Prerequisites: COSC 110
Introduces the fundamental theory and concepts for cybersecurity including security principles, ethical and professional issues in cybersecurity, attack strategies, risk management, access control, integrity management, cryptography basics, security protocols, and strategies for defending computers and networks. Includes practical hands-on learning activities to enhance understanding and to apply the theory and concepts.
Prerequisites: COSC 110, and MATH 121 or 125, and MATH 214, 216, or 217, or equivalents
Covers data communications, computer network architectures, functions of various network layers, communication protocols, internetworking, emerging high-speed networks.
Prerequisite: COSC 216 and either COSC 345 or COSC/IFMG 352
Explores mechanisms for protecting networks against attacks. Emphasizes network security applications that are used on the Internet and for corporate networks. Investigates various networking security standards and studies methods for enforcing and enhancing
Prerequisites: COSC 310 and MATH 309
Fundamental concepts of encoding and/or encrypting information, cryptographic protocols and techniques, various cryptographic algorithms, and security of information are covered in depth.
Prerequisites: COSC 110 or equivalent programming course, junior standing or instructor permission
Takes a detailed, hands-on approach to the use of computer technology in investigating computer crime. From network security breaches to child pornography, the common bridge is the demonstration that particular electronic media contains incriminating evidence. Using modern forensics tools and techniques, students learn how to conduct a structured investigation process to determine exactly what happened and who was responsible, and to perform this investigation in such a way that the results are useful in criminal proceedings. Real world case studies will be used to provide a better understanding of security issues. Unique forensics issues associated with various operating systems including Linux/Windows operating systems and associated applications are covered.
Prerequisite: COSC 300, 310 or equivalents
Introduces the principles of operating system design and implementation. Includes interrupt services, process states and transitions, threads, scheduling algorithms, synchronization tools, deadlocks, virtualization, memory management of (main and virtual), storage devices management, file systems, and operating systems security.
Prerequisites: COSC 216 or instructor permission
Explores the various issues pertinent to maintaining acceptable levels of information security within organizations. Addresses issues involved in administering and managing information security systems. Intended to raise awareness of information security issues across organizations.
Prerequisites: COSC 105, COSC 220 (except Languages and Systems Track), COSC 300, COSC 310, COSC 319, COSC 341, COSC 380, other courses depending on type of internship position desired, completion of application, and selection by a faculty committee. COSC 319, COSC 341, and COSC 380 Prerequisite may be waived when registering for first 6cr.
Positions with participating companies provide students with paid experience in computer science under supervision of the companies and faculty. Requirements include three on-site consultations (one during first 6cr and two in final 6cr), two university consultations (one during first 6cr and one in final 6cr), completion of progress reports, oral presentation (final 6cr only), and a final cumulative paper (final 6cr only). An internship is offered only to students who have completed their sophomore year. No more than 3cr of the first 6cr of COSC 493 and 3cr of the last 6cr of COSC 493 may be applied toward the credit-hour requirement for a major in computer science. Internship can be completed as one 12cr unit over a minimum of 23 weeks or in 6cr units each over a minimum of 12 weeks. (Writing-intensive course. As such, an internship requires completion of designated writing-intensive components.) * Internship is cybersecurity course
when placed in a cybersecurity role.
Prerequisites: CRIM 101 or CRIM 102
Addresses the cybersecurity threat from a more comprehensive standpoint. Challenges students to recognize and understand security concerns from multiple perspectives, ranging from the insider threat to threats involving the actual physical components. Exposure to a design methodology, associated system components modules, and basic security principles is featured. Students also are exposed to the private and public responses to computer security problems, including the insider threat, domestic and foreign terrorism, and a number of unique computer crimes and solutions to deal with these crimes. The importance of a sound security policy in the overall management of any organization is addressed.
Prerequisites: CRIM 101 or CRIM 102
Examines the scope of cybercrime and its impact on today’s system of criminal justice. Includes cybercrime and the Bill of Rights, computer-based economic crime, electronic commerce, ethical challenges, and the Computer Fraud and Abuse Act. Includes an analysis of the legal considerations facing law enforcement and cybersecurity professionals who deal with the problem of discovering, investigating, and prosecuting cybercrime.
For further information on Computer Science Cyber Security-related courses and the entire Computer Science curriculum, please check the Mathematical and Computer Sciences Department website.
For further information on Criminology Cyber Security-related courses and the entire Criminology curriculum, please check the Criminology and Criminal Justice Department website.
For further information on Political Science Cyber Security-related courses and the entire Political Science curriculum, please check the Political Science Department website.