Skip to main content Skip to footer site map
Cyber Science Department

Courses

Course:

SY110  Cyber Security I

Description: Introduction to Cyber Security is a hands-on lab-based course providing a technically focused introduction to the principles behind the use, function, and operation of computers, networks and applications with an emphasis on cyber security.
Credits: 2-2-3
Offered: Fall/Spring
Prerequisites: None

Course:

SY201  Cyber Fundamentals I

Description: This course will teach students problem solving skills in cyber-operations domain using the Python programming language on a Linux platform.  Students will analyze the current cyber warfare threats and problems, and code Python programs to solve some of these and related problems.
Credits: 2-3-4
Offered: Fall
Prerequisites: None

Course:

SY202  Cyber Systems Engineering

Description: An introductory practicum that emphasizes interconnected cyber-physical systems, communications between those systems, the controls and the associated space in which these relationships exist. The student will demonstrate that cyberspace is a domain within the information and electromagnetic environment consisting of the interdependent network of information technology infrastructure, including the Internet, telecommunications networks, computer systems, and embedded processors and control systems. The theme of this course is for the student to understand that entire communication cycle as it pertains to the cyber physical and communications controls systems.
Credits: 2-2-3
Offered: Spring
Prerequisites: SY201, SM223, SP211

Course:

SY204  Systems Programming & OS Fundamentals

Description: Students will expand their programming expertise through the exploration of systems level programming utilizing C. Additionally, students will learn the fundamental features and design of operating systems. The activities in the course will be covered from a cyber operations perspective.
Credits: 3-2-4
Offered: Spring
Prerequisites: IC210/SI204/SY201

Course:

SY301  Data Structures for Cyber Operations

Description: This course will cover the usual Data Structures topics, with a focus on cyber-operations. Students will learn how complex data are represented in computer programs and how the implementation/interface distinction helps enable it. They will learn the most common abstract data types and the standard implementations of them. They will explore how complexity in representation enables more sophisticated software, but also creates complex vulnerabilities. Examples will segue into the Web and Database course.
Credits: 3-2-4
Offered: Fall
Prerequisites: SY204

Course:

SY303  Applied Cyber Systems Architecture

Description: A simple yet functional computer will be designed and implemented using NAND gates and D Flip-Flops. In this project-oriented course, groups will collaborate on each component of this modular system design. A hardware description language will be used to describe the sequential and combinational logic needed to implement each module. The computer will then be prepared to execute high-level object-oriented programs through the designs of an assembler, a virtual machine, and a compiler. Finally, a basic operating system will be designed to allow easy interfacing with the underlying hardware. As time permits, a final project will address a security concern in the overall system or utilize the system to implement an existing security algorithm.
Credits: 2-3-4
Offered: Fall
Prerequisites: SY204

Course:

SY304  Information Operations, Social Engineering, and Hacktivism

Description: This course will examine the "human factor" of cyber operations, the role of individuals and groups as a factor in cyber operations, with a focus on the use of social engineering techniques and non-standard approaches used to gain an advantage (technologically, militarily, economically, intellectually) in the cyber domain. Social Engineering is the art of exploiting human psychology to gain access to buildings, systems, or data, and is evolving such that technology solutions, security policies, and operational procedures alone cannot protect resources. In many cases, individuals prove to be the largest vulnerability in a network, cyber practitioners need to understand how to effectively defend against or exploit such vulnerabilities.
Credits: 3-0-3
Offered: Spring
Prerequisites: None

Course:

SY306  Web & Database Cyber Operations

Description: The course covers basic web-based application development with a database back-end, with a focus on security. Topics include client side and server side web applications development, the SQL language for relational databases, web authentication, secure web protocols, attack and defense of web-based applications with a database back-end.
Credits: 2-2-3
Offered: Spring
Prerequisites: SY301

Course:

SY308  Security: Fundamental Principles

Description: This course is an introduction to computer, network and information security. Students will learn the fundamental principles of security while studying various topics including basic cryptography, buffer overflow attacks, various protocols, and firewalls. SY308 is a required course for students in the Cyber Operations major.
Credits: 2-2-3
Offered: Spring
Prerequisites: SY301

Course:

SY310  Networking & Mobile Computing

Description: An introduction to wired and wireless communications and associated vulnerabilities at the physical, data link and network layers of the TCP/IP model. The theme of this course is for the student to understand the entire communication cycle as it pertains to wired and wireless computer networks and communications systems. Beginning with electromagnetic spectrum and the fundamentals that govern its use, each student will learn the unique implications of operating in a wireless environment. The student will demonstrate applications of interdependent networks, including the Internet and telecommunications networks within the cyberspace domain. Additionally, the student will understand electronic engineering and tactics in support of spectrum dominance and retaining strategic advantage to open and closed networks.
Credits: 2-3-4
Offered: Spring
Prerequisites: SM224 & SP212

Course:

SY401  Cyber Operations I

Description: Provides exposure into the operational approach of employing offensive capabilities in the cyberspace domain, presenting pertinent information focused primarily on: offensive cyber operations methodology to include information gathering, reconnaissance, initial access, exploitation, and enumeration; through the use of open source tools (exploits and malicious software), tactics, techniques and procedures.
Credits: 2-2-3
Offered: Fall
Prerequisites: SY304 & SY308

Course:

SY402  Cyber Operations II

Description: Cyber Operations II is a hands on course where students work to develop an understanding of Cyber Defense via the development of tools and techniques to understand their networks, identify risks, and determine when their networks may be compromised.  Using their skills developed in SY401, the students are now asked to identify when threats are acting upon their network and systems. 
Credits: 2-2-3
Offered: Fall
Prerequisites: SY401

Course:

SY403  Cyber Planning & Policy

Description: A growing dependence on military and intelligence networks and the networking of our critical national infrastructure can quickly become vulnerabilities. This course will develop a political and economic framework for analyzing cyber power. The course will cover the body of thought that impinges on cyber matters and provides a synthesis of this information in a variety of decision-making contexts.
Credits: 3-0-3
Offered: Fall
Prerequisites: FP130

Course:

SY406  Cyber Law & Ethics

Description: This course examines many of the legal and ethical challenges that cyber operations professionals confront in the public and private sectors.  The course begins with an in-depth review of the provisions of the United States Constitution that shape the cyber operations of the military and civilian government agencies.  The course then reviews the statutes and regulations that provide the government with the authority to conduct cyber operations, as well as the limits that the statutes impose. The course examines the interplay between public-sector and private sector cybersecurity efforts, and the state and federal laws that regulate private-sector cybersecurity.  We also explore the ethical considerations that apply to cyber operations.
Credits: 3-0-3
Offered: Spring
Prerequisites: FY403
go to Top