Cyber Safety and Security

10

This track allows students to focus on knowledge and skills related to the vulnerabilities, threats, protections, investigations and legalities associated with technology systems.

FALL 2021 Course Descriptions

Course options WITH computational/digital focus:

CDT 37200 - Section 01 or 02: Tec Dev in Cyber Sec. Forensic taught by Mitch Kajzer
This course requires department approval and is devoted to special cybercrime projects. The course is project oriented and is devoted to two broad topics in Cybercrime: Cybercrime and Technology, and Cybercrime and the Law. Effectively, these two topics constitute two sections of the course. Section 01 (Prof. Kajzer) will involve cybercrime projects related to technology, while Section 02 (Prof. Tamashasky) will involve projects related to the law. Students should elect the section of most interest to them. Students will meet online with instructors and will define a project that will involve online research and a final paper in written form. The syllabus will contain guidelines for what constitutes passing performance.

CDT 37300 Spec Proj in Cybercrime & Law taught by Mitch Kajzer
This course is intended to be used only for special Cybercrime and CyberLaw projects that are approved in advance by an advisor and by CDT. Special requirements and arrangements must be made to take this course.

CDT 40200 Privacy & Security taught by James Smith
This course provides students with a practical, hands-on exposure to information security topics. This course follows the curriculum for the industry standard Security+ certification program. Students successfully completing this course will be prepared to take the Security+ certification exam. This credential is a valuable way to demonstrate knowledge of information security topics to potential employers.

Students completing this course will be prepared to address the information security issues facing managers and
leaders in any organization. The course is also an excellent starting point for those seeking a career in information
security or risk management consulting. Specific topics covered include:

  • Network Security
  • Compliance and Operational Security
  • Threats and Vulnerabilities
  • Application, Data and Host Security
  • Access Control and Identity Management
  • Cryptography

CDT 40211: Psychology of Info Analysis taught by Mitch Kajzer
The world is full of information that we are continuously evaluating. As part of the human thought process, we build mental models through which we process, analyze, and form conclusions as to the meaning of that information. This is a natural function of the human cognitive process. We construct our own version of reality based on the information that we have. The problem with this is that we frequently make judgments on large amounts of incomplete and ambiguous information. This is something that the mind is poorly wired to deal with effectively. In addition, we often fail to recognize our inherent biases in evaluation, cause & effect, and estimating probabilities. Some of these biases include confirmation, hindsight, anchoring, availability, and self-serving. The pitfalls set by the human mental process for analyzing information cannot be eliminated; they are part of us. What can be done is to learn how to look for and to recognize these mental obstacles, and how to develop procedures designed to offset them. We must distinguish between what you know and what you believe. The difference between fact and opinion; between knowledge and thinking. Through primary source readings and a declassified book from a government intelligence agency, students will learn how to be self-conscious about their reasoning processes. Students will learn techniques for critical thinking, creative thinking, and analytical thinking. About how you make judgments and reach conclusions, not just about the judgments and conclusions themselves. The goal is to equip students with the thinking and reasoning skills necessary to better construct a more accurate reality.

CDT 40220 Cybercrime and the Law taught by Eric Tamashasky
Almost all crimes, or even human interactions, contain a digital component. The fact that "old" laws don't always fit "new" problems is no more apparent than in the area of cybercrimes. This course will include discussion of topics including: the methodology of typical cyber investigations, the application of the Fourth Amendment to digital evidence, and different types of cyber-specific laws enforced today. The course will also focus on the responses of both courts and legislators to the ever-evolving issues presented by computer crimes.

SPRING 2021 Course Descriptions

Course options WITH computational/digital focus:

CDT 30200 Privacy and Security taught by Jared Bulosan
In today’s digital age, people and organizations produce and deal with unprecedented amounts of data. Thus, issues concerning information privacy and security have taken on critical importance. Information privacy and security are fundamentally about data protection. Information privacy refers to decisions around what information should be protected, from whom, why, and issues related to the ownership of information; whereas information security refers to the tactics and technologies to ensure data protection. In this course, we will address questions such as: How should organizations manage privacy and security issues? What are the various privacy and security threats that organizations and individuals face? What are the current advancements in privacy and security technologies and government regulations? We will learn about economics of privacy, biases and heuristics in privacy decisions, privacy ethics, social engineering, and public policy and regulations. Also, we will gain an understanding of security threats and gain insight into managerial best practices for managing information security. This course will involve a number of assignments along with interactive in-class exercises aimed at enhancing your privacy and security decisions.

CDT 37200 - Section 01 or 02: Tec Dev in Cyber Sec. Forensic taught by Mitch Kajzer
This course requires department approval and is devoted to special cybercrime projects. The course is project oriented and is devoted to two broad topics in Cybercrime: Cybercrime and Technology, and Cybercrime and the Law. Effectively, these two topics constitute two sections of the course. Section 01 (Prof. Kajzer) will involve cybercrime projects related to technology, while Section 02 (Prof. Tamashasky) will involve projects related to the law. Students should elect the section of most interest to them. Students will meet online with instructors and will define a project that will involve online research and a final paper in written form. The syllabus will contain guidelines for what constitutes passing performance.

CDT 37300 Spec Proj in Cybercrime & Law taught by Mitch Kajzer
This course is intended to be used only for special Cybercrime and CyberLaw projects that are approved in advance by an advisor and by CDT. Special requirements and arrangements must be made to take this course.

CDT 40205 Computer Security taught by John McEachen
This course is a survey of topics in realm of computer security. This course will introduce the students to many contemporary topics in computer security ranging from PKIs (Public Key Infrastructures) to cyber-warfare to security ethics. Students will learn fundamental concepts of security that can be applied to many; traditional aspects of computer programming and computer systems design. The course will culminate in a research project where the student will have an opportunity to more fully investigate a topic related to the course. Instructor permission required

CDT 40216 Advanced Digital Forensics taught by Mitch Kajzer
This course is designed for students who are already familiar with the basic principles of digital forensics and are looking to expand their knowledge and skill set.  Students will learn how to conduct digital forensics on multiple items, including computers, RAM, USB devices, cloud accounts, iOS device, and Android devices. Digital evidence recovered during this process will lead students to tell the story of the evidence and determine the who, what, where, when, why, and how of a digital incident.  The majority of class instruction in this course is hand-on and requires that students be familiar with basic computer operation and navigation. This course also prepares students to test for the optional industry certification of Magnet Certified Forensic Examiner.