CY510. Cyber Security & Risk Management. 3 Credits<\/strong><\/p>\nIn this course we will study the concepts in cyber security design and implementation for computer systems (both hardware and software). Security architecture, organization policies, standards, procedures, and security system implementation, including diagnostic testing of databases and networks. Throughout this course, practical skills will also be acquired through a series of interactive risk assessment workshops and case studies.<\/p>\n
CY520. Cyber Security Legal Aspects & Ethical Concerns.\u00a03 Credits<\/strong><\/p>\nIn this course we will study Cybersecurity law, policy and compliance, legal rights and liabilities associated with computer security; the application of ethical principles (respect for persons, beneficence, and justice) in cyber security; Information privacy; Rights enforceable by private parties; Liabilities associated by private parties and governments; Legal aspects of records management; Un-authorized computer use; Computer Fraud and Abuse Act; Trade Secrets; Economic Espionage Act; Civil Law Claims; Privacy; Export Control; Constitutional Rights; USA-PATRIOT Act; HIPAA, Gramm-Leach-Bliley; and Digital Rights Management.<\/p>\n
CY530. Cryptography.\u00a03 Credits<\/strong><\/p>\nThis course gives a historical introduction to Cryptology, the science of secret codes. It begins with the oldest recorded codes, taken from hieroglyphic engravings, and ends with the encryption schemes used to maintain privacy during Internet credit card transactions. Since secret codes are based on mathematical ideas, each new kind of encryption method leads in this course to the study of new mathematical ideas and results. The first part of the course we study permutation-based codes: substitutional ciphers, transpositional codes, and Vigenere ciphers. In the second part of the course, the subject moves to bit stream encryption methods. These include block cipher schemes such as the Data Encryption Standard (DES). Public key encryption is the subject of the final part of the course. We learn the mathematical underpinnings of Diffie-Hellman key exchange, RSA and Knapsack codes. Software packages and tools will also be studied.<\/p>\n
CY540. International Telecommunications Networks.\u00a03 Credits<\/strong><\/p>\nIn this course we will learn how International Telecommunications Networks are designed, built, and maintained. Within the context of cyber security, we will study transmission modes, coding schemes, modulation, multiplexing, data sets, common carriers, tariffs, monitoring, troubleshooting, and network design. As part of the course, we will design an International Telecommunications Network and identify associated risks and vulnerabilities.<\/p>\n
CY550. mobiles Computing and Wireless.\u00a03 Credits<\/strong><\/p>\nIn this course we will study nomadic computing and mobility; challenges in design and deployment of wireless and ad-hoc networks; MAC issues, routing protocols, and mobility management for ad-hoc networks and networks of the future.<\/p>\n
CY610. Ethical Hacking and Penetration Testing.\u00a03 Credits<\/strong><\/p>\nThis course is designed for students to be trained in understanding vulnerabilities in networks, operating systems, database management systems and web servers. Students will learn how exploits are designed by an adversary attacker to penetrate into vulnerable systems. Students will also learn how a hacker can move into a compromised system and remove her\/his footprints. The course will introduce students to tools used for network scanning, finger printing, and password cracking. Tools include Nmap, Nessus, and others.<\/p>\n
CY620. Malware Analysis and Defense.\u00a03 Credits<\/strong><\/p>\nIn this course students will study malicious software detection and defenses including tripwire, Bit9, and other techniques such as signature and hash algorithms. Viruses, worms, Trojan horses, logic bombs, malicious web server scripts, mobiles code issues, and methodologies used by anti-virus\/spyware vendors will be studied.<\/p>\n
CY630. Disaster Recovery.\u00a03 Credits<\/strong><\/p>\nIn this course students will learn how to identify cyber security vulnerabilities and implement appropriate countermeasures to mitigate risks. Techniques will be taught for creating a continuity plan and methodology for building an infrastructure that supports its effective implementation. Throughout this course, skills in disaster recovery planning will be acquired through a series of interactive workshops and case studies. Students will design and develop a disaster recovery plan.<\/p>\n
CY640. Cyber Crime Investigation & Digital Forensics.\u00a03 Credits<\/strong><\/p>\nThe topics covered in this course include cyber-crime investigation, digital forensics, forensic duplication and analysis, network surveillance, intrusion detection and response, incident response, anti-forensics techniques, anonymity and pseudonymity, cyber law, computer security policies and guidelines, court report writing and presentations, and case studies. The course will include lecture and demonstrations and is designed around a virtual lab environment that provides for robust and realistic hands-on experience in working with a range of information assurance topics. Students will be assigned projects to apply information security practices and technologies to solve real-world cyber security problems.<\/p>\n
CY650. Cyber Security Capstone.\u00a03 Credits<\/strong><\/p>\nThis course is the capstone experience for graduate students in the Master\u2019s degree in Cyber Security and provides students with the opportunity to carry out in-depth research on a specific topic in cyber security. The student\u2019s project will reflect the integration and application of the cyber security knowledge gained over the course of the program.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"
Master\u00a0of Science in Cyber Security Fall Semester (First Year) CY510 Cyber Security & Risk Management 3 CY520 Cyber Security Legal Aspects & Ethical Concerns 3 CY530 Cryptography 3 CY540 International Telecommunications Networks 3 Spring Semester (First Year) CY550 mobiles Computing and Wireless 3 CY610 Ethical Hacking and Penetration Testing 3 CY620 Malware Analysis and Defense […]<\/p>\n","protected":false},"author":32,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"template-department-standard-child.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-29","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/pages\/29","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/comments?post=29"}],"version-history":[{"count":20,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/pages\/29\/revisions"}],"predecessor-version":[{"id":13120,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/pages\/29\/revisions\/13120"}],"wp:attachment":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/media?parent=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}