Cybersecurity Minor

Cybersecurity is a rapidly evolving field that addresses the need to protect digital assets in an increasingly data-driven world. This cybersecurity minor offers a comprehensive exploration of fundamental concepts such as ethical hacking, data protection, and network security, preparing students to tackle real-world challenges. It integrates practical skills with theoretical knowledge and addresses the growing demand for professionals that can manage and mitigate cyber threats effectively. The program focuses on ethical issues, professional responsibility, and essential technical skills for effectively navigating today’s complex cybersecurity environment.

Minor Requirements

Required Courses:

CSC1300Computer Science I

4 sh

CSC2044Computer Systems and Networks - Fundamentals

4 sh

CSC3360Network Security

4 sh

CYB3111Information Security

4 sh

CYB4111Cybersecurity

4 sh

Total Credit Hours: 20

 

Program Outcomes

Exhibit an understanding of fundamental principles and concepts of computer systems and computer networks, and demonstrate an ability to apply that understanding using a computer system command line interface.

Leveraging an understanding of software programming fundamentals and computational thinking, exhibit an understanding of common cybersecurity attack techniques, and corresponding cybersecurity defense measures, in software development environments, and demonstrate an ability to apply that understanding to real-world applications and scenarios.

In software application and network environments, exhibit an understanding of common cybersecurity attack techniques, and corresponding cybersecurity defense measures, and demonstrate an ability to apply that understanding to real-world applications and scenarios.

In data and information environments, exhibit an understanding of common cybersecurity attack techniques, and corresponding cybersecurity defense measures, and demonstrate an ability to apply that understanding to real-world applications and scenarios.

Exhibit an understanding of common attack, defense, and remediation techniques that pervade the specific environments in cybersecurity and demonstrate ability to apply that understanding to real-world applications and scenarios.

Powered by SmartCatalog IQ