Course: |
SY110 Cyber Security I
|
Description: |
Introduction to Cyber Security is a hands-on lab-based course providing a technically focused introduction to the principles behind the use, function, and operation of computers, networks and applications with an emphasis on cyber security. |
Credits: |
2-2-3 |
Offered: |
Fall/Spring |
Prerequisites: |
None |
Coordinator: |
LCDR John Paramadilok |
Course: |
SY201 Cyber Fundamentals I
|
Description: |
This course will teach students problem solving skills in cyber-operations domain using the Python programming language on a Linux platform. Students will analyze the current cyber warfare threats and problems, and code Python programs to solve some of these and related problems. |
Credits: |
2-3-4 |
Offered: |
Fall |
Prerequisites: |
None |
Coordinator: |
Dr. April Edwards |
Course: |
SY202 Cyber Systems Engineering
|
Description: |
An introductory practicum that emphasizes interconnected cyber-physical systems, communications between those systems, the controls and the associated space in which these relationships exist. The student will demonstrate that cyberspace is a domain within the information and electromagnetic environment consisting of the interdependent network of information technology infrastructure, including the Internet, telecommunications networks, computer systems, and embedded processors and control systems. The theme of this course is for the student to understand that entire communication cycle as it pertains to the cyber physical and communications controls systems. |
Credits: |
2-2-3 |
Offered: |
Spring |
Prerequisites: |
SY201, SM223, SP211 |
Coordinator: |
Erick J. Rodriguez-Seda |
Course: |
SY204 Systems Programming & OS Fundamentals
|
Description: |
Students will expand their programming expertise through the exploration of systems level programming utilizing C. Additionally, students will learn the fundamental features and design of operating systems. The activities in the course will be covered from a cyber operations perspective. |
Credits: |
3-2-4 |
Offered: |
Spring |
Prerequisites: |
IC210/SI204/SY201 |
Coordinator: |
Dr. William Casey |
Course: |
SY205 Networking Operations and Analysis
|
Description: |
|
Credits: |
3-2-4 |
Offered: |
Spring |
Prerequisites: |
IC210/SI204/SY201 |
Coordinator: |
LCDR Slack |
Course: |
SY301 Data Structures for Cyber Operations
|
Description: |
This course will cover the usual Data Structures topics, with a focus on cyber-operations. Students will learn how complex data are represented in computer programs and how the implementation/interface distinction helps enable it. They will learn the most common abstract data types and the standard implementations of them. They will explore how complexity in representation enables more sophisticated software, but also creates complex vulnerabilities. Examples will segue into the Web and Database course. |
Credits: |
3-2-4 |
Offered: |
Fall |
Prerequisites: |
SY204 |
Coordinator: |
Travis Mayberry |
Course: |
SY303 Applied Cyber Systems Architecture
|
Description: |
A simple yet functional computer will be designed and implemented using NAND gates and D Flip-Flops. In this project-oriented course, groups will collaborate on each component of this modular system design. A hardware description language will be used to describe the sequential and combinational logic needed to implement each module. The computer will then be prepared to execute high-level object-oriented programs through the designs of an assembler, a virtual machine, and a compiler. Finally, a basic operating system will be designed to allow easy interfacing with the underlying hardware. As time permits, a final project will address a security concern in the overall system or utilize the system to implement an existing security algorithm. |
Credits: |
2-3-4 |
Offered: |
Fall |
Prerequisites: |
SY204 |
Coordinator: |
CDR Croteau |
Course: |
SY304 Human Factors in Cyber Operations
|
Description: |
This course will examine the "human factor" of cyber operations, the role of individuals and groups as a factor in cyber operations, with a focus on the use of social engineering techniques and non-standard approaches used to gain an advantage (technologically, militarily, economically, intellectually) in the cyber domain. Social Engineering is the art of exploiting human psychology to gain access to buildings, systems, or data, and is evolving such that technology solutions, security policies, and operational procedures alone cannot protect resources. In many cases, individuals prove to be the largest vulnerability in a network, cyber practitioners need to understand how to effectively defend against or exploit such vulnerabilities. |
Credits: |
3-0-3 |
Offered: |
Spring |
Prerequisites: |
None |
Coordinator: |
LCDR Hatfield |
Course: |
SY306 Web & Database Cyber Operations
|
Description: |
