The Cybersecurity in Computer Science program was created to respond to the large and fast-growing need for technical Cybersecurity experts nationally and internationally. Students in this program will acquire up-to-date knowledge and skills in Cybersecurity, a field of ever-increasing importance to national security, the economy, and individual users. They will also get a firm grounding in requisite core knowledge in computer science, as well as the ability to take courses in related disciplines.

Cybersecurity Policy & Compliance helps prepare students for managerial level positions in leading an organization’s cyber practices. The program consists of courses in computer science, policy, management, compliance, and risk management. Upon completion of the program, graduates will be equipped to protect proprietary information in the age of cyber warfare and global corporate espionage.

 

Career Resources

LinkedIn Learning Classes

Wireshark: Malware and Forensics

Taught by Lisa Bock
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic.…

Quantum Spark Network Security

Taught by Cybrary
The Check Point Quantum Spark 1500 Pro security gateway family delivers enterprise-grade security in a series of simple, affordable, all-in-one…

Machine Learning and AI Foundations: Classification Modeling

Taught by Keith McCormick
One type of problem absolutely dominates machine learning and artificial intelligence: classification. Binary classification, the predominant method, sorts data into…

SSL Certificates for Web Developers

Taught by Kevin Skoglund
All websites should be using secure connections over HTTPS by default. Web browsers have evolved and warn users whenever sites…

Cisco Network Security: Content and Endpoint Security

Taught by Lisa Bock
As a network professional, it’s imperative to have a solid understanding of endpoint threats and how to defend against them.…

Cisco Network Security: Intrusion Detection and Prevention

Taught by Lisa Bock
A network must be able to quickly recognize threats. Intrusion detection and intrusion prevention systems (IDS/IPS) provide organizations with a…

Cybersecurity for Small and Medium Businesses: Essential Training

Taught by Kristin Judge
As the owner of a small or medium business, you’re probably aware that cybersecurity threats are on the rise. Learning…

Symmetric Cryptography Essential Training (2018)

Taught by Jeremy A. Hansen
No matter what your role, if you work with computers, you use cryptography every day. Symmetric cryptography is a common…

Securing Windows Server 2016: Managing Privileged Identities

Taught by Ed Liberman
Discover how to manage privileged identities in Windows Server 2016. In this concise course, instructor Ed Liberman discusses how to…

Selling into Industries: Healthcare

Taught by Elizabeth Lotardo
Healthcare is a complex industry that requires a strategic sales approach. In this course, learn how to increase your revenue…

Cisco Network Security: Secure Routing and Switching

Taught by Lisa Bock
A malicious person that gains access to a switch or router can modify system integrity to steal information or disrupt…

Programming Foundations: Discrete Mathematics

Taught by Peggy Fisher
What is discrete math, and how does it apply to programming? Math is an important part of all programming. Discrete…

Technology and Data Careers in Government

Taught by Jonathan Reichental
Today, some of the most exciting, meaningful, impactful, and in-demand IT careers are in helping to make cities work well.…

Creating a Culture of Privacy

Taught by Kalinda Raina
Every news cycle, we seem to hear about another privacy-related problem, whether it’s a data breach, a controversial policy, or…

Cisco Network Security: Core Security Concepts

Taught by Lisa Bock
Protect your network from common security threats. In this course, instructor Lisa Bock helps equip network administrators with a foundational…

Ubuntu Linux: User and Group Management

Taught by Scott Simpson
It’s important for aspiring system administrators to have a handle on how to work with users accounts and groups to…

Ethical Hacking: Mobile Devices and Platforms

Taught by Malcolm Shore
Mobile devices are used for our most sensitive transactions, including email, banking, and social media. But they have a unique…

Learning Data Science: Understanding the Basics

Taught by Doug Rose
Many of the people who work on data science teams won’t be data scientists. They’ll be the managers and associates…

Ethical Hacking: Wireless Networks

Taught by Malcolm Shore
Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi…

Ethical Hacking: Session Hijacking

Taught by Malcolm Shore
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or service sessions—the valid…