This course provides an in-depth exploration of emerging trends, advanced
concepts, and cutting-edge research in the field of cybersecurity. The course
will delve into various topics that go beyond the fundamental principles of
cybersecurity, enabling students to develop a comprehensive understanding of
advanced techniques, strategies, and management practices. Through
readings, discussions, and assignments, students will engage with the latest
research and industry developments, allowing them to critically analyze and
apply advanced cybersecurity concepts.
This Doctorate level course in the Cybersecurity program provides an in-depth
examination of foundational theories, principles, and models that underpin
cybersecurity. The course focuses on key areas such as cryptography, network
security, and secure systems. Students will gain a comprehensive
understanding of the theoretical foundations of cybersecurity, enabling them
to analyze and apply advanced concepts in real-world scenarios.
This course provides a comprehensive study of research methods, data
collection, analysis techniques, and ethical considerations in the context of
cybersecurity research. Students will gain knowledge and skills necessary to
conduct effective and rigorous research in the field of cybersecurity. Through
readings, discussions, and assignments, students will explore various research
methodologies, data collection techniques, and analytical tools used in
cybersecurity research. Ethical considerations and responsible conduct of
research will also be emphasized throughout the course.
This Doctorate-level course provides an in-depth exploration of advanced
cryptographic algorithms, secure key management, secure communication
protocols, and advanced data protection mechanisms. Students will develop a
comprehensive understanding of the theoretical foundations and practical
applications of cryptography and data protection, equipping them with the
necessary knowledge and skills to analyze, design, and implement secure
systems.
This course provides an advanced study of cyber threat intelligence gathering
techniques, threat analysis, threat hunting, and the use of data analytics in
cybersecurity. Students will develop a deep understanding of the principles and
practices of cyber threat intelligence, as well as the application of analytics to
detect and mitigate cyber threats. The course will also cover the use of big data
analytics in cybersecurity and explore various tools and techniques used in the
field.
This course explores advanced techniques for secure software development,
software security testing, secure coding practices, and the design of secure
software architectures. The course aims to equip students with the knowledge
and skills necessary to develop and maintain secure software systems in a
variety of contexts. Through a combination of lectures, discussions, readings,
and assignments, students will gain a deep understanding of the principles and
practices of secure software engineering.
This course provides an advanced study of digital forensics techniques, incident
response planning and management, malware analysis, and advanced
techniques for forensic data recovery. The course emphasizes practical skills
and knowledge required to investigate and respond to cyber incidents
effectively. Students will develop expertise in analyzing digital evidence,
managing incident response operations, and mitigating cyber threats. The
course will incorporate hands-on exercises, case studies, and real-world
scenarios to enhance practical skills.
This course is an examination of privacy laws, regulations, and frameworks, as
well as advanced techniques for protecting sensitive data and ensuring privacy
in various contexts. Students will gain a deep understanding of the challenges
and strategies involved in safeguarding privacy and data protection. The course
will cover legal and ethical aspects of privacy, risk management, privacy-
enhancing technologies, and best practices in data privacy.
This course provides an advanced exploration of cybersecurity governance
models, policy development, legal and regulatory compliance, and strategic
planning for cybersecurity in organizations. It offers a comprehensive
understanding of the principles, practices, and challenges associated with
cybersecurity governance and policy, with a particular focus on the context of
local government. Through readings, discussions, case studies, and practical
assignments, students will develop the skills necessary to analyze, design, and
implement effective cybersecurity governance frameworks and policies.
This course is the culminating experience in the Doctorate in Cybersecurity
program. It provides students with the opportunity to independently conduct
in-depth research on a specific cybersecurity topic of their choice. Throughout
the course, students will engage in extensive literature reviews, data collection
and analysis, and the preparation of a formal doctoral dissertation. The course
concludes with a rigorous defense of the research findings before a faculty
committee. Students will demonstrate their advanced knowledge, critical
thinking, and research skills developed throughout the program.