Quick Search
- Accounting
- Acquisition and Contract Mgmt
- Bioinformatics
- Biotechnology Studies
- Biosecurity and Biodefense
- Biotechnology Management
- Biotech Regulatory Affairs
- Cyber Comm & Leadership
- Doctoral Stds in Comm College
- Cloud Computing Systems
- Criminal Justice Management
- Cybersecurity Mgmt and Policy
- Cyber Operations
- Cybersecurity Technology
- Cybersecurity
- Data Analytics
- Doctor of Business Admin
- Database Systems Technology
- Decisive Comm & Leadership
- DE Policy and Management
- Distance Education Technology
- DE in Teaching and Training
- Digital Forensics & Cyber Inv
- Doctoral Stds in Comm College
- Education: Instructional Tec
- Education Teacher Preparation
- Emergency Management
- Environmental Management
- Financial Management
- Global Health Management
- Health Care Administration
- Health Informatics Admin
- Human Resource Mgmt and Devpm
- Homeland Security Management
- Informatics
- Information Assurance
- Intelligence Management
- Education: Instructional Tech
- Information Systems & Service
- Information Technology
- Learning Design & Technology
- Business Administration
- Management
- Marketing
- MS in Acct Financial Mgmt
- Strategic Communications
- Nonprofit Management
- Distance Education
- Project Management
- Software Engineering
- Systems Engineering
- Transformational Leadership
- Univ College Special Topics
2024 Spring: January 10 - June 25
Course | Class No. | Section | Start & End Date | Day | Time | Status | Location |
---|
2024 Spring: January 10 - June 25
Course | Class No. | Section | Start & End Date | Day | Time | Status | Location |
---|---|---|---|---|---|---|---|
CST 610 | Cyberspace and Cybersecurity Foundations (6) | ||||||
Gain knowledge of the foundations of cybersecurity, and apply cyber methodologies to cyber architectures, services, protocols, algorithms, hardware and software components, and programming languages. Become familiar with the important role that business continuity planning, security management practices, security architecture, operations security, and physical security play in cybersecurity. Explore the impact of cyber terrorism and national security on cybersecurity. Gain hands-on, real-world experience with state-of-the-art tools and technologies in a lab-intensive environment. Students may receive credit for only one of the following courses: CST 610 or DFC 610. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20289 | 9040 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Harig, Paul E. | Syllabus | Course Materials | |||||
CST 610 | Cyberspace and Cybersecurity Foundations (6) | ||||||
Gain knowledge of the foundations of cybersecurity, and apply cyber methodologies to cyber architectures, services, protocols, algorithms, hardware and software components, and programming languages. Become familiar with the important role that business continuity planning, security management practices, security architecture, operations security, and physical security play in cybersecurity. Explore the impact of cyber terrorism and national security on cybersecurity. Gain hands-on, real-world experience with state-of-the-art tools and technologies in a lab-intensive environment. Students may receive credit for only one of the following courses: CST 610 or DFC 610. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20302 | 9041 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Plass, Mathias R | Syllabus | Course Materials | |||||
CST 610 | Cyberspace and Cybersecurity Foundations (6) | ||||||
Gain knowledge of the foundations of cybersecurity, and apply cyber methodologies to cyber architectures, services, protocols, algorithms, hardware and software components, and programming languages. Become familiar with the important role that business continuity planning, security management practices, security architecture, operations security, and physical security play in cybersecurity. Explore the impact of cyber terrorism and national security on cybersecurity. Gain hands-on, real-world experience with state-of-the-art tools and technologies in a lab-intensive environment. Students may receive credit for only one of the following courses: CST 610 or DFC 610. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20303 | 9042 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Panja, Biswajit | Syllabus | Course Materials | |||||
CST 610 | Cyberspace and Cybersecurity Foundations (6) | ||||||
