[PORTALNAME]
Toggle menu
Home
Search
Search
Search Transfer Schools
Search for Course Equivalencies
Search for Exam Equivalencies
Search for Transfer Articulation Agreements
Search for Programs
Search for Courses
PA Bureau of CTE SOAR Programs
Transfer Student Center
Transfer Student Center
Adult Learners
Community College Students
High School Students
Traditional University Students
International Students
Military Learners and Veterans
About
About
Institutional information
Transfer FAQ
Register
Login
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
IT 489R: Undergraduate Research in Information Technology
1.00 - 4.00 Credits
Utah Valley University
Prerequisite(s): Department approval and University Advanced Standing. Provides the opportunity to conduct research under the mentorship of a faculty member. Practices the theoretical knowledge gained in prior major courses. Creates a significant intellectual or creative product that is characteristic of the Information Technology discipline and worthy of communication to a broader audience. May be repeated for a maximum of 6 credits toward graduation.
Share
IT 489R - Undergraduate Research in Information Technology
Favorite
IT 497R: Independent Study
1.00 - 3.00 Credits
Utah Valley University
Prerequisite(s): Department chair approval and University Advanced Standing. For bachelor degree students and other interested persons. Offers independent study as directed in reading, in individual projects, at the discretion and approval of the department chairperson. May be repeated for a maximum of 9 credits toward graduation.
Share
IT 497R - Independent Study
Favorite
IT 6300: Principles of Cybersecurity
3.00 Credits
Utah Valley University
Prerequisite(s): Acceptance into Graduate Certificate or Master of Science in Cybersecurity or Departmental Approval. Provides foundational knowledge of cybersecurity for graduate-level studies. Covers information security theories, terminology, and implementation. Includes networking and system fundamentals, cryptography, malware, authentication, authorization, access control, physical security, attacker profiles, appropriate threat responses, and the human elements of cybersecurity. Introduces multiple aspects of cybersecurity and various career paths within the field.
Share
IT 6300 - Principles of Cybersecurity
Favorite
IT 6330: Cybersecurity Operations
3.00 Credits
Utah Valley University
Prerequisite(s): Acceptance into Graduate Certificate or Master of Science in Cybersecurity or Departmental Approval. Focuses on operational aspects of cybersecurity. Includes incident response, network monitoring, change management, configuration management, and resource protection. Emphasizes the role of cybersecurity in the enterprise. Integrates sound cybersecurity principles into various aspects of IT operations. Includes information on secure server administration and open source security software. Teaches cybersecurity standards for government and industry sources and the application of those standards.
Share
IT 6330 - Cybersecurity Operations
Favorite
IT 6350: Law/Ethics/Privacy in Cybersecurity
3.00 Credits
Utah Valley University
Prerequisite(s): Acceptance into Graduate Certificate or Master of Science in Cybersecurity or Departmental Approval. Explores legal, ethical, and privacy issues as they apply to cybersecurity. Includes the legalities and ethics of hacking, corporate information security and use policies, and the government's role in cybersecurity. Emphasizes the roles and responsibilities of individual cybersecurity practitioners as well as corporate entities, including vulnerability disclosure and correcting software defects. Teaches privacy policies and regulations as they relate to cybersecurity and information systems.
Share
IT 6350 - Law/Ethics/Privacy in Cybersecurity
Favorite
IT 6370: Penetration Testing and Vulnerability Assessment
3.00 Credits
Utah Valley University
Prerequisite(s): Acceptance into Graduate Certificate or Master of Science in Cybersecurity or Departmental Approval. Pre- or Corequisite(s): IT 6300. Explores advanced topics in ethical hacking, penetration testing, vulnerability assessment, and other offensive network and system techniques. Teaches network scanning, target identification, application exploitation, antivirus evasion, physical security, social engineering, phishing, and privilege escalation. Contains hands-on labs providing experience from the perspective of an attacker.
