|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
1.00 Credits
Survey of fundamental concepts of relational databases. Topics include relationships, tables, primary and foreign keys, and query languages. Focus is on SQL (Structured Query Language). Prerequisite: Admission to the applied computer science program.
Prerequisite:
Prerequisite: Admission to the applied computer science program.
-
3.00 Credits
This course explores characteristics that make software secure and less vulnerable to attacks. Basic techniques for securing applications such as input validation, output encoding, memory management, race conditions, vulnerability analysis and testing, authentication, access control, and secure database management will be covered in detail. Cross-listed with CIS 418. Prerequisite: CIS 500.
Prerequisite:
Prerequisite: CIS 500.
-
3.00 Credits
This course will introduce widely used ethical hacking techniques and help students develop their system hardening skills. Well-known tools for penetration testing will be introduced in hands-on activities. The knowledge base and skill set for a certified ethical hacker will be covered. Offered winter semester. Prerequisite: Admission to M.S.-Cybersecurity or admission to cybersecurity badge.
Prerequisite:
Prerequisite: Admission to M.S.-Cybersecurity or admission to cybersecurity badge.
-
3.00 Credits
Applied modern cryptographic and cryptanalysis techniques. Emphasis on the use of cryptographic mechanisms to secure large systems, as well as ways in which cryptographic mechanisms can fall vulnerable to cryptanalysis in deployed systems. Topics include symmetric ciphers, asymmetric ciphers, digital signatures, message authentication, cryptographic protocols, cryptanalysis techniques, and public-key infrastructure. Cross-listed with CIS 455. Prerequisite: Admission to M.S.-Cybersecurity or admission to the cybersecurity badge.
Prerequisite:
Prerequisite: Admission to M.S.-Cybersecurity or admission to the cybersecurity badge.
-
3.00 Credits
Examination of traditional and alternative software development life cycles and their associated systems analysis techniques. Models for data, process, and control are related both to information required by various life cycle models and to the development of traditional and object-oriented software. (3-0-0) Prerequisite: Admission to CIS program or permission of instructor.
Prerequisite:
Prerequisite: Admission to CIS program or permission of instructor.
-
3.00 Credits
Both the process and the product aspects of requirements specification are examined; the concepts are applicable to systems and to software. The advantages and limitations of several requirements specification techniques are presented. (3-0-0)
-
3.00 Credits
Discussion of the major techniques of software testing: software technical reviews, software testing techniques, proofs of correctness, and simulation/prototyping. Concludes with guidelines on organizational implications of software verification and validation activities. (3-0-0)
-
3.00 Credits
This course presents the principles of information security, and how to integrate these principles into the systems life cycle. Coverage includes a broad overview of information security concepts, requirements, threats, vulnerabilities, and countermeasures, with an emphasis on designing for security, risk management, and security policies. Prerequisite: Admission to M.S.-CIS program.
Prerequisite:
Prerequisite: Admission to M.S.-CIS program.
-
3.00 Credits
This course covers advanced concepts and techniques to secure data and preserve privacy in a distributed multiuser environment. Topics include applied cryptography, network security, operating system security and privacy preserving techniques. Prerequisite: Admission to MS-Cybersecurity or Cybersecurity badge.
Prerequisite:
Prerequisite: Admission to MS-Cybersecurity or Cybersecurity badge.
-
3.00 Credits
An introduction to the application of digital forensics principles and practices to collect, examine, analyze, and preserve digital evidence in support of cyber forensics investigations in various computing systems. This course is a blended mix of lecture and hands-on exercises to reinforce the concepts discussed in the lecture. Prerequisite: Admission to MS-Cybersecurity or Cybersecurity badge.
Prerequisite:
Prerequisite: Admission to MS-Cybersecurity or Cybersecurity badge.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Cookies Policy |
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2025 AcademyOne, Inc.
|
|
|