Quick Search
- African American Studies
- Accounting
- Anthropology
- Applied Technology
- Arabic
- Artificial Intelligence
- Art History
- Art
- Asian Studies
- Astronomy
- Behavioral and Social Science
- Biology
- Business and Management
- Career Planning
- Criminology/Criminal Justice
- Chemistry
- Chinese
- Criminal Justice Law Enformnt
- Computer Information Technolo
- Computer Science
- Computer Studies
- Communication Studies
- Cyber Security-Info Assurance
- Cyber Operations
- Data Analytics
- Drones and Autonomous Systems
- Economics
- Emergency Management
- English
- Environmental Hlth and Safety
- Experiential Learning
- Finance
- French
- Fire Science
- Geography
- Geology
- German
- Gerontology
- Graphic Communication
- Government and Politics
- History
- Health Services Management
- Homeland Security
- Human Resource Management
- Humanities
- Information Systems Managemen
- Japanese
- Journalism
- Korean
- Legal Studies
- Library Skills & Info Literac
- Mathematics
- Marketing
- Music
- Natural Science
- Nursing
- Nutrition
- Operations Management
- Professional Exploration
- Philosophy
- Physics
- Public Safety Administration
- Psychology
- Sociology
- Spanish
- Speech
- Statistics and Probability
- Women's Studies
- Writing
2026 Spring: January 7 - May 5
| Course | Class No. | Section | Start & End Date | Day | Time | Status | Location |
|---|
2026 Spring: January 7 - May 5
| Course | Class No. | Section | Start & End Date | Day | Time | Status | Location |
|---|---|---|---|---|---|---|---|
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2501 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Wynn, Sarah E | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2502 | 6381 | 07 Jan 2026-03 Mar 2026 | Closed | Online | |||
| Faculty: McDonnell, Nancy A | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2528 | 6382 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Colon, Lilian M | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2583 | 6383 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Uribe, Felix A | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2769 | 6384 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Brandenburg, Eric J | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2990 | 6385 | 07 Jan 2026-03 Mar 2026 | Closed | Online | |||
| Faculty: Carrington, Lisa L | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 3126 | 6386 | 07 Jan 2026-03 Mar 2026 | Closed | Online | |||
| Faculty: Turner, Dana Aaron | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 3975 | 6387 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Vetter, Mark C | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 4502 | 6980 | 11 Feb 2026-07 Apr 2026 | Open | Online | |||
| Faculty: Ahmed, Basra Bashir | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 4547 | 6981 | 11 Feb 2026-07 Apr 2026 | Open | Online | |||
| Faculty: Riley, Jamel Shauntre | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 4709 | 6982 | 11 Feb 2026-07 Apr 2026 | Open | Online | |||
| Faculty: Barker, Helen G | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| 5577 | 7380 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Wynn, Sarah E | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| 5578 | 7381 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Jumper, Sharon D | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| 5579 | 7382 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Taglisferi, Staci D | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| 5942 | 7383 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: McCord, Gregory L | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| 6165 | 7384 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Nelson, Gary C | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| 6437 | 7385 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Holmes, Aisha E | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| 7575 | 2820 | 07 Jan 2026-03 Mar 2026 | W | 6:00P-9:00P | Open | Fort Sam Houston Education Ct | |
| Faculty: Mendez, Thomas R | Syllabus | Course Materials | |||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| 8663 | 4020 | 07 Jan 2026-03 Mar 2026 | W | 6:30P-9:30P | Open | College Park (Hybrid) | |
| Faculty: Wallace, Amanda J | Bldg/Room: Tydings Hall 0101 | Syllabus | Course Materials | ||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 8784 | 1105 | 10 Dec 2025-06 Jan 2026 | Closed | Online | |||
| Faculty: Ahmed, Basra Bashir | Syllabus | Course Materials | |||||
| Note: This accelerated 4-week course has a condensed workload. Students are encouraged to enroll in only one course during Intersession. To decide if this is a good fit for you, contact your Success Coach or Military Education Coordinator. Learn more at https://umgc.edu/winter | |||||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 9254 | 1106 | 10 Dec 2025-06 Jan 2026 | Open | Online | |||
| Faculty: Wright, Linnea Louise | Syllabus | Course Materials | |||||
| Note: This accelerated 4-week course has a condensed workload. Students are encouraged to enroll in only one course during Intersession. To decide if this is a good fit for you, contact your Success Coach or Military Education Coordinator. Learn more at https://umgc.edu/winter | |||||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 9334 | 1107 | 10 Dec 2025-06 Jan 2026 | Closed | Online | |||
