Cyber Safety and Security


This track allows students to focus on knowledge and skills related to the vulnerabilities, threats, protections, investigations and legalities associated with technology systems.

Course options with computational/digital focus:

CDT 30200 Privacy and Security formerly Networking and Security taught by Jason Williams (SPRING)
In today’s digital age, people and organizations produce and deal with unprecedented amounts of data. Thus, issues concerning information privacy and security have taken on critical importance. Information privacy and security are fundamentally about data protection. Information privacy refers to decisions around what information should be protected, from whom, why, and issues related to the ownership of information; whereas information security refers to the tactics and technologies to ensure data protection. In this course, we will address questions such as: How should organizations manage privacy and security issues? What are the various privacy and security threats that organizations and individuals face? What are the current advancements in privacy and security technologies and government regulations? We will learn about economics of privacy, biases and heuristics in privacy decisions, privacy ethics, social engineering, and public policy and regulations. Also, we will gain an understanding of security threats and gain insight into managerial best practices for managing information security. This course will involve a number of assignments along with interactive in-class exercises aimed at enhancing your privacy and security decisions.

CDT 40200 Privacy & Security taught by James Smith (FALL)

This course provides students with a practical, hands-on exposure to information security topics. This course follows the curriculum for the industry standard Security+ certification program. Students successfully completing this course will be prepared to take the Security+ certification exam. This credential is a valuable way to demonstrate knowledge of information security topics to potential employers.

Students completing this course will be prepared to address the information security issues facing managers and
leaders in any organization. The course is also an excellent starting point for those seeking a career in information
security or risk management consulting. Specific topics covered include:

  • Network Security
  • Compliance and Operational Security
  • Threats and Vulnerabilities
  • Application, Data and Host Security
  • Access Control and Identity Management
  • Cryptography

CDT 40205 Computer Security taught by Walter Scheirer (SPRING)
This course is a survey of topics in realm of computer security. This course will introduce the students to many contemporary topics in computer security ranging from PKIs (Public Key Infrastructures) to cyber-warfare to security ethics. Students will learn fundamental concepts of security that can be applied to many; traditional aspects of computer programming and computer systems design. The course will culminate in a research project where the student will have an opportunity to more fully investigate a topic related to the course. Instructor permission required

CDT 40210 Digital and Forensic Psychology
taught by Mitch Kajzer (NOT OFFERED AT THIS TIME)
The use and interaction with digital devices is a part of daily life. This course will introduce students to the principles of forensic psychology as they apply to cybercrime offenses along with the field of computer forensics techniques and methodologies. Topics to be covered include the motivations of hackers, online child offenders, cyber stalkers, and identity thieves along with electronic discovery, Windows forensic analysis procedures, and Macintosh forensic analysis procedures.

CDT 40215 Intro to Digital Forensics taught by Mitch Kajzer (FALL)
Digital devices and communications are a part of daily life. This course will provide students with an introduction to the field of digital analysis and e-discovery. Topics to be covered include the scientific method of digital analysis, electronic discovery, legal issues related to digital analysis, network investigations, and mobile technologies. Students will learn basic procedures and hardware/software requirements for conducting digital analyses on Windows and Macintosh computer systems along with iOS and Android mobile devices.

CDT 40216 Advanced Digital Forensics taught by Mitch Kajzer (SPRING)
This course is designed for students who are already familiar with the basic principles of digital forensics and are looking to expand their knowledge and skill set.  Students will learn how to conduct digital forensics on multiple items, including computers, RAM, USB devices, cloud accounts, iOS device, and Android devices. Digital evidence recovered during this process will lead students to tell the story of the evidence and determine the who, what, where, when, why, and how of a digital incident.  The majority of class instruction in this course is hand-on and requires that students be familiar with basic computer operation and navigation. This course also prepares students to test for the optional industry certification of Magnet Certified Forensic Examiner.

CDT 40220 Cybercrime and the Law taught by Eric Tamashasky (FALL)
Almost all crimes, or even human interactions, contain a digital component. The fact that "old" laws don't always fit "new" problems is no more apparent than in the area of cybercrimes. This course will include discussion of topics including: the methodology of typical cyber investigations, the application of the Fourth Amendment to digital evidence, and different types of cyber-specific laws enforced today. The course will also focus on the responses of both courts and legislators to the ever-evolving issues presented by computer crimes.

CDT 43210 Forensic Psychology Seminar taught by Mitch Kajzer (NOT OFFERED AT THIS TIME)
This discussion-oriented seminar will examine specific topics in the field of forensic psychology.   In this section, we will explore the psychology of mass-shooters.  Through current research and investigations, we will examine characteristics of mass shooters and discuss these characteristics as they relate to notable mass-shooting cases.  Students will be required to complete an extensive project where they will critically analyze evidence (Internet postings, messages, notebook writings, computer forensics reports) and form an opinion about a mass-shooter case that was discovered and thwarted by law enforcement several years ago.