Browse Duke Cybersecurity Courses
In order to offer courses in today's most in-demand skills and industry-relevant topics, course offerings and content are subject to change.
Please Note: Not all courses are offered every semester. Scheduled courses may be subject to change during course registration periods, including the possibility of course cancellation.
Industry Preparation Core
MENG 540: Management of High-Tech Industries
The purpose of this course is to empower students to become collaborative, ethical leaders in the globalized, 21st-century workplace. Students learn concepts and practice skills that will enable them to transition from being an engineering sole contributor to managing and leading others as a business professional. Students gain a sound understanding of management and leadership; increase awareness of their own management and leadership styles; build and practice competencies essential for team success (e.g., effective communication, collaboration, conflict resolution); and become ethical leaders above reproach. Emphasis is on leading teams in a volatile, complex and interdependent world.
MENG 570: Business Fundamentals for Engineers
This comprehensive course examines core and evolving concepts in the business fundamentals of successful technology-based companies including Business Plan Development & Strategies, Marketing, Product & Process Development processes, Intellectual Property, Accounting, Finance, and Operations. Students will learn the fundamentals essential to understanding all aspects of a business and will be able to converse in some depth in each of the areas studied upon completion. Other topics will include Supply Chain Management, Stage-Gate Development Cycles, Balances Scorecards, Blue Ocean Strategy, and Disruptive Technologies.
Cybersecurity Technical Core
CYBERSEC 500: Introduction to Cybersecurity Perspectives
This course provides an overview of the domains, concepts, and elements and reviews current and emerging trends in Cybersecurity. Students will learn the National Institute of Standards and Technology (NIST) Cybersecurity Framework considering IT systems components, operating systems concepts, basic data analysis, and networking concepts including networking technologies and protocols. Real-world examples will be used to cover significant types of security incidents and their impact and remediation. Fundamental security design principles, information assurance fundamentals, and the significance of cryptography. Readings in different media will be used to demonstrate how quickly the threat and vulnerability landscape is changing across different industries.
CYBERSEC 501: Weekly Cybersecurity Seminar
In their first fall term, Cybersecurity students are required to complete one semester of the professional development Seminar and Workshops course, Cybersec 501. This course engages industry leaders in a speaker series on applied financial technology and entrepreneurship.
Course requirements include completion of three (3) professional development workshops, including the sessions Achieving Objectives in Organizations and Time Management. Students may choose the third workshop from the offerings provided by Pratt's professional development program for master's students. 0 units.
CYBERSEC 502: Multidisciplinary Cybersecurity: Government, Public Policy, Law, and Select Industry Topics
Rapid progress in global digital transformation and connectivity requires us to think and act differently in the cyber domain. National security, economic security, and business interests are impacted by vulnerable information systems. Domestic and international cyber-crime is on the rise. Hostile governments infiltrate public and private sector systems with relative impunity causing billions of dollars in financial damage and undermining public trust and confidence. Our notion of privacy is also changing. Students will explore cybersecurity through a non-technical lens by studying U.S. government responsibilities, law, and public policy as they relate to selected topics including finance, health care, and trade. Students will also gain an understanding of privacy, cybersecurity standards manifested in public policy, and how cybercrime is prosecuted.
CYBERSEC 503: Cybersecurity Risk Management
Understanding and measuring the risk involved with real and potential cybersecurity threats and vulnerabilities are fundamental for an organization or enterprise to invest in and to protect its information and operational infrastructure, its constituents, its relationships, and its reputation. Students will learn and apply various modeling techniques to identify and quantify risk and how they are used to determine the value and criteria for managing that risk. Risk management concepts and standards will be explored including its essential elements, effective governance, understanding the appetite for risk, and the need for developing appropriate policies and procedures to mitigate risk. These concepts and standards will be addressed across different industries and environments.
CYBERSEC 510: Security Incident Detection, Response and Resilience
Current and emerging technologies and processes to monitor, detect and respond to security incidents in systems, networks, and clouds will be covered including automation and analytics. Best practices for developing effective incident response plans, including regulatory and legal considerations, will be studied. Also studied is how to build resilience into development, manufacturing, or other business processes in the case of an incident.
CYBERSEC 520: Applying Machine Learning to Advance Cybersecurity
The use of machine learning and AI is becoming more prevalent for collecting and analyzing data as its consolidation increases in value. Cyberattacks seek to steal, deny access, misrepresent (such as deepfakes), or compromise the privacy of information. Students will explore the power of machine learning and AI’s use in enhancing Cybersecurity tools across the NIST Framework and also in detecting and exploiting vulnerabilities in timeframes and ways heretofore unthinkable.
