Quick Search
- African American Studies
- Accounting
- Anthropology
- Applied Technology
- Arabic
- Art History
- Art
- Asian Studies
- Astronomy
- Behavioral and Social Science
- Biology
- Business and Management
- Career Planning
- Criminology/Criminal Justice
- Chemistry
- Chinese
- Computer Information Technolo
- Computer Science
- Computer Studies
- Communication Studies
- Cyber Security-Info Assurance
- Cyber Operations
- Data Analytics
- Economics
- Education Teacher Preparation
- Emergency Management
- English
- Environmental Hlth and Safety
- Environmental Management
- Experiential Learning
- Finance
- French
- Fire Science
- Geography
- Geology
- German
- Gerontology
- Graphic Communication
- Government and Politics
- History
- Health Services Management
- Homeland Security
- Human Resource Management
- Humanities
- Information Systems Managemen
- Japanese
- Journalism
- Korean
- Legal Studies
- Library Skills & Info Literac
- Mathematics
- Marketing
- Music
- Natural Science
- Nursing
- Nutrition
- Professional Exploration
- Philosophy
- Physics
- Public Safety Administration
- Psychology
- Sociology
- Spanish
- Speech
- Statistics and Probability
- Women's Studies
- Writing
2024 Fall: August 14 - December 10
Course | Class No. | Section | Start & End Date | Day | Time | Status | Location |
---|
2024 Fall: August 14 - December 10
Course | Class No. | Section | Start & End Date | Day | Time | Status | Location |
---|---|---|---|---|---|---|---|
CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
86130 | 6380 | 14 Aug 2024-08 Oct 2024 | Open | Online | |||
Faculty: Woodson, Kevin T | Syllabus | Course Materials | |||||
CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
86131 | 7380 | 16 Oct 2024-10 Dec 2024 | Closed | Online | |||
Faculty: Woodson, Kevin T | Syllabus | Course Materials | |||||
CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
86743 | 6381 | 14 Aug 2024-08 Oct 2024 | Open | Online | |||
Faculty: Bradford, Corley S | Syllabus | Course Materials | |||||
CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
86919 | 6382 | 14 Aug 2024-08 Oct 2024 | Open | Online | |||
Faculty: Mathur, Pratik | Syllabus | Course Materials | |||||
CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
87078 | 7381 | 16 Oct 2024-10 Dec 2024 | Closed | Online | |||
Faculty: Fuller, Jonathan | Syllabus | Course Materials | |||||
CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
87348 | 7382 | 16 Oct 2024-10 Dec 2024 | Open | Online | |||
Faculty: Parsons, Matthew J | Syllabus | Course Materials | |||||
CYOP 300 | Building Secure Python Applications (3) | ||||||
(Formerly SDEV 300.) Prerequisite: CMSC 215 or CYOP 200. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. Students may receive credit for only one of the following courses: CYOP 300 or SDEV 300. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
81265 | 6380 | 14 Aug 2024-08 Oct 2024 | Closed | Online | |||
Faculty: Parsons, Matthew J | Syllabus | Course Materials | |||||
CYOP 300 | Building Secure Python Applications (3) | ||||||
(Formerly SDEV 300.) Prerequisite: CMSC 215 or CYOP 200. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. Students may receive credit for only one of the following courses: CYOP 300 or SDEV 300. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
81482 | 6381 | 14 Aug 2024-08 Oct 2024 | Open | Online | |||
Faculty: Babcock, Mark A | Syllabus | Course Materials | |||||
CYOP 300 | Building Secure Python Applications (3) | ||||||
(Formerly SDEV 300.) Prerequisite: CMSC 215 or CYOP 200. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. Students may receive credit for only one of the following courses: CYOP 300 or SDEV 300. |
|||||||
83516 | 7380 | 16 Oct 2024-10 Dec 2024 | Closed | Online | |||
Faculty: Pike, Melissa A | Syllabus | Course Materials | |||||
CYOP 300 | Building Secure Python Applications (3) | ||||||
(Formerly SDEV 300.) Prerequisite: CMSC 215 or CYOP 200. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. Students may receive credit for only one of the following courses: CYOP 300 or SDEV 300. |
|||||||
83517 | 7381 | 16 Oct 2024-10 Dec 2024 | Open | Online | |||
Faculty: Fair, Zachary | Syllabus | Course Materials | |||||
CYOP 300 | Building Secure Python Applications (3) | ||||||
(Formerly SDEV 300.) Prerequisite: CMSC 215 or CYOP 200. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. Students may receive credit for only one of the following courses: CYOP 300 or SDEV 300. |
