The Cybersecurity in Computer Science program was created to respond to the large and fast-growing need for technical Cybersecurity experts nationally and internationally. Students in this program will acquire up-to-date knowledge and skills in Cybersecurity, a field of ever-increasing importance to national security, the economy, and individual users. They will also get a firm grounding in requisite core knowledge in computer science, as well as the ability to take courses in related disciplines.

Cybersecurity Policy & Compliance helps prepare students for managerial level positions in leading an organization’s cyber practices. The program consists of courses in computer science, policy, management, compliance, and risk management. Upon completion of the program, graduates will be equipped to protect proprietary information in the age of cyber warfare and global corporate espionage.

 

Career Resources

LinkedIn Learning Classes

Wireshark: Malware and Forensics

Taught by Lisa Bock
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic.…

Quantum Spark Network Security

Taught by Cybrary
The Check Point Quantum Spark 1500 Pro security gateway family delivers enterprise-grade security in a series of simple, affordable, all-in-one…

Cybersecurity for Small and Medium Businesses: Essential Training

Taught by Kristin Judge
As the owner of a small or medium business, you’re probably aware that cybersecurity threats are on the rise. Learning…

Symmetric Cryptography Essential Training

Taught by Jeremy A. Hansen
No matter what your role, if you work with computers, you use cryptography every day. Symmetric cryptography is a common…

Securing Windows Server 2016: Managing Privileged Identities

Taught by Ed Liberman
Discover how to manage privileged identities in Windows Server 2016. In this concise course, instructor Ed Liberman discusses how to…

Linux Security and Hardening Essential Training

Taught by Jason Cannon
Discover how to tighten up the security on any Linux system. This course covers foundational security concepts and guidelines that…

Selling into Industries: Healthcare

Taught by Elizabeth (McLeod) Lotardo
Healthcare is a complex industry that requires a strategic sales approach. In this course, learn how to increase your revenue…

Microsoft Azure: Backup and Disaster Recovery

Taught by Sharon Bennett
The most important components of disaster recovery are proper planning and the proper tools. This course shows IT admins how…

DevSecOps: Automated Security Testing

Taught by James Wickett
Security testing is a vital part of ensuring you deliver a complete, secure solution to your customers. Automating the process…

Cisco Network Security: Secure Routing and Switching

Taught by Lisa Bock
A malicious person that gains access to a switch or router can modify system integrity to steal information or disrupt…

Linux System Engineer: Authentication with LDAP and Kerberos

Taught by Grant McWilliams
Earning the Red Hat Certified Engineer (RHCE) certification-the benchmark certification for Red Hat Enterprise Linux (RHEL)-demonstrates to both your current…

Programming Foundations: Discrete Mathematics

Taught by Peggy Fisher
What is discrete math, and how does it apply to programming? Math is an important part of all programming. Discrete…

Technology and Data Careers in Government

Taught by Jonathan Reichental
Today, some of the most exciting, meaningful, impactful, and in-demand IT careers are in helping to make cities work well.…

Creating a Culture of Privacy

Taught by Kalinda Raina
Every news cycle, we seem to hear about another privacy-related problem, whether it’s a data breach, a controversial policy, or…

Cisco Network Security: Core Security Concepts

Taught by Lisa Bock
Protect your network from common security threats. In this course, instructor Lisa Bock helps equip network administrators with a foundational…

Ubuntu Linux: User and Group Management

Taught by Scott Simpson
It’s important for aspiring system administrators to have a handle on how to work with users accounts and groups to…

Ethical Hacking: Mobile Devices and Platforms

Taught by Malcolm Shore
Mobile devices are used for our most sensitive transactions, including email, banking, and social media. But they have a unique…

Learning Data Science: Understanding the Basics

Taught by Doug Rose
Many of the people who work on data science teams won’t be data scientists. They’ll be the managers and associates…

Ethical Hacking: Wireless Networks

Taught by Malcolm Shore
Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi…

Ethical Hacking: Session Hijacking

Taught by Malcolm Shore
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or service sessions—the valid…