{"id":9946,"date":"2019-06-03T14:51:39","date_gmt":"2019-06-03T18:51:39","guid":{"rendered":"https:\/\/web.uri.edu\/cs\/?page_id=9946"},"modified":"2019-06-03T14:53:40","modified_gmt":"2019-06-03T18:53:40","slug":"course-descriptions","status":"publish","type":"page","link":"https:\/\/web.uri.edu\/cs\/academics\/minor-programs\/cyber-security-minor\/course-descriptions\/","title":{"rendered":"Course Descriptions"},"content":{"rendered":"<h1>Cyber Security Minor<\/h1>\n<section class=\"cl-wrapper cl-menu-wrapper\"><nav id=\"\" class=\"cl-menu  \" data-name=\"cyber-security-minor\" data-show-title=\"0\"><ul id=\"menu-cyber-security-minor\" class=\"cl-menu-list cl-menu-list-no-js\"><li id=\"menu-item-9790\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-9790\"><a href=\"https:\/\/web.uri.edu\/cs\/academics\/minor-programs\/cyber-security-minor\/\">Overview<\/a><\/li>\n<li id=\"menu-item-9787\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-9787\"><a href=\"https:\/\/web.uri.edu\/cs\/academics\/minor-programs\/cyber-security-minor\/curriculum\/\">Curriculum<\/a><\/li>\n<li id=\"menu-item-16996\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-16996\"><a href=\"https:\/\/web.uri.edu\/cs\/academics\/minor-programs\/cyber-security-minor\/current-minors\/\">Current Minors<\/a><\/li>\n<li id=\"menu-item-9970\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-9970\"><a href=\"https:\/\/web.uri.edu\/cs\/academics\/minor-programs\/cyber-security-minor\/careers\/\">Careers<\/a><\/li>\n<\/ul><\/nav><\/section>\n<h2>Course Descriptions<\/h2>\n<div class=\"uri-kuali\">\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 102G<\/span>\n    <h3 class=\"uri-kuali-course-title\">Cyber Security Technology and Issues in a Global Society<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) Provides an overview of the technology, threats, and social impact of cybersecurity. (Lec. 3, Lab 1\/Online). (C2) (B3) (GC)<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 202<\/span>\n    <h3 class=\"uri-kuali-course-title\">Fundamentals for Cyber Security<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) Overview of technical background required for cyber security. Including: binary\/hex number systems, operating systems concepts and installation, Python, file systems, OSI model, network topologies and protocols. (Lec\/Online) Pre: CSC110 or CSC211, earned at least 36 credits, or by permission of instructor.<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 410<\/span>\n    <h3 class=\"uri-kuali-course-title\">Digital Forensics I<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) The science, technology, procedures, and law of acquiring and analyzing digital evidence from computers and devices. (Lec\/Online 4) Pre: B or better in CSF 202 and cumulative GPA of 2.7, or by permission of instructor.<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 412<\/span>\n    <h3 class=\"uri-kuali-course-title\">Digital Forensics II<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) Selected focused topics on acquiring and analyzing evidence from digital devices. Details on analysis of specific operating system artifacts. (Lec\/Online) Pre: CSF 410.  Not for graduate credit.<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 430<\/span>\n    <h3 class=\"uri-kuali-course-title\">Introduction to Information Assurance<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) Fundamental concepts to understand threats to security; various defenses against those threats. Planning for security; technology used to defend computer systems; implementing security measures and technology. (Lec\/Online 4) Pre: C- or better in CSF 202 or permission of instructor.<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 432<\/span>\n    <h3 class=\"uri-kuali-course-title\">Introduction to Network and Systems Security<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) This course provides an overview of network and systems security. It provides the underlying theory of computer security. It further introduces hands-on skills and techniques that are essential to effectively secure the networks and systems of large and small organizations. (Lec\/Online) Pre: Minimum cumulative GPA of 2.7 and B or better in CSF 202, or by permission of instructor.<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 434<\/span>\n    <h3 class=\"uri-kuali-course-title\">Network and Systems Security<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) Advanced security topics including intrusion detection, penetration testing, incident response, malware analysis, and risk management. (Lec\/Online) Pre: CSF 432. <\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 462<\/span>\n    <h3 class=\"uri-kuali-course-title\">Secure Programming<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) Cross-listed as (CSF), CSC 462. This class will present the basic topics in computer security and their relation to secure programming. Security models, threats, design principles and secure coding practices will be discussed. We will also look at programming language features and semantics to evaluate whether they help or hurt the ability to write secure programs. (Lec. 3, Lab. 1) Pre: CSC 305.<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 505<\/span>\n    <h3 class=\"uri-kuali-course-title\">Professional Development in Cybersecurity<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(2 crs.) Cybersecurity career preparation. (Seminar) Pre: permission of the instructor. May be repeated for a maximum of 8 credits. S\/U credit.<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 512<\/span>\n    <h3 class=\"uri-kuali-course-title\">Advanced Digital Forensics<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) New and emerging techniques for identifying, acquiring, and analyzing new and emerging sources of digital evidence. Current research in Digital Forensics. (Lec\/Online 4) Pre: CSF 410.