This course provides an overview of the field of cybersecurity, including its
principles, concepts, and current challenges. Through a combination of
lectures, discussions, and practical assignments, students will develop a
foundational understanding of cybersecurity and its importance in modern
society.
This course provides a comprehensive study of network vulnerabilities, secure
network design principles, encryption protocols, firewalls, and intrusion
detection systems. Students will gain theoretical knowledge and practical skills
necessary to analyze, assess, and secure computer networks. Through a
combination of readings, discussions, and assignments, students will develop a
deep understanding of network security concepts and techniques.
This course is an in-depth examination of cyber threats, intelligence gathering
techniques, analysis of threat data, and the development of strategies to
mitigate risks. Students will explore the field of cyber threat intelligence, its
importance in the modern digital landscape, and the role it plays in enhancing
organizational security. Through a combination of lectures, readings, and
practical assignments, students will develop a comprehensive understanding of
cyber threats and acquire the skills necessary to effectively gather, analyze, and
utilize threat intelligence.
This course focuses on providing students with a comprehensive understanding
of secure coding practices, software vulnerabilities, secure development
lifecycle, and techniques for testing and auditing software security. Students
will learn how to develop software with security in mind, identify and mitigate
common vulnerabilities, and apply industry best practices to ensure the
security of software systems.
This course provides an in-depth study of cryptographic algorithms, encryption
techniques, public key infrastructure (PKI), and data protection mechanisms.
Students will gain a comprehensive understanding of the principles and
applications of cryptography, as well as the practical skills necessary to secure
data in various contexts. Through readings, assignments, and discussions,
students will explore the theoretical foundations of cryptography and its real-
world implementations.
This course provides a comprehensive exploration of cybersecurity policies, risk
assessment methodologies, compliance frameworks, and strategies for
managing cybersecurity risks in organizations. Students will gain an
understanding of the fundamental principles and best practices in
cybersecurity governance and risk management, and develop the necessary
skills to effectively identify, assess, and mitigate cybersecurity risks.
This course provides an in-depth exploration of ethical hacking techniques,
penetration testing methodologies, vulnerability assessment, and the ethical
considerations essential in the field of cybersecurity. Students will develop
practical skills in identifying and exploiting vulnerabilities, securing network
systems, and implementing effective countermeasures. Emphasis will be placed
on ethical behavior, legal frameworks, and industry best practices.
This course provides an in-depth understanding of incident response planning,
incident handling procedures, recovery strategies, and the coordination of
response efforts in the event of a cybersecurity incident. Students will develop
the necessary skills to effectively respond to and recover from various
cybersecurity incidents.
This course provides an in-depth study of the legal and ethical issues
surrounding cybersecurity. It examines the principles and frameworks of
cybersecurity law, privacy laws and regulations, international cybersecurity
agreements, and the ethical responsibilities of cybersecurity professionals.
Through a combination of lectures, readings, discussions, and practical
assignments, students will develop a comprehensive understanding of the legal
and ethical considerations in the cybersecurity field.
The Cybersecurity Capstone Project is a culminating course where students
apply the knowledge and skills acquired throughout their Master’s program to
solve real-world cybersecurity challenges. This project-based course provides
students with the opportunity to work individually or in teams to design and
implement innovative solutions to complex cybersecurity problems. Students
will engage in research, analysis, and practical exercises, culminating in the
creation of a comprehensive cybersecurity project.