Courses
Information Security Management-2025/2026
Level 1 | ||||
INFO-6001 | Information Security | 4 | ||
This course will concentrate on the essential concepts of information security CIA, confidentiality, integrity, and availability. The common vulnerabilities in computer and network systems and the methodology hackers use to exploit these systems will be examined. | ||||
INFO-6003 | O/S & Applications Security | 4 | ||
This course will concentrate on the vulnerabilities of Windows and LINUX operating systems. The best practices and methodologies to ensure that critical security upgrades and system patches are installed will be discussed. Vulnerabilities to web applications will be explored. | ||||
INFO-6008 | I.T. Auditing | 3 | ||
This course will concentrate on the concepts of auditing, controls and security in an IT environment. Topics covered include general and application internal controls, security, governance, standards, guidelines and regulations. Methods and procedures to assess the risks and evaluate controls over information systems in an organization will be examined. | ||||
INFO-6076 | Web Security | 4 | ||
This course will delve into the current scripting and computer languages used by modern web clients and servers, with a focus on the programming methodologies used to prevent exploitation of web security vulnerabilities. | ||||
INFO-6027 | Security Planning | 3 | ||
This course will provide necessary skills to identify essential elements of a Security Management System, and the business processes that require protection. Risk assessments will identify vulnerabilities and required countermeasures to prevent and mitigate system failures. The consequences of data loss and the required safeguards are part of the process. The course will concentrate on the principals of implementing security in an organization. As part of this process Students will prepare and assess various security policies. | ||||
INFO-6070 | Network Management | 3 | ||
In today's technology driven environment end users just want to get work done and networking is an integral part of that effort. This course focuses on managing networks and the network protocols that enable them to function and how they are used to transmit data between senders and receivers. | ||||
ACAD-6002 | Graduate Success Strategies | 1 | ||
This course presents and helps to develop some of the skills required to achieve academic and career success for graduate students. Areas of focus include college resources, study skills, and time management among other skills. The importance of Academic Integrity will be a main focus. | ||||
Level 2 | ||||
Group 1 | ||||
INFO-6081 | Monitoring & Incident Response | 3 | ||
This course will cover techniques of the network security management cycle: data collection, threat detection, and analysis. Students will learn the skills necessary to identify and defend the network against intrusion and attack. | ||||
INFO-6010 | CISSP Prep | 3 | ||
This course provided students with a comprehensive overview of the domains or areas of study in the CISSP (Certified Information Systems Security Professional) certification. Domains include; Security and Risk Management), Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, Software Development Security. Throughout the course each domain will be studied in more detail covering the topics in the CISSP examination. | ||||
INFO-6139 | Managing Enterprise Networks | 3 | ||
In this course, students will explore the principles and technologies involved with enterprise network design, management, and security. You will learn the importance of enterprise design, documentation, configuration management, and technologies such as firewall, threat prevention, virtual private networks (VPN), and data loss prevention. | ||||
INFO-6065 | Ethical Hacking & Exploits | 4 | ||
This course will discuss vulnerabilities and exploits and introduce the student to methods of attack that involve the weakest component of the enterprise, the end user. The student will also learn how to identify attacks against the network and defend against them. | ||||
RSCH-6016 | Research Methodology & Capstone Project | 4 | ||
Students will advance their understanding of research through critical exploration of research language, ethics, and approaches. The elements of the research process within quantitative, qualitative, and mixed methods approaches are covered. The project enables the review of relevant literature and how research findings are useful in understanding their work. | ||||
Group 2 | ||||
INFO-6079 | Security Applications | 4 | ||
This course covers secure object-oriented software development using high-level languages such as Python. Along with shell scripting techniques and implementation of shell-scripts to perform system-related tasks. As part of implementing defensive and security analysis applications, students will experience advanced cybersecurity techniques to secure centralized and distributed ecosystems. | ||||
INFO-6077 | Digital Forensics | 4 | ||
This course prepares students to apply the principals of digital forensics to detect, recover, trace, analyze and interpret digital evidence. This course teaches students how files are structured, data recovery techniques, data hiding and how to conduct a digital investigation. | ||||