Provides an orientation to the field of cybersecurity and outlines expectations of the Cybersecurity AAS degree. Lecture: 1 credit (15 contact hours).
Provides students with an overview of the cybersecurity field and its related concepts. Includes an introduction to cybersecurity terminology, best practices and ethics, principles and standards, and planning and managing cybersecurity functions and assets. Presents a foundation for understanding common threats and attacks and the methods and tools to defend and protect against the same. Includes an overview of human, organizational, social and legal issues related to cybersecurity. Presents concepts which meet national standards in cybersecurity. Lecture: 3 credits (45 contact hours).
Provides an overview of cybersecurity forensics. Includes an overview of data acquisition, processing crime and incident scenes, working with different platforms (Windows, Linux, Mac OS X, mobile, cloud), current forensics tools, report writing and ethical considerations in the digital forensics arena. Lecture: 3 credits (45 contact hours).
Provides a foundation for designing, creating, maintaining and secure databases. Emphasizes security for all topics presented. Introduces various database models and common security concerns including SQL injections. Presents database security models and concerns including inference, injections, hashing and encryption, data corruption, and access controls (DAC (Discretionary Access Control), MAC (Mandatory Access Control), RBAC, (Role Based Access Control) and Clark). Requires students to design and deploy a simple secure database for a specified application. Lecture: 3 credits (45 contact hours).
Provides students with an understanding of the components in an information technology system and their roles in system operations. Includes a theoretical understanding of the roles of an operating system, its basic functions, services, and security issues. Presents concepts related to common computer hardware and basic networking.
Introduces secure software development using an easy-to-learn programming language appropriate for a first semester of secure coding. Covers secure coding principles and practices while focusing on developing software that is free from security vulnerabilities. Presents foundational programming concepts (data types; sequence, selection, and repetition control structures; single and two-dimensional arrays; and classes and objects) from a security perspective. Compares the strengths, weaknesses, and optimal applications for several scripting and programming languages, but focuses on writing secure code in a selected language, such as Python. Presents concepts which meet national standards in secure software development. Lecture: 3 credits (45 contact hours).
Provides students with an overview of human, organizational, and societal security. Covers trends in human behavior and resulting risks to individuals, organizations, and society. Covers techniques to encourage personal compliance with cybersecurity rules, policies, and norms. Provides an overview of personal, local, national, and international cybersecurity policies and legislation. Introduces cybersecurity ethics, theories, and related impact on individuals and society. Lecture: 3 credits (45 contact hours).
Presents an overview of the Internet of Things (IoT) ecosystem and how to secure IoT devices and the data they contain. Covers IoT standards, guidelines and tools, including NIST (National Institute of Standards and Technology) standards and recommendations. Provides an overview of common IoT devices, applications and related security. Lecture: 3 credits (45 contact hours).
Provides an overview of digital forensics for computer operating systems (Linux, Windows, and macOS systems). Includes an in-depth study of registry/preference/configuration files, file systems, memory forensics, data and file recovery, web browsing, tracking artifacts, log files, executable programs, email and other related topics. Lecture: 3 credits (45 contact hours).
Provides an advanced exploration of cyber systems including threats, attacks and vulnerabilities on an organization's information assets (hardware, software, data, and networks) and defense tools and techniques against threats, attacks, and vulnerabilities. Covers network protocols, logical and physical security measures, encryption and decryption techniques, disaster recovery, and incident response. Lecture: 3 credits (45 contact hours).
Focuses on security aspects related to installation and administration and implementation of the Linux operating system. Lecture: 3 credits (45 contact hours).
Explores various communication protocols with a concentration on TCP/IP. Explores communication protocols from the point of view of the hacker to highlight protocol weaknesses. Encompasses internet architecture, routing, addressing, topology, fragmentation and protocol analysis and the use of various utilities to explore TCP/IP (Transmission Control Protocol/Internet Protocol). Lecture: 3 credits (45 contact hours).
Covers an in-depth exploration of methods for attacking and defending various types of networks. Explores network security concepts from a hacker's viewpoint including attack methodologies. Lecture: 3 credits (45 contact hours).
Provides a comprehensive study of secure software development using an object-oriented language appropriate for a second semester of programming (in a language different from CYS 150 to allow for a broader study of security across programming languages). Includes a syntax and security review of data types, control structures, and arrays for the language used in the course. Covers classes, objects, inheritance, polymorphism, sorting and searching algorithms, streams and files, exception handling, recursion, efficiency of algorithms, and standard libraries. Compares the strengths, weaknesses and optimal uses of several object-oriented programming languages but focuses on a single language such as Java or C/C++/C#. Covers syntax and logic concepts through a security perspective. Presents concepts which meet national standards in secure software development. Lecture: 3 credits (45 contact hours).
Provides an introduction to secure software development for students who have transfer courses for the first and second semester of software development (another college/university or KCTCS CIT courses). Presents an in-depth study of secure coding principles and practices typically covered in the first and second semester of secure software development courses. Presents concepts which meet national standards in secure software development. Lecture: 3 credits (45 contact hours).
Provides an overview of data structures and related security issues. Presents an in-depth study of arrays, lists, linked lists, stacks, queues, trees, hash tables, heaps, and graphs. Provides on overview of several object-oriented languages and how they support and implement data structures. Presents concepts which meet national standards in secure software development. Lecture: 3 credits (45 contact hours).
Provides an overview of modern programming languages (scripting, query, and object-oriented) and highlights the strengths, weaknesses, and security implications of each. Presents scenarios and applications for each language (when to use and when not to use). Covers techniques for overcoming security vulnerabilities of the languages. Lecture: 3 credits (45 contact hours).
Provides an overview of network and cloud forensics. Includes a review of the investigation methodology in the context of network and cloud evidence. Includes an in-depth study of network and cloud forensics including deep packet inspection, statistical flow analysis, tunneling and encryption, malware, network intrusions and footprints, and various tools to assist with network and cloud forensics. Lecture: 3 credits (45 contact hours).
Provides an overview of cyber forensics for mobile devices including but not limited to smartphones, tablets, IoT (Internet of Things) devices, and embedded systems (i.e. GPS (global positioning system), game consoles, smart TVs, drones, medical equipment, automotive equipment). Investigates common mobile operating systems (i.e. iOS, Android, Windows, and others). Includes a review of the investigation methodology in the context of mobile devices and evidence. Provides hands-on experience with open source and commercial (when possible) mobile device forensic tools. Covers how to create simple SQLite queries and/or scripts for mobile file interrogations. Covers how to write forensic reports that that meet judicial and defense scrutiny. Lecture: 3 credits (45 contact hours).
Provides students with an overview of cryptography and its role in cybersecurity. Introduces a variety of encryption algorithms and cryptographic protocols, tools, techniques, and standards. Includes a review of basic mathematical concepts which students will use to construct and break classical and modern ciphers. Lecture: 3 credits (45 contact hours).
Prepares students for experiences and challenges that may be met while applying, interviewing, and working in a cybersecurity workplace. Includes three primary objectives of teamwork, experience, and employability. Includes an assessment of core cybersecurity curriculum competencies. Lecture: 3 credits (45 contact hours).