Core courses in the graduate program will focus on methods, knowledge and leadership in cybersecurity. There are 13 courses that comprise the core content of the master's in Cybersecurity program.
CYB610 Intrusion Detection and Prevention
This course investigates the methods by which security professionals can detect and respond to individual and persistent threats. In depth labs provide the student with the skills needed to implement and manage an intrusion detection or prevention system, while solid foundational theory allows the students to utilize any upcoming technology that the future may provide.
CYB611 Cyberlaw and Cyberethics
This course helps students understand the legal and policy issues associated with the Internet. Tackling a full range of legal topics, it includes discussion of jurisdiction, intellectual property, contracts, taxation, torts, computer crimes, online speech, defamation and privacy. Sessions include recent, relevant cases, discussion questions and exercises at the end of each lesson. This will also encompass research and presentation skills for public and organizational use.
CYB620 Governance, Risk, and Compliance
This course details the requirements to properly govern and maintain a technical enterprise. Topics include: Corporate Governance, IT Governance and Strategies, Operational Risk, Governance, Risk, and Compliance (GRC) Technology and Tools, and International Guidance. This course will focus on conducting internal audits to meet regulatory guidelines and consulting initiatives.
CYB625 Incident Response, Disaster Recovery, and Business Continuity
This course examines incident response through planning, implementation, management, and review. The student will learn underlying technological requirements, business requirements, and tools for combating regulatory mandates. This will also provide a real-world analysis of human and non-human incidents in an international perspective.
CYB630 International Terrorism and Cyber Warfare
This course will introduce the student to terrorism history and concepts, criminal and terrorist motivations and differences, global terror and crime network analysis, methods of influence, fraud, digital network analysis concepts, and methods to analyze dark networks. The student will understand the underpinnings of the current and past terror movements and methods currently employed to detect and disrupt these phenomena.
CYB635 Operating Systems: Linux, Windows, Virtualization and Cloud
This course introduces the fundamental concepts to understand operating system design and usage. Topics include Windows Server (2016), Linux/UNIX, Virtualization (VMWare, Bochs, Xen, VirtualBox), and Cloud Computing. The student will be immersed in several operating systems, requiring proper configuration for network services and user administration. The student will be required to provide a research project involving the design, implementation, and management of a multiplatform and interoperable network.
CYB654 Principles of Cybersecurity
This course provides an introduction to the fundamentals of network security, including compliance and operational security; threats and vulnerabilities; application, data, and host security; access control and identity management; and cryptography. The course covers new topics in network security as well, including psychological approaches to social engineering attacks, Web application attacks, penetration testing, data loss prevention, cloud computing security, and application programming development security. The student will also gain presentation and management skills for information security projects.
CYB660 Secure Programming
This course will introduce the student to secure programming techniques and concepts that focus on common pitfalls programmers encounter when striving to publish their code. This includes handling input, buffer overflows, output and exceptions, and other common issues. There is also a focus on web-enabled systems and deployment of C and Java-based software.
CYB671 Digital Forensics
This course presents the leading programs for practical forensic techniques. The text introduces legal and technical challenges, offering detailed coverage of crucial topics such as mobile forensics, Mac forensics, cyberbullying, and child endangerment. The practical activities require the student to extract, analyze, and report on several different digital media, using hands-on mastery of modern digital forensics tools and techniques.
CYB672 Ethical Hacking
This course will investigate a multitude of topics needed to become an Ethical Hacker, Security Professional, or well-informed technology staff. This course will concentrate on real-world application of hacking techniques, ethical and spiritual motivations of malicious hackers, and defensive concerns for protecting systems. This course will provide a solid foundation for ethical hacking certifications and penetration testing with Metasploit.
CYB680 Principles of Cryptography
This course introduces the student to cryptographic concepts, tools, and techniques for both protection and malicious attack. The student will be introduced to cryptography attack algorithms and procedures, as well as, corrective procedures. This will include encryption algorithms, hashes, and usage scenarios for corporate and personal application. The student will be required to implement several cryptographic tools in laboratory exercises.
CYB690 Cloud Security
Cloud computing is used in every facet of private and public organizations around the world. This course discusses concepts related to cloud computing and provides insight into the risks and solutions to protect cloud computing resources.
Dr. Gordon Richards, Cybersecurity Program
grichards@geneva.edu, 724-847-6718
Graduate Enrollment Counselor
gradadmissions@geneva.edu, 724-847-6588