Course Description

CYS 531 Fundamentals of Cybersecurity

Credits: 3 (3-0-0) Prerequisites: None

This course introduces cybersecurity and provides students with essential computer and networking knowledge and skills, particularly those related to cybersecurity. This course also provides insight into the many variations of vulnerabilities, attack mechanisms, intrusion detection systems, and some methods to mitigate cybersecurity risks.
CYS 532 Information Systems Security
CYS 533 Cybersecurity Defense
CYS 534 Threats, Exploits and Countermeasures
CYS 535 Cybersecurity Governance, Risk and Compliance

Elective Courses

CYS 540 Enterprise Security Architecture

Credits: 3 (3-0-0) Prerequisites: None

This course introduces cybersecurity architecture concepts and practices using organization-wide enterprise architecture as context. The purpose of cybersecurity architecture is to ensure that proper levels of information confidentiality, integrity, and availability are provided for an organization's information, data, and related assets. The course will show how implementation of a cybersecurity architecture can be based on a Security Architecture Framework that addresses eight key cybersecurity areas to address enterprise and system-level information sharing and safeguarding requirements: information security governance, operations security, personnel security, information and data security, systems security, application development security, infrastructure security, and physical security.
CYS 541 Privacy in a Digital Networked World

Credits: 3 (3-0-0) Prerequisites: None

This course is designed to introduce data privacy concepts to students and help them to see how data privacy has evolved as a compelling concern to public and private organizations as well as individuals. It makes students aware of online privacy issues, primarily those relating to giving out personal information on social networking sites. The emphasis is on the “economics” of personal information and that most "free" apps and online services make some or all of their revenue by collecting (and in some cases reselling) users' personal information. Students will watch a video that illustrates the idea that they may be paying with their privacy and then discuss some of the ramifications of this. They will learn about tools and techniques for minimizing the personal information they share and create a public service announcement that helps them and their peers “know the deal” about the value of privacy.
CYS 542 Advanced Cryptography

Credits: 3 (3-0-0) Prerequisites: CYS531

Cryptography is a core topic and one of the major pillars of modern cybersecurity. It plays an essential role in protecting sensitive information and ensuring secure communications over computer networks. Advanced Cryptography provides a comprehensive understanding of cryptographic algorithms, including symmetric-key and public-key cryptography, cryptographic protocols, and their mathematical foundations. This course covers the major cryptographic techniques, algorithms, protocols and strategies used in modern cybersecurity Systems.
CYS 545 Software Security

Credits: 3 (3-0-0) Prerequisites: None

This course covers the concepts of software assurance and the fundamentals of the secure software lifecycle as it relates to software development. The course will discuss the secure software development lifecycle phase by phase establishing and discussing best practices in these phases. Students will experience the secure software lifecycle process by developing concrete artifacts and practicing in a lab environment.
CYS 546 Web Security

Credits: 3 (3-0-0) Prerequisites: None

This course explores the standards, principles, techniques, and best practices essential for developing web applications and websites securely. Students will gain a deep understanding of web security concepts, and guidelines including authentication, encryption, access control, and threat modeling. They will learn the standards of security web applications such OWASP. They will also learn to identify, understand, and mitigate common web vulnerabilities such as Cross-Site Scripting (XSS), SQL injection, and Cross-Site Request Forgery (CSRF).
CYS 547 Mobile Device Security

Credits: 3 (3-0-0) Prerequisites: None

This course aims to provide students with knowledge and understanding of mobile technologies and its structure for different platforms such as IOS and Android. The course highlights the significance of protecting mobile devices and its environment from the potential security attacks that target mobile environment on the device and application levels. The course will provide students with the security countermeasures such as encryption, access control, secure boot processes, and network security.
CYS 593 Research Methodology

Credits: 3 (3-0-0) Prerequisites: CYS531

The course describes the specific procedures or techniques used to identify, select, process, and analyze information about a topic. The different phases of research are presented and discussed: Problem Statement, Research Questions / Hypotheses, Theoretical framework, Review of Literature, Data collection, Data Analysis, Findings and Discussion, Summary, Recommendations, Conclusions and References. The course introduces the differences between the various research designs including Quantitative, Qualitative and Mixed Methods. The students will be able to evaluate and justify their methodological choices. The course offers students tips for writing a strong methodology as well as a research paper. Through this course, the student will be able to critically evaluate a study's overall validity and reliability. The course will combine theory and practice throughout the term and students will be given an opportunity to write a research proposal. The course does not require exams. The students will be evaluated through research work presented against an examination committee.
CYS 598 Project I & CYS599 Project II

Credits: 1+3 Prerequisites: after performing 18 hours

This course allows students applying their academic work to develop a significant cybersecurity-based solution to a real-world problem. Students are expected to work individually. The course would be taken in two parts (final 2 semesters) of the program. The problem description, theoretical foundations of possible solutions would be documented in the first semester. In the second semester, the students are required to complete the designed solution and demonstrate their work.
CYS 600 MSc Thesis

Credits: (6+0) Prerequisites: after performing 15 hours + Very Good Grade + CYS593

Students enrolled in this course would apply their cybersecurity and research-based knowledge and skills acquired during earlier course work to develop a significant cybersecurity-based solution for a real-world problem. Students are expected to work individually under the supervision of one or two faculty members specialists in the cybersecurity field. The course would be taken in two parts (final 2 semesters) of the program. The first semester consists of submitting the thesis proposal that includes problem description, research objectives/questions, and theoretical foundations of possible solutions. The second semester requires the completion of the research work and the submission of the thesis document accompanied by a defense. The defense is done against at least two examiners’ specialists in cybersecurity. Many topics could be investigated including threats/risk analysis, cybersecurity governance, network security, cryptography, forensics, etc.