The course covers basic web-based application development with a database back-end, with a focus on security. Topics include client side and server side web applications development, the SQL language for relational databases, web authentication, secure web protocols, attack and defense of web-based applications with a database back-end. |
Credits: |
2-2-3 |
Offered: |
Spring |
Prerequisites: |
SY301 |
Coordinator: |
Dr. April Edwards |
Course: |
SY308 Security: Fundamental Principles
|
Description: |
This course is an introduction to computer, network and information security. Students will learn the fundamental principles of security while studying various topics including basic cryptography, buffer overflow attacks, various protocols, and firewalls. SY308 is a required course for students in the Cyber Operations major. |
Credits: |
2-2-3 |
Offered: |
Spring |
Prerequisites: |
SY301 |
Coordinator: |
Travis Mayberry |
Course: |
SY310 Networking & Mobile Computing
|
Description: |
An introduction to wired and wireless communications and associated vulnerabilities at the physical, data link and network layers of the TCP/IP model. The theme of this course is for the student to understand the entire communication cycle as it pertains to wired and wireless computer networks and communications systems. Beginning with electromagnetic spectrum and the fundamentals that govern its use, each student will learn the unique implications of operating in a wireless environment. The student will demonstrate applications of interdependent networks, including the Internet and telecommunications networks within the cyberspace domain. Additionally, the student will understand electronic engineering and tactics in support of spectrum dominance and retaining strategic advantage to open and closed networks. |
Credits: |
2-3-4 |
Offered: |
Spring |
Prerequisites: |
SM224 & SP212 |
Coordinator: |
LCDR Shey |
Course: |
SY401 Cyber Operations I
|
Description: |
How do we exploit the adversary in Cyberspace? How do we operate in and through this domain and what is required of a Cyber Operator to be successful? What are the tools, tactics, techniques and procedures to conduct Offensive Cyberspace Operations (OCO)? This course is here to answer those questions and many more. Focusing on understanding the fundamentals of the tools and techniques, how to embrace failure, unlock your creativity, and persevere. This course is structured methodically to represent and end-to-end OCO, and challenges you in the same manner you would expect to experience as a Cyber Operator. After this course MIDN will understand what it takes to be a Cyber Operator, have an understanding of end-to-end Offensive Cyber Operations (OCO), and acquire the requisite skills to achieve desired effects. |
Credits: |
2-2-3 |
Offered: |
Fall |
Prerequisites: |
SY304 & SY308 |
Coordinator: |
Dennis Dias |
Course: |
SY402 Cyber Operations II
|
Description: |
How do we build and defend large networks? How do organizations handle risk? How do we understand all of the information that is out there? This course is here to answer those questions and many more. Focusing on understanding the technology, how everything is connected, and how best to manage it. The course is divided into four areas: The Foundations on which Networks are Built, Network and Host Intrusion Detection, Data, and Understanding & Managing Risk. After the course, you should be able to understand effective ways in which to layout large networks, the importance of protecting the data, and understand the associated risks that having networked data creates. |
Credits: |
2-2-3 |
Offered: |
Fall |
Prerequisites: |
SY401 |
Coordinator: |
Dennis Dias |
Course: |
SY403 Cyber Planning & Policy
|
Description: |
A growing dependence on military and intelligence networks and the networking of our critical national infrastructure can quickly become vulnerabilities. This course will develop a political and economic framework for analyzing cyber power. The course will cover the body of thought that impinges on cyber matters and provides a synthesis of this information in a variety of decision-making contexts. |
Credits: |
3-0-3 |
Offered: |
Fall |
Prerequisites: |
FP130 |
Coordinator: |
LCDR Hatfield |
Course: |
SY406 Cyber Law & Ethics
|
Description: |
This course examines many of the legal and ethical challenges that cyber operations professionals confront in the public and private sectors. The course begins with an in-depth review of the provisions of the United States Constitution that shape the cyber operations of the military and civilian government agencies. The course then reviews the statutes and regulations that provide the government with the authority to conduct cyber operations, as well as the limits that the statutes impose. The course examines the interplay between public-sector and private sector cybersecurity efforts, and the state and federal laws that regulate private-sector cybersecurity. We also explore the ethical considerations that apply to cyber operations. |
Credits: |
3-0-3 |
Offered: |
Spring |
Prerequisites: |
FY403 |
Coordinator: |
Jeff Kosseff |