Students choosing the Minor in Cybersecurity must take:
ISYS 222 Digital Forensics (3)
ISYS 333 Systems Security (3)
ISYS 336 Internet Security (3)
ISYS 408 Management of Information Security (3)
ISYS 434 Network Defense & Security (3)
ISYS 436 Contingency Planning & Disaster Recovery (3)
Note: Specialized skills recognized in this course are designed for students majoring in Information System Technology, Computer Science, Computer Engineering and Cyber/Digital Forensics. Nonetheless, other students are welcome, but may be required to take additional courses to meet the pre-requisites.
TOTAL CREDIT HOURS: 18
Click any section below for additional information or access your course schedule.
Recovery of evidence from any media or digital device that can store or transmit data. Best practices and current techniques for capturing and analyzing digital evidence to support a criminal or civil complaint in court.
Securing the systems that run our computers is the key to ensuring that our essential information remains safe and available. This course provides the essentials for understanding the threats to systems security, the methods to counter these threats, and some practical work in systems security. A computer system with appropriate software is required. Prerequisite: ISYS 331.
Access to the Internet for multiple purposes is one of the major components of most business operations. Many businesses also have intranets, which provide internal communications. Security of these assets is critical for a successful business. Course provides an introduction to the concepts and procedures of assessing and providing security for internet/intranets. Prerequisite: ISYS 331.
Information security must be a significant part of any business plan today, and managers in this field must remain aware of the principles and methodology of managing information security. Provides an in-depth view of the management of information security for government, corporations, and other institutions. Prerequisite: ISYS 331.
Global and local networks provide capabilities that have become essential in the success of the world economy for businesses and individuals. Defending these systems against attacks through the use of worms, viruses, and other criminal acts is imperative. Provides a solid foundation in the fundamentals of network security and some hands-on experience in the installation and utilization of firewalls and intrusion detection systems. Prerequisite: ISYS 331.
The threats to information security are numerous, and even the best security systems can be penetrated in one manner or another. In addition, physical security is a consideration for securing the systems necessary for business operations to continue. Natural disasters, terrorist activities, and internal subversion can all cause destruction or denial of service. Provides a framework for understanding the threats and how to counter them. Prerequisite: ISYS 331.