|||||||
83518 | 7382 | 16 Oct 2024-10 Dec 2024 | Open | Online | |||
Faculty: Boswell, Justin L. | Syllabus | Course Materials | |||||
CYOP 300 | Building Secure Python Applications (3) | ||||||
(Formerly SDEV 300.) Prerequisite: CMSC 215 or CYOP 200. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. Students may receive credit for only one of the following courses: CYOP 300 or SDEV 300. |
|||||||
84296 | 7383 | 16 Oct 2024-10 Dec 2024 | Open | Online | |||
Faculty: Webb, Alla | Syllabus | Course Materials | |||||
CYOP 300 | Building Secure Python Applications (3) | ||||||
(Formerly SDEV 300.) Prerequisite: CMSC 215 or CYOP 200. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. Students may receive credit for only one of the following courses: CYOP 300 or SDEV 300. |
|||||||
85290 | 7750 | 16 Oct 2024-10 Dec 2024 | M | 6:30P-9:30P | Open | Arundel Mills (Hybrid) | |
Faculty: Mathur, Pratik | Bldg/Room: Arundel Mills 109 | Syllabus | Course Materials | ||||
CYOP 310 | Reverse Engineering and Malware Analysis (3) | ||||||
A lab-intensive study of reverse engineering and malware analysis techniques. The objective is to recognize, dissect, and remediate infections caused by malicious code and malware using modern tools and methodologies. Topics include malware analysis, reverse engineering, common malware patterns, assembly language, debuggers and obfuscation, and packing techniques. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
86128 | 6380 | 14 Aug 2024-08 Oct 2024 | Open | Online | |||
Faculty: Smith, Benjamin M | Syllabus | Course Materials | |||||
CYOP 310 | Reverse Engineering and Malware Analysis (3) | ||||||
A lab-intensive study of reverse engineering and malware analysis techniques. The objective is to recognize, dissect, and remediate infections caused by malicious code and malware using modern tools and methodologies. Topics include malware analysis, reverse engineering, common malware patterns, assembly language, debuggers and obfuscation, and packing techniques. |
|||||||
86129 | 7380 | 16 Oct 2024-10 Dec 2024 | Closed | Online | |||
Faculty: Smith, Benjamin M | Syllabus | Course Materials | |||||
CYOP 310 | Reverse Engineering and Malware Analysis (3) | ||||||
A lab-intensive study of reverse engineering and malware analysis techniques. The objective is to recognize, dissect, and remediate infections caused by malicious code and malware using modern tools and methodologies. Topics include malware analysis, reverse engineering, common malware patterns, assembly language, debuggers and obfuscation, and packing techniques. |
|||||||
87203 | 7381 | 16 Oct 2024-10 Dec 2024 | Open | Online | |||
Faculty: Aus, Alex D | Syllabus | Course Materials | |||||
CYOP 325 | Detecting Software Vulnerabilities (3) | ||||||
(Formerly SDEV 325.) Prerequisite: CYOP 300 or SDEV 300. An in-depth, practical application of techniques and tools for detecting and documenting software vulnerabilities and risks. The goal is to research, select, and use software to analyze code and isolate and prioritize application code and processes that could lead to failure or compromise data integrity or privacy. Topics include the top 25 software vulnerabilities, secure coding guidelines, static code analysis, and software assurance metrics. Students may receive credit for only one of the following courses: CYOP 325 or SDEV 325. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
81266 | 6380 | 14 Aug 2024-08 Oct 2024 | Open | Online | |||
Faculty: Donoho, Lucas M. | Syllabus | Course Materials | |||||
CYOP 325 | Detecting Software Vulnerabilities (3) | ||||||
(Formerly SDEV 325.) Prerequisite: CYOP 300 or SDEV 300. An in-depth, practical application of techniques and tools for detecting and documenting software vulnerabilities and risks. The goal is to research, select, and use software to analyze code and isolate and prioritize application code and processes that could lead to failure or compromise data integrity or privacy. Topics include the top 25 software vulnerabilities, secure coding guidelines, static code analysis, and software assurance metrics. Students may receive credit for only one of the following courses: CYOP 325 or SDEV 325. |
|||||||
83521 | 7380 | 16 Oct 2024-10 Dec 2024 | Open | Online | |||
Faculty: Donoho, Lucas M. | Syllabus | Course Materials | |||||
CYOP 325 | Detecting Software Vulnerabilities (3) | ||||||
