Cybersecurity

Course Descriptions

ACG XXXX      Accounting Systems Audit, Control & Security
This course will help students develop a working knowledge of the effects of computerization on controls, security, and auditing of accounting information systems. Additional topics include IT governance frameworks, general and application IT controls, and the use of audit software such as ACL for fraud examination and detection..

BUL XXXX      Risk Management & Legal Compliance
This course is designed for non-accounting students and covers topics such as corporate governance, risk strategy/management and legal/regulatory compliance including analysis of significant laws and regulations directly affecting business.

BUL XXXX      Forensic Accounting and Legal Issues
In this course, students will learn about fraud and its detection, investigation and prevention. The course focuses on complex financial crime including accounting fraud, corporate fraud, economic fraud, public corruption and white-collar crimes.

CJE XXXX       Digital Evidence Recognition
This course is designed to instruct participants in the basics of recognizing potential sources of electronic evidence, preparing them to respond to an electronic crime scene, and to safely and methodically preserve and collect items of evidentiary value to be used in court proceedings. (3 credits)

CJE 6624        Introduction to Digital Evidence
This course is designed to facilitate development of the basic knowledge and skills necessary to recognize, identify, collect, and preserve digital evidence in any kind of criminal investigation. Topics will include legal and evidentiary considerations in the field and the courtroom, foundations of digital forensics, applying forensic science to digital technologies, digital crime scenes and digital investigations, digital evidence on networks, and digital evidence on the Internet. (3 credits)

CJE 6625        Network Forensic Criminal
As applied to criminal investigations, this course focuses on forensic security issues involving access to data stored on networked computer systems and the transmission of data between systems. Topics include detecting and monitoring intrusions of networks and systems, authentication protocols, malware, and intrusion response strategies. (3 credits)

CJE 6626        Digital Forensic Criminal Investigations
This course will introduce students to digital forensics as practiced by local, state, and federal law enforcement. Students will gain hands-on experience with several digital forensic tools in this laboratory-based course. Students taking this course will become familiar with the emerging responsibilities of cyber crime investigators as well as developing a hands-on working knowledge of software commonly used at many law enforcement agencies. (3 credits)

CJE 6688        Cybercrime and Criminal Justice
This course will be an introduction to the topic of criminality in online environments. Topics include hacking, online identity theft, fraud, trade in illicit substances/items, sexual crimes online, and responses to cyber criminality (security, law enforcement, surveillance, etc.) (3 credits)

EEL XXXX      Data Networks , Systems & Security
This course begins with an introduction to databases and operating systems, but focuses primarily on the components of IT infrastructures and their interactions. Specific topics include Physical layer & data link layer/ Ethernet, Network layer/ IP & Transport layer/ TCP, Application layer & support services, Routing & subnetting, WAN technologies, Wireless & phone networks, and Network security and managerial issues. (3 credits)

ISM 6124        Advanced Systems Analysis and Design
The goal of this course is to instruct in students in the technical and managerial foundations of software engineering and information systems development. Based on a prerequisite understanding of basic systems concepts, students will learn to manage and perform activities throughout the software-intensive systems development life cycle, from the analysis of system requirements through system design to system implementation, testing, and maintenance. (3 credits)

ISM 6145       Seminar on Software Testing
This course wills urvey and analyze thebest practices in industrial testing groups. Students will gain practical experience withboth functional and structural testing methods via assignments. Automated testing tools will be an important part of the educational experience. The goal is for all students tocome away with an in-depth understanding of software testing practice and research. (3 credits)

ISM 6137         Statistical Data Mining
Students will learn how to build statistical models around data patterns, starting with methods for data exploration and data visualization. This course focuses on the statistical aspects of data mining, and it has a strong emphasis on data-driven models.

