The BS in IT requires 36 hours of general education courses and 27
hours of information technology courses, with between 32 and 36 core
business credit hours. The Cybersecurity concentration requires a
combination of 18 credit hours in concentration-specific electives
and seven credit hours in general electives.
Keep in mind that you’re required to transfer in with at least 24
credit hours and any additional transfer credits may significantly
reduce your required hours to graduate.
The required Cybersecurity concentration courses include:
CSEC 2010 Networking Fundamentals – 3 Credit Hours
The goal of this course is to provide the student with an outlook of
computer networking from the viewpoint of a network administrator.
The course introduces the student to the work of computer networking
by covering concepts related to Ethernet networks, routing protocols
and router configuration, and TCP/IP based networks. The student
will also be exposed to the local, campuswide area network
configurations, network security, wireless network, optical
networks, Voice over IP (VoIP), network services, and Linux
networking scenarios.
CSEC 3000 Cybersecurity Forensics – 3 Credit Hours
This course provides the technical and investigative skills needed
to succeed in digital forensics as well as key security standards
and models for business and government. This course covers such
topics as the scope of computer forensics, Windows and Mac
forensics, mobile forensics, cyberbullying, and child endangerment.
CSEC 3010 Cybersecurity Risk Management – 3 Credit Hours
This course introduces the student to industry-leading practices and
standards, such as the International Organization for
Standardization (ISO) standards and the National Institute of
Standards and Technology (NIST) Cybersecurity Framework and Special
Publications. By incorporating concepts of governance, risk
management, asset management, data loss prevention, human resources,
and physical and environmental security the course provides guidance
on how to develop cybersecurity policies, programs, and frameworks
within an organization.
CSEC 3020 Network Defense and Countermeasures – 3 Credit Hours
This course explains concepts, terminology, challenges, tools, and
skills needed to defend networks. The course provides key security
standards and models for business and government. This course also
covers such topics as evaluation of key network risks and danger,
choosing the right network security approach for the organization,
anticipating and countering widespread network attacks — including
those based on social engineering — and leading security standards
and models, including ISO and NIST standards.
CSEC 3030 Linux Fundamentals for Cybersecurity – 3 Credit Hours
This course introduces the basics through advanced techniques to
secure Linux systems, networks, applications, and data. The course
provides tools and techniques for enforcing and troubleshooting
security to protect systems — even if one or more layers are
penetrated. This course covers such topics as the installation of
Linux to achieve optimal security, best practices for securely
managing accounts, devices, services, processes, data, and networks,
and tools. The course also teaches automated scripting techniques
for foot printing, penetration testing, threat protection, logging,
auditing, and software management. Hands-on labs will be used to
practice and develop critical thinking and complex problem-solving
skills.
CSEC 4000 Ethical Hacking and Penetration Thinking – 3 Credit
Hours
This course introduces the key concepts, terminology, challenges,
tools, and skills for penetration testing. The course integrates
theory and practice, covering the entire penetration testing life
from planning to reporting. This course covers such topics as pen
testing standards, comprehensive and effective testing, cryptography
essentials, and reconnaissance. Hands-on labs will be used to
practice and develop critical thinking and complex problem-solving
skills as well as for testing for vulnerabilities, injection, and
cross-site scripting attacks.