3000

CYBR 3180 Cybersecurity Seminar

This seminar course, for participants in the Cybersecurity major, examines current topics in cybersecurity in relation to a Christian world-view. Specific topics may vary by semester. Seminars include reading critiques, case studies, discussion, and student presentations.
Corequisite: CYBR 1306, CYBR 2310, CYBR 2320, CYBR 3320, CYBR 3330, or CYBR 4395. May be repeated for credit.

1

CYBR 3320 Network and System Security

Modern organizations know that even the strongest systems can be vulnerable to cyber-attacks. As a result, jobs in cybersecurity are rapidly expanding as companies look to secure their digital assets. This course will teach you how to secure those assets by identifying and fixing potential security vulnerabilities. By the end of the course, you will be able to identify and remedy common network and systems vulnerabilities.

Prerequisites: CYBR 1306, Corequisites: CYBR 3180 

3

CYBR 3330 Cyber Forensics

When cybercrimes do happen, you need to know how to respond. This course examines the tools and techniques used to perform cyber forensics and conduct investigations into cybercrimes. By the end of the course, you’ll be able to gather and analyze important digital evidence and gain skills in analyzing cybercrime that are in demand from companies across the country. This online class has optional live sessions.
Prerequisites: CYBR 1306 and CYBR 2310
3

CYBR 3340 Application Development I – Exploring Web Applications

Modern development relies on frameworks which provide developers with powerful tools to speed up development. If you want to build apps, you need to understand how to use frameworks. This course, which has been built in collaboration with Google, will introduce you to Django - a framework used for data-driven web applications. You’ll learn the fundamentals of Django, improve your database management skills, and begin developing your own apps.

Corequisite: CYBR 3180

3

CYBR 3341 Application Development II – Building Web Applications

This course - built in collaboration with Google - is the second part of the application development series. In this course, you will put your skills into practice and build your own application. By the end of this course, you'll have a greater understanding of the technologies that power modern apps and be able to build your own.

Corequisite: CYBR 3180 

3

CYBR 3350 Security Operations

The moments after a breach can make or break an organization. When the unthinkable happens and a cybercrime is discovered, the actions taken by the security operations team can either contain the damage and restore order or lead to catastrophic consequences. This course examines the tools and techniques used to conduct investigations into cybercrimes and teaches the defensive skills necessary to ensure a breach doesn’t occur in the first place.

Prerequisites: CYBR 1306, CYBR 3320, Corequisites: CYBR 3180

3

CYBR 3370 Ethical Hacking

To stop a hacker, you need to be able to think like a hacker. In this course, you will learn hands-on techniques for attacking and penetrating networks and systems. You’ll learn the tools to launch these offensive tactics and then complete a hands-on project where you will be asked to ethically hack a real system.

Prerequisites: CYBR 3320, Corequisites: CYBR 3180

3