Skip to main content

Cyber Security Courses (ADCY) Woods College of Advancing Studies


Subject Area Course # Course Title Semester Credit Hours Expand
ADCY 6000 Cyber Ecosystem and Cybersecurity Spring 3
Course Description

Course provides an overview of Cyberspace, defines the scope of Cybersecurity, and addresses information classification and system compartmentalization. Course includes an appreciation of information confidentiality, integrity, and availability, and covers Cybersecurity architecture, strategy, services, hardware, software, and cloud services. The course also examines national security issues, critical infrastructure, and the potential for cybercrime and cyber terrorism, as well as the need for corporations to align their security with business needs and consider the threat from malicious employees, contractors, and/or vendors.


Schedule: Periodically

Instructor(s):

Prerequisites: None

Cross listed with:

Comments:

ADCY 6050 Cybersecurity Policy: Privacy & Legal Requirements Spring 3
Course Description

Course provides a comprehensive examination of the laws, regulations, and Executive Orders concerning privacy, including PCI, HIPAA, GLBA and their overseas counterparts, and the roles of Federal, State and local law enforcement. The course also examines national security issues governed by various Federal agencies (e.g., SEC, FTC, FCC, FERC), including suspicious activity reporting (SAR) requirements under the Patriot Act. Additionally, the course addresses intellectual property protection (e.g., SOX, FISMA, NIST), security classifications, data location requirements, audits, compliancy assessments, and individual, class-action, and shareholder derivative litigation and liability.


Schedule: Periodically

Instructor(s):

Prerequisites: None

Cross listed with:

Comments:

ADCY 6200 International Cybersecurity Summer 3
Course Description

TBD


Schedule: Periodically

Instructor(s):

Prerequisites: None

Cross listed with:

Comments:

ADCY 6300 Network & Infrastructure Security Summer 3
Course Description

Course provides an understanding of the threats and vulnerabilities in Cybersecurity and an introduction to the concepts of layering defense and providing for defense-in-depth. Specific topics include operating system security, component lifecycle management, database security, server security, application security, mobile devices, BYOD, and end-point security. The course covers the roles of physical security, system hardening, firewalls, encryption, anti-virus, and malware defense. The course also introduces identity and access management, role-based access control (RBAC), intrusion detection, penetration testing, and incident response.


Schedule: Periodically

Instructor(s):

Prerequisites: None

Cross listed with:

Comments:

ADCY 6350 Incident Response & Management Summer 3
Course Description

Course provides an understanding of the design and development of a Cybersecurity strategy which aligns with private industry and government needs, including incident documentation/analysis, response planning, and the role of a critical event response team (CERT) in determining recovery, managing liability and communications, coordinating with law enforcement, and protecting corporate reputation. Course also examines leadership and the adoption and implementation of a proactive stance through monitoring and responding to internal and external intelligence, including monitoring network traffic, activity logs (SIEM) for data breaches, denial of service (DoS), and integrity events, and outlines the roles of information security operations centers (ISOCs) and network operations centers (NOCs).


Schedule: Periodically

Instructor(s):

Prerequisites: None

Cross listed with:

Comments:

ADCY 6400 Managing Cyber Risk: Mobile Devices and Social Networking Fall 3
Course Description

TBA


Instructor(s):

Prerequisites: None

Cross listed with:

Comments:

ADCY 6450 Investigations and Forensics Fall 3
Course Description

Course covers forensic investigation, case prioritization, and case management, and addresses procedural documentation, standards of evidence, reporting, and disclosure requirements. The digital forensic portion of the course provides an understanding as to disk imaging, file recovery, trace-back techniques, network analytics, evaluation of metadata, malware, and anti-forensics. Additionally, the course covers the out-sourcing of the investigative function, or part thereof, to third parties, and provides specific case studies, including a practical laboratory project.


Schedule: Periodically

Instructor(s):

Prerequisites: None

Cross listed with:

Comments:

ADCY 6475 Security in the Cloud Spring 3
Course Description

Course provides an understanding of basic cloud deployment models, including private, public, hybrid, and community, and the various service platforms (e.g., SaaS, PaaS, IaaS). Course addresses governance control and responsibility for cloud security together with cloud security components, and covers service provider security and its evaluation, security standards (e.g., SSAE-16, CSA-CCM, Shared Assessments, NIST, CIS), procurement, and service level agreements (SLAs). Security topics include traffic hijacking, data isolation/storage segregation, identity management, virtualization security, continuity, data recovery, logging, notification, and auditing.


Schedule: Periodically

Instructor(s):

Prerequisites: None

Cross listed with:

Comments:

ADCY 6500 Organizational Effectiveness: Governance, Risk Management and Compliancy Fall 3
Course Description

TBA


Instructor(s):

Prerequisites: None

Cross listed with:

Comments:

ADCY 6600 Establishing the Business Case & Resource Allocation Spring 3
Course Description

Course provides guidance and the necessary skills to lead, design, and frame a business case for investment. Course outlines cost-benefit analysis and return-on-investment (ROI) by utilizing incident analysis, threat, and residual vulnerability analyses to determine and quantify the underlying business parameters. Course also addresses supporting techniques, including benchmarking and normalization, to enable data-based decision-making. Additionally, the course covers executive dashboard design, security metrics, key performance indicators (KPIs), graphics, illustrative techniques, business reach-out, and leadership engagement.


Schedule: Periodically

Instructor(s):

Prerequisites: None

Cross listed with:

Comments:

ADCY 6650 Role of Intelligence: Enabling Proactive Security Fall 3
Course Description

Course addresses internal and external intelligence sources, including intrusion detection, log analysis, data mining, M&A due diligence, HUMINT, and the role of an Information Security Operations Center (ISOC). From an external perspective, the course covers information gathering, intelligence feeds/sources, and fusion centers as well as the automation, filtering, validation, analysis, and dissemination of intelligence. The course also provides an understanding as to technical countermeasures (e.g., sandboxes, honeypots), and addresses the roles of DHS, FBI, NSA, and DOD.


Schedule: Periodically

Instructor(s):

Prerequisites: None

Cross listed with:

Comments:

ADCY 6900 Ethical Issues in Cybersecurity and the Ignation Paradigm Summer 3
Course Description

TBD


Schedule: Periodically

Instructor(s):

Prerequisites: None

Cross listed with:

Comments:

ADCY 6950 Applied Research Project Summer 3
Course Description

TBD


Schedule: Periodically

Instructor(s):

Prerequisites: None

Cross listed with:

Comments: