Courses

  • CYBR-101 Intro to Cybersecurity (3)

    In this course, students will learn the fundamentals of cybersecurity. Topics to be covered include authentication, cryptography, steganography, methods of digital eavesdropping, wireless security, access control, exploits, denial of service attacks, intrusion detection and prevention, social engineering, and security policies.

    Attributes: YLIB
  • CYBR-110 Introduction to Networking (3)

    Digital data uses various network infrastructure and processes to travel from sender to receiver. This course introduces networking terms, technology & devices that make this digital communication possible, laying the foundation for understanding networks and how they are related to cybersecurity. Networking process and protocols will be discussed as well as various network hardware and network design. Examples of topics that may be discussed are; TCP/IP & OSI models, connection types, types of addressing, IPv4 subnetting, router and switch basics, types of networks and current trends in networks.
    Students who have received credit for CSCI 300 Networking may not receive credit for CYBR 110.

    Attributes: NLIB
  • CYBR-150 Cybersecurity Fundamentals (3)

    This course builds on the student’s introductory knowledge of cybersecurity and computer networking with identifying vulnerabilities & threats and implementation of appropriate security solutions within various environments. Students will learn about security planning, and where to apply appropriate security controls in the plan to maintain confidentiality, integrity and the availability of data and systems. Curriculum is designed to support student preparation for CompTIA Security+ certification.

    Attributes: NLIB
    Pre-requisites: CYBR-101 D- AND CYBR-110 D-
  • CYBR-222 Networking Fundamentals (4)

    This course builds a foundation in understanding the way networks operate. Topics discusses include; various network components and connections, services, network structure, and various protocols. Instruction and hands-on experience are provided in the proper care, safety, and maintenance of equipment, cabling, and tools. Students build local area networks (LANs), configure basic settings on routers and switches, and implement internet protocol (IP & IPv6) addressing schemes. Particular attention is given to decision making and problem-solving techniques implement network solutions, solve networking problems and analyzing data traffic. This course covers elements of the industry certification Cisco Certified Network Associate (CCNA).

    Students who have received credit for CYBR 304 Network and Cloud Security may not receive credit for CYBR-222.

    Attributes: NLIB
    Pre-requisites: CYBR-110 D-
  • CYBR-232 Intermediate Networking (4)

    This course describes the architecture, design, protocols, and operation of a small to medium sized networks. Students implement an efficient IPv4 and IPv6 address design, configure and verify static and dynamic routing, switching and wireless protocols with redundancy. Students examine and correct common networking issues and implement security best practices. Packet simulator activities reinforce new concepts and allow students to visually model and analyze packet processing. Student teams research and design a small to medium size network proposal implementing user requirements and current technologies. This course covers elements of the industry certification Cisco Certified Network Associate (CCNA).

    Attributes: NLIB
    Pre-requisites: CYBR-222 D-
  • CYBR-301 Cyberlaw, Policies, & Mgmt (3)

    This course introduces students to the ramifications of cybersecurity on the legal system, including issues of protecting computer systems from the perspective of both government and private sector entities. Emphasis is on current issues and integrating this legal knowledge into the practical aspects of developing security policies and practices around protection of assets in the face of threats to security. Industry standard best practices, compliance, audits, and logs are also covered.Techniques for ensuring stakeholder buy-in, from both employees and management, are covered. This extends into risk and vulnerability assessment of cyber assets, from both a strategic and tactical standpoint.

    Attributes: NLIB
    Pre-requisites: CSCI-251 C
  • CYBR-302 Scripting Languages (3)

    This course provides an introduction to various scripting languages in both the Windows and Unix environments. The emphasis in this course is on writing various shell scripts with a practical focus. Such scripts are often used in not only system maintenance, but also to parse logs, audits, and various other security artifacts. Shells covered include Windows batch files, and various Unix shell scripting languages, such as csh, tcsh, and zsh. Additional Unix tools such as grep, sed, and awk are also covered as appropriate. Python is also introduced as a general-purpose programming language.

    Attributes: NLIB
    Pre-requisites: CSCI-161 C
  • CYBR-303 Database Mgmt & Security (3)

    This is a course in advanced database management with a focus on database security. As databases become more and more prevalent in corporate settings, knowledge is required of not only how to manage all of this data, which will likely include sensitive employee and corporate information, but also how to keep it secure from both internal and external threats. Th course, in addition to covering theoretical issues regarding database security, covers the practical aspects of managing and securing a database in SQL. This course has a significant laboratory component.

