The BS in IT requires 36 hours of general education courses and 27 hours of information technology courses, with between 32 and 36 core business credit hours. The Cybersecurity concentration requires a combination of 18 credit hours in concentration-specific electives and seven credit hours in general electives.
Keep in mind that you’re required to transfer in with at least 24 credit hours and any additional transfer credits may significantly reduce your required hours to graduate.
The required Cybersecurity concentration courses include:
CSEC 2010 Networking Fundamentals – 3 Credit Hours
The goal of this course is to provide the student with an outlook of computer networking from the viewpoint of a network administrator. The course introduces the student to the work of computer networking by covering concepts related to Ethernet networks, routing protocols and router configuration, and TCP/IP based networks. The student will also be exposed to the local, campuswide area network configurations, network security, wireless network, optical networks, Voice over IP (VoIP), network services, and Linux networking scenarios.
CSEC 3000 Cybersecurity Forensics – 3 Credit Hours
This course provides the technical and investigative skills needed to succeed in digital forensics as well as key security standards and models for business and government. This course covers such topics as the scope of computer forensics, Windows and Mac forensics, mobile forensics, cyberbullying, and child endangerment.
CSEC 3010 Cybersecurity Risk Management – 3 Credit Hours
This course introduces the student to industry-leading practices and standards, such as the International Organization for Standardization (ISO) standards and the National Institute of Standards and Technology (NIST) Cybersecurity Framework and Special Publications. By incorporating concepts of governance, risk management, asset management, data loss prevention, human resources, and physical and environmental security the course provides guidance on how to develop cybersecurity policies, programs, and frameworks within an organization.
CSEC 3020 Network Defense and Countermeasures – 3 Credit Hours
This course explains concepts, terminology, challenges, tools, and skills needed to defend networks. The course provides key security standards and models for business and government. This course also covers such topics as evaluation of key network risks and danger, choosing the right network security approach for the organization, anticipating and countering widespread network attacks — including those based on social engineering — and leading security standards and models, including ISO and NIST standards.
CSEC 3030 Linux Fundamentals for Cybersecurity – 3 Credit Hours
This course introduces the basics through advanced techniques to secure Linux systems, networks, applications, and data. The course provides tools and techniques for enforcing and troubleshooting security to protect systems — even if one or more layers are penetrated. This course covers such topics as the installation of Linux to achieve optimal security, best practices for securely managing accounts, devices, services, processes, data, and networks, and tools. The course also teaches automated scripting techniques for foot printing, penetration testing, threat protection, logging, auditing, and software management. Hands-on labs will be used to practice and develop critical thinking and complex problem-solving skills.
CSEC 4000 Ethical Hacking and Penetration Thinking – 3 Credit Hours
This course introduces the key concepts, terminology, challenges, tools, and skills for penetration testing. The course integrates theory and practice, covering the entire penetration testing life from planning to reporting. This course covers such topics as pen testing standards, comprehensive and effective testing, cryptography essentials, and reconnaissance. Hands-on labs will be used to practice and develop critical thinking and complex problem-solving skills as well as for testing for vulnerabilities, injection, and cross-site scripting attacks.