CYBR - Cybersecurity

CYBR 1306 Introduction to Cybersecurity

In today’s world, no one is safe from cyber-attacks, but everyone can be prepared. This course will teach you how malicious actors use social skills and technology to facilitate cyber-attacks and provide you with the tools and information you need to defend against those attacks. Whether you pursue one of the many available jobs in cybersecurity or just want to secure your own privacy, you’ll learn how to make the Internet safer.

Corequisite: CYBR 3180

3

CYBR 2310 Cybercrime and Governance

Cybercrime is one of the biggest threats companies face on a daily basis, and they are constantly looking for new hires to help protect them. In this course, you will get a firsthand look at the methods used to commit cybercrimes. You will also learn how governments detect, investigate, and stop these crimes, and become familiar with the laws and policies in place to deter cybercriminals.

Prerequisites: CYBR 1306, Corequisites: CYBR 3180

3

CYBR 2320 Modern Cybersecurity

Just as technology is constantly evolving, so too must cybersecurity to keep pace with changing trends. In this class, you will learn about the changing landscape of cybersecurity, emerging technologies that are likely to be targeted, and new forms of cyber-attack being launched. By the end of the course, you will be able to implement the most up-to-date practices in cybersecurity in order to protect against attack. This online class has optional live sessions.
3

CYBR 2340 Google Cloud Computing Foundations

This course will introduce you to the fundamentals of Cloud Computing, Infrastructure and Networking, and will explore how the cloud is used in a range of situations, including IT, App Development and Machine Learning. By the end of the course you will know what the cloud is, and how to use it effectively. This course uses the Google Cloud Platform (GCP) and was built in concert with the Google Cloud Learning Services team.

Corequisite: CYBR 3180 

3

CYBR 2350 Cybersecurity Career Navigation and Exploration

This course will help you find a job in Cybersecurity upon graduation. Not just any job; one that meets your personal and financial needs and makes you excited about the future. In this course, you’ll explore career paths in Cybersecurity potential salary outcomes, and different roles. Then, you’ll pick target jobs and opportunities that are the best fit for you and make a clear plan of action toward securing them.

Prerequisites: CYBR 1306, Corequisites: CYBR 3180  

3

CYBR 3180 Cybersecurity Seminar

This seminar course, for participants in the Cybersecurity major, examines current topics in cybersecurity in relation to a Christian world-view. Specific topics may vary by semester. Seminars include reading critiques, case studies, discussion, and student presentations.
Corequisite: CYBR 1306, CYBR 2310, CYBR 2320, CYBR 3320, CYBR 3330, or CYBR 4395. May be repeated for credit.

1

CYBR 3320 Network and System Security

Modern organizations know that even the strongest systems can be vulnerable to cyber-attacks. As a result, jobs in cybersecurity are rapidly expanding as companies look to secure their digital assets. This course will teach you how to secure those assets by identifying and fixing potential security vulnerabilities. By the end of the course, you will be able to identify and remedy common network and systems vulnerabilities.

Prerequisites: CYBR 1306, Corequisites: CYBR 3180 

3

CYBR 3330 Cyber Forensics

When cybercrimes do happen, you need to know how to respond. This course examines the tools and techniques used to perform cyber forensics and conduct investigations into cybercrimes. By the end of the course, you’ll be able to gather and analyze important digital evidence and gain skills in analyzing cybercrime that are in demand from companies across the country. This online class has optional live sessions.
Prerequisites: CYBR 1306 and CYBR 2310
3

CYBR 3340 Application Development I – Exploring Web Applications

Modern development relies on frameworks which provide developers with powerful tools to speed up development. If you want to build apps, you need to understand how to use frameworks. This course, which has been built in collaboration with Google, will introduce you to Django - a framework used for data-driven web applications. You’ll learn the fundamentals of Django, improve your database management skills, and begin developing your own apps.

Corequisite: CYBR 3180

3

CYBR 3341 Application Development II – Building Web Applications

This course - built in collaboration with Google - is the second part of the application development series. In this course, you will put your skills into practice and build your own application. By the end of this course, you'll have a greater understanding of the technologies that power modern apps and be able to build your own.

Corequisite: CYBR 3180 

3

CYBR 3350 Security Operations

The moments after a breach can make or break an organization. When the unthinkable happens and a cybercrime is discovered, the actions taken by the security operations team can either contain the damage and restore order or lead to catastrophic consequences. This course examines the tools and techniques used to conduct investigations into cybercrimes and teaches the defensive skills necessary to ensure a breach doesn’t occur in the first place.

Prerequisites: CYBR 1306, CYBR 3320, Corequisites: CYBR 3180

3

CYBR 3370 Ethical Hacking

To stop a hacker, you need to be able to think like a hacker. In this course, you will learn hands-on techniques for attacking and penetrating networks and systems. You’ll learn the tools to launch these offensive tactics and then complete a hands-on project where you will be asked to ethically hack a real system.

Prerequisites: CYBR 3320, Corequisites: CYBR 3180

3

CYBR 4310 The Future of Cybersecurity

Technology is racing forward, and cybersecurity must stay ahead to meet new challenges and threats. In this class, you will learn about the changing landscape of cybersecurity, emerging mobile technologies that are likely to be targeted, and new forms of cyber-attacks being launched. By the end of the course, you will be able to implement the most cutting-edge practices in cybersecurity in order to protect against attacks.

Prerequisites: CYBR 3320, Corequisites: CYBR 3180

3

CYBR 4340 Cloud Application Practicum

Software engineers are frequently tasked with building applications using unfamiliar elements. This course will ask you to build an application using the Google Cloud Platform (GCP) and one or more unfamiliar technologies or tools you select. By the end of this course, you will learn how to tackle unfamiliar situations, a key skill for any programmer, and improve your skills in programming and software development. This course will provide you with a project to add to your portfolio of work. 

Corequisite: CYBR 3180 

3

CYBR 4350 Cybersecurity Capstone

The Capstone course is the culmination of the Cybersecurity program, allowing students to apply their knowledge to real-world challenges. Students will undertake a comprehensive project integrating various aspects of cybersecurity, including log analysis, vulnerability assessment, incident response, ethical hacking, and cloud security. This project will develop critical thinking skills and prepare students for major cybersecurity certifications.

Prerequisites: CYBR 2310, CYBR 3350, CYBR 3370, CYBR 4310, Corequisites: CYBR 3180 

3

CYBR 4395 Ethical Hacking

To stop a hacker, you need to be able to think like a hacker. In this course, you will learn hands-on techniques for attacking and penetrating networks and systems. You will be prepped with tools to launch these offensive tactics, and then complete a hands-on project where you are asked to ethically hack a real system. This online class has optional live sessions. Prerequisites: CYBR 3320 or CISC 4324
3