The Computer Security degree program prepares students to assess the security needs of computer and network systems, recommend safeguard solutions, and manage the implementation and maintenance of security devices, systems, and procedures. The degree program includes instruction in computer architecture, programming, and systems analysis. Other topics include telecommunications, cryptography, security system design, applicable law and regulations, risk assessment and policy analysis, contingency planning, user access issues, investigation techniques, and troubleshooting skills.
| Associate of Applied Science Degree
Required Program Courses
|Program planners and degree checklists can be read and printed at the page located here. Degree requirements and course are subject to change. Students should consult with an advisor/counselor when registering for courses.
Selected Course Descriptions
CSCI 1070 Introduction to Computer Security
This is an introductory course in computer security that will provide students with an understanding of the issues corporate security officers face every day. The course will cover the information warfare that exists in the corporate environment today and what measures are taken to reduce the risk of attack and exposure. This course is a prerequisite for most of the other computer crime courses offered.
CSCI 1072/LAWE 1072 E-Crime: Detection and Prosecution Issues
This course is an introduction to the current topics in computer crime, the issues involved in investigation of these crimes, and the corporate perspective of these crimes-how corporate America views them and investigates them. all of the issues involved in business planning and disaster recovery, primarily in connection with serious breaches of an organization's computer and network security.
CSCI 1078 Business Continuity Planning
This course is designed to consider all of the issues involved in business planning and disaster recovery, primarily in connection with serious breaches of an organization's computer and network security.
CSCI 2010 Introduction to Computer Science I
Programs, computers, and problem solving; an introduction to a high level language, such as C++ or Java, and development of programming skills. Provides an introduction to computer organization, machine and assembly language exercises. Introduction to algorithmic problem solving. Overview of social and ethical issues with technology and computing, both with historical review and examination of contemporary issues.
CSCI 2011 Introduction to Computer Science II
Algorithms and data structures; fundamental data structures such as stacks, queues, trees, and graphs are introduced and explored through exercises. Computational complexity is studied through analysis of standard searching and sorting algorithms. A high-level language, such as C++ or Java, is used for exercises.
CSCI 2070 Advanced Computer Security
This course will provide the person having taken the Introduction to Computer Security course a deeper look at how security is handled in the corporate environment. Topics covered include development of security policies, cryptography, access control mechanisms, vulnerability analysis, network intrusion, and security auditing.
CSCI 2072 Cybersleuthing
This course will cover what to do if a network has been compromised, from data recovery techniques to reconstructing the events. It will assist the student in laying out the facts for a law enforcement officer to be able to move forward with crime resolution.
CSCI 2076 Tools and Tactics of the Black Hat Hacker
This course is designed to identify the types of tools hackers use to access a system. Those trying to thwart these criminals can also use these tools to gather evidence and investigate the alleged crime. This course will show the student what tactics the hackers use to gain entry, how some of the tools used in the attacks can also be used to investigate the crimes, and how to set the trap for hackers in an attempt to not only catch them, but to watch them work before releasing the trap to gain additional knowledge on the dark underworld of the Black Hat Community.
Degree requirements and courses are subject to change. Students should consult with an advisor/counselor when registering for courses.