Specialization: Enterprise Security Architect

This concentration focuses on planning, analyzing, designing, configuring, testing, implementing, maintaining, and supporting an organization’s computer and network security infrastructure. It also covers hardening enterprise architecture from the most advanced attacks, secure programming practices to overcome these inherent drawbacks to preempt bugs from the code, and designing and implementing cloud security.

Course Outline:

Certifications

masters degree in cybersecurity

Job Roles

  • IT analyst
  • Systems analyst
  • Computer Network Architect
  • Enterprise Architect
  • Security Architect
  • Systems Requirements Planner
  • System Testing and Evaluation Specialist
  • Information Systems Security Developer
  • Systems Developer
  • Technical Support Specialist
  • Network Operations Specialist
  • System Administrator
  • Systems Security Analyst
  • Chief Information Security Officer
  • Information Security Officer
  • Chief Security Officer
  • Information Assurance Security Officer

Pricing

information security

Course Description

ECCU 505 Introduction to Research and Writing for the IT Practitioner

Three Credit Hours


This foundational core course introduces students to basic English writing skills and research methods also including: APA style writing, citing sources, determining when a website is credible, effective communication, outlines, and collaboration. Students will write/present portions of the above in the course in various formats.

MGMT 502 Business Essentials

Three Credit Hours

This course will lay a broad foundation of understanding the processes of business principles globally and for a varied population of students who work in businesses of all kinds including the IT and IA fields. It covers the latest changes in Information Technology for Business, including computer-aided manufacturing (CAM), applications software, and recent ethical issues arising from IT. Real-life business examples are added throughout the course that reinforces the business principles.

Book Requirements:

    • Ebert, R., Griffin, R. Business Essentials. 9th ed. Pearson. 2013. ISBN: 13: 978-0-13-266402-8 (pbk)

ECCU 504 Foundations of Organizational Behavior for the IT Practitioner

Three Credit Hours

This foundation course deals with organizational behavior and allows the technology practitioner to experience the basic facets of organizational theory and define the skills required to understand and apply the theory to a real organizational setting. Elements of the course are organizational structure, effec tive communication, team building, ethics and project management as seen through the organizational lens.

Book Requirements:

  • Glen, Paul. Leading Geeks: How to Manage and Lead People Who Deliver Technology. Jossey Bass. c2003. ISBN: 0-7879-6148-5.
  • Robbins, Stephen P. & DeCenzo, David A. Supervision Today, 5th ed. Prentice Hall. c2007. ISBN: 0-13-172609-9



Learn More

ECCU 516 The Hacker Mind: Profiling the IT Criminal

Three Credit Hours

Cyber space has increased human communication, connectivity, creativity, capacity and crime by leaps and bounds in the last decade. For all of the positive aspects it offers, it offers as many negative aspects. Those negative aspects are explored and developed by everyone from the high school challenge hacker to the international terrorist. Businesses, governmental agencies, militaries, and organizations of every kind are threatened by the IT criminal. This course will survey the spectrum of psychological attributes which may make up the profile of the IT criminal.

Book Requirements:

  • Chiesa, Raoul & Ducci, Stefania. Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking. CRC Press. c2009. ISBN: 13: 978-1-4200-8693-5 (pbk)
  • Lacey, David. Managing the Human Factor in Information Security: How to Win Over Staff and Influence Business Managers. John Wiley & Sons. c2009. ISBN: 978-0-470-72199-5 (pbk)




Learn More

ECCU 514 Quantum Leadership

Three Credit Hours

This course encompasses an extensive research project about cross-cultural differences in leadership conducted by a group of researchers in 62 countries. It lays a foundation of understanding the process of leadership. The study describes the roles, functions and impact of global leadership concepts. The speed at which leadership must work is provided by many team exercises. Research and views into how most cultures respond to this area of management are provided.

Book Requirements:

  • Nahavandi, Afsaneh. The Art and Science of Leadership, 5th ed. Pearson/Prentice Hall. c2009. ISBN: 13: 978-0-13-604408-6

ECCU 500 Managing Secure Network Systems

Three Credit Hours

This course focuses on evaluating network and Internet security issues, designing, implementing successful security policies and firewall strategies, exposing system and network vulnerabilities and defending against them. Topics include network protocols, network attacks, intrusion detection systems, packet filtering and proxy servers, Bastion host and honey pots, hardening routers, hardening security, email security, virtual private networks and creating fault tolerance.


Learn More

ECCU 507 Linux Networking and Security

Three Credit Hours

This course focuses on configuring a secure Linux network using command line and graphical utilities. Emphasis is placed on file sharing technologies such as the Network File System, NetWare’s NCP file sharing, and File Transfer Protocol. Additional topics include making data secure, user security, file security, and network intrusion detection. Students will be required to take on the role of problem solvers and apply the concepts presented to situations that might occur in a work environment.


Learn More

ECCU 501 Ethical Hacking & Countermeasures

Three Credit Hours

This course focuses on how perimeter defenses work, how intruders escalate privileges, and methods of securing systems. Additional topics include intrusion detection, policy creation, social engineering, DoS attacks, buffer overflows, and virus creation.


Learn More

ECCU 520: Advanced Network Defense

Three Credit Hours


This course focuses on the fundamental areas of fortifying your defenses by discovering methods of developing a secure baseline and how to harden your enterprise architecture from the most advanced attacks. It provides segmentation and isolation to reduce the effectiveness of the advanced persistent threats.

ECCU 524: Designing and Implementing Cloud Security

Three Credit Hours


This course focuses provides comprehensive knowledge of cloud services, their characteristics, benefits, applications, and service models. It covers planning, designing, and implementing cloud security controls. It delves into various cloud standards, countermeasures, and best practices to secure information in the cloud. The program also emphasizes the business aspects of cloud security such as cloud uptime, uptime guarantee, availability, fault tolerance, failover policy, and how cloud security strengthens the business case for cloud adoption.

ECCU 510 Secure Programming

Three Credit Hours

This course provides the essential and fundamental skills for secure programming. The most prevalent reason behind buggy code and vulnerabilities being exploited by hackers and malicious code is the lack of adoption of secure coding practices. This program will ensure that students are exposed to the inherent security drawbacks in various programming languages or architectures. They will be exposed to exercise secure programming practices to overcome these inherent drawbacks to preempt bugs from the code.


Learn More

REQUEST INFO