CYB 536 Network and System Information Assurance

The security threats and risks that govern computer systems and networks can be mitigated by using a variety of security models, mechanisms and protocols. Such mechanisms are used to implement security policies that are defined in a risk management strategy. Designing security architecture is a critical task that includes securing hardware, software and networks. This course introduces security models and the concept of subjects and objects in order to discuss authorization and access control. Case studies of how authentication and access control are implemented in real-life systems are also presented. Security risks that are related to networks are equally important. Students define secure communication channels and present known and established network security protocols (SSH, SSL, IPSec, etc.). Special cases such as wireless and mobile networks are also examined to demonstrate how traditional security architectures can be adapted to facilitate different requirements. Pre/Co-requisite: MGM 533

CYB 538 Security Auditing and Risk Management

In this course, students appraise all standards and information technology (IT) security audit processes, evaluate security controls, and examine governance of compliance and control responsibilities. Most organizations are required to comply with IT security regulations and/or standards resulting from the establishment of the Sarbanes-Oxley Act, General Computing Controls, the Gramm–Leach–Bliley Act (GLBA), the Federal Information Security Management Act (FISMA), and the Payment Card Industry Data Security Standard (PCI DSS) Students will become familiar with these standards and regulations. Pre/Co-requisite: MGM 533

CYB 542 Ethical Hacking in Defense of the Enterprise

An ethical hacker is a security expert who attacks a system on behalf of the system’s owners. This course focuses on discovering network vulnerabilities that a malicious hacker can exploit. The course explores penetration testing, footprinting and social engineering, scanning and enumeration, operating system weaknesses, and the methods used to hack Web servers and wireless networks. Students perform hands-on projects using state-of-art hacking tools and techniques after extensive planning. Pre/Co-requisite: MGM 533

CYB 548 Robust Incident Response Planning

This course provides students with the background and skills to manage information security incidents to minimize impact on business operations. Topics include detection, investigation, and response to different types of security incidents. Students explore these topics by developing incidence response plans; utilizing industry-standard processes and tools for investigating information security incidents; and recommending processes for incidence response that adhere to legal, regulatory, and organizational compliance. Students who have completed the course have a comprehensive view of cybersecurity incident detection and response. Pre/Co-requisite: MGM 533

CYB 552 Digital Forensic & Breach Investigations

This course explores the expertise required to conduct digital forensic investigations. Topics include investigation methods, problem-solving techniques, current forensics analysis tools, digital evidence acquisition and control, and impact of ongoing technological changes on digital forensics. Student projects include scenario-based investigations in investigating cybersecurity breaches. This course explores the expertise required to conduct digital forensic investigations. Topics include investigation methods, problem-solving techniques, current forensics analysis tools, digital evidence acquisition and control, and impact of ongoing technological changes on digital forensics. Student projects include scenario-based investigations in investigating cybersecurity breaches. Pre/Co-requisite: MGM 533

CYB 558 Secure Software Development

Software applications are often characterized as the cement of our times due to the high prevalence of computer systems in all aspects of our lives: banking, health, transportation, retail, even “smart home” systems. As a result, managing application security risks is a quite critical aspect of information security. This course aims to justify the importance of application security, firstly by analyzing how security can be integrated in the software development lifecycle. We demonstrate methods to identify vulnerabilities and discuss techniques that can be used to mitigate them and improve the overall security of software applications. Closely coupled with applications are databases that support them and facilitate data storage, retrieval and corresponding transactions. Concurrency control is a critical issue in database security. Methods for concurrency control and several aspects of database security, focusing on relational databases are discussed. Pre/Co-requisite: MGM 533

IT 524 Information Systems Security

Students in this course will get a high-level overview of the information security topics for which today’s corporations need competencies. Essential security topics in this course cover network fundamentals and applications, standards, privilege management, environmental security issues, defense in depth, risk management, vulnerability assessments, business continuity planning, security policies, incident handling, web application security, and advanced persistent threats. Pre/Co-requisite: MGM 533

IT 544 Cloud Computing

This course provides students with a detailed exploration of the cloud-computing paradigm. After studying cloud architecture, students will study the strategic, risk and financial impact of utilizing this platform.

