Courses

  • CYBR-101 Intro to Cybersecurity (3)

    In this course, students will learn the fundamentals of cybersecurity. Topics to be covered include authentication, cryptography, steganography, methods of digital eavesdropping, wireless security, access control, exploits, denial of service attacks, intrusion detection and prevention, social engineering, and security policies.

    Attributes: YLIB
  • CYBR-301 Cyberlaw, Policies, & Mgmt (3)

    This course introduces students to the ramifications of cybersecurity on the legal system, including issues of protecting computer systems from the perspective of both government and private sector entities. Emphasis is on current issues and integrating this legal knowledge into the practical aspects of developing security policies and practices around protection of assets in the face of threats to security. Industry standard best practices, compliance, audits, and logs are also covered.Techniques for ensuring stakeholder buy-in, from both employees and management, are covered. This extends into risk and vulnerability assessment of cyber assets, from both a strategic and tactical standpoint.

    Attributes: NLIB
    Pre-requisites: CSCI-251 C
  • CYBR-302 Scripting Languages (3)

    This course provides an introduction to various scripting languages in both the Windows and Unix environments. The emphasis in this course is on writing various shell scripts with a practical focus. Such scripts are often used in not only system maintenance, but also to parse logs, audits, and various other security artifacts. Shells covered include Windows batch files, and various Unix shell scripting languages, such as csh, tcsh, and zsh. Additional Unix tools such as grep, sed, and awk are also covered as appropriate. Python is also introduced as a general-purpose programming language.

    Attributes: NLIB
    Pre-requisites: CSCI-161 C
  • CYBR-303 Database Mgmt & Security (3)

    This is a course in advanced database management with a focus on database security. As databases become more and more prevalent in corporate settings, knowledge is required of not only how to manage all of this data, which will likely include sensitive employee and corporate information, but also how to keep it secure from both internal and external threats. Th course, in addition to covering theoretical issues regarding database security, covers the practical aspects of managing and securing a database in SQL. This course has a significant laboratory component.

    Attributes: NLIB
    Pre-requisites: CSCI-260 D-
  • CYBR-304 Network and Cloud Security (3)

    This course provides a practical coverage of network and cloud security. This is an advanced networking course with an emphasis on security architecture and maintenance. There is an emphasis on the practical usage of modern hardware and software to assist in securing a network. Topics include threat assessment and mitigation (including viruses, worms, and trojan horses), secure networks, access control, firewall configuration and deployment, network-wide security, and cryptography. In addition, cloud computing security is emphasized, as it has become a standard in the current IT industry, but security issues are little understood. In addition to basic knowledge of cloud architecture, risks and threats associated with cloud computing are covered. This course has a significant laboratory component.

    Attributes: NLIB
    Pre-requisites: CSCI-300 D-
  • CYBR-401 Dgtl Forensics & Ethcl Hacking (3)

    The course focuses on two aspects of cybersecurity: digital forensics and ethical hacking (also know as penetration testing). Digital forensics describes the techniques and tools used to gather evidence with respect to potential policy violations (this typically includes actual prosecutable crimes, even if a policy does not address this). The course covers the tools and techniques used to gather said evidence from a variety of sources, including files, operating system logs, cell phones, instant messaging, and the like. In addition to the theory behind the techniques for data gathering, the course also covers the practical application of these tools. In addition to the technical and theoretical content of the class, legal issues are discussed as necessary. The ethical hacking portion of the course focuses on assessing vulnerability within one’s own network (commonly known as “white hat” hacking). The course covers the various tools and technologies used to assess network vulnerability as well as coverage of the various types of threats and how they cause a network to become insecure. Both manual assessment as well as automated tool usage is covered. This course has a significant laboratory component.

    Attributes: NLIB
    Pre-requisites: CYBR-301 D- AND CYBR-302 D-
  • CYBR-402 Malware Analysis (3)

    An important aspect of cybersecurity involves malicious software (malware). Everything from harmless but annoying adware to software written for cyberwarfare between nations is classified as malware. It is important to not only be able to detect malware, but to also know exactly what type of threat it presents and how to neutralize it. Real world examples of malware are analyzed using modern analysis tools and techniques. This course has an extensive laboratory component.

    Attributes: NLIB
    Pre-requisites: CYBR-401 D-

Cybersecurity


For More Information

Admissions
(585) 385-8064
admissions@sjfc.edu