Share
IT 6370 - Penetration Testing and Vulnerability Assessment
Favorite
IT 6660: Advanced Network Forensics
3.00 Credits
Utah Valley University
Prerequisite(s): Acceptance into Graduate Certificate or Master of Science in Cybersecurity or Departmental Approval. Pre- or Corequisite(s): IT 6300. Provides a standard methodology for conducting digital forensic analysis in a network environment. Teaches the importance of network forensic principles and development of an understanding of the technologies, protocols, laws, regulations, ethics, and procedures for network forensics. Incorporates demonstrations and laboratory exercises covering the identification, acquisition, authentication, preservation, analysis, and reporting of evidence for prosecution purposes.
Share
IT 6660 - Advanced Network Forensics
Favorite
IT 6740: Advanced Network Defense and Countermeasures
3.00 Credits
Utah Valley University
Prerequisite(s): Acceptance into Graduate Certificate or Master of Science in Cybersecurity or Departmental Approval. Pre- or Corequisite(s): IT 6300. Explores advanced topics in network defense, server hardening, vulnerability assessment, and mitigation scanning. Teaches students about network scanning, asset identification, Linux and Windows server hardening, anti-malware tools, intrusion detection, physical security, perimeter security, and cybersecurity awareness training. Contains hands-on labs providing experience from the perspective of a defender.
Share
IT 6740 - Advanced Network Defense and Countermeasures
Favorite
IT 6750: Reverse Engineering and Malware Analysis
3.00 Credits
Utah Valley University
Prerequisite(s): Acceptance into Graduate Certificate or Master of Science in Cybersecurity or Departmental Approval. Pre- or Corequisite(s): IT 6300. Explores the analysis tools and techniques for identifying malicious programs and recovering compromised operating systems. Provides a standard methodology for reverse engineering and eradicating malware. Includes setting up isolated malware labs and utilizing a selected set of forensic tools, such as system and network monitoring utilities, disassemblers, and debuggers for analyzing malware characteristics and the impact that malware may have on compromised systems.
Share
IT 6750 - Reverse Engineering and Malware Analysis
Favorite
IT 6760: Case Studies in Cybersecurity
3.00 Credits
Utah Valley University
Prerequisite(s): Acceptance into Graduate Certificate or Master of Science in Cybersecurity or Departmental Approvall. Pre- or Corequisite(s): IT 6300. Discusses current trends and issues in cybersecurity. Reflects current global events related to cybersecurity. Includes data breaches, cyber warfare, and emerging threats. Emphasizes the changing and transformative nature of cybersecurity threats, including geographical, institutional, and cultural evolution. Provides guest lecturers from industry with perspectives on the state of cybersecurity. Examines real-world examples of the application of cybersecurity principles and requires critical analysis of each case.
Share
IT 6760 - Case Studies in Cybersecurity
Favorite
First
Previous
281
282
283
284
285
Next
Last
Results Per Page:
10
20
30
40
50
Search Again
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
College:
(Type the name of a College, University, Exam, or Corporation)
Course Subject:
(For example: Accounting, Psychology)
Course Prefix and Number:
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
Course Title:
(For example: Introduction To Accounting)
Course Description:
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
Within
5 miles
10 miles
25 miles
50 miles
100 miles
200 miles
of
Zip Code
Please enter a valid 5 or 9-digit Zip Code.
(For example: Find all institutions within 5 miles of the selected Zip Code)
State/Region:
Alabama
Alaska
American Samoa
Arizona
Arkansas
California
Colorado
Connecticut
Delaware
District of Columbia
Federated States of Micronesia
Florida
Georgia
Guam
Hawaii
Idaho
Illinois
Indiana
Iowa
Kansas
Kentucky
Louisiana
Maine
Marshall Islands
Maryland
Massachusetts
Michigan
Minnesota
Minor Outlying Islands
Mississippi
Missouri
Montana
Nebraska
Nevada
New Hampshire
New Jersey
New Mexico
New York
North Carolina
North Dakota
Northern Mariana Islands
Ohio
Oklahoma
Oregon
Palau
Pennsylvania
Puerto Rico
Rhode Island
South Carolina
South Dakota
Tennessee
Texas
Utah
Vermont
Virgin Islands
Virginia
Washington
West Virginia
Wisconsin
Wyoming
American Samoa
Guam
Northern Marianas Islands
Puerto Rico
Virgin Islands