Laptop computer and lines of code

No Application Fee — Classes Start Fall 2021

Course Descriptions

Industry Preparation Core

MENG 540: Management of High-Tech Industries

Decision making in complex environments; emphasis on project analysis, complex investment analyses, strategic decision making where outcomes depend on high technology, and the role of decisions in product development. Management in high tech firms; emphasis on management of professionals, management of project-based and team-based organizational structures, and the role of the manager in expertise-driven organizations.

MENG 570: Business Fundamentals for Engineers

This comprehensive course examines core and evolving concepts in the business fundamentals of successful technology-based companies including Business Plan Development & Strategies, Marketing, Product & Process Development processes, Intellectual Property, Accounting, Finance, and Operations. Students will learn the fundamentals essential to understanding all aspects of a business and will be able to converse in some depth in each of the areas studied upon completion. Other topics will include Supply Chain Management, Stage-Gate Development Cycles, Balances Scorecards, Blue Ocean Strategy, and Disruptive Technologies.

Cybersecurity Technical Core

Course numbers to come.

CYBERSEC XXX: Introduction to Cybersecurity Perspectives

This course provides an overview of the domains, concepts, and elements and reviews current and emerging trends in Cybersecurity. Students will learn the National Institute of Standards and Technology (NIST) Cybersecurity Framework considering IT systems components, operating systems concepts, basic data analysis, and networking concepts including networking technologies and protocols. Real-world examples will be used to cover significant types of security incidents and their impact and remediation. Fundamental security design principles, information assurance fundamentals, and the significance of cryptography. Readings in different media will be used to demonstrate how quickly the threat and vulnerability landscape is changing across different industries.

CYBERSEC XXX: Cybersecurity and Interdisciplinary Law/Ethics/Policy/Privacy Considerations

As digital transformation across industry and society continues its rapid progression, individual rights and privacy, economic and business interests, and national security needs protection. Students will explore the areas of cybersecurity, considering regional and global dynamics, that affect policy development and the intersection of the use of regulations and incentives in law to protect those interests. Current readings will be used to examine the tradeoffs between security and privacy that are prevalent in the consumer, industry, and government spheres, how they might evolve in the future, and how ethics plays in setting priorities and decision making.

CYBERSEC XXX: Cybersecurity Risk Modeling and Management

Understanding and measuring the risk involved with real and potential cybersecurity threats and vulnerabilities are fundamental for an organization or enterprise to invest in and to protect its information and operational infrastructure, its constituents, its relationships, and its reputation. Students will learn and apply various modeling techniques to identify and quantify risk and how they are used to determine the value and criteria for managing that risk. Risk management concepts and standards will be explored including its essential elements, effective governance, understanding the appetite for risk, and the need for developing appropriate policies and procedures to mitigate risk. These concepts and standards will be addressed across different industries and environments.

Electives

Course numbers to come.

Technology Track

CYBERSEC XXX: Security Incident Detection, Response and Resilience

Current and emerging technologies and processes to monitor, detect and respond to security incidents in systems, networks, and clouds will be covered including automation and analytics. Best practices for developing effective incident response plans, including regulatory and legal considerations, will be studied. Also studied is how to build resilience into development, manufacturing, or other business processes in the case of an incident.

CYBERSEC XXX: Cybersecurity and Software Development

Teaches students about all steps of the software development lifecycle and the role Cybersecurity design principles play in requirements definition, design, development, testing, and maintenance. Tools and techniques to provide software security analysis and software assurance will be explored including software reverse engineering.

CYBERSEC XXX: Applying Machine Learning to Advance Cybersecurity

The use of machine learning and AI is becoming more prevalent for collecting and analyzing data as its consolidation increases in value. Cyberattacks seek to steal, deny access, misrepresent (such as deepfakes), or compromise the privacy of information. Students will explore the power of machine learning and AI’s use in enhancing Cybersecurity tools across the NIST Framework and also in detecting and exploiting vulnerabilities in timeframes and ways heretofore unthinkable.

Technology Management Track

CYBERSEC XXX: The Human Element in Cybersecurity

Most cybersecurity attacks and breaches are due to social engineering techniques like phishing to obtain user identities and access privileges to circumvent an enterprise’s defense mechanisms and to access sensitive data and control systems. The student will study these techniques and current and emerging practices to prevent or minimize unintentional user errors or deliberate illegal insider threats. How to create an effective security awareness program and integrate it all relevant business processes will be one of the key topics covered.

CYBERSEC XXX: Identity and Access Management

This course will explore the everyday tasks and procedures that the IT security team employs to manage user and admin identities for authentication and access management. Students will learn the latest technologies and practices for multifactor authentication, single sign-on, and real-time privileges administration and what are the best practices for different use cases.

CYBERSEC XXX: Cybersecurity Program Development, Operations & Analysis

Students will examine the life cycle of a cybersecurity program from development, administration, evaluation, and improvement processes. Operational and strategic roles including the chief information security officer (CISO) in a representative security team will be studied and current and evolving areas where the team is placed in the enterprise. Best practices and models for how a security team’s performance can be measured will be learned with some real-world examples.