Skip to Main Content
Navigated to CYS Courses.

Course 

Description

CYS 101 Introduction to Information Security

This course is designed to introduce students in any major to the Computer Security field. Students will be introduced to main domains of Information Security and Information Assurance as represented in the COMPTIA Certification exam Security Plus.

Credits: 3
Prerequisite(s): None

CYS 131 Computer Science I

This is the first course in the computer science major sequence. The course introduces the object-oriented approach to software design using the programming language Java. Topics covered are software design, implementation and testing, basic computer organization and source code translation. No previous programming experience is presupposed.
 
Credits: 3
Prerequisite(s): None

CYS 170 Computer Architecture and Operating Systems

The course will provide a working knowledge of computer hardware and the basic operating systems of DOS and Windows. The course will focus on the creation, maintenance, and destruction of data stored in electronic form. The configuration and connection of peripheral equipment and the installation of network hardware and cabling are explored.

Credits: 3
Prerequisite(s): None

CYS 132 Computer Science II

This is the second course in the computer science major sequence. The course utilizes the object-oriented design approach to building applications, which emphasizes the creation and utilization of reusable software tools. Students are introduced to data structures that are commonly encountered in building software applications and to the analysis of the efficiency of algorithms used to solve problems. The programming language Java is used to implement software designs.
 
Credits: 3
Prerequisite(s): CYS 131

CYS 231 Computer Organization

A study of the organization of computer systems. Topics include the representation of information, conventional machine and assembly language, circuit design, and organization of the major components of a computer, e.g. the CPU, memory, I/O devices, etc. Students will become familiar with assembly language programming and will use simulators to learn about hardware components.
 
Credits: 3
Prerequisite(s): CYS 131

CYS 254 Computer Networks

A study of computer networks based on the OSI model of a layered network architecture. The TCP/IP protocol suite is used to illustrate network protocols. The course includes an overview of local area networks, routing algorithms, and network applications. The course consists of three lecture hours and one two -hour laboratory per week. The laboratory component provides experience in network programming using sockets.
 
Credits: 3
Prerequisite(s): CYS 132

CYS 313 Financial Investigations

This course is designed to introduce and apply financial investigative techniques to the detection and resolution of criminal activity. It includes an in-depth discussion of financial investigative approaches, law and legal concepts guiding criminal prosecutions in the United States, concepts of evidence and procedure, the movement of money through financial institutions, tracing money through a business including discussions of business organization and accounting systems, various methods of tracing funds and interviewing techniques used in these investigations.

Credits: 3
Prerequisite(s): None

CYS 333 Information Security

With the expansion of global networks, organizations have an increasing need to understand how to protect critical information assets from a myriad of threats. This course provides a broad overview of the field of information security, with a focus on security management practices. It covers terminology, history and the process of managing an information security program. The course includes a discussion of several of the ten domains which comprise the common body of knowledge for information security. This course sets the foundation for further study in computer and network security.

Credits: 3
Prerequisite(s): 60 earned credits

CYS 340 Intelligence Research Methods

This course is designed to introduce students to the intelligence process and its role in research and criminal investigations. Using analytic and database software, students will apply the intelligence process to basic research on topics in economic crime investigation, criminal justice and business. The course will culminate with students presenting their research on an assigned topic in both written and oral formats.

Credits: 3
Prerequisite(s): 60 earned credits

CYS 345 Computer and Network Security

This course will focus on the protection of the Confidentiality, Integrity, and Availability of information. Physical security and other security management topics will be discussed as they pertain to computer and network security. The identification and authentication of users and types of authentication will be covered. Lectures will include the discussion of formal security models and associated access controls. An emphasis will be placed on network security technologies including: firewalls/packet filtering and intrusion detection systems, business continuity planning/disaster recovery and the importance of logs and audits will also be covered.

Credits: 3
Prerequisite(s): CYS 254

CYS 350 Law of Economic Crime

Economic Crime Investigation focuses on those complex crimes designed to bring financial rewards to the offender. The course will examine substantive and procedural law affecting financial institutions, commercial businesses and their agents and employees in relation to economic and business-related crimes. This course will identify criminal statutes and case law applicable to economic crimes, and through a study of these will give students a thorough knowledge of the elements required to successfully identify, investigate and prosecute economic crimes.

Credits: 3
Prerequisite(s): 60 earned credits

CYS 354 Introduction to Network Security

Introduction to network security auditing.  Students will learn how to perform the different phases of an audit, including discovery and penetration, as well as how to prevent hackers from controlling your network.  This course introduces various tools to help students in the auditing process.  Students will be exposed to international standards, along with time-tested methods for auditing a network efficiently, and they will be able to use specific, practical tools for counteracting network attacks.  Finally, they will be able to analyze all findings and make informed recommendations for establishing the best security possible in a given scenario.
 
