To view the Master of Security Science Course description, click on the class title.
This course will lay a broad foundation of understanding the processes of business principles globally and for a varied population of students who work in businesses of all kinds including the IT and IA fields. It covers the latest changes in Information Technology for Business, including computer-aided manufacturing (CAM), applications software, and recent ethical issues arising from IT. Real-life business examples are added throughout the course that reinforces the business principles.
Managing Secure Network Systems
This course focuses on evaluating network and Internet security issues, designing, implementing successful security policies and firewall strategies, exposing system and network vulnerabilities and defending against them. Topics include network protocols, network attacks, intrusion detection systems, packet filtering and proxy servers, Bastion host and honey pots, hardening routers, hardening security, E-Mail security, virtual private networks and creating fault tolerance. CNSS 4011
Ethical Hacking & Countermeasures
This course focuses on how perimeter defenses work, how intruders escalate privileges, and methods of securing systems. Additional topics include intrusion detection, policy creation, social engineering, DoS attacks, buffer overflows, and virus creation. CNSS 4013A.
Investigating Network Intrusions and Computer Forensics
This course focuses on cyber-attack prevention, planning, detection, and incident response with the goals of counteracting cyber crime, cyber terrorism, and cyber predators, and making them accountable. Additional topics include fundamentals of computer forensics, forensic duplication and analysis, network surveillance, intrusion detection and response, incident response, anonymity, computer security policies and guidelines, and case studies. CNSS 4012.
Security Analysis and Vulnerability Assessment
This course focuses on testing methods and techniques to effectively identify and mitigate risks to the security of a company’s infrastructure. Topics include penetration testing methodologies, test planning and scheduling, information gathering, password cracking penetration testing and security analysis, social engineering penetration testing and security analysis, internal and external penetration testing and security analysis, router penetration testing and security analysis, and reporting and documentation. Prerequisite 501. CNSS 4014.
Foundations of Organizational Behavior for the IT Practitioner
This foundation course deals with organizational behavior and allows the technology practitioner to experience the basic facets of organizational theory and define the skills required to understand and apply the theory to a real organizational setting. Elements of the course are organizational structure, effective communication, team building, ethics and project management as seen through the organizational lens.
Introduction to Research and Writing for the IT Practitioner
This foundational core course introduces students to basic English writing skills and research methods also including: APA style writing, citing sources, determining when a website is credible, effective communication, outlines, and collaboration. Students will write/present portions of the above in the course in various formats.
Conducting Penetration and Security Tests
This course focuses on mastery of the international standard for penetration testing. Topics include customers and legal agreements, penetration testing planning and scheduling, information gathering, external and internal network penetration testing, router penetration testing, firewalls penetration testing, intrusion detection system penetration testing, wireless networks penetration testing; password cracking penetration testing, social engineering penetration testing, PDA and cell phone penetration testing, and penetration testing report and documentation writing. Prerequisite ECCU 503. CNSS 4015.
Linux Networking and Security
This course focuses on configuring a secure Linux network using command line and graphical utilities. Emphasis is placed on file sharing technologies such as the Network File System, NetWare’s NCP file sharing, and File Transfer Protocol. Additional topics include making data secure, user security, file security, and network intrusion detection. Students will be required to take on the role of problem solvers and apply the concepts presented to situations that might occur in a work environment. Prerequisite ECCU 500.
Securing Wireless Networks
This course focuses on the various methods of securing wireless networks including authentication, authorization, and encryption. Topics include radio frequency communications, infrared, Bluetooth, low-speed wireless local area networks, high-speed WLANs and WLAN Security, digital cellular telephone, fixed wireless, and wireless communications in business.
This course provides the essential and fundamental skills for secure programming. The most prevalent reason behind buggy code and vulnerabilities being exploited by hackers and malicious code is the lack of adoption of secure coding practices. This program will ensure that students are exposed to the inherent security drawbacks in various programming languages or architectures. They will be exposed to exercise secure programming practices to overcome these inherent drawbacks in order to preempt bugs from the code.
Global Business Leadership
This course is designed to provide fundamental skills needed to understand global leadership concepts such as developing technological savvy, appreciating diversity, building partnerships, creating shared vision, maintaining a competitive advantage, integrity and leading for change. This is a study of current and historical leadership theories with emphasis on viewing the leadership function in the context of global organizational behavior and organizational designs. Prerequisite ECCU 505.
Beyond Business Continuity:
Managing Organizational Change
Whether an organization has experienced a disaster, downsizing, a shift in culture or a change in leadership; it will experience organizational change. This change demands remembering the past, finding ways to recover from it, engaging the future and energizing change. Leaders in change must have the skills to identify, structure, forecast, envision, design, plan, implement, account for and lead a team through change that has been strategically planned to advance the organization. Such a leader is a change agent and must understand the process, expectations, and nuances of change. Prerequisite: ECCU 505
This course focuses on disaster recovery principles including assessment of risks to an enterprise, development of disaster recovery policies and procedures, the roles and relationships of various members of an organization, preparation of a disaster recovery plan, testing and rehearsal of the plan, implementation of the plan, and recovering from a disaster. Additional emphasis is placed on identifying vulnerabilities and taking appropriate countermeasures to prevent information failure risks. CNSS 4016.
This course encompasses an extensive research project about cross-cultural differences in leadership conducted by a group of researchers in 62 countries. It lays a foundation of understanding the process of leadership. The study describes the roles, functions and impact of global leadership concepts. The speed at which leadership must work is provided by many team exercises. Research and views into how most cultures respond to this area of management are provided. Prerequisite: ECCU 505
This class is designed to provide students with the knowledge of how to manage IT security projects in order to enhance the success rate for both organizations and IT managers. It acts as an operational framework for users who design their own IT security project plan. The goal of PMITS is to help the students implement their IT project management skills by providing a road-map for implementing IT security in their organizations. It standardizes the knowledge base for business professionals by incorporating the best practices and legal standards related to corporate IT security.
The Hacker Mind: Profiling the IT Criminal
Cyber space has increased human communication, connectivity, creativity, capacity and crime by leaps and bounds in the last decade. For all of the positive aspects it offers, it offers as many negative aspects. Those negative aspects are explored and developed by everyone from the high school challenge hacker to the international terrorist. Businesses, governmental agencies, militaries, and organizations of every kind are threatened by the IT criminal. This course will survey the spectrum of psychological attributes which may make up the profile of the IT criminal. Prerequisite: ECCU 505
This course focuses on the legal issues affected by on-line criminal conduct and electronic evidence and the legal ramifications of neglecting trademarks, copyrights, patents, and digital rights. Topics include: laws, regulations, and international standards; privacy laws governing law enforcement investigations in cyberspace; implications of cyber crimes upon the traditional notions of sovereignty; and current events that affect cyber laws. Prerequisite ECCU 505.
Special topics courses will be offered from time to time to pilot a course or to respond to a particular trend in information assurance. These courses will be considered as electives. Prerequisites ECCU 500 and 505.
The Capstone is the summative experience designed to allow students to demonstrate all program objectives and draw on the knowledge and skills learned throughout the entire program. Students can enroll in the Capstone after of successful completion of all core degree requirements; must be within 6 credit hours of graduation and the attainment of a 3.0 cumulative grade point average.