| Faculty: Shample, Stephanie | Syllabus | Course Materials | |||||
| Note: This accelerated 4-week course has a condensed workload. Students are encouraged to enroll in only one course during Intersession. To decide if this is a good fit for you, contact your Success Coach or Military Education Coordinator. Learn more at https://umgc.edu/winter | |||||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 9405 | 1108 | 10 Dec 2025-06 Jan 2026 | Open | Online | |||
| Faculty: Manley, Rupert S | Syllabus | Course Materials | |||||
| Note: This accelerated 4-week course has a condensed workload. Students are encouraged to enroll in only one course during Intersession. To decide if this is a good fit for you, contact your Success Coach or Military Education Coordinator. Learn more at https://umgc.edu/winter | |||||||
| CSIA 300 | Cybersecurity for Leaders and Managers (3) | ||||||
(Designed in part to help prepare for the EC-Council Secure Computer User [CSCU] certification.). A survey of the cybersecurity principles, practices, and strategies required by leaders and managers to become strategic partners in the establishment, management, and governance of an enterprise's cybersecurity program. The aim is to develop both an understanding of how cybersecurity supports key business goals and objectives and the soft skills necessary for success in a leadership or managerial role. Topics include the fundamentals of cybersecurity practices and principles; enterprise IT governance processes and security controls; data security; the information life cycle; intellectual property protections; privacy laws and regulations; security education, training, and awareness; and the need for cooperation and collaboration between business units and the organization's cybersecurity program. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 9467 | 1109 | 10 Dec 2025-06 Jan 2026 | Open | Online | |||
| Faculty: Epstein, Steven L. | Syllabus | Course Materials | |||||
| Note: This accelerated 4-week course has a condensed workload. Students are encouraged to enroll in only one course during Intersession. To decide if this is a good fit for you, contact your Success Coach or Military Education Coordinator. Learn more at https://umgc.edu/winter | |||||||
| CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government and industry-recognized intermediate-level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2157 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Hobbie, John W. | Syllabus | Course Materials | |||||
| CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government and industry-recognized intermediate-level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2158 | 6381 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Akinpelu, Zechariah Oluleke | Syllabus | Course Materials | |||||
| CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government and industry-recognized intermediate-level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2159 | 6382 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: McFaul, Janet L | Syllabus | Course Materials | |||||
| CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government and industry-recognized intermediate-level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 4264 | 6980 | 11 Feb 2026-07 Apr 2026 | Open | Online | |||
| Faculty: McBorrough, William J | Syllabus | Course Materials | |||||
| CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government and industry-recognized intermediate-level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
| 4925 | 7380 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Hobbie, John W. | Syllabus | Course Materials | |||||
| CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government and industry-recognized intermediate-level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
| 5575 | 7381 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Hutchins, Deborah A | Syllabus | Course Materials | |||||
| CSIA 310 | Cybersecurity Processes and Technologies (3) | ||||||
(Includes content designed to help in preparing for EC-Council Certified Incident Handler [ECIH] certification.) A study of the processes and technologies used to implement and manage enterprise IT security operations. The goal is to apply and integrate cybersecurity concepts and best practices with the principles of IT operations and management and to prepare for a government and industry-recognized intermediate-level cybersecurity certification (Certified Incident Handler). Topics include the essential management and operational activities (acquisition, deployment, and operations) required to secure IT technologies and business operations against a wide variety of threats and attacks. |
|||||||
| 8664 | 4060 | 11 Mar 2026-05 May 2026 | W | 6:30P-9:30P | Open | College Park (Hybrid) | |
| Faculty: Uribe, Felix A | Syllabus | Course Materials | |||||
| CSIA 350 | Cybersecurity in Business and Industry (3) | ||||||
