Graduate Cyber Security
Graduate Cyber Security
2023 Summer Term
Disclaimer
- This course listing is informational and does not guarantee availability for registration.
- Please click through to view the class schedule to see sections offered for your selected term.
- Sections may be full or not open for registration. Please use WINS if you wish to register for a course.
MANAGEMENT OF INFORMATION ASSURANCE AND SECURITY
CYBER 731
This course offers an applied guide that includes the practical steps institutions can take to achieve digital resilience and protect against cyber-attacks while creating value from technology investments and innovation. Cybersecurity must move up the corporate and political agenda if organizations are to remain safe and realize the full potential value of innovation.
CYBER INCIDENT RESPONSE, BUSINESS CONTINUITY, AND RISK MANAGEMENT
CYBER 734
The course covers business continuity planning and implementation, a systematic approach used to create and validate a plan for maintaining continuous business operations before, during, and after disasters or disruptive events. It also covers disaster recovery, which is aimed at assessing the risks and stopping the effects of disasters as quickly as possible, and addressing the immediate aftermath.
COMPUTER FORENSICS
CYBER 742
Computer forensics involves the preservation, identification, extraction and documentation of evidence stored on a computer. This course covers both the principles and practices of computer forensics that include data acquisition and data recovery; volume analysis; file system analysis; network forensics; evidence hiding and steganography; tools and techniques for investigating computer intrusions; scripting for forensics; and the legal and ethical implications.
CLOUD SECURITY
CYBER 758
This course offers both broad and in-depth study of cloud security issues related to data and computation outsourcing from perspectives of operation, management, and design. Topics include identity and access management, vulnerability assessment, intrusion detection, forensics, and incident handling on cloud; security policies, management, and regulatory compliance in cloud; and cloud security architecture design and implementation.