Gain knowledge of the foundations of cybersecurity, and apply cyber methodologies to cyber architectures, services, protocols, algorithms, hardware and software components, and programming languages. Become familiar with the important role that business continuity planning, security management practices, security architecture, operations security, and physical security play in cybersecurity. Explore the impact of cyber terrorism and national security on cybersecurity. Gain hands-on, real-world experience with state-of-the-art tools and technologies in a lab-intensive environment. Students may receive credit for only one of the following courses: CST 610 or DFC 610. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20304 | 9043 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Basta, Alfred | Syllabus | Course Materials | |||||
CST 610 | Cyberspace and Cybersecurity Foundations (6) | ||||||
Gain knowledge of the foundations of cybersecurity, and apply cyber methodologies to cyber architectures, services, protocols, algorithms, hardware and software components, and programming languages. Become familiar with the important role that business continuity planning, security management practices, security architecture, operations security, and physical security play in cybersecurity. Explore the impact of cyber terrorism and national security on cybersecurity. Gain hands-on, real-world experience with state-of-the-art tools and technologies in a lab-intensive environment. Students may receive credit for only one of the following courses: CST 610 or DFC 610. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20305 | 9044 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Chow, Tsun S | Syllabus | Course Materials | |||||
CST 610 | Cyberspace and Cybersecurity Foundations (6) | ||||||
Gain knowledge of the foundations of cybersecurity, and apply cyber methodologies to cyber architectures, services, protocols, algorithms, hardware and software components, and programming languages. Become familiar with the important role that business continuity planning, security management practices, security architecture, operations security, and physical security play in cybersecurity. Explore the impact of cyber terrorism and national security on cybersecurity. Gain hands-on, real-world experience with state-of-the-art tools and technologies in a lab-intensive environment. Students may receive credit for only one of the following courses: CST 610 or DFC 610. |
|||||||
25318 | 7631 | 10 Apr 2024-25 Jun 2024 | W | 6:30P-9:30P | Open | Dorsey Station (Hybrid) | |
Faculty: Acholonu, Omogbemiboluwa I | Syllabus | Course Materials | |||||
Note: Dorsey Station: Classroom assignments are subject to change. Please view the electronic board in the hallway for your classroom assignment. | |||||||
CST 610 | Cyberspace and Cybersecurity Foundations (6) | ||||||
Gain knowledge of the foundations of cybersecurity, and apply cyber methodologies to cyber architectures, services, protocols, algorithms, hardware and software components, and programming languages. Become familiar with the important role that business continuity planning, security management practices, security architecture, operations security, and physical security play in cybersecurity. Explore the impact of cyber terrorism and national security on cybersecurity. Gain hands-on, real-world experience with state-of-the-art tools and technologies in a lab-intensive environment. Students may receive credit for only one of the following courses: CST 610 or DFC 610. |
|||||||
25319 | 1121 | 10 Apr 2024-25 Jun 2024 | T | 6:30P-9:30P | Open | College Park (Hybrid) | |
Faculty: Butler, William H | Bldg/Room: Hornbake Library (Undergrad) 0103 | Syllabus | Course Materials | ||||
CST 620 | Prevention of Cyber Attack Methodologies (6) | ||||||
Prerequisite: CST 610. Explore the theories and practices related to the prevention of cyber-attacks. Design, apply, and analyze technological solutions that address countermeasures, encryption, network access control methods, firewalls, intrusion detection/prevention, and secure systems development. Practice techniques such as software assurance, verification, and validation; virtual network and cloud computing security techniques; and physical security techniques. Examine the nation's complex critical infrastructure industries. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20247 | 9040 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Ratchford, Melba M | Syllabus | Course Materials | |||||
CST 620 | Prevention of Cyber Attack Methodologies (6) | ||||||
Prerequisite: CST 610. Explore the theories and practices related to the prevention of cyber-attacks. Design, apply, and analyze technological solutions that address countermeasures, encryption, network access control methods, firewalls, intrusion detection/prevention, and secure systems development. Practice techniques such as software assurance, verification, and validation; virtual network and cloud computing security techniques; and physical security techniques. Examine the nation's complex critical infrastructure industries. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20278 | 9041 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Nance, Michael | Syllabus | Course Materials | |||||
