Directories and Search

Course Search


Courses may be offered in one of the following modalities:

  • Traditional in-person courses (0–29 percent of coursework is delivered online, the majority being offered in person.)
  • Hybrid/blended courses (30–79 percent of coursework is delivered online.)
  • Online courses (100 percent of coursework is delivered online, either synchronously on a designated day and time or asynchronously as a deadline-driven course.)
  • Hyflex (Students will be assigned to attend in-person or live streamed sessions as a reduced-size cohort on a rotating basis; live sessions are also recorded, offering students the option to participate synchronously or view asynchronously as needed.)

If you are enrolled in courses delivered in traditional or hybrid modalities, you will be expected to attend face-to-face instruction as scheduled.


Cybersecurity Concepts (CSC-650)


Semester: Spring 2024
Number: 0145-650-001
Instructor: Kees Leune
Days: TBA
Note: Online, Asynchronous
Location: Online
Credits: 3
Status: This Course is Filled to Capacity
Course Meets: March 25 - May 16
Course Materials: View Text Books
Description:

Students will receive an extensive introduction to cybersecurity. Students will learn to apply cybersecurity concepts like offensive and defensive models, law and ethics, principles of secure design, authentication and access control, human factors, vulnerability management, cryptography, standards, and will be introduced to follow-up courses in digital forensics and threat analysis.

Learning Goals:   After completion of this course, students will be able to:O1: Read and communicate about cybersecurity.O2: Define, explain, and apply the concepts of authentication, access control and audit, principles of security design, legal, ethical, and privacy concerns.O3: Define cryptography, be able to identify and explain elements that are crucial in implementing cryptographic solutions, and be able to explain basic cryptographic applications.O4: Define, explain, and discuss human factors in cybersecurity, as well as administrative controls and standardization.O5: Explain and analyze network security technologies such as firewalls, intrusion detection systems, network access control, data loss prevention, etc.O6: Articulate the subject matter and relevance of our cybersecurity courses.

*The learning goals displayed here are those for one section of this course as offered in a recent semester, and are provided for the purpose of information only. The exact learning goals for each course section in a specific semester will be stated on the syllabus distributed at the start of the semester, and may differ in wording and emphasis from those shown here.

» View Other Sections of this Course


« Back to Search Results

 
Apply Now
Request Information