Skip to main content Skip to footer site map
Center for Cyber Security Studies

Current Cyber Courses

Course:

SY110  Cyber Security I

Website:

SY110 Introduction to Cyber Security Technical Foundations Page

Description: Introduction to Cyber Security is a hands-on lab-based course providing a technically focused introduction to the principles behind the use, function, and operation of computers, networks and applications with an emphasis on cyber security.
Credits: 2-2-3
Offered: Fall/Spring
Prerequisites: None

Course:

SY201  Cyber Fundamentals I

Website:

SY201 Cyber Fundamentals 1 Page

Description: This course will teach students problem solving skills in cyber-operations domain using the Python programming language on a Linux platform.  Students will analyze the current cyber warfare threats and problems, and code Python programs to solve some of these and related problems.
Credits: 2-3-4
Offered: Fall
Prerequisites: None

Course:

SY202  Cyber Systems Engineering

Description: An introductory practicum that emphasizes interconnected cyber-physical systems, communications between those systems, the controls and the associated space in which these relationships exist. The student will demonstrate that cyberspace is a domain within the information and electromagnetic environment consisting of the interdependent network of information technology infrastructure, including the Internet, telecommunications networks, computer systems, and embedded processors and control systems. The theme of this course is for the student to understand that entire communication cycle as it pertains to the cyber physical and communications controls systems.
Credits: 2-2-3
Offered: Spring
Prerequisites: SY201, SM223, SP211

Course:

SY204  Systems Programming & OS Fundamentals

Description: Students will expand their programming expertise through the exploration of systems level programming utilizing C. Additionally, students will learn the fundamental features and design of operating systems. The activities in the course will be covered from a cyber operations perspective.
Credits: 3-2-4
Offered: Spring
Prerequisites: IC210/SI204/SY201

Course:

SY301  Data Structures for Cyber Operations

Description: This course will cover the usual Data Structures topics, with a focus on cyber-operations. Students will learn how complex data are represented in computer programs and how the implementation/interface distinction helps enable it. They will learn the most common abstract data types and the standard implementations of them. They will explore how complexity in representation enables more sophisticated software, but also creates complex vulnerabilities. Examples will segue into the Web and Database course.
Credits: 3-2-4
Offered: Fall
Prerequisites: SY204

Course:

SY303  Applied Cyber Systems Architecture

Description: A simple yet functional computer will be designed and implemented using NAND gates and D Flip-Flops. In this project-oriented course, groups will collaborate on each component of this modular system design. A hardware description language will be used to describe the sequential and combinational logic needed to implement each module. The computer will then be prepared to execute high-level object-oriented programs through the designs of an assembler, a virtual machine, and a compiler. Finally, a basic operating system will be designed to allow easy interfacing with the underlying hardware. As time permits, a final project will address a security concern in the overall system or utilize the system to implement an existing security algorithm.
Credits: 2-3-4
Offered: Fall
Prerequisites: SY204

Course:

SY304  Information Operations, Social Engineering, and Hacktivism

Description: This course will examine the "human factor" of cyber operations, the role of individuals and groups as a factor in cyber operations, with a focus on the use of social engineering techniques and non-standard approaches used to gain an advantage (technologically, militarily, economically, intellectually) in the cyber domain. Social Engineering is the art of exploiting human psychology to gain access to buildings, systems, or data, and is evolving such that technology solutions, security policies, and operational procedures alone cannot protect resources. In many cases, individuals prove to be the largest vulnerability in a network, cyber practitioners need to understand how to effectively defend against or exploit such vulnerabilities.
Credits: 3-0-3
Offered: Spring
Prerequisites: None

Course:

SY306  Web & Database Cyber Operations

Description: The course covers basic web-based application development with a database back-end, with a focus on security. Topics include client side and server side web applications development, the SQL language for relational databases, web authentication, secure web protocols, attack and defense of web-based applications with a database back-end.
Credits: 2-2-3
Offered: Spring
Prerequisites: SY301

Course:

SY308  Security: Fundamental Principles

Description: This course is an introduction to computer, network and information security. Students will learn the fundamental principles of security while studying various topics including basic cryptography, buffer overflow attacks, various protocols, and firewalls. SY308 is a required course for students in the Cyber Operations major.
Credits: 2-2-3
Offered: Spring
Prerequisites: SY301

Course:

SY310  Networking & Mobile Computing

Description: An introduction to wired and wireless communications and associated vulnerabilities at the physical, data link and network layers of the TCP/IP model. The theme of this course is for the student to understand the entire communication cycle as it pertains to wired and wireless computer networks and communications systems. Beginning with electromagnetic spectrum and the fundamentals that govern its use, each student will learn the unique implications of operating in a wireless environment. The student will demonstrate applications of interdependent networks, including the Internet and telecommunications networks within the cyberspace domain. Additionally, the student will understand electronic engineering and tactics in support of spectrum dominance and retaining strategic advantage to open and closed networks.
Credits: 2-3-4
Offered: Spring
Prerequisites: SM224 & SP212

Course:

SY401  Cyber Operations I

Description: This course will be part I of a two-part course during senior year, during which all aspects of Cyber Operations and course work up to this point will be used to adequately defend or attack a "Cyber City". This simulated cyber environment will pose multiple technical and non-technical challenges in a holistic approach to cyber operations across the spectrum.
Credits: 2-2-3
Offered: Fall
Prerequisites: SY304 & SY308

Course:

SY402  Cyber Operations II

Description: This course will be the second part of a two-part course during senior year, during which all aspects of Cyber Operations and course work up to this point will be used to adequately defend or attack a "Cyber City". This simulated cyber environment will pose multiple technical and non-technical challenges in a holistic approach to cyber operations across the spectrum.
Credits: 2-2-3
Offered: Fall
Prerequisites: SY401

Course:

SY403  Cyber Planning & Policy

Description: A growing dependence on military and intelligence networks and the networking of our critical national infrastructure can quickly become vulnerabilities. This course will develop a political and economic framework for analyzing cyber power. The course will cover the body of thought that impinges on cyber matters and provides a synthesis of this information in a variety of decision-making contexts.
Credits: 3-0-3
Offered: Fall
Prerequisites: FP130

Course:

SY406  Cyber Law & Ethics

Description: This course examines many of the legal and ethical challenges that cyber operations professionals confront in the public and private sectors.  The course begins with an in-depth review of the provisions of the United States Constitution that shape the cyber operations of the military and civilian government agencies.  The course then reviews the statutes and regulations that provide the government with the authority to conduct cyber operations, as well as the limits that the statutes impose. The course examines the interplay between public-sector and private sector cybersecurity efforts, and the state and federal laws that regulate private-sector cybersecurity.  We also explore the ethical considerations that apply to cyber operations.
Credits: 3-0-3
Offered: Spring
Prerequisites: FY403
go to Top