Laptop computer and lines of code

Cybersecurity Courses

Industry Preparation Core

MENG 540: Management of High-Tech Industries

Decision making in complex environments; emphasis on project analysis, complex investment analyses, strategic decision making where outcomes depend on high technology, and the role of decisions in product development. Management in high tech firms; emphasis on management of professionals, management of project-based and team-based organizational structures, and the role of the manager in expertise-driven organizations.

MENG 570: Business Fundamentals for Engineers

This comprehensive course examines core and evolving concepts in the business fundamentals of successful technology-based companies including Business Plan Development & Strategies, Marketing, Product & Process Development processes, Intellectual Property, Accounting, Finance, and Operations. Students will learn the fundamentals essential to understanding all aspects of a business and will be able to converse in some depth in each of the areas studied upon completion. Other topics will include Supply Chain Management, Stage-Gate Development Cycles, Balances Scorecards, Blue Ocean Strategy, and Disruptive Technologies.

Cybersecurity Technical Core

CYBERSEC 500: Introduction to Cybersecurity Perspectives

This course provides an overview of the domains, concepts, and elements and reviews current and emerging trends in Cybersecurity. Students will learn the National Institute of Standards and Technology (NIST) Cybersecurity Framework considering IT systems components, operating systems concepts, basic data analysis, and networking concepts including networking technologies and protocols. Real-world examples will be used to cover significant types of security incidents and their impact and remediation. Fundamental security design principles, information assurance fundamentals, and the significance of cryptography. Readings in different media will be used to demonstrate how quickly the threat and vulnerability landscape is changing across different industries.

CYBERSEC 502: Multidisciplinary Cybersecurity: Government, Public Policy, Law, and Select Industry Topics

Rapid progress in global digital transformation and connectivity requires us to think and act differently in the cyber domain. National security, economic security, and business interests are impacted by vulnerable information systems. Domestic and international cyber-crime is on the rise. Hostile governments infiltrate public and private sector systems with relative impunity causing billions of dollars in financial damage and undermining public trust and confidence. Our notion of privacy is also changing. Students will explore cybersecurity through a non-technical lens by studying  U.S. government responsibilities, law, and public policy as they relate to selected topics including finance, health care, and trade. Students will also gain an understanding of privacy, cybersecurity standards manifested in public policy, and how cybercrime is prosecuted.

CYBERSEC 503: Cybersecurity Risk Management

Understanding and measuring the risk involved with real and potential cybersecurity threats and vulnerabilities are fundamental for an organization or enterprise to invest in and to protect its information and operational infrastructure, its constituents, its relationships, and its reputation. Students will learn and apply various modeling techniques to identify and quantify risk and how they are used to determine the value and criteria for managing that risk. Risk management concepts and standards will be explored including its essential elements, effective governance, understanding the appetite for risk, and the need for developing appropriate policies and procedures to mitigate risk. These concepts and standards will be addressed across different industries and environments.


Technology Track

CYBERSEC 510: Security Incident Detection, Response and Resilience

Current and emerging technologies and processes to monitor, detect and respond to security incidents in systems, networks, and clouds will be covered including automation and analytics. Best practices for developing effective incident response plans, including regulatory and legal considerations, will be studied. Also studied is how to build resilience into development, manufacturing, or other business processes in the case of an incident.

CYBERSEC 511: Cybersecurity in the Software Development Life Cycle

Teaches students about all steps of the software development lifecycle and the role Cybersecurity design principles play in requirements definition, design, development, testing, and maintenance. Tools and techniques to provide software security analysis and software assurance will be explored including software reverse engineering.

CYBERSEC 520: Applying Machine Learning to Advance Cybersecurity

The use of machine learning and AI is becoming more prevalent for collecting and analyzing data as its consolidation increases in value. Cyberattacks seek to steal, deny access, misrepresent (such as deepfakes), or compromise the privacy of information. Students will explore the power of machine learning and AI’s use in enhancing Cybersecurity tools across the NIST Framework and also in detecting and exploiting vulnerabilities in timeframes and ways heretofore unthinkable.

Technology Management Track

CYBERSEC 531: The Human Element in Cybersecurity

Most cybersecurity attacks and breaches are due to social engineering techniques like phishing to obtain user identities and access privileges to circumvent an enterprise’s defense mechanisms and to access sensitive data and control systems. The student will study these techniques and current and emerging practices to prevent or minimize unintentional user errors or deliberate illegal insider threats. How to create an effective security awareness program and integrate it all relevant business processes will be one of the key topics covered.

CYBERSEC 530: Identity and Access Management

This course will explore the everyday tasks and procedures that the IT security team employs to manage user and admin identities for authentication and access management. Students will learn the latest technologies and practices for multifactor authentication, single sign-on, and real-time privileges administration and what are the best practices for different use cases.

CYBERSEC 521: Cybersecurity Program Development, Operations & Analysis

Students will examine the life cycle of a cybersecurity program from development, administration, evaluation, and improvement processes. Operational and strategic roles including the chief information security officer (CISO) in a representative security team will be studied and current and evolving areas where the team is placed in the enterprise. Best practices and models for how a security team’s performance can be measured will be learned with some real-world examples.