Cybersecurity

SEMISTER 1SEMISTER 2
CODECOURSECODECOURSE
CS 100Computers and the Internetworked SocietyCS 200Information Systems Analysis and Design
CS 110Cyber Security : Concept , Theory CS 210Digital communications systems
CS 120Machine learning and data analytics CS 215Fundamentals of Computer Networks
CS 150Business Data Communications CS 315Social and Ethical issue of the internet
CS 115Database Management Systems CS 350Information Security in Public and Private sectors

  • CS 100: Computers and the Internetworked Society: This course introduces students to concepts of computer technology and the impacts of the Internet on social, organizational, personal and ethical issues. Students develop a sufficient understanding of computers and other issues to form critical opinions about them, as well as acquire and hone skills to recognize and evaluate their role in interacting with the Internet.
  • CS 110: Cyber Security : Concept , Theory : This course provides an introduction to technical aspects of cyber security. It describes threats and types of attacks against computers and networks to enable students to understand and analyze security requirements and define security policies.
  • CS 120: Machine learning and data analytics : This course will introduce you to machine learning and develop core principles that allow you to determine which algorithm to use, or design a novel approach to solving to engineering task at hand.
  • CS 150 : Business Data Communications: Data communications, networks, protocols, Internet and electronic commerce.
  • CS 115: Database Management systems : Introduction to database management systems; relational models; security concurrency, integrity and recovery issues; query interfaces.
  • CS 200: Information systems analysis and desing : The analysis and logical design of business processes and management information systems focusing on the systems development life cycle; project management and cost-benefit analysis; techniques for gathering and analyzing information systems requirements; use of automated and non-automated techniques for logical system design.
  • CS 210: Digital Communications systems : The purpose of the course is to give students a comprehensive introduction to digital communication principles. The major part of the course is devoted to studying how to translate information into a digital signal to be transmitted, and how to retrieve the information back from the received signal in the presence of noise and intersymbol interference (ISI)
  • CS 215: Fundamentals of Computer networks : Introduction to computer networks and protocols. Study of the ISO open systems interconnection model, with emphasis on the physical, data link, network, and transport layers. Discussion of IEEE 802, OSI, and Internet protocols.
  • CS 315: Social and Ethical issue of the internet :  Broad survey of the individual, organizational, cultural, social and ethical issues provoked by current and projected uses of networked computers on the Internet.
  • CS 350: Information Security in Public and Private sectors : This course exposes the student to a broad range of computer systems and information security topics. It is designed to provide a general knowledge of measures to insure confidentiality, availability, and integrity of information systems. Topics range from hardware, software and network security to INFOSEC, OPSEC and NSTISS overviews. Components include national policy, threats, countermeasures, and risk management among others.

 

 

SEMISTER 3SEMISTER 4
CODECOURSECODECOURSE
CS 400System security management CS 451Cyber Warfare
CS 411Introduction to Enterprise Computing Environments CS 460Computer Security and Systems Management Specialization
CS 415Cyber threat intelligence CS 470Business Intelligence: Web and social media analytics
CS 420Detection of Deception and IntentCS 480Fundamentals of Object-oriented programming
CS 450Production and operations managementCS 490Software design and integration