CST 620 | Prevention of Cyber Attack Methodologies (6) | ||||||
Prerequisite: CST 610. Explore the theories and practices related to the prevention of cyber-attacks. Design, apply, and analyze technological solutions that address countermeasures, encryption, network access control methods, firewalls, intrusion detection/prevention, and secure systems development. Practice techniques such as software assurance, verification, and validation; virtual network and cloud computing security techniques; and physical security techniques. Examine the nation's complex critical infrastructure industries. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20279 | 9042 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Nziga, Jean-Pierre | Syllabus | Course Materials | |||||
CST 620 | Prevention of Cyber Attack Methodologies (6) | ||||||
Prerequisite: CST 610. Explore the theories and practices related to the prevention of cyber-attacks. Design, apply, and analyze technological solutions that address countermeasures, encryption, network access control methods, firewalls, intrusion detection/prevention, and secure systems development. Practice techniques such as software assurance, verification, and validation; virtual network and cloud computing security techniques; and physical security techniques. Examine the nation's complex critical infrastructure industries. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20288 | 9043 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Daniels, Jeffrey W | Syllabus | Course Materials | |||||
CST 620 | Prevention of Cyber Attack Methodologies (6) | ||||||
Prerequisite: CST 610. Explore the theories and practices related to the prevention of cyber-attacks. Design, apply, and analyze technological solutions that address countermeasures, encryption, network access control methods, firewalls, intrusion detection/prevention, and secure systems development. Practice techniques such as software assurance, verification, and validation; virtual network and cloud computing security techniques; and physical security techniques. Examine the nation's complex critical infrastructure industries. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20306 | 9044 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Richman, Steven H. | Syllabus | Course Materials | |||||
CST 620 | Prevention of Cyber Attack Methodologies (6) | ||||||
Prerequisite: CST 610. Explore the theories and practices related to the prevention of cyber-attacks. Design, apply, and analyze technological solutions that address countermeasures, encryption, network access control methods, firewalls, intrusion detection/prevention, and secure systems development. Practice techniques such as software assurance, verification, and validation; virtual network and cloud computing security techniques; and physical security techniques. Examine the nation's complex critical infrastructure industries. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20307 | 9045 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Wang, Yongge | Syllabus | Course Materials | |||||
CST 620 | Prevention of Cyber Attack Methodologies (6) | ||||||
Prerequisite: CST 610. Explore the theories and practices related to the prevention of cyber-attacks. Design, apply, and analyze technological solutions that address countermeasures, encryption, network access control methods, firewalls, intrusion detection/prevention, and secure systems development. Practice techniques such as software assurance, verification, and validation; virtual network and cloud computing security techniques; and physical security techniques. Examine the nation's complex critical infrastructure industries. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
25320 | 7631 | 10 Apr 2024-25 Jun 2024 | W | 6:30P-9:30P | Open | Dorsey Station (Hybrid) | |
Faculty: Smith, Candice E. | Syllabus | Course Materials | |||||
Note: Dorsey Station: Classroom assignments are subject to change. Please view the electronic board in the hallway for your classroom assignment. | |||||||
CST 620 | Prevention of Cyber Attack Methodologies (6) | ||||||
Prerequisite: CST 610. Explore the theories and practices related to the prevention of cyber-attacks. Design, apply, and analyze technological solutions that address countermeasures, encryption, network access control methods, firewalls, intrusion detection/prevention, and secure systems development. Practice techniques such as software assurance, verification, and validation; virtual network and cloud computing security techniques; and physical security techniques. Examine the nation's complex critical infrastructure industries. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
25322 | 1121 | 10 Apr 2024-25 Jun 2024 | T | 6:30P-9:30P | Open | College Park (Hybrid) | |