(Designed to help prepare for the Program Management Institute Professional Business Analyst [PMI-PBA] certification exam.) A study of the application and integration of cybersecurity principles, frameworks, standards, and best practices to the management, governance, and policy development processes for businesses. The aim is to apply business analysis principles and methods to cybersecurity problems in business and industry. Discussion covers the organization, management, and governance of cybersecurity for enterprise IT in business settings; risk and risk management practices; and development and implementation of industry-wide cybersecurity initiatives and programs. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2166 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Carter, Daniel J | Syllabus | Course Materials | |||||
| CSIA 350 | Cybersecurity in Business and Industry (3) | ||||||
(Designed to help prepare for the Program Management Institute Professional Business Analyst [PMI-PBA] certification exam.) A study of the application and integration of cybersecurity principles, frameworks, standards, and best practices to the management, governance, and policy development processes for businesses. The aim is to apply business analysis principles and methods to cybersecurity problems in business and industry. Discussion covers the organization, management, and governance of cybersecurity for enterprise IT in business settings; risk and risk management practices; and development and implementation of industry-wide cybersecurity initiatives and programs. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2167 | 6381 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Cole, Susan B. | Syllabus | Course Materials | |||||
| CSIA 350 | Cybersecurity in Business and Industry (3) | ||||||
(Designed to help prepare for the Program Management Institute Professional Business Analyst [PMI-PBA] certification exam.) A study of the application and integration of cybersecurity principles, frameworks, standards, and best practices to the management, governance, and policy development processes for businesses. The aim is to apply business analysis principles and methods to cybersecurity problems in business and industry. Discussion covers the organization, management, and governance of cybersecurity for enterprise IT in business settings; risk and risk management practices; and development and implementation of industry-wide cybersecurity initiatives and programs. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2690 | 6382 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Leung, Wilson K | Syllabus | Course Materials | |||||
| CSIA 350 | Cybersecurity in Business and Industry (3) | ||||||
(Designed to help prepare for the Program Management Institute Professional Business Analyst [PMI-PBA] certification exam.) A study of the application and integration of cybersecurity principles, frameworks, standards, and best practices to the management, governance, and policy development processes for businesses. The aim is to apply business analysis principles and methods to cybersecurity problems in business and industry. Discussion covers the organization, management, and governance of cybersecurity for enterprise IT in business settings; risk and risk management practices; and development and implementation of industry-wide cybersecurity initiatives and programs. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 4265 | 6980 | 11 Feb 2026-07 Apr 2026 | Open | Online | |||
| Faculty: Rahul, Mahabub Rabbani | Syllabus | Course Materials | |||||
| CSIA 350 | Cybersecurity in Business and Industry (3) | ||||||
(Designed to help prepare for the Program Management Institute Professional Business Analyst [PMI-PBA] certification exam.) A study of the application and integration of cybersecurity principles, frameworks, standards, and best practices to the management, governance, and policy development processes for businesses. The aim is to apply business analysis principles and methods to cybersecurity problems in business and industry. Discussion covers the organization, management, and governance of cybersecurity for enterprise IT in business settings; risk and risk management practices; and development and implementation of industry-wide cybersecurity initiatives and programs. |
|||||||
| 4928 | 7380 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Middleton, Kenice E | Syllabus | Course Materials | |||||
| CSIA 350 | Cybersecurity in Business and Industry (3) | ||||||
(Designed to help prepare for the Program Management Institute Professional Business Analyst [PMI-PBA] certification exam.) A study of the application and integration of cybersecurity principles, frameworks, standards, and best practices to the management, governance, and policy development processes for businesses. The aim is to apply business analysis principles and methods to cybersecurity problems in business and industry. Discussion covers the organization, management, and governance of cybersecurity for enterprise IT in business settings; risk and risk management practices; and development and implementation of industry-wide cybersecurity initiatives and programs. |
|||||||
| 5574 | 7381 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Cole, Susan B. | Syllabus | Course Materials | |||||