Pertinent topics also include design, implementation and security aspects of applications stored in the cloud. The course will cover the entire spectrum of moving applications into the cloud. Pre/Co-requisite: MGM533

IT 556 Master’s Project

This course is graded as pass/fail. Information Technology and Cybersecurity Defense students must choose one of the following two options:

Option 1: The capstone project requires IT and CD students to demonstrate their competence in the skills and knowledge associated with their degree program. It is designed to show the in-depth learning and higher-order thinking of students. With this option, students must choose a project in the field of information technology or cybersecurity and then plan, organize, implement, and work towards the completion of the project in a controlled manner, to meet the goals and objectives of their project. The capstone project is carried out by an individual student and may be derived from the student’s workplace where the student can exploit the workplace experience to benefit both the student and the student’s place of employment. Before beginning work, each capstone project must first be approved by an Information Technology Faculty Advisor. At the end of the project, the student will prepare a Final Project Report and defend this work product before the Faculty Advisor and a panel of other assigned faculty members.

Option 2: The master’s thesis requires students to carry out an investigation of technology or methodology in which the student has a strong interest. The topic of this investigation or research should be an extension or continuation of the topics covered in the MSIT or MSCD curriculum. The topic must first be approved by an Information Technology Faculty Advisor. The thesis option requires a presentation of the paper to the Faculty Advisor and a panel of assigned faculty members

MGM 514 Leadership

Leadership is about developing a vision and inspiring others to achieve that vision. It is wayfinding through effective communication. Leaders seek to understand and shape organizational culture, while effecting and supporting positive change. This course provides aspiring leaders with tools to develop a confident voice for their own current and future leadership roles. The major theories of leading and managing people and organizations will be applied to real leadership situations in organizations ranging from start-ups to large enterprises, as well as real leaders in the student’s chosen field. While seeking a deep understanding of their own leadership style, students will examine the interaction between leadership and organizational culture, culminating in the development of a personalized comprehensive leadership development plan.

MGM 533 Advanced Project Management

Project management is more than merely parceling out work assignments to individuals and hoping that they will somehow accomplish a desired result. In fact, projects that could have been successful often fail because of such take-it- for-granted approaches. Individuals need hard information and real skills to work successfully in a project environment and to accomplish project objectives. Topics include project management life cycle and process; identifying and selecting projects; developing a project proposal; techniques for planning, scheduling, resource assignment, budgeting, and controlling project performance; project risks; project manager responsibilities and skills; project team development and effectiveness; project communication and documentation; and project management organizational structures. The concepts in the course support the project management knowledge areas of the Project Management Institute’s A Guide to the Project Management Body of Knowledge (PMBOK® Guide).

CPT 591 Workplace Practicum I

In this optional course, students will use knowledge gained through previous coursework in the master’s program with planned and supervised work experiences in the public or private sector. The course allows students to enhance the practical skills necessary for success by being exposed to the reality of the world of work beyond the boundaries of the campus and enhancing their self-confidence and career direction. Students are required to provide bi-weekly status reports to the Graduate Director while enrolled in this course. Requires successful completion of four courses in the master’s program and approval of the Graduate Director or Department Chair

CPT 592 Workplace Practicum II

This course is a continuation of the Workplace Practicum begun in CPT 591. Prerequisite: CPT 591

CPT 593 Workplace Practicum III

This course is a continuation of the Workplace Practicum begun in CPT 591 and continued in CPT 592. Prerequisite: CPT 592

CPT 594 Workplace Practicum IV

This course is a continuation of the Workplace Practicum begun in CPT 591 and continued in CPT 593. Prerequisite: CPT 593