Master of Science, School of Information Technology, Cybersecurity
This course addresses ethical and legal issues related to e-commerce and e-business. Students investigate government approaches to content control and rights, access and jurisdiction regarding personal information, digital property, U.S. and international law, antitrust law, fraud and more.
Topics include the importance of telecommunication in today's business environment, the analysis, design and implementation of telecommunications systems, the scope of the telecommunications industry and current trends; telecommunications hardware, the Open Systems Interconnection (OSI) network model, networking technologies and telecommunications software, protocols and standards.
This course explores the basic concepts and prepares students with the foundation skills for the protection of networks, communication, and data, as well as the knowledge base for planning, implementing, and managing enterprise-level security and system integrity. Topics include approaches in an organization to prevent, detect, and recover from the loss of information, cryptography and its applications, security in networks and distributed environments.
The course also teaches the concepts and design of algorithms for problem solving and includes the topics of data structures as they are related to the algorithms that use them. The course provides the technical foundation necessary to handle the material covered in the subsequent IT courses.
This course examines the human factors present in cyber security related to ethics, integrity, practices, policies, and procedures. Students will design information technology security awareness training and optimize information technology organizational factors to foster a healthy security culture within an organization. Additionally, students will recommend mitigation strategies to protect an organization from human behaviors that could potentially cause a security threat.
Explore a broad range of topics from secure network fundamentals, protocols and analysis; threats and vulnerabilities; application, data and host security, access control and identity management. Examine defensive measures to secure an organization's network. Identify overall network security posture and the basic practices in vulnerability assessment.
In this course, students learn the theory, practice, and principles of digital forensics through investigation of computer, network, operating system, mobile device and other areas of digital forensics. Topics include identification, collection, acquisition, authentication, preservation, examination, analysis and presentation of digital forensic evidence
This course explores how to develop and deploy distributed web applications, including web services and HTML5 applications that run on a mobile device
This capstone course integrates previous coursework and practical experience with a focus on authentic demonstration of competencies outlined by the program. Rather than introducing new concepts, students synthesize prior learning to design, develop, and execute an analytics project on their chosen subject as a culmination of their studies. The course is structured around this critical capstone assessment, so that students have the appropriate support and resources required to be successful.
Copyright © 2022 Danny Naum - All Rights Reserved.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.