| CSIA 350 | Cybersecurity in Business and Industry (3) | ||||||
(Designed to help prepare for the Program Management Institute Professional Business Analyst [PMI-PBA] certification exam.) A study of the application and integration of cybersecurity principles, frameworks, standards, and best practices to the management, governance, and policy development processes for businesses. The aim is to apply business analysis principles and methods to cybersecurity problems in business and industry. Discussion covers the organization, management, and governance of cybersecurity for enterprise IT in business settings; risk and risk management practices; and development and implementation of industry-wide cybersecurity initiatives and programs. |
|||||||
| 6901 | 7382 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Goren, Nedim S | Syllabus | Course Materials | |||||
| CSIA 350 | Cybersecurity in Business and Industry (3) | ||||||
(Designed to help prepare for the Program Management Institute Professional Business Analyst [PMI-PBA] certification exam.) A study of the application and integration of cybersecurity principles, frameworks, standards, and best practices to the management, governance, and policy development processes for businesses. The aim is to apply business analysis principles and methods to cybersecurity problems in business and industry. Discussion covers the organization, management, and governance of cybersecurity for enterprise IT in business settings; risk and risk management practices; and development and implementation of industry-wide cybersecurity initiatives and programs. |
|||||||
| 7571 | 5120 | 07 Jan 2026-03 Mar 2026 | W | 6:30P-9:30P | Open | Shady Grove (Hybrid) | |
| Faculty: Onyegbula, Festus C | Bldg/Room: Shady Grove Center, Bldg III 3203 | Syllabus | Course Materials | ||||
| CSIA 350 | Cybersecurity in Business and Industry (3) | ||||||
(Designed to help prepare for the Program Management Institute Professional Business Analyst [PMI-PBA] certification exam.) A study of the application and integration of cybersecurity principles, frameworks, standards, and best practices to the management, governance, and policy development processes for businesses. The aim is to apply business analysis principles and methods to cybersecurity problems in business and industry. Discussion covers the organization, management, and governance of cybersecurity for enterprise IT in business settings; risk and risk management practices; and development and implementation of industry-wide cybersecurity initiatives and programs. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 9532 | 6383 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Stanfield, Miranda A | Syllabus | Course Materials | |||||
| CSIA 360 | Cybersecurity in Government Organizations (3) | ||||||
Prerequisite: CSIA 350. A study of cybersecurity management and governance in the context of the missions, functions, and operations of federal, state, and municipal government agencies, departments, and programs. Discussion covers the policy life cycle and the mechanisms used by governments to formulate and implement laws, policies, regulations, and treaties to protect and defend government operations and society as a whole against cyber attacks and crimes, both foreign and domestic. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2168 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Ancar, Quentin E. | Syllabus | Course Materials | |||||
| CSIA 360 | Cybersecurity in Government Organizations (3) | ||||||
Prerequisite: CSIA 350. A study of cybersecurity management and governance in the context of the missions, functions, and operations of federal, state, and municipal government agencies, departments, and programs. Discussion covers the policy life cycle and the mechanisms used by governments to formulate and implement laws, policies, regulations, and treaties to protect and defend government operations and society as a whole against cyber attacks and crimes, both foreign and domestic. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2169 | 6381 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Wagner, Lily Yeung | Syllabus | Course Materials | |||||
| CSIA 360 | Cybersecurity in Government Organizations (3) | ||||||
Prerequisite: CSIA 350. A study of cybersecurity management and governance in the context of the missions, functions, and operations of federal, state, and municipal government agencies, departments, and programs. Discussion covers the policy life cycle and the mechanisms used by governments to formulate and implement laws, policies, regulations, and treaties to protect and defend government operations and society as a whole against cyber attacks and crimes, both foreign and domestic. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 3392 | 6382 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Middleton, Kenice E | Syllabus | Course Materials | |||||
| CSIA 360 | Cybersecurity in Government Organizations (3) | ||||||
