400

CYB400 Ethical Hacking

This course will provide students with the essential skills and experience required to identify and document security vulnerabilities. The student will learn penetration testing using ethical principles to secure a computer data environment. A variety of security technologies and concepts are used to provide in-depth understanding of secure communications channels, devices and media. Upon successful course completion, students will be able to identify and mitigate weaknesses in a data infrastructure.

3

Prerequisites

CYB250

Cross Listed Courses

Formerly CIS403

CYB400L Ethical Hacking Lab

This course will provide students with practice and skill-building exercises required to identify and document security vulnerabilities. The student will learn penetration testing in a lab environment using ethical principles to secure a computer data environment. Upon completion students will be able to provide an in-depth understanding of secure communications channels, devices and media.
1

Prerequisites

CYB250

Corequisites

CYB400

Cross Listed Courses

Formerly CIS403L

CYB410 Ethical Hacking II

This course will provide students with the essential skills and experience required to identify and document security vulnerabilities. This is the second course in the sequence. The student will learn penetration testing using ethical principles to secure a computer data environment. A variety of security technologies and concepts are used to provide in-depth understanding of secure communications channels, devices and media. Upon successful course completion, students will be able to identify and mitigate weaknesses in a data infrastructure.

3

Prerequisites

CYB400

Cross Listed Courses

Formerly CIS411

CYB420 Network Virtualization Fundamentals

This course will provide students with a background in virtualization technology needed to advance in today's technology workplace. Students will learn about the latest virtualization technology. Upon successful course completion, students will be able to explain virtualization, configure workstation virtualization products, and design, manage, and configure, and monitor virtual machines in a virtualized IT environment.
3

Prerequisites

CYB260

Corequisites

CYB420L

Cross Listed Courses

Formerly CIS253

CYB420L Network Virtualization Fundamentals Lab

This course will provide students with application-oriented experiences in virtualization technology. Students will learn skills required to use virtualization software in network server environments and build virtual networks, implement high-availability clusters, and enhance performance and security to centralize the management of multiple virtual servers. Upon successful course completion, students will be able to choose a virtualization product, configure operating systems in a virtualization environment, which includes subnetting, DHCP, and DNS schemes that support virtual networks. Students will also be able to develop and design a SANS configuration for supporting a virtual network design.
1

Prerequisites

CYB260

Corequisites

CYB420

Cross Listed Courses

Formerly CIS253L

CYB430 Advanced Defense and Countermeasures

This course will provide students with a foundation in network defense and countermeasures with a primary emphasis on intrusion detection and firewall defense mechanisms that a network administrator would put in place to protect their business from further attacks. Students will gain foundational knowledge in network defense and countermeasures. Students will also be implementing firewall defense configuration and intrusion detection and access control lists. Upon successful completion, students will be able to apply essential security practices and methods along with deploying security tools using a security policy as a guideline.

3

Prerequisites

CYB260

Cross Listed Courses

Formerly CIS425

CYB430L Advanced Defense and Countermeasures Lab

This course will provide students with a hands-on approach to network defense and countermeasures. Students will learn the primary knowledge and skills required for intrusion detection and firewall defense mechanisms. Upon successful course completion, students will be able to develop an enterprise security policy and then implement a policy by configuring firewalls, stateful and stateless packet filtering, intrusion detection systems, and proxy servers.

1

Prerequisites

CYB260

Corequisites

CYB430

Cross Listed Courses

Formerly CIS425L

CYB440 AI/Machine Learning

This course will provide students with an introduction to artificial intelligence (AI) and machine learning and their use in business today. Students will receive an overview of AI concepts and workflows, machine learning and deep learning, and performance metrics.  Upon successful completion of this course, students will be able to install, train, and deploy an AI/machine learning program for use in business operations.
3

Prerequisites

CYB380

Cross Listed Courses

Formerly CIS335

CYB450 AWS Academy Cloud Foundations

This course provides students with an overall understanding of AWS Cloud Computing concepts, independent of specific technical roles. Students will learn about AWS Cloud Computing infrastructure and application services, cost and billing practices, and the pillars of the AWS Well-Architected Framework.

3

Prerequisites

CYB260

Cross Listed Courses

Formerly CIS242

CYB460 Kubernetes in Cloud Security

This course will provide an advanced look at securing the Kubernetes cluster in the cloud and ensuring pod security standards using encryption, authentication, and Ingress controllers. Students will learn the vulnerabilities of cloud computing and the steps necessary to ensure safe and secure computing in a remote environment. Upon successful course completion, students will understand the steps required to secure a cloud environment using the 4Cs: Cloud, Cluster, Container, and Code. 

3

Prerequisites

CYB450

CYB490 Information and Cybersecurity Externship

The purpose of this course is to provide the graduating bachelor's Degree student with real-world experience in a work area appropriate for their particular CIS concentration. The externship is approved and managed by the faculty advisor for the concentration area and is graded by the faculty member assigned course management. Students are expected to complete 45 hours of on-the-job work assignments for each one semester credit hour of course credit, as well as provide all paperwork related to the externship, including weekly observations and work attendance reports, to their course faculty manager.

3

Prerequisites

Approval of Academic Advisor

Cross Listed Courses

Formerly CIS490

CYB491 Information and Cybersecurity Externship I

This course will provide students with real-world experience in a work environment appropriate for their concentration. Students will apply the skills they have acquired in their program to on-the-job work assignments. Upon successful course completion, students will have documented their attendance, activities, and achievements for the externship. 

1

Prerequisites

Approval of Academic Advisor

Cross Listed Courses

Formerly CIS491

CYB492 Information and Cybersecurity Externship II

This course will provide students with real-world experience in a work environment appropriate for their concentration. Students will apply the skills they have acquired in their program to on-the-job work assignments. Upon successful course completion, students will have documented their attendance, activities, and achievements for the externship. 

1

Prerequisites

Approval of Academic Advisor

Cross Listed Courses

Formerly CIS492

CYB493 Information and Cybersecurity Externship III

This course will provide students with real-world experience in a work environment appropriate for their concentration. Students will apply the skills they have acquired in their program to on-the-job work assignments. Upon successful course completion, students will have documented their attendance, activities, and achievements for the externship. 
1

Prerequisites

Approval of Academic Advisor

Cross Listed Courses

Formerly CIS493

CYB495 Information and Cybersecurity Capstone

This course is designed to enable students to assimilate the broad educational themes embedded in the major and general education program to support the outcomes of the B.S. Degree in Information and Cybersecurity Operations. As such, the course is constructed to require students to interact as teams to develop and present group reports and presentations that synthesize and support the expected student outcomes in the general education and major core curriculum. Students are required to design, plan, and defend an appropriate project approved by the professor that will enable them to demonstrate individual and group mastery of skills and competencies learned across the entire curriculum. The course helps the students to develop knowledge and skills that may facilitate their career growth as they progress through the ranks toward IT leadership positions.
3

Prerequisites

Approval of Academic Advisor

Cross Listed Courses

Formerly CIS495