Cybersecurity (M.S.)

The Cybersecurity in Computer Science program was created to respond to the large and fast-growing need for technical Cybersecurity experts nationally and internationally. Students in this program will acquire up-to-date knowledge and skills in Cybersecurity, a field of ever-increasing importance to national security, the economy, and individual users. They will also get a firm grounding in requisite core knowledge in computer science, as well as the ability to take courses in related disciplines.

Cybersecurity Policy & Compliance helps prepare students for managerial level positions in leading an organization’s cyber practices. The program consists of courses in computer science, policy, management, compliance, and risk management. Upon completion of the program, graduates will be equipped to protect proprietary information in the age of cyber warfare and global corporate espionage.

 

Career Resources

LinkedIn Learning Classes

Data-Driven Network Security Essentials

Taught by Jungwoo Ryoo
Explore essential concepts, skills, and techniques for managing network security and forensics. In this course, Jungwoo Ryoo explains how to…

Google Cloud Digital Leader Cert Prep 5: Trust and Security with Google Cloud

Taught by Google Cloud
As organizations move their data and applications to the cloud, they must address new security challenges. This course explores the…

Microsoft Azure: Backup and Disaster Recovery

Taught by Sharon Bennett
The most important components of disaster recovery are proper planning and the proper tools. This course shows IT admins how…

DevSecOps: Automated Security Testing

Taught by James Wickett
Security testing is a vital part of ensuring you deliver a complete, secure solution to your customers. Automating the process…

Cisco Network Security: Secure Routing and Switching

Taught by Lisa Bock
A malicious person that gains access to a switch or router can modify system integrity to steal information or disrupt…

Linux System Engineer: Authentication with LDAP and Kerberos

Taught by Grant McWilliams
Earning the Red Hat Certified Engineer (RHCE) certification-the benchmark certification for Red Hat Enterprise Linux (RHEL)-demonstrates to both your current…

CISA Cert Prep: 2 Information Technology Governance and Management for IS Auditors

Taught by Jordan Genung
Earning a CISA certification validates your ability to audit, control, and monitor information systems. The CISA Cert Prep series prepares…

Wireshark: Malware and Forensics

Taught by Lisa Bock
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic.…

Creating a Culture of Privacy

Taught by Kalinda Raina
Every news cycle, we seem to hear about another privacy-related problem, whether it’s a data breach, a controversial policy, or…

Cisco Network Security: Core Security Concepts

Taught by Lisa Bock
Protect your network from common security threats. In this course, instructor Lisa Bock helps equip network administrators with a foundational…

Ubuntu Linux: User and Group Management

Taught by Scott Simpson
It’s important for aspiring system administrators to have a handle on how to work with users accounts and groups to…

Developing Secure Software

Taught by Jungwoo Ryoo
Software developers are constantly told to use secure coding practices. Luckily, with today’s tools, secure code doesn’t take a lot…

Performing a Technical Security Audit and Assessment

Taught by Marc Menninger
This course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from…

Ethical Hacking: Mobile Devices and Platforms

Taught by Malcolm Shore
Mobile devices are used for our most sensitive transactions, including email, banking, and social media. But they have a unique…

Learning Data Science: Understanding the Basics

Taught by Doug Rose
Many of the people who work on data science teams won’t be data scientists. They’ll be the managers and associates…

Ethical Hacking: Wireless Networks

Taught by Malcolm Shore
Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi…

Ethical Hacking: Session Hijacking

Taught by Malcolm Shore
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or service sessions—the valid…

Ethical Hacking: Social Engineering

Taught by Lisa Bock
Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems.…

Ethical Hacking: System Hacking

Taught by Lisa Bock
System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to…

Ethical Hacking: Footprinting and Reconnaissance (2016)

Taught by Lisa Bock
If you watched our Introduction to Ethical Hacking course, you know the basics of ethical hacking. Ethical hackers use their…