Prerequisite: CSIA 350. A study of cybersecurity management and governance in the context of the missions, functions, and operations of federal, state, and municipal government agencies, departments, and programs. Discussion covers the policy life cycle and the mechanisms used by governments to formulate and implement laws, policies, regulations, and treaties to protect and defend government operations and society as a whole against cyber attacks and crimes, both foreign and domestic. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 4573 | 6980 | 11 Feb 2026-07 Apr 2026 | Open | Online | |||
| Faculty: Cash, Angenette | Syllabus | Course Materials | |||||
| CSIA 360 | Cybersecurity in Government Organizations (3) | ||||||
Prerequisite: CSIA 350. A study of cybersecurity management and governance in the context of the missions, functions, and operations of federal, state, and municipal government agencies, departments, and programs. Discussion covers the policy life cycle and the mechanisms used by governments to formulate and implement laws, policies, regulations, and treaties to protect and defend government operations and society as a whole against cyber attacks and crimes, both foreign and domestic. |
|||||||
| 4929 | 7380 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Ancar, Quentin E. | Syllabus | Course Materials | |||||
| CSIA 360 | Cybersecurity in Government Organizations (3) | ||||||
Prerequisite: CSIA 350. A study of cybersecurity management and governance in the context of the missions, functions, and operations of federal, state, and municipal government agencies, departments, and programs. Discussion covers the policy life cycle and the mechanisms used by governments to formulate and implement laws, policies, regulations, and treaties to protect and defend government operations and society as a whole against cyber attacks and crimes, both foreign and domestic. |
|||||||
| 5573 | 7381 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Chun, Samuel W | Syllabus | Course Materials | |||||
| CSIA 360 | Cybersecurity in Government Organizations (3) | ||||||
Prerequisite: CSIA 350. A study of cybersecurity management and governance in the context of the missions, functions, and operations of federal, state, and municipal government agencies, departments, and programs. Discussion covers the policy life cycle and the mechanisms used by governments to formulate and implement laws, policies, regulations, and treaties to protect and defend government operations and society as a whole against cyber attacks and crimes, both foreign and domestic. |
|||||||
| 7570 | 7710 | 07 Jan 2026-03 Mar 2026 | M | 6:30P-9:30P | Open | Arundel Mills (Hybrid) | |
| Faculty: Kostic, Linda C | Bldg/Room: Arundel Mills 110 | Syllabus | Course Materials | ||||
| CSIA 360 | Cybersecurity in Government Organizations (3) | ||||||
Prerequisite: CSIA 350. A study of cybersecurity management and governance in the context of the missions, functions, and operations of federal, state, and municipal government agencies, departments, and programs. Discussion covers the policy life cycle and the mechanisms used by governments to formulate and implement laws, policies, regulations, and treaties to protect and defend government operations and society as a whole against cyber attacks and crimes, both foreign and domestic. |
|||||||
| 9783 | 7382 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Leung, Wilson K | Syllabus | Course Materials | |||||
| CSIA 413 | Cybersecurity Policy, Plans, and Programs (3) | ||||||
(Includes content designed to help in preparing for IAPP Certified Information Privacy Professional/US certification.) Prerequisite: CSIA 360. A study of the application of cybersecurity principles, frameworks, standards, and best practices to organization-level strategies, policies, programs, plans, procedures, and processes. The aim is to assist students in preparing to take an internationally recognized information privacy certification. Projects include writing security policies and plans, developing metrics and measures for information security programs, planning audits of compliance practices and processes, and developing organization-level security policies for enterprise IT governance. Discussion covers principles and best practices for protecting privacy and ensuring compliance with laws and regulations. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 1913 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Shirazee, Mohammad F | Syllabus | Course Materials | |||||
| CSIA 413 | Cybersecurity Policy, Plans, and Programs (3) | ||||||
(Includes content designed to help in preparing for IAPP Certified Information Privacy Professional/US certification.) Prerequisite: CSIA 360. A study of the application of cybersecurity principles, frameworks, standards, and best practices to organization-level strategies, policies, programs, plans, procedures, and processes. The aim is to assist students in preparing to take an internationally recognized information privacy certification. Projects include writing security policies and plans, developing metrics and measures for information security programs, planning audits of compliance practices and processes, and developing organization-level security policies for enterprise IT governance. Discussion covers principles and best practices for protecting privacy and ensuring compliance with laws and regulations. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 1914 | 6381 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: DeBlase, Joseph V | Syllabus | Course Materials | |||||