<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 516<\/span>\n    <h3 class=\"uri-kuali-course-title\">File System Analysis<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) The structure and implementation of computing device file systems. Forensic analysis and reconstruction of digital evidence found in modern file systems. (Lec\/Online 4) Pre: CSF 410.<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 524<\/span>\n    <h3 class=\"uri-kuali-course-title\">Advanced Incident Response<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) Presents advanced techniques and research for incident response and live forensics. Topics may include live forensics in cloud environments, visualization of security incidents, and live forensics in the smart grid. (Lec\/Online) Pre: CSF 432 or CSF 410.<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 534<\/span>\n    <h3 class=\"uri-kuali-course-title\">Advanced Topics in Network and System Security<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) Advanced topics in network security including intrusion detection, penetration testing, incident response, malware analysis, and risk management. Students will learn relevant skills and research emerging solutions to these problems. (Lec\/Online 4) Pre: CSF 432.<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 536<\/span>\n    <h3 class=\"uri-kuali-course-title\">Advanced Intrusion Detection and Defense<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) Presents advanced techniques and research on intrusion detection and network defense. Topics may include network traffic analysis, intrusion analysis, machine learning techniques for intrusion detection, data mining for intrusion detection, advanced persistent threats. (Lec\/Online 4) Pre: CSF 432.<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 538<\/span>\n    <h3 class=\"uri-kuali-course-title\">Penetration Testing<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) Advanced techniques used in assessing the security of networks and identifying vulnerabilities. Network traffic analysis; session hijacking; social engineering; application exploitation; rootkits; network sniffers; developing threats. (Lec\/Online 4) Pre: CSF 432<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 540<\/span>\n    <h3 class=\"uri-kuali-course-title\">Introduction to Malware Analysis<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) Introduces core concepts and terminology associated with the practice of malware analysis. Provides a fundamental understanding of basic and advanced static and dynamic malware analysis. Additional topics will include: data encoding, packers, and other forms of anti-malware analysis techniques. (Lec\/Online) Pre: CSF 432.<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 560<\/span>\n    <h3 class=\"uri-kuali-course-title\">Cyber Threat Intelligence<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) Introduction to cyber threat intelligence and how it is applied across public and private sector organizations. Topics include stages of intelligence life cycle, cyber security frameworks, tradecraft skills. (Lec\/Online) Pre: CSF 534.<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 580<\/span>\n    <h3 class=\"uri-kuali-course-title\">Professional Skills for Cyber Security<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) This course provides each student with a framework for understanding organizational behavior in the context of organizational decision making and leadership in a cyber security work environment. It examines the theory, research, and practice of organizational behavior in work settings, focusing on individual differences, communications, group dynamics, motivation, and leadership. Through course discussion, analytical writing, and exercises, students will learn to apply professional skills in a technical working environment to promote both individual and organizational success. (Lec\/Online) Pre: CSF 430.<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 590<\/span>\n    <h3 class=\"uri-kuali-course-title\">Cyber Security Internship<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(4 crs.) This course provides each student with a professional experience working on an internship, applying technical and professional cyber security skills. (Practicum\/Online) Pre: CSF 580 or permission of instructor. S\/U only.<\/p>\n<\/div>\n\n<div class=\"uri-kuali-course\">\n  <div class=\"uri-kuali-course-header\">\n    <span class=\"uri-kuali-course-code\">CSF 591<\/span>\n    <h3 class=\"uri-kuali-course-title\">Directed Study in Cyber Security<\/h3>\n  <\/div>\n  <p class=\"uri-kuali-course-description\">(1-4 crs.) Advanced work in cyber security conducted as supervised individual projects. (Independent Study) Pre: permission of instructor. S\/U only.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security Minor Course Descriptions<\/p>\n","protected":false},"author":1962,"featured_media":0,"parent":9766,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-9946","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/9946","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/users\/1962"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/comments?post=9946"}],"version-history":[{"count":4,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/9946\/revisions"}],"predecessor-version":[{"id":9958,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/9946\/revisions\/9958"}],"up":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/9766"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/media?parent=9946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}