    Attributes: NLIB
    Pre-requisites: CSCI-260 D-
  • CYBR-304 Network and Cloud Security (3)

    This course provides a practical coverage of network and cloud security. This is an advanced networking course with an emphasis on security architecture and maintenance. There is an emphasis on the practical usage of modern hardware and software to assist in securing a network. Topics include threat assessment and mitigation (including viruses, worms, and trojan horses), secure networks, access control, firewall configuration and deployment, network-wide security, and cryptography. In addition, cloud computing security is emphasized, as it has become a standard in the current IT industry, but security issues are little understood. In addition to basic knowledge of cloud architecture, risks and threats associated with cloud computing are covered. This course has a significant laboratory component.

    Attributes: NLIB
    Pre-requisites: CSCI-300 D-
  • CYBR-305 Cloud Security (3)

    This course provides a practical coverage of cloud security. In addition to basic knowledge of cloud architecture, risks and threats associated with cloud computing are covered. This course has a significant laboratory component. This course covers elements of the industry certification Certificate of Cloud Security Knowledge (CCSK).

    Students who have received credit for CYBR 304 Network and Cloud Security may not receive credit for CYBR-305.

    Attributes: NLIB
    Pre-requisites: CYBR-232 D-
  • CYBR-342 Cyber Operations (4)

    Students will apply security framework principles to maintain integrity, confidentiality and availability of data. Students will learn to detect and analyze alerts in a Security Information and Event Management (SIEM) system, and report on cybersecurity incidents in a Security Operations Center (SOC) as a Tier 1/Tier 2 security analyst. Students will learn how to view logs in various file systems and mitigate threats in the network infrastructure and services through such technologies as firewalls, Virtual Private Networks (VPN), and Intrusion Detection and Prevention Systems (IDS/IPS). Curriculum is designed to support student preparation for the Cisco Certified Network Associate (CCNA) Cyber Operations (Cyber Ops) exam.

    Attributes: NLIB
    Pre-requisites: CSCI-161 D- AND CYBR-150 D- AND CYBR-232 D-
  • CYBR-401 Dgtl Forensics & Ethcl Hacking (3)

    The course focuses on two aspects of cybersecurity: digital forensics and ethical hacking (also know as penetration testing). Digital forensics describes the techniques and tools used to gather evidence with respect to potential policy violations (this typically includes actual prosecutable crimes, even if a policy does not address this). The course covers the tools and techniques used to gather said evidence from a variety of sources, including files, operating system logs, cell phones, instant messaging, and the like. In addition to the theory behind the techniques for data gathering, the course also covers the practical application of these tools. In addition to the technical and theoretical content of the class, legal issues are discussed as necessary. The ethical hacking portion of the course focuses on assessing vulnerability within one’s own network (commonly known as “white hat” hacking). The course covers the various tools and technologies used to assess network vulnerability as well as coverage of the various types of threats and how they cause a network to become insecure. Both manual assessment as well as automated tool usage is covered. This course has a significant laboratory component.

    Attributes: NLIB
    Pre-requisites: CYBR-301 D- AND CYBR-302 D-
  • CYBR-402 Malware Analysis (3)

    An important aspect of cybersecurity involves malicious software (malware). Everything from harmless but annoying adware to software written for cyberwarfare between nations is classified as malware. It is important to not only be able to detect malware, but to also know exactly what type of threat it presents and how to neutralize it. Real world examples of malware are analyzed using modern analysis tools and techniques. This course has an extensive laboratory component.

    Attributes: NLIB
    Pre-requisites: CYBR-401 D-
  • CYBR-403 Digital Forensics (3)

    Digital forensics describes the techniques and tools used to gather evidence with respect to potential policy violations (this typically includes actual prosecutable crimes, even if a policy does not address this). The course covers the tools and techniques used to gather said evidence from a variety of sources, including files, operating system logs, cell phones, instant messaging, and the like. In addition to the theory behind the techniques for data gathering, the course also covers the practical application of these tools. In addition to the technical and theoretical content of the class, legal issues are discussed as necessary. This course has a significant laboratory component.

    Students who have received credit for CYBR-401 Dgtl Forensics & Ethcl Hacking may not receive credit for CYBR-403.

    Attributes: NLIB
    Pre-requisites: CYBR-305 D-
  • CYBR-404 Ethical Hacking (3)

    The course focuses on ethical hacking (also known as penetration testing). Our focus is on assessing vulnerability within one’s own network (commonly known as “white hat” hacking). The course covers the various tools and technologies used to assess network vulnerability as well as coverage of the various types of threats and how they cause a network to become insecure. Both manual assessment as well as automated tool usage is covered. This course has a significant laboratory component.

    Students who have received credit for CYBR-401 Dgtl Forensics & Ethcl Hacking may not receive credit for CYBR-404.

    Attributes: NLIB
    Pre-requisites: CYBR-342 D-

Cybersecurity


For More Information

Admissions
(585) 385-8064
admissions@sjfc.edu