| CSIA 413 | Cybersecurity Policy, Plans, and Programs (3) | ||||||
(Includes content designed to help in preparing for IAPP Certified Information Privacy Professional/US certification.) Prerequisite: CSIA 360. A study of the application of cybersecurity principles, frameworks, standards, and best practices to organization-level strategies, policies, programs, plans, procedures, and processes. The aim is to assist students in preparing to take an internationally recognized information privacy certification. Projects include writing security policies and plans, developing metrics and measures for information security programs, planning audits of compliance practices and processes, and developing organization-level security policies for enterprise IT governance. Discussion covers principles and best practices for protecting privacy and ensuring compliance with laws and regulations. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 3874 | 6382 | 07 Jan 2026-03 Mar 2026 | Closed | Online | |||
| Faculty: Heben, Heather L. | Syllabus | Course Materials | |||||
| CSIA 413 | Cybersecurity Policy, Plans, and Programs (3) | ||||||
(Includes content designed to help in preparing for IAPP Certified Information Privacy Professional/US certification.) Prerequisite: CSIA 360. A study of the application of cybersecurity principles, frameworks, standards, and best practices to organization-level strategies, policies, programs, plans, procedures, and processes. The aim is to assist students in preparing to take an internationally recognized information privacy certification. Projects include writing security policies and plans, developing metrics and measures for information security programs, planning audits of compliance practices and processes, and developing organization-level security policies for enterprise IT governance. Discussion covers principles and best practices for protecting privacy and ensuring compliance with laws and regulations. |
|||||||
| 5558 | 7380 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Ringgold, Ronald S | Syllabus | Course Materials | |||||
| CSIA 413 | Cybersecurity Policy, Plans, and Programs (3) | ||||||
(Includes content designed to help in preparing for IAPP Certified Information Privacy Professional/US certification.) Prerequisite: CSIA 360. A study of the application of cybersecurity principles, frameworks, standards, and best practices to organization-level strategies, policies, programs, plans, procedures, and processes. The aim is to assist students in preparing to take an internationally recognized information privacy certification. Projects include writing security policies and plans, developing metrics and measures for information security programs, planning audits of compliance practices and processes, and developing organization-level security policies for enterprise IT governance. Discussion covers principles and best practices for protecting privacy and ensuring compliance with laws and regulations. |
|||||||
| 5566 | 7381 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Markham, Ray E | Syllabus | Course Materials | |||||
| CSIA 413 | Cybersecurity Policy, Plans, and Programs (3) | ||||||
(Includes content designed to help in preparing for IAPP Certified Information Privacy Professional/US certification.) Prerequisite: CSIA 360. A study of the application of cybersecurity principles, frameworks, standards, and best practices to organization-level strategies, policies, programs, plans, procedures, and processes. The aim is to assist students in preparing to take an internationally recognized information privacy certification. Projects include writing security policies and plans, developing metrics and measures for information security programs, planning audits of compliance practices and processes, and developing organization-level security policies for enterprise IT governance. Discussion covers principles and best practices for protecting privacy and ensuring compliance with laws and regulations. |
|||||||
| 7569 | 7760 | 11 Mar 2026-05 May 2026 | W | 6:30P-9:30P | Open | Arundel Mills (Hybrid) | |
| Faculty: Onyegbula, Festus C | Bldg/Room: Arundel Mills 110 | Syllabus | Course Materials | ||||
| CSIA 459 | Evaluating Emerging Technologies (3) | ||||||
Prerequisites: CMIT 320 and CSIA 350. A survey of emerging and leading technologies in the cybersecurity field. The aim is to research, evaluate, and recommend emerging technologies and determine secure implementation strategies for best-fit business solutions. Topics include evolutionary technology development and adoption in organizations. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 1831 | 6380 | 07 Jan 2026-03 Mar 2026 | Closed | Online | |||
| Faculty: Mengistu, Zelalem W | Syllabus | Course Materials | |||||
| CSIA 459 | Evaluating Emerging Technologies (3) | ||||||