CYBERSEC 590: Advanced Topics in Cybersecurity/Web3 Engineering & Security
Web 3 technologies are advancing at ever increasing rate, with security being a critical component of that evolution. This class will serve to analyze the current state of cybersecurity, the most critical needs moving forward - both from a technical as well policy and regulatory perspective. Students will require interdisciplinary skills - technical development, legal, and business. Additional topic areas will include digital identity, securing proofing systems, core internet protocols and development tools. The course will also include a team project designed to advance one or more topic areas covered.
CYBERSEC 590: Advanced Topics in Cybersecurity/Industrial Technology and Cybersecurity Analysis
Since the early 2000s, researchers and a variety of adversaries, ranging from cyber criminals to nation-states, have turned their attention to discovering and exploiting vulnerabilities in industrial control systems (ICS), which control infrastructures ranging from electricity grids to manufacturing facilities. Every 60 seconds a business will have a cybersecurity breach. Some of the breaches are just hackers testing their skills, other breaches focus on extracting sensitive information or planting viruses to cause financial and business disruptions to companies and critical infrastructure. In today’s industrial environments, it is not a question of “if” a company will be breached, it is the question of “when”. Enacting a business continuity plan during a cyber event will help companies contain and understand the impacts of the breach or effects on operations. When companies know how to respond internally to maintain operations and have defined and clear roles of stakeholders, the whole event can be contained and limit the losses incurred. The key to having an effective plan and implementation is training and practice. Building an effective business continuity plan means testing the response and identifying best practices.
CYBERSEC 590: Advanced Topics in Cybersecurity/Cloud Cybersecurity and Operations
With the rapid adoption of the emerging technologies being delivered by major Cloud Providers and Software as a Service (SaaS) providers, security capabilities must keep pace by creating methods to provide assurance of the confidentiality, integrity, and availability of critical business processes leveraging cloud workloads. This course will provide students with practical and operational knowledge of industry-accepted cloud security practices and strategies for managing the evolving cloud risk landscape.
Electives—Technology Management Track
CYBERSEC 521: Managing Cyber Threats through Effective Leadership Strategies
Students will examine the life cycle of a cybersecurity program from development, administration, evaluation, and improvement processes. Operational and strategic roles including the chief information security officer (CISO) in a representative security team will be studied and current and evolving areas where the team is placed in the enterprise. Best practices and models for how a security team’s performance can be measured will be learned with some real-world examples.
CYBERSEC 530: Identity and Access Management
This course will explore the everyday tasks and procedures that the IT security team employs to manage user and admin identities for authentication and access management. Students will learn the latest technologies and practices for multi-factor authentication, single sign-on, and real-time privileges administration and what are the best practices for different use cases.
CYBERSEC 531: The Human Element in Cybersecurity
Most cybersecurity attacks and breaches are due to social engineering techniques like phishing to obtain user identities and access privileges to circumvent an enterprise’s defense mechanisms and to access sensitive data and control systems. The student will study these techniques and current and emerging practices to prevent or minimize unintentional user errors or deliberate illegal insider threats. How to create an effective security awareness program and integrate it all relevant business processes will be one of the key topics covered.
PUBPOL 551S: Cybersecurity and National Security Law and Policy
Course examines issues of cybersecurity and privacy. Focuses on roles that different government organizations play in protecting cybersecurity. Course also examines the issues raised by the government's acquisition and storage of information in the interests of national security. Examines the intersection between commercial privacy and cybersecurity, business planning and government surveillance in the global economy, focusing on the US and the EU, with particular attention to the tensions that have arisen in the aftermath of the Snowden revelations of NSA surveillance activity, various large scale cybersecurity breaches and questions as to the trustworthiness of technology.
CYBERSEC 590: Advanced Topics in Cybersecurity – Ethical Hacking in Cybersecurity Operations
This course will introduce the benefits that offensive cybersecurity operations (ethical hacking) can provide in protecting an organization from malicious attackers. The student will be familiarized with methodologies for conducting ethical hacking of an external, internal and cloud environment. The course will cover the Tactics, Techniques, Procedures (TTPs) that adversaries use when attacking an organization (Red Team) and provide processes that defenders can use to protect the organization (Blue Team). Hands-on ethical hacking exercises to develop the skills taught will be through the use of virtual cyber ranges.
CYBERSEC 590 Advanced Topics in Cybersecurity – Cyber Threat Intelligence Analysis and Operations
Introduction to Cybersecurity Threat Intelligence (CTI) and analysis functions in an organization. The course will familiarize the student with the role of intelligence, CTI and how disparate information/data is analyzed to identify threat adversary intentions and activity that may cause risk to the business. Students will learn the skills necessary to write cyber threat reports from their analysis of Tactics, Techniques and Procedures (TTP’s) and Indicators of Compromise (IOC’s) utilized by threat actors.