(Formerly SDEV 325.) Prerequisite: CYOP 300 or SDEV 300. An in-depth, practical application of techniques and tools for detecting and documenting software vulnerabilities and risks. The goal is to research, select, and use software to analyze code and isolate and prioritize application code and processes that could lead to failure or compromise data integrity or privacy. Topics include the top 25 software vulnerabilities, secure coding guidelines, static code analysis, and software assurance metrics. Students may receive credit for only one of the following courses: CYOP 325 or SDEV 325. |
|||||||
85291 | 7665 | 16 Oct 2024-10 Dec 2024 | Th | 6:30P-9:30P | Open | Dorsey Station (Hybrid) | |
Faculty: Royal, Brandon R | Syllabus | Course Materials | |||||
Note: Dorsey Station: Classroom assignments are subject to change. Please view the electronic board in the hallway for your classroom assignment. | |||||||
CYOP 350 | Database Security (3) | ||||||
(Formerly SDEV 350.) Prerequisite: CMSC 320 or CYOP 200. A study of processes and techniques for securing databases. The objective is to design, build, and maintain databases to minimize risks and security attacks. Topics include privileges and roles, user accounts, encryption, authentication methods, and auditing. Students may receive credit for only one of the following courses: CYOP 350 or SDEV 350. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
81274 | 6380 | 14 Aug 2024-08 Oct 2024 | Open | Online | |||
Faculty: Eyler, Carl W | Syllabus | Course Materials | |||||
CYOP 350 | Database Security (3) | ||||||
(Formerly SDEV 350.) Prerequisite: CMSC 320 or CYOP 200. A study of processes and techniques for securing databases. The objective is to design, build, and maintain databases to minimize risks and security attacks. Topics include privileges and roles, user accounts, encryption, authentication methods, and auditing. Students may receive credit for only one of the following courses: CYOP 350 or SDEV 350. |
|||||||
83523 | 7380 | 16 Oct 2024-10 Dec 2024 | Open | Online | |||
Faculty: De Los Santos, Ivan A. | Syllabus | Course Materials | |||||
CYOP 350 | Database Security (3) | ||||||
(Formerly SDEV 350.) Prerequisite: CMSC 320 or CYOP 200. A study of processes and techniques for securing databases. The objective is to design, build, and maintain databases to minimize risks and security attacks. Topics include privileges and roles, user accounts, encryption, authentication methods, and auditing. Students may receive credit for only one of the following courses: CYOP 350 or SDEV 350. |
|||||||
84534 | 7381 | 16 Oct 2024-10 Dec 2024 | Open | Online | |||
Faculty: Braun, Nathan L | Syllabus | Course Materials | |||||
CYOP 360 | Secure Software Engineering (3) | ||||||
(Formerly SDEV 360.) Prerequisite: CMSC 215 or CYOP 200. An in-depth study of the processes, standards, and regulations associated with secure software engineering. The objective is to plan, manage, document, and communicate all phases of a secure software development cycle. Topics include security requirements, secure software life cycle development, threat modeling, and Security Technical Implementation Guides (STIGs). Students may receive credit for only one of the following courses: CYOP 360 or SDEV 360. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
81462 | 6380 | 14 Aug 2024-08 Oct 2024 | Open | Online | |||
Faculty: Johnson, Kyle L | Syllabus | Course Materials | |||||
CYOP 360 | Secure Software Engineering (3) | ||||||
(Formerly SDEV 360.) Prerequisite: CMSC 215 or CYOP 200. An in-depth study of the processes, standards, and regulations associated with secure software engineering. The objective is to plan, manage, document, and communicate all phases of a secure software development cycle. Topics include security requirements, secure software life cycle development, threat modeling, and Security Technical Implementation Guides (STIGs). Students may receive credit for only one of the following courses: CYOP 360 or SDEV 360. |
|||||||
83524 | 7380 | 16 Oct 2024-10 Dec 2024 | Open | Online | |||
Faculty: Khan, Muhammad A | Syllabus | Course Materials | |||||
CYOP 400 | Secure Programming in the Cloud (3) | ||||||
(Formerly SDEV 400.) Prerequisite: CYOP 300 or SDEV 300. A hands-on study of programming secure applications in the cloud. The goal is to design and build applications in the cloud while implementing appropriate security policies. Topics include cloud computing models, risks and security challenges of programming in the cloud, and data security. Students may receive credit for only one of the following courses: CYOP 400 or SDEV 400. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