Prerequisites: CMIT 320 and CSIA 350. A survey of emerging and leading technologies in the cybersecurity field. The aim is to research, evaluate, and recommend emerging technologies and determine secure implementation strategies for best-fit business solutions. Topics include evolutionary technology development and adoption in organizations. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2040 | 6381 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Nelson, Gary C | Syllabus | Course Materials | |||||
| CSIA 459 | Evaluating Emerging Technologies (3) | ||||||
Prerequisites: CMIT 320 and CSIA 350. A survey of emerging and leading technologies in the cybersecurity field. The aim is to research, evaluate, and recommend emerging technologies and determine secure implementation strategies for best-fit business solutions. Topics include evolutionary technology development and adoption in organizations. |
|||||||
| 5919 | 7380 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Pefoubou Mofo, Severin B | Syllabus | Course Materials | |||||
| CSIA 459 | Evaluating Emerging Technologies (3) | ||||||
Prerequisites: CMIT 320 and CSIA 350. A survey of emerging and leading technologies in the cybersecurity field. The aim is to research, evaluate, and recommend emerging technologies and determine secure implementation strategies for best-fit business solutions. Topics include evolutionary technology development and adoption in organizations. |
|||||||
| 5920 | 7381 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Vance, Andrew S | Syllabus | Course Materials | |||||
| CSIA 459 | Evaluating Emerging Technologies (3) | ||||||
Prerequisites: CMIT 320 and CSIA 350. A survey of emerging and leading technologies in the cybersecurity field. The aim is to research, evaluate, and recommend emerging technologies and determine secure implementation strategies for best-fit business solutions. Topics include evolutionary technology development and adoption in organizations. |
|||||||
| 6282 | 7382 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Mengistu, Zelalem W | Syllabus | Course Materials | |||||
| CSIA 459 | Evaluating Emerging Technologies (3) | ||||||
Prerequisites: CMIT 320 and CSIA 350. A survey of emerging and leading technologies in the cybersecurity field. The aim is to research, evaluate, and recommend emerging technologies and determine secure implementation strategies for best-fit business solutions. Topics include evolutionary technology development and adoption in organizations. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 9533 | 6382 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Ridgeway, Holly E | Syllabus | Course Materials | |||||
| CSIA 485 | Cyber Management and Policy Capstone (3) | ||||||
(Intended as a final, capstone course to be taken in a student's last 6 credits; includes content designed to help in preparing students for the EC-Council Certified Chief Information Security Officer [CCISO] and Information Security Manager [EISM] certifications.) Prerequisites: CMIT 320 and CSIA 413. A study of cybersecurity management and policy that integrates knowledge gained from previous coursework and experience. Focus is on developing security strategies, plans, policies, and processes for the protection of an organization's critical information and assets. The goal is to enhance professional skills in cybersecurity management and leadership. Topics also include the ethical integration of cybersecurity best practices and risk management throughout an enterprise. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 1850 | 6380 | 07 Jan 2026-03 Mar 2026 | Closed | Online | |||
| Faculty: Pascarella, Joseph E | Syllabus | Course Materials | |||||
| CSIA 485 | Cyber Management and Policy Capstone (3) | ||||||
(Intended as a final, capstone course to be taken in a student's last 6 credits; includes content designed to help in preparing students for the EC-Council Certified Chief Information Security Officer [CCISO] and Information Security Manager [EISM] certifications.) Prerequisites: CMIT 320 and CSIA 413. A study of cybersecurity management and policy that integrates knowledge gained from previous coursework and experience. Focus is on developing security strategies, plans, policies, and processes for the protection of an organization's critical information and assets. The goal is to enhance professional skills in cybersecurity management and leadership. Topics also include the ethical integration of cybersecurity best practices and risk management throughout an enterprise. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 1951 | 6381 | 07 Jan 2026-03 Mar 2026 | Closed | Online | |||
| Faculty: Leerburger, Marian | Syllabus | Course Materials | |||||
| CSIA 485 | Cyber Management and Policy Capstone (3) | ||||||
(Intended as a final, capstone course to be taken in a student's last 6 credits; includes content designed to help in preparing students for the EC-Council Certified Chief Information Security Officer [CCISO] and Information Security Manager [EISM] certifications.) Prerequisites: CMIT 320 and CSIA 413. A study of cybersecurity management and policy that integrates knowledge gained from previous coursework and experience. Focus is on developing security strategies, plans, policies, and processes for the protection of an organization's critical information and assets. The goal is to enhance professional skills in cybersecurity management and leadership. Topics also include the ethical integration of cybersecurity best practices and risk management throughout an enterprise. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 3406 | 6382 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Chun, Samuel W | Syllabus | Course Materials | |||||
