In this industry-focused curriculum, you’ll have an opportunity to learn how to use secure protocols over networked systems using cryptography. You can also explore current issues in network security and apply security concepts. Courses focus on technical topics as well as privacy and policy issues.
For an Online Cyber Security Master's Degree, your classes may include:
Principles of Information Systems
In this course students examine management skills as they relate to the information technology industry, taking into account the relationship between networking, databases, and programming.
Principles of Information Security
This course covers information security technologies as applied to operating systems, database management systems, and computer networks. The three major goals of information security, confidentiality, integrity and availability, are introduced. Threats, vulnerability, exposure, risks, identity management, incidents response, the state machine model and disaster recovery are also covered.
Applied Cryptography and Network Security
In this course, students learn to apply secure protocols over networked systems using cryptography. Symmetric and asymmetric encryption is covered. Other topics that are also covered include one way function, hash, cryptography arithmetic, public key infrastructure, Digital Signature Algorithm and Internet security issues.
Legal Issues in Information Security and Incident Response
In this course, students explore current issues in network security and apply security concepts. The class focuses on technical topics as well as privacy and policy issues. Computer crimes, evidence presentation, chain of custody and introduction to the United States criminal justice system are also covered.
IT Auditing and Security Risk Management
The course covers information systems control, application audit, security threats, security risk types, computer attacks, countermeasures, and risk management. Risk assessment methodologies, certification, accreditation, information systems auditing and metrics for measuring an organization's information security program are also covered in this course.
During this course students analyze and apply the fundamentals of object-oriented application development.
Database System Design and Implementation
In this course students will focus on the design and implementation of a relational database management system, including concepts such as data extraction and data manipulation.
In this course students examine computer networking concepts, which enable them to translate business objectives into a physical network design. Students will be expected to collect and analyze appropriate information to make context-appropriate, network-related, business decisions.