Cybersecurity Concentration
Students earning the Bachelor of Science in computer science may elect to complete a concentration in cybersecurity. As a formal discipline, cybersecurity incorporates related technical and non-technical disciplines, including but not limited to software development, information systems and technology (IS/IT), mathematics, ethics and compliance, policy and governance, forensics, personnel, incident response, and risk management. Our daily lives are connected to the extent that nearly every crime includes a digital component. Malicious actors compromise data and violate privacy, manipulating the lives of individuals and entire user populations. Cybersecurity professionals possess the knowledge, skills, and abilities (KSA) to protect and defend digital systems and data, to detect and identify malicious activities, to preserve and analyze digital evidence, to mitigate related impacts, and to ensure accountability and justice.
This concentration prepares students for entry-level cybersecurity roles in the workplace, advanced studies and research in this discipline, and industry certifications now required for many lucrative job opportunities. Nine credits of core requirements are completed with three courses: CSC 220 Introduction to Cybersecurity, CSC 343 Digital Forensics, and CSC 353 Systems Security. In addition, students identify a specialty focus and engage six (6) credits of elective options to complete the concentration. A specialty focus may include traditional or emerging interests such as advanced forensics, incident handling, penetration testing, encryption, ethics and compliance, or a general preparation for industry certifications (e.g., CompTIA CySA+, SANS Security Essentials).
The requirements to complete the concentration in cybersecurity include the three core courses shown below. In addition to the required courses, six credit hours of elective studies related to a cybersecurity focus must be completed using any of the listed options.
Required Courses:
Course Number |
Course Title |
Prerequisite(s) |
Credits |
---|---|---|---|
CSC 220 |
Introduction to Cybersecurity |
CSC 117 (or demonstrated programming experience) |
3 |
CSC 343 |
Introduction to Digital Forensics |
CSC 220-Introduction to Cybersecurity |
3 |
CSC 353 |
System Security |
CSC 220; junior status or higher required. |
3 |
*Elective Options (6 Credits in cybersecurity): |
Topics related to Cybersecurity |
|
6 |
* For more information please consult your advisor |
**Student must submit a pre-proposal to be approved by the Department Chair and the Deanin order to enroll in the course. |
|
|
Total: |
15 |
IMPORTANT:: In order to successfully complete the cybersecurity concentration students must earn a grade of C or higher in each course.
This concentration can be completed on either the St. Thomas or St. Croix campus.
Examples of selected topics: : Information Security, Network forensics, Ethical Hacking, Web-based Security, Penetration Testing, Cryptography, and Malware Analysis, Incident-Response Handling.
COURSE DESCRIPTION
COURSE TITLE: CSC 220: Introduction to Cybersecurity
COURSE DESCRIPTION: This course investigates cybercrime, cyberterrorism, and cyberwarfare from a technical perspective. Analysis of case studies provide a framework to explore the roles of cyber-defender, cyber-attacker, the victim, and legal advocate. Prevention, detection, privacy, incident response, mitigation, and resilience interests are examined using social, economic, political, ethical, and legal criteria. In this context, students develop a working knowledge of interdisciplinary cybersecurity essentials, theory, and methods. Live demonstrations and virtual solutions in authentic scenarios provide students an opportunity to gain experience and competence with personal security measures.3 Credits
PRE-REQUISITES: CSC 117 Introduction to Programming I or (demonstrated prior programming experience)
COURSE TITLE: CSC 343: Digital Forensics
COURSE DESCRIPTION: This course will review the history of computer, network, and mobile device forensics, incident handling, and malware analysis as they have evolved into the formal discipline of digital forensics, the science that enables a forensic investigator to detect and analyze hidden data or unauthorized activity on connected devices and systems. Students will study key terminology, digital storage techniques, new trends in tech-related crimes, the scope of investigation, the roles of forensic first responders and digital evidence specialists, the tasks to preserve the admissibility of evidence collected during a formal investigation, and the victim/client from a political, technological, economical, and criminal justice perspective. Students will develop relevant, hands-on proficiency via live demonstrations, directed practice, and virtual solutions that apply forensic principles and best practices in authentic scenarios. 3 Credits
PRE-REQUISITES: CSC 220 (Introduction to Cybersecurity).
COURSE TITLE: CSC 353: System Security
COURSE DESCRIPTION: This course is designed to translate current data safety mandates into the practical knowledge, skills, and abilities (KSA) required to secure devices, systems, networks, and data in an efficient and cost-effective manner. Students will apply security concepts with best practices promoted by current industry standards in authentic scenarios using live interactive networked systems to reduce exposure and mitigate common threats. Instructional criteria and activities are framed and presented in a vendor-agnostic manner so that students can use what they learn on any system in any computing environment. A final capstone project affirms student competence and proof of concept for selected systems security measures with a penetration test performed to scale.. 3 Credits
PRE-REQUISITES: CSC 220; junior status or higher required