| CSIA 485 | Cyber Management and Policy Capstone (3) | ||||||
(Intended as a final, capstone course to be taken in a student's last 6 credits; includes content designed to help in preparing students for the EC-Council Certified Chief Information Security Officer [CCISO] and Information Security Manager [EISM] certifications.) Prerequisites: CMIT 320 and CSIA 413. A study of cybersecurity management and policy that integrates knowledge gained from previous coursework and experience. Focus is on developing security strategies, plans, policies, and processes for the protection of an organization's critical information and assets. The goal is to enhance professional skills in cybersecurity management and leadership. Topics also include the ethical integration of cybersecurity best practices and risk management throughout an enterprise. |
|||||||
| 5554 | 7380 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: White, Richard A | Syllabus | Course Materials | |||||
| CSIA 485 | Cyber Management and Policy Capstone (3) | ||||||
(Intended as a final, capstone course to be taken in a student's last 6 credits; includes content designed to help in preparing students for the EC-Council Certified Chief Information Security Officer [CCISO] and Information Security Manager [EISM] certifications.) Prerequisites: CMIT 320 and CSIA 413. A study of cybersecurity management and policy that integrates knowledge gained from previous coursework and experience. Focus is on developing security strategies, plans, policies, and processes for the protection of an organization's critical information and assets. The goal is to enhance professional skills in cybersecurity management and leadership. Topics also include the ethical integration of cybersecurity best practices and risk management throughout an enterprise. |
|||||||
| 5555 | 7381 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Bennett, Donna S | Syllabus | Course Materials | |||||
| CSIA 485 | Cyber Management and Policy Capstone (3) | ||||||
(Intended as a final, capstone course to be taken in a student's last 6 credits; includes content designed to help in preparing students for the EC-Council Certified Chief Information Security Officer [CCISO] and Information Security Manager [EISM] certifications.) Prerequisites: CMIT 320 and CSIA 413. A study of cybersecurity management and policy that integrates knowledge gained from previous coursework and experience. Focus is on developing security strategies, plans, policies, and processes for the protection of an organization's critical information and assets. The goal is to enhance professional skills in cybersecurity management and leadership. Topics also include the ethical integration of cybersecurity best practices and risk management throughout an enterprise. |
|||||||
| 5556 | 7382 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Salmans, Brian R | Syllabus | Course Materials | |||||
| CSIA 485 | Cyber Management and Policy Capstone (3) | ||||||
(Intended as a final, capstone course to be taken in a student's last 6 credits; includes content designed to help in preparing students for the EC-Council Certified Chief Information Security Officer [CCISO] and Information Security Manager [EISM] certifications.) Prerequisites: CMIT 320 and CSIA 413. A study of cybersecurity management and policy that integrates knowledge gained from previous coursework and experience. Focus is on developing security strategies, plans, policies, and processes for the protection of an organization's critical information and assets. The goal is to enhance professional skills in cybersecurity management and leadership. Topics also include the ethical integration of cybersecurity best practices and risk management throughout an enterprise. |
|||||||
| 5557 | 7383 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Colon, Lilian M | Syllabus | Course Materials | |||||
| CSIA 485 | Cyber Management and Policy Capstone (3) | ||||||
(Intended as a final, capstone course to be taken in a student's last 6 credits; includes content designed to help in preparing students for the EC-Council Certified Chief Information Security Officer [CCISO] and Information Security Manager [EISM] certifications.) Prerequisites: CMIT 320 and CSIA 413. A study of cybersecurity management and policy that integrates knowledge gained from previous coursework and experience. Focus is on developing security strategies, plans, policies, and processes for the protection of an organization's critical information and assets. The goal is to enhance professional skills in cybersecurity management and leadership. Topics also include the ethical integration of cybersecurity best practices and risk management throughout an enterprise. |
|||||||
| 9850 | 7384 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Wagner, Lily Yeung | Syllabus | Course Materials | |||||