Credits: 3
Prerequisite(s): CYS 254

CYS 355 Computer Crime

The media reports terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in software and e-mail, corporate espionage on business networks, and crackers breaking into systems on the Internet. Computer criminals are becoming ever more technically sophisticated, and it’s an increasing challenge to keep up with their methods. This course will focus on computer crimes: what they are, how to prevent them, and how to detect, investigate and prosecute them if they do occur. Computer crime laws will also be covered. Other topics will include evidence collection during a computer crime investigation as well as the preparation and execution of a search warrant.

Credits: 3
Prerequisite(s): CYS 345 and CYS 354

CYS 360 Computer Forensics

A police officer makes a gruesome discovery, a body is found. Located near the corpse is a cellular telephone, a digital camera and a computer. The officer is unsure on how to proceed. On the other side of town, a search warrant of a business is being conducted. A server and the computers networked to it are believed to contain the evidence of a crime. The detectives are trying to decide on what to seize and how to take it. More and more crimes involve digital evidence that requires seizing, imaging and analysis. The evidence needs to be reviewed for possible investigative leads and for possible presentation in court. This course will focus on how to properly seize, image and examine digital evidence. It will include creating and verifying the duplicate image of digital evidence, analyzing the data to locate evidence, and recovering evidence.

Credits: 3
Prerequisite(s): CYS 355

CYS 365 Investigative Software Tools

Intelligence led policing and intelligence based investigative strategies are coming to the forefront of law enforcement. Private industry is also becoming increasingly aware of the strategic intelligence model as it applies to corporate planning, competitive practices and maintaining corporate integrity. This course is designed to introduce students to several key software tools that are widely used and considered essential for intelligence research and criminal investigations. These software tools will include, but not be limited to, Analyst Notebook, iBase, and Idea. Students will be given a thorough understanding of how to apply these tools in the course of the intelligence process and /or during the course of a criminal investigation. The course will culminate with students preparing a project using all the software tools introduced during the course.

Credits: 3
Prerequisite(s): 60 earned credits

CYS 375 AI: Machine Learning & Impact on Society

The course explores the full breadth and depth of the field of artificial intelligence (AI) and introduces the students to the latest technologies involving machine learning, deep learning, transfer learning, multiagent systems, robotics, natural language processing, causality, probabilistic programming, privacy, fairness, and safe AI. Using a unified approach to AI, the course demonstrates how the various subfields of AI fit together to build actual, useful programs. In-depth coverage of both basic and advanced topics provides students with a basic understanding of the frontiers of AI without compromising complexity and depth. Students are presented with the latest technologies and present concepts in a manner which includes expanded coverage of probabilistic programming; multiagent decision making; deep learning; and deep learning for natural language processing. Students will address issues concerning ethics, privacy, fairness, the future of work, and safe AI.

Credits: 3
Prerequisite(s):  CYS 254 and 60 earned credits

CYS 381 Business Continuity: Strategic Contingency Planning for Businesses and Organizations

Student will learn the development of business continuity management policies and planning. management process for a variety of business environments as well as management systems, tools and techniques needed to establish, monitor and maintain business continuity will be examined. Students will develop skills to create essential continuity plans for various businesses and organizations that identify vertical processes, required personnel, and procedures to preserve and secure vital records to continue operating during and after man-made or natural disasters.

Credits: 3
Prerequisite(s): 60 earned credits

CYS 410 Introduction to Cryptography

In this course, the key terms, concepts and principles of cryptography are defined and explained. Application of cryptographic techniques to ensure confidentiality, integrity, authentication, access control, and non-repudiation issues will also be covered. Other topics will include the history of classical cryptographic and cryptanalytic techniques, modern symmetric and asymmetric algorithms, Federal Information Processing Standard (FIPS) algorithms, random and pseudo­random number generators and cryptographic hash functions. Issues involving cryptographic application at various OSI layers in networking communications will also be discussed.

Credits: 3
Prerequisite(s): MA 235

CYS 450 Senior Seminar

This is the capstone course for ECI students. The primary goal of this course is to integrate previous learning experiences in a manner that will help students further develop their investigative, communication and problem-solving skills. The course uses a problem-based methodology which allows to students experience the key aspects of investigating and prosecuting an economic crime. Students also research, evaluate and discuss noteworthy current and historical fraud cases through written and oral presentations.

Credits: 3
Prerequisite(s): 90 earned credits

CYS 497 Student Teaching Assistantship

Teaching Assistant TA, or Student Assistant SA, handles helping Professors complete daily tasks within a classroom environment. Their duties include leading lessons or small group activities for students, reviewing student assignments in accordance with the Professors criteria and providing individual guidance to students with learning disabilities or behavioral challenges. The professor chooses the student to attend and assist the class for the semester.

Credits: 3
Prerequisite(s): Cybersecurity major, 90 earned credits

CYS 498 Internship

This course will place a student in an experiential situation with an agency or corporation. There are two major components: the student must work a minimum of 120 hours at the intern site and participate in weekly seminars.

Credits: 3
Prerequisite(s): Cybersecurity major, 90 earned credits