Fall 2022 COVID-19 CAMPUS-WIDE GUIDELINES

Department Information

Location:

Office Hours:

Contact:

SCHOOL OF ARTS AND SCIENCES

cyber security computer

WHAT IS CYBERSECURITY?

Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems. A strong cybersecurity strategy can provide a good security posture against malicious attacks designed to access, alter, delete, destroy or extort an organization’s or user’s systems and sensitive data. Cybersecurity is also instrumental in preventing attacks that aim to disable or disrupt a system’s or device’s operations.

The Goal of Cybersecurity
The ultimate goal of cybersecurity is to protect the information from being stolen or compromised. To achieve this we look at 3 fundamental goals of cybersecurity.

Protecting the Confidentiality of data

Keeping the sensitive data private and accessible to only authorized users.

Preserve the integrity of data.

Designed to protect the data from unauthorized access and ensure its reliability, completeness and correctness.

Restricting the Availability of data only to authorized users

Authorized users can have access to system resources and data as and when they need it.

Stillman College Minor Degree in Cybersecurity

The Cybersecurity Minor Program uses IBM curriculum and is available to
any degree discipline. Upon completion of the program student receives an IBM Digital Badge. Courses for the program are as follows:

Course Description (as it will appear in the Catalog, including prerequisites and co-requisites):

This course prepares students to understand the body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access. Cybersecurity landscape is a collection of best practices, technologies, frameworks, and standards to protect an enterprise, organization, government entity, individual user from global cyber threats.

Course Description (as it will appear in the Catalog, including prerequisites and co-requisites):

This course prepares students to understand the basic knowledge of networking and provides an understanding of how networks are built and operate and give students some experience with basic network analysis tools. Students are exposed to the concept of potential vulnerabilities in a network. Also prepares students to understand how Mobile Technologies & IoT Security course is designed and provides students with an understanding of the hardware, communications, management, and programming environments associated with mobile technologies.

Course Description (as it will appear in the Catalog, including prerequisites and co-requisites):

This course teaches the student to understand Cyber threat intelligence (CTI). The student learns that cyber threat intelligence is what cyber threat information becomes once it has been collected, evaluated in the context of its source and reliability, and analyzed through rigorous and structured tradecraft techniques by those with substantive expertise and access to all-source information. Like all intelligence, cyber threat intelligence provides a value-add to cyber threat information, which reduces uncertainty for the consumer, while aiding the consumer in identifying threats and opportunities. It requires that analysts identify similarities and differences in vast quantities of information and detect deceptions to produce accurate, timely, and relevant intelligence. This includes information about threats and threat actors that helps mitigate harmful events in cyberspace. Cyber threat intelligence sources include open-source intelligence (OSINT), social media intelligence (SOCMINT), human intelligence (HUMINT), technical intelligence or intelligence from the deep and dark web. The primary purpose of threat intelligence is to help organizations understand the risks of the most common and severe external threats, such as zero-day threats, and other malware. This course focuses on the fundamentals and the application of threat intelligence to cybersecurity.

Course Description (as it will appear in the Catalog, including prerequisites and co-requisites):

This course uses a combination of lectures and hands-on exercises to demonstrate the use of best practices in developing secure software applications and the tools for investigating anomalies and vulnerabilities in application software. Students will engage in a variety of course assignments focusing on related topics, including buffer overflow, structured query language (SQL) injections, selected programming and scripting languages, and the security of web applications on both the client and server-side.

Course Description (as it will appear in the Catalog, including prerequisites and co-requisites):

This course provides students with a basic understanding of technologies and services that enable cloud computing, different types of cloud computing models and the security and legal issues associated with cloud computing.

Course Description (as it will appear in the Catalog, including prerequisites and co-requisites):

This course builds on the foundations of Cyber Intelligence which focuses on applying intelligence analytic methods to plan, collect, process, analyze, produce and disseminate cyber intelligence products. Students will learn to apply intelligence analytic methods to create actionable intelligence products that support a cybersecurity mission.  Cyber security intelligence incorporates threat intelligence, threat analysis and other forms of securing computer networks taught in other courses of the curriculum.

Course Description (as it will appear in the Catalog, including prerequisites and co-requisites):

This course provides information about the security team responsible for monitoring and analyzing an organization’s security posture on an ongoing basis. Its mission is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set of processes. A Security Operations Center (SOC) helps improve security and compliance by consolidating key security personnel and event data in a centralized location. This block of instruction will cover the people, processes, and technology necessary to build a Security Operations Center.

Job Growth

Cyber security professionals work in nearly every sector and industry – public and private, for profit and nonprofit, at businesses and organizations large, and small:

  • Technology, Government, Banking, and Finance
  • Insurance, Healthcare
  • Law enforcement and Telecommunications
Careers
Cyber security professionals, or information security analysts, have a wide range of responsibilities, but the crux of their job is to protect online data form being compromised. As more of our personal information is stored online, the more important it becomes to step up security. Cyber security careers are complex and many roles can be found with banks, retailers and government organizations. On the job, you can expect to safeguard an organization’s files and network, install firewalls, create security plans and monitor activity. If a breach occurs, you’ll be responsible for identifying the problem and finding a solution quickly. Because of the frequency of cyber attacks, careers are varied and qualified professionals are in demand. If you’re ready to get started in this fast-growing career, start exploring cyber careers now.
Average Pay Scale
Research studies show that cyber security professionals can earn an average of $105,736M annually or $55.77 per hour, for instance, while PayScale estimates that the average salary for computer security specialists is around $74,000, with location as a major factor in pay structure. Please visit the website below.

Testimonials

More Resources

Cyber Security in the Age of COVID-19

Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic (June,2021)

Cybersecurity Awareness

From ransomware and phishing to identity fraud and data breaches, cyber security threats are frequent and need to be addressed.

Vulnerabilities by types

File Upload Vulnerabilities are the third most common vulnerability type that were found in a vulnerability analysis of 1599 WordPress vulnerabilities over 14 months.

logo