ISM 6218         Advanced Database Administration
Advanced practice and research in database systems, to include entity-relationship modeling, relational databases, object-oriented databases, performance issues, and management of the database administration (DBA) function. State-of-the-art database systems will be used for individual and group projects. (3 credits)

ISM 6316         Project Management
The general objective of this course is to become familiar with the fundamental issues for managing projects and to develop an understanding of the overall process of dealing with competing demands in various environments. (3 credits)

ISM 6328         Basics of Information Security and Risk Management
The course will include class presentations and extensive hands-on projects on implementing the common IT controls such as access control lists (ACLs), firewalls, network scanning, STIG (Security Technical Implementation Guidelines), identifying software errors and documenting some key IT General Controls. Required reports will help students improve their writing and documentation skills. (3 credits)

ISM 6930        Decision Processes for Business Continuity and Disaster Recovery
This course covers topics such as disaster recovery and business continuity following extreme events. The course will also present methods for decision making in such scenarios, with an emphasis on risk assessment and management. The course will also discuss the guidelines of the U.S. Department of Commerce, National Institute of Standards and Technology (NIST)'s Computer Security Incident Handling Guide. (3 credits)

LIS 6670 Advanced Cyber Intelligence
This course builds on the foundations of Cyber Intelligence and focuses on applying intelligence analytic methods to plan, collect, process, analyze, produce and disseminate cyber intelligence products. Students will learn to apply intelligence analytic methods to create actionable intelligence products that support a cybersecurity mission. (3 credits)

LIS 6700         Information Strategy & Decision Making       
This course explores definitions, theories and applied frameworks for understanding information, knowledge, and strategy. It reviews the history of strategic thought and strategy assessment in security and business contexts. Students learn to evaluate possible courses of action, and project and explain actions by assessing an agent's (or organization's) strategic interests and circumstances. (3 credits)

LIS XXXX       Professional and Technical Communication for Analysts
This course focuses on the writing requirements of analytic professionals, with emphasis on the content, organization, format and style of specific types of information technology documents. This course also provides students with the opportunity to develop presentation skills while improving communication and critical thinking skills. (3 credits)

LIS 6703         Core Concepts in Intelligence                                                      
This course introduces intelligence theories and application, beginning with a review of how intelligence and counterintelligence have been used over the centuries. It will describe the structure, responsibilities and capabilities of agencies and institutions in the US Intelligence Community and introduce general characteristics of foreign intelligence services. It will explore the different disciplines of intelligence and review the processes of intelligence planning, collection and analysis. (3 credits)

LIS 6702         Advanced Intelligence Analytic Methods                                      
This course will provide a foundation for analytic and quantitative reasoning. It focuses on advanced, applied skills for problems analysis, problem solving and decision-making. It is designed to help the student apply the rigor of the scientific method to strategy and information analysis. The course will draw on the decision sciences to teach students about the strengths and limitations of human judgment and decision-making and in algorithmic models and simulations, and how to mitigate the impact of bias in each. Students will also be introduced to several structured analytic techniques commonly used in intelligence analysis. (3 credits)

LIS 6709         Cyber intelligence                                                                                  
This course builds a foundation for understanding how cyber intelligence and counterintelligence can support cybersecurity and contribute more broadly to an enterprise or national security mission.   It traces the history of cyber threats; evaluates the different forms of cyber conflict from hacktivism to cyber warfare; identifies and describes some of the key states and non-state actors posing a threat to cybersecurity; describe what is currently known about "insider threats" to information systems; examines how espionage (national and corporate) is evolving in the cyber realm; reviews research on cyberbehavior and its implications for the "human dimension" of cybersecurity; and explores how to integrate technical, social and strategic data in cyber threat analysis. (3 credits)

MAT 5932        Applied Cryptography
This course covers Cryptography context (design criteria, generic attacks), Block ciphers, Hash functions, Message authentication codes, Secure channel, Key negotiation, Prime numbers, Diffie-Hellman, RSA, Key negotiation, Key management (Kerberos), PKI, and Storing secrets. (3 credits)