Notice: wpcf7_remove_shortcode is deprecated since Contact Form 7 version 4.6! Use wpcf7_remove_form_tag instead. in /home/wwwgeneral/sites/parker/dev5/www/wp-content/plugins/contact-form-7/includes/functions.php on line 374

Notice: wpcf7_remove_shortcode is deprecated since Contact Form 7 version 4.6! Use wpcf7_remove_form_tag instead. in /home/wwwgeneral/sites/parker/dev5/www/wp-content/plugins/contact-form-7/includes/functions.php on line 374

Deprecated: wp_make_content_images_responsive is deprecated since version 5.5.0! Use wp_filter_content_tags() instead. in /home/wwwgeneral/sites/parker/dev5/www/wp-includes/functions.php on line 4777

Deprecated: wp_make_content_images_responsive is deprecated since version 5.5.0! Use wp_filter_content_tags() instead. in /home/wwwgeneral/sites/parker/dev5/www/wp-includes/functions.php on line 4777

Deprecated: wp_make_content_images_responsive is deprecated since version 5.5.0! Use wp_filter_content_tags() instead. in /home/wwwgeneral/sites/parker/dev5/www/wp-includes/functions.php on line 4777

Deprecated: wp_make_content_images_responsive is deprecated since version 5.5.0! Use wp_filter_content_tags() instead. in /home/wwwgeneral/sites/parker/dev5/www/wp-includes/functions.php on line 4777

Deprecated: wp_make_content_images_responsive is deprecated since version 5.5.0! Use wp_filter_content_tags() instead. in /home/wwwgeneral/sites/parker/dev5/www/wp-includes/functions.php on line 4777

Deprecated: wp_make_content_images_responsive is deprecated since version 5.5.0! Use wp_filter_content_tags() instead. in /home/wwwgeneral/sites/parker/dev5/www/wp-includes/functions.php on line 4777
Computer Information Systems Cybersecurity Degree Program - Parker University

CIS Curriculum CyberSecurity Concentration

CyberSecurity Concentration:

18 Total credit hours

credit hours

This course will introduce students to digital forensics as practiced by local, state, and federal law enforcement. Students will gain hands-on experience with several digital forensic tools in this laboratory based course. Students taking this course will become familiar with the emerging responsibilities of cybercrime investigators, as well as developing a hands-on working knowledge of software commonly used at many law enforcement agencies. The course will use “Encase Tools” for laboratory activities.

Prerequisites: BCIS 1301 Fundamentals of Computer Information Systems

3

This course is designed to acquaint students with the security threats posed by both terrorist and criminal activity, and with strategies to combat these threats. Terrorism and security are defined as well as terrorism in its historical context. Varieties of terrorist groups, organizations and their actions are studied with targets of terrorism being a focus. Types of crime including street, employee, organization and white collar crime are studied.

3

This course will cover events such as identify theft, physical security during international travel, or invasion of one’s privacy. Focus will be on incidents such as cyber-crimes, fires, flooding, financial frauds, kidnapping of employees, and expropriation of resources. Covers the following conceptual areas: business risks and the management of business risk, IT risk as a component of business risk, the need to manage IT risks, and the basic type of controls required in a business system in order to control IT risks. Issues associated with new risks created by the use of the internet for business applications and electronic businesses are also covered.

3

This course will cover Network Security Policies and implementation of firewall policies, stateful firewalls, and firewall appliances. Network-related physical security, risk management and disaster recovery/contingency planning issues and housekeeping procedures.

3

This course covers the principles and practices of implementing computer database security in modern businesses and industries, including database security principles, database auditing, security implementation and database reliability. Focus will be on issues related to the design and implementation of secure data stores. Emphasis will be placed on multi-level security in database systems, covert channels, and security measures for relational and object-oriented database systems.

Prerequisites: BCSC 2305 Security Policy Analysis and Implementation

3

This course will cover the process of gathering Information Intelligence, identifying and solving Security Vulnerabilities, develop Exploits, scan and Produce Vulnerability Assessments and application of Network Attacking Techniques. Message authentication codes and key management. WLAN security, IPSec, SSL, and VPNs are also included in the topics to be covered.

Prerequisites: BCSC 2305 Security Policy Analysis and Implementation

3