  • CS 400: System security management : The information security arena contains a broad array of multi-level models for assessing, planning, implementing and monitoring the mitigation of security risks. At the very core of this information security spectrum are the actual system and network devices which store, manage, transmit and secure information. This course is designed to provide a working knowledge of issues and techniques surrounding the proper safeguarding of operating systems and related components. Filled with Information Assurance topics, this course offers a solid base for system administrators and technical managers.
  • CS 411: Introduction to enterprise Computing Environments: Enterprise Resource Planning (ERP) systems represents integrated strategy for management of information among organizations, suppliers and customers.
  • CS 415 : Cyber threat intelligence : This course is designed to provide students with a hands-on introduction to the fundamental concepts and tools of modern cyber threat intelligence. Students will become familiar with the cyber threat intelligence lifecycle, identifying, collecting, and integrating intelligence feeds, common intelligence formats, and standard cyber threat intelligence technologies
  • CS 420 : Detection of Deception and Intent : Our focus in this course is geared towards developing software tools and techniques dealing with the automatic deception and intent. The course will be project-based involving exchange of ideas, opportunities, challenges, and research issues as well as development of software tools and techniques, in the area of detection of deception and intent.
  • CS 450: Production and operations management: Productive systems, including service type industries; activities entailed in selecting, designing, operating, controlling, and updating systems. Forecasting, aggregate planning, MRP, inventory models under uncertainty, scheduling.
  • CS 451: Cyber Warfare : The focus of this course is the usage of common tools used during penetration assessments and hardening system defenses. Students will draw from previous classes to combine skills in online defense and penetration exercises of systems in a virtual environment.
  • CS 460: Computer Security and Systems Management Specialization:  The courses will cover practical use of major server operating systems in an enterprise environment and how to design and operate them securely.
  • CS 470: Business Intelligence: Web and social media analytics: This course will provide students the opportunity to learn about Business Intelligence (BI) theory and combine it with powerful social media tools to gain insights into the emerging social media phenomena.
  • CS 480: Fundamentals of Object-oriented programming: The course is intended to provide a solid foundation in and understanding of the principles of object-oriented programming language using the Java language and/or to serve as a refresher for more advanced work.
  • CS 490: Software design and integration: This course aims to equip students with advanced object-oriented system design and software engineering principles and techniques to tackle modern challenges facing the development and maintenance of production-quality software systems in today’s fast-paced business environments. .

 

 

SEMISTER 5SEMISTER 6
CODECOURSECODECOURSE
CS 505Business Foundations for ITCS 530Introduction to Cyber attacks
CS 510Information technology Audit CS 541Cyber attacks countermeasure
CS 515Information Security risk management CS 550Web application Security
CS 520Enterprise Data ManagementCS 556IT and Environmental Sustainability
CS 525Data Mining for business intelligence CS 580Innovation in Information Systems

  • CS 505: Business Foundations for IT : This course will integrate many business foundations in support of MIS students in the MS program. In today’s environment, IT solutions have to support the competitive needs of organizations and recognize the inter-organizational nature of business processes. In addition, the IT solutions have to support the financial well-being of a firm as well as its responsibility to various stakeholders. This course uses five modules: business strategy in a global environment, process analysis and re-design in an ever expanding value chain; IT in support of these business processes, economic justification, and social implications.
  • CS 510: Information technology audit : This course covers using controls to protect information assets. Topics include internal and external IT auditing, the role of auditing role in information security, the IT audit process, system independent IT audit processes, system dependent IT audit processes, auditing outsourced IT systems and resources.
  • CS 515 : Information Security Risk management : The objective of this course is to provide students a thorough and operational knowledge of information security so that this critical area is recognized as a management issue and not an I.T. issue
  • CS 520: Enterprise data management: This course introduces the student to fundamentals of database analysis, design, and implementation. Emphasis is on practical aspects of business process analysis and the accompanying database design and development.
  • CS 525: Data Mining for business intelligence : This course will cover data mining for business intelligence. Data mining refers to extracting or “mining” knowledge from large amounts of data. It consists of several techniques that aim at discovering rich and interesting patterns that can bring value or “business intelligence” to organizations. Examples of such patterns include fraud detection, consumer behavior, and credit approval. The course will cover the most important data mining techniques — classification, clustering, association rule mining, visualization, prediction.
  • CS 530: Introduction to Cyber Attacks : This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included.
  • CS 541 : Cyber Attack countermeasure: This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks.
  • CS 550 : Web application Security: This is a technical course designed to help students learn how to exploit web applications and to be better able as developers to defend against such exploits. The course covers the process of hacking a web application, starting with initial mapping and analysis, followed by identifying common logic flaws in web apps, database and network exploits, command and SQL injections.
  • CS 556: IT and Environmental Sustainability: In this course, students will reflect on the challenges of sustainability and the potential role IS/IT may play in enabling adaptation and mitigation of these challenges.
  • CS 580 : Innovation in Information systems : In this course, students will be challenged to produce “proof of concept” systems or prototypes that are fully documented, tested, and ready to present for external evaluation