. No student may earn credit for both 4883 and 5883. (F)
CYBS 5903. Master's Practicum.3 Credit Hours.
Prerequisite: Graduate Standing. The course provides the students with a culminating experience to exhibit their knowledge and skills in all areas of cybersecurity. Students will collaboratively work in small groups to identify and scope a current cybersecurity problem and/or challenge. Students will be required to write a proposal, create a work plan, draft a final report and make a presentation. (Sp)
CYBS 5960. Directed Readings.1-3 Credit Hours.
1 to 3 hours. Prerequisite: Graduate standing and departmental permission. Directed readings and/or literature reviews under the direction of a faculty member. May be repeated; maximum credit six hours. (F, Sp, Su)
CYBS 5963. Strategic Planning in Cybersecurity Practicum.3 Credit Hours.
Prerequisite: Graduate standing. This capstone course delves into the strategic planning and leadership aspects of cybersecurity. Students will explore the relationship between the business environment and organizational goals, risk management, and protecting information assets. The course will provide tools to build a cybersecurity strategic plan, develop IT security policies, and lead teams in the execution of these plans. (Irreg.)
CYBS 5980. Research for Master's Thesis.2-9 Credit Hours.
2 to 9 hours. Prerequisite: Graduate Standing and Instructor Permission. Directed research culminating in the completion of the master's thesis. Variable enrollment, permission of instructor required, two to nine hours; maximum credit required for degree, six hours. (F, Sp)
CYBS 5990. Independent Study.1-3 Credit Hours.
1 to 3 hours. Prerequisite: Graduate standing and permission of instructor. Contracted independent study for a topic not currently offered in regularly scheduled courses. Independent study may include library and/or laboratory research and field projects. May be repeated; maximum credit six hours. (Irreg.)