Bellevue University Cybersecurity Programs & Courses



Similar documents
Introduction to Cyber Security / Information Security

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

The Protection Mission a constant endeavor

Big Data, Big Risk, Big Rewards. Hussein Syed

Security + Certification (ITSY 1076) Syllabus

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

(Instructor-led; 3 Days)

Cisco Advanced Services for Network Security

Certified Information Systems Auditor (CISA)

Bachelor of Information Technology (Network Security)

The Information Security Problem

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Security aspects of e-tailing. Chapter 7

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

IT Networking and Security

InfoSec Academy Application & Secure Code Track

CIS 253. Network Security

Critical Controls for Cyber Security.

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Enterprise Cybersecurity: Building an Effective Defense

LINUX / INFORMATION SECURITY

CESG Certification of Cyber Security Training Courses

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Securing the Service Desk in the Cloud

IBX Business Network Platform Information Security Controls Document Classification [Public]

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Principles of Information Assurance Syllabus

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

information security and its Describe what drives the need for information security.

Information Systems Security Certificate Program

Cyber Essentials Scheme

Information Systems and Tech (IST)

Network Security Administrator

Microsoft Technologies

Five keys to a more secure data environment

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Jort Kollerie SonicWALL

The Information Assurance Process: Charting a Path Towards Compliance

External Supplier Control Requirements

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

SRA International Managed Information Systems Internal Audit Report

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

MS Information Security (MSIS)

Enterprise Cybersecurity: Building an Effective Defense

Fundamentals of Network Security - Theory and Practice-

This is a preview - click here to buy the full publication

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

CISCO IOS NETWORK SECURITY (IINS)

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

External Supplier Control Requirements

Exam 1 - CSIS 3755 Information Assurance

Information Technology Career Cluster Advanced Cybersecurity Course Number:

CyberSecurity Solutions. Delivering

Master of Science in Information Systems & Security Management. Courses Descriptions

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

FREQUENTLY ASKED QUESTIONS

What Data? I m A Trucking Company!

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Looking at the SANS 20 Critical Security Controls

CCA CYBER SECURITY TRACK

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Human Factors in Information Security

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

IT Security. Securing Your Business Investments

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

capabilities statement

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

ICANWK406A Install, configure and test network security

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Chapter 1 The Principles of Auditing 1

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

John Essner, CISO Office of Information Technology State of New Jersey

Security Controls for the Autodesk 360 Managed Services

A Systems Approach to Protecting the U.S. Air Traffic Control System Against Cyber-Terrorism

Cyber R &D Research Roundtable

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Altius IT Policy Collection Compliance and Standards Matrix

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

CA Technologies Solutions for Criminal Justice Information Security Compliance

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Transcription:

Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320 Operational Security CYBR 340 Operating Systems and Mobile Device Security CYBR 350 Web, Commerce and Application Security CYBR 410 Data/Database Security CYBR 420 Cyber Investigations and Forensics CYBR 450 Advanced Cybersecurity Concepts Plus, choose two courses (6 credit hours) from the following: CIS 242 Introduction to Programming using Java OR CIS 243 Introduction to Programming Using C# CIS 313 Cryptography CIS 321 Structured System Analysis and Design CIS 351 Networking Structures and Desktop Operating Systems CIS 357 Operating System Administration CIS 433 Information Technology Project Management CIS 436 Ethics for IT Professionals CIS 468 Accounting for IT Professionals OR AC 341 Accounting Information Systems PS 208 Introduction to National Security PS 209 Foundations in Intelligence and Counterintelligence PS 210 Ethical Controversies in Security and Intelligence CYBR 433 Security for Business, Finance, and Accounting CYBR 436 Security for Healthcare CYBR 250 Introduction to Cyber Threats, Technologies and Security Bellevue University as of: December 2013 1

This course introduces information technologies and examines methods for protecting them against persistent and constantly evolving threats. Existing and emerging information technologies are discussed including operating environments, computer networking, and data management. Basic methods for managing information systems and technologies are presented from a standpoint of providing sufficient security protections. CIS 311 Network Security This course provides an introduction to the goals, functional processes, tools, and techniques associated with network security. Discussion includes devices such as firewalls, intrusion detection mechanisms, and Virtual Private Networks (VPNs). Telecommunications and network security protocols used to prevent, detect, and correct potential vulnerabilities associated with both the outsider and insider threat are also explored. CIS 312 Securing Access Control This course provides an introduction to the concepts associated with configuring identification and authentication. Discussion includes comparison of various access models, and how passwords, smart cards and biometric devices can assist in securing system access and ensure confidentiality, integrity, and availability of data. Other technologies such as remote authentication and Public Key Infrastructure (PKI) are also explored. CIS 313 Cryptography This course provides an introduction to the fundamental components of encryption. Topics include the history of cryptography, public key and private key systems, hashing, and digital signatures. Topics also include the development of the Advanced Encryption Standard, the use and functionality of Pretty Good Privacy, and the Secure Socket Layer. CIS 411 Assessments and Audits This course explores the principles of risk assessment, vulnerability analysis, and auditing. Discussion includes the use of these principles to evaluate the effectiveness of information security controls. Topics include threat and asset identification, countermeasures and safeguards, acceptable risks, and vulnerabilities. The auditing concepts of technical, physical, and administrative controls are also introduced along with how these controls are measured for effectiveness. CYBR 320 Operational Security This course focuses on the skills required to operate a security program within an organization. Coverage includes the practical application of security practices in an operational environment. Topics include security structure, leading security projects, policy management, human factors of security, and physical security methods. CYBR 340 Operating Systems and Mobile Device Security This course focuses on the skills required to secure base operating systems on server, desktop, virtual, and mobile platforms. Coverage includes the practical application of security tools, utilities, and Bellevue University as of: December 2013 2