Faculty: Burton, Barbara E. | Bldg/Room: Hornbake Library (Undergrad) 0105 | Syllabus | Course Materials | ||||
CST 630 | Advanced Cyber Exploitation and Mitigation Methodologies (6) | ||||||
Prerequisite: CST 620. Practice intrusion detection and prevention, exploitation, and mitigation in cyberspace. Employ technological solutions that identify, resolve, prevent, and mitigate cyber attacks Utilize network security techniques, monitoring, auditing, intrusion detection and prevention, and ethical penetration testing. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20248 | 9040 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Awuah, Lawrence | Syllabus | Course Materials | |||||
CST 630 | Advanced Cyber Exploitation and Mitigation Methodologies (6) | ||||||
Prerequisite: CST 620. Practice intrusion detection and prevention, exploitation, and mitigation in cyberspace. Employ technological solutions that identify, resolve, prevent, and mitigate cyber attacks Utilize network security techniques, monitoring, auditing, intrusion detection and prevention, and ethical penetration testing. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20282 | 9041 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Schweigert, Chris J | Syllabus | Course Materials | |||||
CST 630 | Advanced Cyber Exploitation and Mitigation Methodologies (6) | ||||||
Prerequisite: CST 620. Practice intrusion detection and prevention, exploitation, and mitigation in cyberspace. Employ technological solutions that identify, resolve, prevent, and mitigate cyber attacks Utilize network security techniques, monitoring, auditing, intrusion detection and prevention, and ethical penetration testing. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20284 | 9042 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Bailey, Michelle D | Syllabus | Course Materials | |||||
CST 630 | Advanced Cyber Exploitation and Mitigation Methodologies (6) | ||||||
Prerequisite: CST 620. Practice intrusion detection and prevention, exploitation, and mitigation in cyberspace. Employ technological solutions that identify, resolve, prevent, and mitigate cyber attacks Utilize network security techniques, monitoring, auditing, intrusion detection and prevention, and ethical penetration testing. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20309 | 9043 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Tung, Ye | Syllabus | Course Materials | |||||
CST 630 | Advanced Cyber Exploitation and Mitigation Methodologies (6) | ||||||
Prerequisite: CST 620. Practice intrusion detection and prevention, exploitation, and mitigation in cyberspace. Employ technological solutions that identify, resolve, prevent, and mitigate cyber attacks Utilize network security techniques, monitoring, auditing, intrusion detection and prevention, and ethical penetration testing. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20310 | 9044 | 10 Apr 2024-25 Jun 2024 | Closed | Online | |||
Faculty: McMahon, Margaret M | Syllabus | Course Materials | |||||
CST 630 | Advanced Cyber Exploitation and Mitigation Methodologies (6) | ||||||
Prerequisite: CST 620. Practice intrusion detection and prevention, exploitation, and mitigation in cyberspace. Employ technological solutions that identify, resolve, prevent, and mitigate cyber attacks Utilize network security techniques, monitoring, auditing, intrusion detection and prevention, and ethical penetration testing. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
25323 | 7641 | 10 Apr 2024-25 Jun 2024 | Th | 6:30P-9:30P | Open | Dorsey Station (Hybrid) | |
Faculty: Lucas, Diana | Syllabus | Course Materials | |||||
Note: Dorsey Station: Classroom assignments are subject to change. Please view the electronic board in the hallway for your classroom assignment. | |||||||
CST 630 | Advanced Cyber Exploitation and Mitigation Methodologies (6) | ||||||
Prerequisite: CST 620. Practice intrusion detection and prevention, exploitation, and mitigation in cyberspace. Employ technological solutions that identify, resolve, prevent, and mitigate cyber attacks Utilize network security techniques, monitoring, auditing, intrusion detection and prevention, and ethical penetration testing. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
25324 | 1111 | 10 Apr 2024-25 Jun 2024 | M | 6:30P-9:30P | Open | College Park (Hybrid) | |
Faculty: Pak, Charles | Bldg/Room: Hornbake Library (Undergrad) 0103 | Syllabus | Course Materials | ||||
CST 630 | Advanced Cyber Exploitation and Mitigation Methodologies (6) | ||||||
Prerequisite: CST 620. Practice intrusion detection and prevention, exploitation, and mitigation in cyberspace. Employ technological solutions that identify, resolve, prevent, and mitigate cyber attacks Utilize network security techniques, monitoring, auditing, intrusion detection and prevention, and ethical penetration testing. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
