In our fast-paced, high-tech, interconnected world, can you imagine a timelier, more dynamic field than Cybersecurity?
In this unique, ranging program, you will gain multi-faceted skills and industry-specific knowledge about the critical work of ensuring information security. Demand for such experts can be found across almost every industry.
Equip yourself with the essential data analytics and risk-mitigation proficiencies to protect computer systems, networks, and sensitive information from cyber threats. Learn about the latest cybersecurity technologies, best practices, and strategies for threat detection with machine learning and artificial intelligence technologies, risk assessment and policy analysis, and incident response.
Put in the work, then put yourself on the frontlines helping businesses and agencies to better protect their data and operations.
In this Section:
Career and Other Opportunities
- Cybersecurity Analyst
- Security Engineer /Architect
- Penetration Tester
- Security Consultant
- Ethical Hacker
Cybersecurity, B.S., Total Credits: 120
Principles and practices associated with the emerging discipline of homeland security. Policies, directives, national plans, and legislation that shape and define the ongoing evolution of homeland security. Key issues including civil liberties and diversity. Relationship to public safety, private security, and national security.
An introduction to cybercriminal activities from the perspective of computer forensics, sociology, criminal justice studies, in non-technological language while examining all basics on investigation and prosecution. Emphasis on both traditional and new forms of computer crime such as unauthorized access, online fraud, e-fencing, fraudulent instruments, identity theft, and many others.
Cryptography & Network Security
Introduction to fundamental concepts and techniques underlying the science and art of cryptography and network security including: symmetric encyption, message digests, public key cryptography, authentication, security protocols on both application and network layers of the Internet, and network operational security techniques.