configurations for protecting computer operating systems at both the user and corporate level. Discussion also includes protecting stand-alone and virtualized servers, cloud computing security, and the protection of mobile platforms such as smart phones, tablets and handheld computers. CYBR 350 Web, Commerce and Application Security This course explores securing core technologies that support Internet applications and commerce. Processes for creating and administering Internet web sites to ensure proper protections are introduced. The course also addresses securing applications on Internet websites and mobile platforms, and introduces basic methods for secure development. CYBR 410 Data/Database Security This course focuses on the protection of data at rest. Coverage includes the identification, ownership, and protection of data whether residing in files, folders, or databases. This course also introduces the concept of database security to include: Architecture, Password Policies, Auditing, Privileges, and Roles Administration. Emphasis is placed on areas unique to data and database security. CYBR 420 Cyber Investigations and Forensics This course examines basic methods of investigation, information acquisition, and management of Internet and computer forensic cases. Topics include record-searching, note taking and report writing, and using scientific methodology in Cyber investigations. Coverage also includes basic tools and techniques for forensic analysis of computers, networks systems, and mobile devices. CYBR 450 Advanced Cybersecurity Concepts This course provides a monitored structure for application of the skills and knowledge acquired throughout the Cybersecurity program. Emphasis is placed on the use of real-world security problems, issues, and situations. Course assignments will require the use of protection, detection, deterrence, and response techniques in addressing threats, vulnerabilities, and risks found in businesses today. Bellevue University as of: December 2013 3

Graduate Course List Core Courses: CIS 607 Computer Forensics CIS 608 Information Security Management CYBR 510 Physical, Operations, and Personal Security CYBR 515 Security Architecture and Design CYBR 520 Human Aspects of Cybersecurity CYBR 525 Ethical Hacking and Response CYBR 610 Risk Management Studies CYBR 615 Cybersecurity Governance and Compliance CYBR 650 Current Trends in Cybersecurity Plus, choose three courses (9 credit hours) from the following: CIS 519 IT Strategy and Policy CIS 520 Survey of system Development CIS 537 Introduction to Cyber Ethics CIS 605 Advanced Database Management PS 639 Cyberwar or Cyberdeterrence OR CIS 610 Information Warfare CIS 611 Cloud computing CIS 629 Managing Emerging Technologies CIS 633 Information Security Technology Project Management CYBR 545 White collar Crime CYBR 613 Control System Security CYBR 625 Business Continuity Planning and Recovery CIS 644 Managing Project Risks MHA 602 Health Information Technologies and Administration CIS 607 Computer Forensics This course is designed as an overview of the investigative methods and tools associated with computer forensics. Topics include: processing crime and incident scenes, digital evidence controls, recovery of information, network forensics, data acquisition, and legal and ethical issues associated with investigations. Bellevue University as of: December 2013 4

CIS 608 Information Security Management This course addresses the issues relating to successful information security management. Topics include access control systems, network and software security, management practices, risk management, protection mechanisms, business continuity planning, and legal and ethical issues. The course allows for analysis of current security management models. CYBR 510 Physical, Operations, and Personnel Security This course presents an examination of effective security methodologies based on comprehensive assessment of threats and implementation of a layered system of physical and electronic protection. Threat identification, countermeasures, and prevention are explored. CYBR 515 Security Architecture and Design This course provides an introduction to the fundamental components of security architecture. Topics include computer organization; hardware, software and firmware components; open and distributed systems; and protection mechanisms. Discussion also includes certification and accreditation; formal security models; and evaluation criteria. Assigned projects include designing a model secure system. CYBR 520 Human Aspects of Cybersecurity This course provides an exploration of the human aspects of Cybersecurity. Topics include human behavior and interaction; motivation and influence; and social engineering. Emphasis is on the human element of cyber incidents in relation to protecting information and technology assets. CYBR 525 Ethical Hacking and Response This course provides a technical study of offensive and defensive techniques for protecting cyber assets. Topics include security testing, risk mitigation techniques, and threat response. Discussion also includes penetration testing theory, techniques, and tools; network, systems, and application vulnerability scanning; risk analysis and response; and intrusion detection and response. Emphasis is placed on identification of system vulnerabilities and threats and techniques for preventing attacks. CYBR 610 Risk Management Studies This course provides an exploration of how organizations manage risks to information technology assets. Discussion includes the application of methodologies and models for managing such risks. Topics also include recognition of security threats and vulnerabilities and the analysis of associated risks. A systematic approach for acquiring and analyzing information to support decision-making in the protection of assets and the allocation of security resources is presented. CYBR 615 Cybersecurity Governance and Compliance This course provides an exploration of the governance of information systems. Discussion includes the importance of compliance with laws, regulations, policies, and procedures as a means of minimizing risk through mandated security and control measures. Bellevue University as of: December 2013 5

CYBR 650 Current Trends in Cybersecurity This course presents an in-depth study of current trends in Cybersecurity threats. Discussion includes the identification and management of threats and vulnerabilities within an effective enterprise security program. Prior Cybersecurity education is synthesized through projects and assignments. CYBR 625 Business Continuity Planning and Recovery This course provides an introduction to the processes associated with business continuity planning and disaster recovery. Topics include project scope and planning, assessing risk, developing policy and procedures, and conducting a business impact analysis. Discussion also includes disaster recovery plan development and implementation, and restoration. Bellevue University as of: December 2013 6