A study of advanced technical challenges in cyber security as the field continues to evolve. Current developments in the industry and research advances will dictate specific areas of emphasis in the course per semester.
For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
This course is part of the Cyber Security graduate degree program. This course provides a study of advanced technical challenges in cyber security as the field continues to evolve, ranging far beyond secure coding to outlining rigorous processes and practices for managing systems and software operations. This course presents current developments in the industry and research advances in Cybersecurity and Cybercrime.
Measurable Learning Outcomes
Upon successful completion of this course, the student will be able to:
- Analyze the assumptions of deterrence theory and its utility.
- Identify hype and exaggeration of hacking incidents found in the media.
- Explain the active role of Nation State actions in recent cyber-attacks.
- Describe the tactics used in cyberspace to promote terrorist ideologies between and within terrorist groups.
Textbook readings and lecture presentations
Course Requirements Checklist
After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.
Discussions are collaborative learning experiences. Therefore, the student is required to create a thread in response to the provided prompt for each discussion. Each thread must be at least 300 words and demonstrate course-related knowledge. In addition to the thread, the student is required to reply to 2 other classmates’ threads. Each reply must be at least 250 words.
Exam 1 covers chapters 1-6 and Exam 2 covers chapters 7-12. Each exam will be open-book/open-notes, contain 30 multiple-choice, and has a time limit of 2 hours.
The student will complete the assigned lab report after completing the assigned labs.
Each quiz will cover the Learn material for the assigned Module: Week. Each quiz will be open-book/open-notes, contain 20 multiple-choice and true/false questions, and has a time limit of 2 hours.
Research Paper Outline and Bibliography
The student will complete a basic outline for the given topic in current APA format. Three research questions will be submitted as well as a preliminary bibliography of at least 3 sources.
The student will write a 2,750–3,250-word research-oriented paper in current APA format that focuses on security engineering. The paper must include at least 3 references in addition to the course textbook and the Bible.
The Final Exam will cover all the Learn material for the course. The Final Exam will be open-book/open-notes, contain 22 multiple-choice and short answer questions, and have a time limit of 2 hours.