MS Cybersecurity Worksheet - University of Nevada, Las Vegas



MS Cybersecurity WorksheetThis program would be providing the skillset for those with the adequate background to start in or transition to a cybersecurity professional. This will also provide the managerial training needed by those already within that industry to manage the cybersecurity professionals and processes.Suggested Course PlanFall—Year OneSpring—Year OneFall—Year TwoSpring—Year TwoCSEC 700 CSEC 703CSEC 705CSEC 790CSEC 701CSEC 704CSEC ElectiveCSEC 702CSEC ElectiveRequired Courses—24 CreditsCourse #Course TitleDescription CreditsCSEC 600Introduction to Cybersecurity TechnologiesBasic introduction to the concepts of technology, specifically related to the technologies in cybersecurity. Content will provide the background for both the Security+ and CEH certifications, thus providing a solid understanding of security concepts.Required for those without technical background only - remediationCSEC 700Security OperationsOperating systems, command line interface, coding and infrastructure3CSEC 701Secure Communication ProtocolsSecure routing, IPv6, HIP, SSH, VoIP, IPTV, Proxy, VPN, DTLS3CSEC 702Security Data AnalyticsCybersecurity data mining, log management, machine learning, AI,?big data architecture3CSEC 703Cyber Physical Systems SecurityIndustrial Control systems, SCADA, IoT, Smart TV, embedded systems, TPM, autonomous cars3CSEC 704Human Factors in CybersecuritySocial engineering, phishing, physiological aspects, insider threat prevention, DLP, log analysis, awareness training 3CSEC 705Enterprise Security AdministrationCybersecurity budget and ROI, Security Insurance, Cost of cybercrime, Risk analysisVulnerability Management3CSEC 790Master ThesisSubmission of a paper to a conference is required6Electives—6 CreditsCourse #Course TitleDescription CreditsCSEC 721Modern Cryptography?Public key cryptography, homomorphic, quantum cryptography, digital rights management, steganography, watermarking3CSEC 722Trusted Software Systems?Secure coding practices, code inspection methods, open source security, malware analysis3CSEC 723Cybercrime and cyberterrorismCybercriminal orgs, criminal profiling, monitoring and surveillance, detection and prevention, darknet, cryptocurrency, critical infrastructure protection, social network analysis, laws3CSEC 724Forensics & Incidence ResponseHow to identify incidents and respond to them. Further, how to collect digital evidence that might be used in judicial proceedings.3CSEC 725Web SecurityTBD3CSEC 731Cybersecurity in Hospitality?industryHotel IT, gaming machine technologies, NVGCB activities, investigation3CSEC 732Cybersecurity?in Healthcare IndustryHospital IT, communication interface, medical DB, data sources, health informatics, privacy, HIPAA3CSEC 733Cybersecurity in Financial Industry PCI DSS, SOX, GLBA, data breach, cyber insurance analysis, credit card anomaly analysis3CSEC 734Cybersecurity in Critical Infrastructure Security in the context of government, utilities, power grid3CSEC 735Information Warfare?Military communication systems, LINK-16, HAIPE, international standards, key management3CSEC 770Special Topics1-9CSEC 780Internship1-3CSEC 781Independent study1-3OtherAny 400/600 or 700 levelComputer Science, Business management, Criminal Justice, Emergency management, Law3 ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download