Bachelor of ScienceCybersecurity Operations and Management (Online)
The Cybersecurity Operations and Management Bachelor of Science degree program prepares students to become cybersecurity leaders in defending organizations against increasingly more sophisticated cyber threats.
The following 11 courses comprise the required core courses of the Cybersecurity Operations and Management program. The credit value of each course appears in parentheses ( ).
This course provides students with basic concepts of cybersecurity fundamentals. Students receive a basic awareness of threats to information systems, vulnerabilities inherent to modern architectures and the options available to mitigate threats within a system.
This course provides students with an understanding of information security policy and how to apply industry and government best practice rules and guidelines. Students begin to create, implement, and institutionalize organization policies that ensure legal, ethical, privacy and compliance standards which are supported. The course compares and contrasts the role of government versus commercial security, to include funding, culture, stakeholders, and classified information protections.
This course introduces the concepts and techniques of computer programming. Emphasis is placed on developing the student’s ability to apply problem-solving strategies to design algorithms and to implement these algorithms in a modern, structured programming language. Topics include fundamental programming constructs, problem solving techniques, simple data structures, Object-Oriented Programming (OOP), program structure, data types and declarations, control statements, algorithm strategies and algorithm development.
Relating to people, process and technology this course provides students the methods to think through and solve complex global cybersecurity problems. Students are introduced to specific methodologies regarding systems engineering and processes, such as Shewhart cycle, OODA loop, and RPR diagnosis as they apply to networks and cybersecurity.
The student is provided with analytical tools to understand and synthesize the most current applications of theories and concepts in business management and is exposed to the debate on the dynamic of busniess environment, evolving business models, economic systems, and scale of domestic and global competition in the market place.
This course provides students with a basic awareness of the options available to understand and mitigate threats within a system. It demonstrates the methodologies used by threat actors to exploit systems and how cyber security professionals can architect more secure systems that support business imperatives, while mitigating cyber risks. An overview of applications, networks, mobile devices, wireless security, and tool categories such as firewall, SIEM, and vulnerability management tools are discussed.
This course provides students with a basic awareness for building defense in depth architectures and security controls into an organization’s technology processes, workforce considerations and network architectures. As part of this course, students gain a preliminary understanding of cryptography and concepts such as authentication.
This course provides students with foundational knowledge in secure networking concepts, technology, and administration. Network security is an essential requirement in building a secure resilient infrastructure. Students learn technical and administrative components of secure networks, how to apply secure design principles to configure network resources (routers, switches, firewalls, IPSes) and how to securely administer the network. Threats to network security are examined and security controls are designed to appropriately mitigate risks. Network and system administration policies and procedures are examined.
This course is a foundation for database design and database security courses. Systems Analysis and Design is a fundamental, active field in which analysts continually learn new techniques and approaches to develop systems more effectively and efficiently. There is a core set of skills that all analysts need to know no matter what approach or methodology is used. All information systems projects move through the four phases of planning, analysis, design, and implementation; all projects require analysts to gather requirements, model the business needs, and create blueprints for how the systems should be built; and all projects require an understanding of organizational behavior concepts like change managememnt and team building. This course captures the dynamic aspects of the field by keeping the student focused on doing Systems Analysis and Design while presenting the core set of skills that the analysts needs to know.
This course provides students with the design fundamentals of the compliance and management governing of the deployment of cloud services. The technologies and services that enable cloud computing, different types of cloud computing models and the security and legal issues associated with cloud computing are covered.
This course provides an overview of database security concepts and techniques and discusses new directions of database security. Topics covered include database application security models, database and data auditing, XML access control, trust management and privacy protection, encryption methods, virtual private databases, risk assessment and mitigation, vulnerability scanning and user access control. The focus is on the key components of information assurance as it relates to database systems – confidentiality, integrity, and availability, and how these components can be managed and measured. Students conduct security assessments and audits of an existing database.
Cyberattack could follow sanctions against Russia, Pa. security expert says
Local governments, businesses, and corporations have been warned by U.S. officials to be on the lookout for cyberattacks. Terrill Frantz…
Social media quizzes may give hackers your answers
If you’ve been on Facebook over the last few days, you’ve probably seen the ’10 Year Challenge’ pop up. While…
HU cybersecurity professor discusses online shopping safety with FOX43
With the COVID-19 pandemic still pushing online holiday shopping, cybersecurity experts again are cautioning shoppers to be extra cautious this…
How to respond to a ransomware attack
What should a company do when cyber criminals attack its systems and demand a ransom? Dr. Bruce Young, who leads…
Cybersecurity Summit 2021
Experts expose solutions to mitigate cyberattacks Phishing is one of the most common methods hackers use to steal information. Artificial…
Registration opens for Shred the System: Driving the Crypto & Blockchain Revolution conference
Cryptocurrency. Bitcoin. Blockchain. Three strange words that strike fear in the hearts of old-schoolers — and joy in the hearts…
Take the Next Step
Get More Information
Questions about our programs? Reach out to a member of our team and get personalized answers.
Create an account and start your free online application to Harrisburg University today.