81909 | 6380 | 14 Aug 2024-08 Oct 2024 | Open | Online | |||
Faculty: Taylor, Matthew A | Syllabus | Course Materials | |||||
CYOP 400 | Secure Programming in the Cloud (3) | ||||||
(Formerly SDEV 400.) Prerequisite: CYOP 300 or SDEV 300. A hands-on study of programming secure applications in the cloud. The goal is to design and build applications in the cloud while implementing appropriate security policies. Topics include cloud computing models, risks and security challenges of programming in the cloud, and data security. Students may receive credit for only one of the following courses: CYOP 400 or SDEV 400. |
|||||||
83526 | 7380 | 16 Oct 2024-10 Dec 2024 | Open | Online | |||
Faculty: Waithe, Errol S. | Syllabus | Course Materials | |||||
CYOP 425 | Mitigating Software Vulnerabilities (3) | ||||||
(Formerly SDEV 425.) Prerequisites: CYOP 325 (or SDEV 325) and CYOP 360 (or SDEV 360). An in-depth analysis and evaluation of the mitigation of software vulnerabilities. The aim is to detect and mitigate software vulnerabilities by evaluating code. Topics include language-specific software vulnerabilities, mitigation, and input validation. Students may receive credit for only one of the following courses: CYOP 425 or SDEV 425. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
81549 | 6380 | 14 Aug 2024-08 Oct 2024 | Open | Online | |||
Faculty: Boswell, Justin L. | Syllabus | Course Materials | |||||
CYOP 425 | Mitigating Software Vulnerabilities (3) | ||||||
(Formerly SDEV 425.) Prerequisites: CYOP 325 (or SDEV 325) and CYOP 360 (or SDEV 360). An in-depth analysis and evaluation of the mitigation of software vulnerabilities. The aim is to detect and mitigate software vulnerabilities by evaluating code. Topics include language-specific software vulnerabilities, mitigation, and input validation. Students may receive credit for only one of the following courses: CYOP 425 or SDEV 425. |
|||||||
84507 | 7380 | 16 Oct 2024-10 Dec 2024 | Open | Online | |||
Faculty: Eyler, Carl W | Syllabus | Course Materials | |||||
CYOP 460 | Software Security Testing (3) | ||||||
(Formerly SDEV 460.) Prerequisite: SDEV 425. A hands-on study of exploits, attacks, and techniques used to penetrate application security defenses and strategies for mitigating such attacks. The objective is to apply appropriate methodologies for software penetration testing to identify application weaknesses and logic flaws and to test and create scripts for exploitation and discovery. Topics include web architecture, application infrastructure, reconnaissance, discovery, mapping, and exploitation. Students may receive credit for only one of the following courses: CYOP 460 or SDEV 460. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
81998 | 6380 | 14 Aug 2024-08 Oct 2024 | Open | Online | |||
Faculty: Nebhnani, Puran C | Syllabus | Course Materials | |||||
CYOP 460 | Software Security Testing (3) | ||||||
(Formerly SDEV 460.) Prerequisite: SDEV 425. A hands-on study of exploits, attacks, and techniques used to penetrate application security defenses and strategies for mitigating such attacks. The objective is to apply appropriate methodologies for software penetration testing to identify application weaknesses and logic flaws and to test and create scripts for exploitation and discovery. Topics include web architecture, application infrastructure, reconnaissance, discovery, mapping, and exploitation. Students may receive credit for only one of the following courses: CYOP 460 or SDEV 460. |
|||||||
84384 | 7380 | 16 Oct 2024-10 Dec 2024 | Open | Online | |||
Faculty: Brown, Matthew L | Syllabus | Course Materials | |||||
CYOP 495 | Cyber Operations Capstone (3) | ||||||
Prerequisite: 27 credits of Cyber Operations major coursework. A comprehensive project-driven study of cyber operations, network collection tactics, techniques, and procedures and reverse engineering and malware analysis with an emphasis on the proactive response to triggers or unusual activity. The objective is to use appropriate tools and techniques to monitor cyber operations. Topics include wireless and virtual networks, cryptography, network monitoring and intrusion analysis, threat hunting, and secure software engineering. |
|||||||
86127 | 7380 | 16 Oct 2024-10 Dec 2024 | Open | Online | |||
Faculty: Klein, Jamy D | Syllabus | Course Materials |