Cybersecurity and Risk Management
CYBR 3320 Operating Systems and Networking (3 semester credit hours) Addresses key concepts of operating systems and networking. Explores how operating systems manage hardware resources, process scheduling, memory management, file systems, and security. Covers networking principles, including network architecture, protocols, IP addressing, and the basics of data transmission. Strengthens foundational understanding of how operating systems and networks work. (Same as ITSS 3320) (3-0) S
CYBR 4090 Cybersecurity and Risk Management Internship (0 semester credit hours) Designed to further develop a student's knowledge of cybersecurity and risk management through appropriate developmental work experiences in a true organizational setting. Tasks will include identifying and submitting specific business learning objectives (goals) at the beginning of the semester. Performance is evaluated by the work supervisor. Credit/No Credit only. May be repeated if internships differ. Department consent required. (0-0) S
CYBR 4333 Enterprise Risk Management (3 semester credit hours) Study of the risks and exposures to loss affecting businesses and non-profit entities, including pure, financial, operational, and strategic risk. Data collection, analysis, and evaluation methods are explored using risk modeling principles. Risk management program objectives, goals, and management are presented along with the tools for identification, treatment, and financing of risk. Prerequisites: Senior standing and FIN 3370. (Same as FIN 4333 and RMIS 4333) (3-0) S
CYBR 4338 Foundations of Risk Analytics and Applications (3 semester credit hours) Enhanced data-driven decision making is an essential component of a successful organization's risk management and insurance program. This course provides a fundamental understanding of analytical techniques for big data. All business students will benefit from exploring the Internet of Things, data mining techniques, social network analysis, predictive modeling concepts, and the development of a data analytics strategy to help achieve superior business results. Prerequisite or Corequisite: FIN 3320 or FIN 3370 or RMIS 3370. (Same as FIN 4338 and RMIS 4338) (3-0) Y
CYBR 4353 Principles of Information Security (3 semester credit hours) Examines the organizational risks from technological advancements in an interconnected world. With growing concerns about cybersecurity, students explore the various components of information systems, review systems control functions to reduce vulnerabilities, delve into the basics of developing a cybersecurity program, and gain insights into the challenges of policy making to prevent information loss. (Same as FIN 4353 and RMIS 4353) (3-0) Y
CYBR 4354 Cybersecurity Risk Management (3 semester credit hours) Explores the risk management concept and process for managing an organization's information systems. Theories of risk and methodologies will be explored to provide an opportunity to examine risk from various levels and dimensions to reduce organizational outcomes. Examines the basic frameworks and models to enhance cybersecurity measures. (Same as FIN 4354 and RMIS 4354) (3-0) Y
CYBR 4356 Data Governance (3 semester credit hours) Explore the principles, goals, and business drivers of data governance. Topics include metadata, data quality, master and reference data management, and appropriate uses of data and ethics. Evaluate various implements of data governance in organizations. Structured around the Certified Data Management Professional (CDMP) exam. Prerequisite: ITSS 3300. (Same as ITSS 4356) (3-0) S
CYBR 4357 Digital Forensics and Incident Management (3 semester credit hours) Discusses methods and techniques for responding to security incidents and breaches and in-depth coverage of digital forensics of client devices, databases, web servers, application servers, and computer networks. Focuses on public relations and crisis communications, AI (offensive AI), and cyber warfare. Use and application of data analysis techniques in support of forensic efforts and chain of evidence are also discussed. (Same as ITSS 4357) (3-0) Y
CYBR 4358 Applied Cybersecurity Analytics and AI (3 semester credit hours) Examine security and analytics through hands-on exercises, identifying security gaps with simulated data (application logs, network monitor logs, firewall logs, etc.), and creating predictions about potential security threats that could exploit the gaps. Uses AI to help monitor and detect potential security breaches. Explore how to identify security flaws and predict an organization's security position. (Same as ITSS 4358) (3-0) Y
CYBR 4359 Preparing for Cybersecurity Threats (3 semester credit hours) Discusses the current threat environment and specific risk mitigation countermeasures that should be deployed. Exposure to material through hands-on lab and analysis of well-publicized hacks, on how to build and manage secure networks, and specific steps necessary to harden the technology environment and reduce vulnerabilities before they can be exploited. (Same as ITSS 4359) (3-0) Y
CYBR 4360 Network and Information Security (3 semester credit hours) With the advances in information technology, the security of information assets has become a keenly debated issue for organizations. While much focus has been paid to technical aspects of the problem, managing information security requires more than technology. Effective information security management demands a clear understanding of technical as well as socio-organizational aspects of the problem. The purpose of this course is to prepare business decision makers who recognize the threats and vulnerabilities present in current information systems and who know how to design and develop secure systems. Prerequisites: ITSS 3300 and (MATH 1325 or MATH 2413 or MATH 2417) and (CS 2305 or MATH 2418 or MATH 2333 or OPRE 3333). (Same as ITSS 4360) (3-0) Y
CYBR 4361 Information Technology Cybersecurity (3 semester credit hours) IT Security in eight security domains. Security and risk management (legal, regulatory compliance). Asset security (data classification, ownership, data security, privacy). Security engineering (security architecture, design, security models). Telecommunication and network security (perimeter protection, network attacks, IDS, IPS, firewalls). Identity and access management (authentication, authorization, identity as a service). Security assessment and testing. Security operations (business continuity, disaster recovery, incident management, vulnerability, patch management). Software development security. Course designed as preparation for Security + exam and Certified Information Systems Security Professional (CISSP) exam. Prerequisite: ITSS 4360 or CYBR 4360. (Same as ITSS 4361) (3-0) S
CYBR 4362 Cybersecurity Governance (3 semester credit hours) Delves into the importance of Cybersecurity Governance, Risk, and Compliance. Covers governance methodologies, audits relating to information security, internal and external information security policy, standards and baselines, as well as compliance driven by laws, rules and regulations. Also focuses on developing an understanding of the vital role that Information and Cyber Security play in achieving and supporting the overall objectives of an organization. Prerequisite: ITSS 4360 or CYBR 4360. (Same as ITSS 4362) (3-0) S