CYBR Course Descriptions

Table of Contents

CYBR 200 Introduction to Cybersecurity Principles

3 hours

This course introduces students to the fundamental concepts of cybersecurity. Students explore the safeguards and countermeasures prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information. Students will learn about the threats and vulnerabilities facing computer systems and the tools and techniques used to secure them.

Back to top

CYBR 240 Network Security and Access Controls

3 hours

This course introduces students to computer networking and network security concepts, including the types of networks and devices. Course concepts also include a detailed look at the types of access controls, including physical and logical controls.

Back to top

CYBR 244 Incident Response

3 hours

This course focuses on the importance of maintaining availability of system operations during unplanned disruptions. Students learn concepts related to each of the three distinct plans that are vital to the survival of any organization facing out-of-the-ordinary operating conditions. In this course, students will examine the incident response and mitigation process including business continuity, disaster recovery, and incident response concepts.

Back to top

CYBR 250 Cybersecurity Operations

3 hours

This course provides students with knowledge on the day-to-day operations of a security program, including the use of security controls and risk mitigation strategies of an organization. Students will learn about best practices in securing data, such as data encryption, configuration management, implementation of security policies, and security awareness training.

Back to top

CYBR 400 Fundamentals of Information Security

3 hours

This course will provide learners with basic security design fundamentals that help create systems that are trustworthy. This course lays the foundation for understanding terminology, principles, processes, and best practices of information security at local and global levels. It further provides an overview of basic security vulnerabilities and countermeasures for protecting information assets through planning and administrative controls within an organization.

Back to top

CYBR 407 Worldview & Identity

3 hours

In this course, students will investigate concepts of worldview as it relates to personal identity, cultural assumptions, interpersonal communication, individual decision-making, and faith. Students will explore the roots of the Christian faith and the influence of Christianity on society, seeking to construct a personal worldview that informs their understanding of the meaning of life.

Back to top

CYBR 410 IT Foundations for Information Security

3 hours

This course provides students with a basic understanding of the components of an information technology system and their roles in system operation. This course also examines the roles of an operating system, its basic functions, and the services provided by the operating system.

Back to top

CYBR 413 Legal & Ethical Issues in Information Security

3 hours

This course addresses the laws, regulations, authorities, and directives that inform the development of operational policies, best practices, and training to assure legal compliance and to minimize internal and external threats. Students analyze legal constraints and liability concerns that threaten information security within an organization and develop disaster recovery plans to assure business continuity. Students also gain an understanding of privacy issues, tools, and practices. Students will examine typical situations where ethical dilemmas arise and to provide the students with tools for ethical decision making.

Back to top

CYBR 420 Data & Information Management

3 hours

This course focuses on organizational issues related to understanding information systems (IS), specific to the management of data. Students receive an overview of IS and explore the application, operation, and management of these systems. Students examine topics such as IS formulation and business alignment; data organization and storage; knowledge management; and IS impacts on organizations. Students will explore topics that include databases and networking and their critical organizational importance, system application, and emerging technologies and trends for the future. Students will learn how database systems are used and managed, and explore issues associated with protecting the associated data assets.

Back to top

CYBR 430 Scripting & Programming for Cybersecurity

3 hours

This course provides students with the basic ability to create simple scripts/programs to automate and perform simple operations in order to solve problems. This knowledge includes basic security practices in developing scripts/programs.

Back to top

CYBR 440 Network Security

3 hours

This course provides students with a basic understanding of how networks are built and operate. Students learn about computer network configurations, devices, services, vulnerabilities, and threats. Students design a network security architecture for an organization. The course also covers cryptography topics including encryption methods, symmetric/asymmetric systems, hashing, public-key infrastructures, and attack types.

Back to top

CYBR 450 Managing Information Security

3 hours

This course provides learners with knowledge necessary to define and implement a security program for the protection of an organization’s systems and data. Students will learn how to develop plans and processes to address cybersecurity vulnerabilities and data protection.

Back to top

CYBR 460 Cloud Computing & Virtualization

3 hours

This course will provide students with a basic understanding of the technologies and services that enable cloud computing, types of cloud computing models, and the security and legal issues associated with cloud computing. Students will understand the interfaces between major components of virtualized systems and the implications these interfaces have for security. This course will explore best practices for design solutions for cloud-based platforms and operations that maintain data availability while protecting the confidentiality and integrity of information. Prerequisite: CYBR 410: IT Foundations for Information Security and CYBR 440 Network Security

Back to top

CYBR 470 Digital Forensics in Cybersecurity

3 hours

This course provides students with the skills to apply forensics techniques throughout an investigation life cycle with a focus on complying with legal requirements. Learners will apply knowledge through a discussion of case law, following the chain of custody, and e-discovery processes, as well as digital investigation concepts and techniques. Students will also learn about techniques related to device forensics.

Back to top

CYBR 475 Field Experience

1-9 hours

Supervised experience in the discipline including internships and practica required for professional programs. This advanced experience must have an on-site supervisor and/or a departmental instructor overseeing, designing, and evaluating the content of the course.

Back to top

CYBR 480 Cyber Defense & Countermeasures

3 hours

This course provides students with the fundamental skills to handle and respond to information system incidents. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students learn how to leverage intelligence and threat detection techniques, analyze and interpret data, identify and address vulnerabilities, suggest preventive measures, effectively respond to and recover from incidents, and handle various types of incidents, risk assessment methodologies, laws, and policies related to incident handling.

Back to top

CYBR 490 Cybersecurity Capstone

3 hours

Students will be provided with real world scenarios in this capstone course, where they will work in teams to adapt to changing environments, prevent attacks, and respond when incidents occur. Students will analyze a security issue and present their findings as a group to a leadership team.

Back to top