27726 | 9045 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Bunnell, Patricia D | Syllabus | Course Materials | |||||
CST 640 | Digital Forensics Technology and Practices (6) | ||||||
Prerequisite: CST 630. Gain proficiency with the tools and technologies commonly used in forensic examinations, and utilize best practices. Explore procedures for securing and validating evidence, including digital media and physical memory, as well as for recovering artifacts and analyzing, reporting, and presenting results in both criminal and civil situations. Gain experience with mobile forensic analysis. Students may receive credit for only one of the following courses: CST 640 or DFC 620. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20249 | 9040 | 10 Apr 2024-25 Jun 2024 | Closed | Online | |||
Faculty: Ball, Michael G | Syllabus | Course Materials | |||||
CST 640 | Digital Forensics Technology and Practices (6) | ||||||
Prerequisite: CST 630. Gain proficiency with the tools and technologies commonly used in forensic examinations, and utilize best practices. Explore procedures for securing and validating evidence, including digital media and physical memory, as well as for recovering artifacts and analyzing, reporting, and presenting results in both criminal and civil situations. Gain experience with mobile forensic analysis. Students may receive credit for only one of the following courses: CST 640 or DFC 620. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20311 | 9041 | 10 Apr 2024-25 Jun 2024 | Closed | Online | |||
Faculty: Rosales, Josue R | Syllabus | Course Materials | |||||
CST 640 | Digital Forensics Technology and Practices (6) | ||||||
Prerequisite: CST 630. Gain proficiency with the tools and technologies commonly used in forensic examinations, and utilize best practices. Explore procedures for securing and validating evidence, including digital media and physical memory, as well as for recovering artifacts and analyzing, reporting, and presenting results in both criminal and civil situations. Gain experience with mobile forensic analysis. Students may receive credit for only one of the following courses: CST 640 or DFC 620. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20312 | 9042 | 10 Apr 2024-25 Jun 2024 | Closed | Online | |||
Faculty: Holcomb, James E | Syllabus | Course Materials | |||||
CST 640 | Digital Forensics Technology and Practices (6) | ||||||
Prerequisite: CST 630. Gain proficiency with the tools and technologies commonly used in forensic examinations, and utilize best practices. Explore procedures for securing and validating evidence, including digital media and physical memory, as well as for recovering artifacts and analyzing, reporting, and presenting results in both criminal and civil situations. Gain experience with mobile forensic analysis. Students may receive credit for only one of the following courses: CST 640 or DFC 620. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20313 | 9043 | 10 Apr 2024-25 Jun 2024 | Closed | Online | |||
Faculty: Meky, Mohamed M | Syllabus | Course Materials | |||||
CST 640 | Digital Forensics Technology and Practices (6) | ||||||
Prerequisite: CST 630. Gain proficiency with the tools and technologies commonly used in forensic examinations, and utilize best practices. Explore procedures for securing and validating evidence, including digital media and physical memory, as well as for recovering artifacts and analyzing, reporting, and presenting results in both criminal and civil situations. Gain experience with mobile forensic analysis. Students may receive credit for only one of the following courses: CST 640 or DFC 620. |
|||||||
25325 | 7631 | 10 Apr 2024-25 Jun 2024 | W | 6:30P-9:30P | Open | Dorsey Station (Hybrid) | |
Faculty: Okui, Bolanissa D | Syllabus | Course Materials | |||||
Note: Dorsey Station: Classroom assignments are subject to change. Please view the electronic board in the hallway for your classroom assignment. | |||||||
CST 640 | Digital Forensics Technology and Practices (6) | ||||||
Prerequisite: CST 630. Gain proficiency with the tools and technologies commonly used in forensic examinations, and utilize best practices. Explore procedures for securing and validating evidence, including digital media and physical memory, as well as for recovering artifacts and analyzing, reporting, and presenting results in both criminal and civil situations. Gain experience with mobile forensic analysis. Students may receive credit for only one of the following courses: CST 640 or DFC 620. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
27619 | 9044 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Garuba, Moses | Syllabus | Course Materials |