Quick Search
- African American Studies
- Accounting
- Anthropology
- Applied Technology
- Arabic
- Artificial Intelligence
- Art History
- Art
- Asian Studies
- Astronomy
- Behavioral and Social Science
- Biology
- Business and Management
- Career Planning
- Criminology/Criminal Justice
- Chemistry
- Chinese
- Criminal Justice Law Enformnt
- Computer Information Technolo
- Computer Science
- Computer Studies
- Communication Studies
- Cyber Security-Info Assurance
- Cyber Operations
- Data Analytics
- Drones and Autonomous Systems
- Economics
- Emergency Management
- English
- Environmental Hlth and Safety
- Experiential Learning
- Finance
- French
- Fire Science
- Geography
- Geology
- German
- Gerontology
- Graphic Communication
- Government and Politics
- History
- Health Services Management
- Homeland Security
- Human Resource Management
- Humanities
- Information Systems Managemen
- Japanese
- Journalism
- Korean
- Legal Studies
- Library Skills & Info Literac
- Mathematics
- Marketing
- Music
- Natural Science
- Nursing
- Nutrition
- Operations Management
- Professional Exploration
- Philosophy
- Physics
- Public Safety Administration
- Psychology
- Sociology
- Spanish
- Speech
- Statistics and Probability
- Women's Studies
- Writing
2026 Spring: January 7 - May 5
| Course | Class No. | Section | Start & End Date | Day | Time | Status | Location |
|---|
2026 Spring: January 7 - May 5
| Course | Class No. | Section | Start & End Date | Day | Time | Status | Location |
|---|---|---|---|---|---|---|---|
| CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 3672 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Sbeit, Raed Omar | Syllabus | Course Materials | |||||
| CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 3795 | 6381 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Menard, Jean Wadson | Syllabus | Course Materials | |||||
| CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 3849 | 6382 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Melendez-Montes, Genesis Naima | Syllabus | Course Materials | |||||
| CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 3891 | 6383 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Babcock, Mark A | Syllabus | Course Materials | |||||
| CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 3995 | 6384 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Fuller, Jonathan | Syllabus | Course Materials | |||||
| CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
| 6707 | 7380 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Caruso, Drake | Syllabus | Course Materials | |||||
| CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
| 6865 | 7381 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Henry, Clayton Andrew | Syllabus | Course Materials | |||||
| CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
| 6921 | 7382 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Wells, Ashleigh A | Syllabus | Course Materials | |||||
| CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
| 6968 | 7383 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Menard, Jean Wadson | Syllabus | Course Materials | |||||
| CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
| 7070 | 7384 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Lamme, John Craig | Syllabus | Course Materials | |||||
| CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
| 7547 | 4560 | 11 Mar 2026-05 May 2026 | W | 6:30P-9:30P | Open | Odenton-Ft. Meade (Hybrid) | |
| Faculty: Pfeifer, Lance William | Syllabus | Course Materials | |||||
| CYOP 200 | Foundations of Cyberspace Operations (3) | ||||||
A hands-on introduction to the principles of cyberspace operations that support defensive and offensive processes. The objective is to navigate, integrate, and use popular cybersecurity tools and functions in a safe environment to detect and reduce system threats and vulnerabilities. Topics include strategic and tactical planning and guidance, security objectives for information systems, cybersecurity frameworks, security design principles, vulnerabilities and exploits, network and application security techniques, and automated tools for testing and security assessment. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 9664 | 6385 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Fair, Zachary | Syllabus | Course Materials | |||||
| CYOP 300 | Building Secure Python Applications (3) | ||||||
(Formerly SDEV 300.) Prerequisite: CMSC 215 or CYOP 200. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. Students may receive credit for only one of the following courses: CYOP 300 or SDEV 300. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2155 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Pike, Melissa A | Syllabus | Course Materials | |||||
| CYOP 300 | Building Secure Python Applications (3) | ||||||
(Formerly SDEV 300.) Prerequisite: CMSC 215 or CYOP 200. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. Students may receive credit for only one of the following courses: CYOP 300 or SDEV 300. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2415 | 6381 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Parsons, Matthew J | Syllabus | Course Materials | |||||
| CYOP 300 | Building Secure Python Applications (3) | ||||||
(Formerly SDEV 300.) Prerequisite: CMSC 215 or CYOP 200. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. Students may receive credit for only one of the following courses: CYOP 300 or SDEV 300. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2540 | 6382 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Evatt, Donald R | Syllabus | Course Materials | |||||
| CYOP 300 | Building Secure Python Applications (3) | ||||||
(Formerly SDEV 300.) Prerequisite: CMSC 215 or CYOP 200. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. Students may receive credit for only one of the following courses: CYOP 300 or SDEV 300. |
|||||||
| 5262 | 7380 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Khan, Muhammad A | Syllabus | Course Materials | |||||
| CYOP 300 | Building Secure Python Applications (3) | ||||||
(Formerly SDEV 300.) Prerequisite: CMSC 215 or CYOP 200. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. Students may receive credit for only one of the following courses: CYOP 300 or SDEV 300. |
|||||||
| 5263 | 7381 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Fair, Zachary | Syllabus | Course Materials | |||||
| CYOP 300 | Building Secure Python Applications (3) | ||||||
(Formerly SDEV 300.) Prerequisite: CMSC 215 or CYOP 200. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. Students may receive credit for only one of the following courses: CYOP 300 or SDEV 300. |
|||||||
| 5264 | 7382 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Parsons, Matthew J | Syllabus | Course Materials | |||||
| CYOP 300 | Building Secure Python Applications (3) | ||||||
(Formerly SDEV 300.) Prerequisite: CMSC 215 or CYOP 200. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. Students may receive credit for only one of the following courses: CYOP 300 or SDEV 300. |
|||||||
| 7545 | 7625 | 07 Jan 2026-03 Mar 2026 | Th | 6:30P-9:30P | Open | Dorsey Station (Hybrid) | |
| Faculty: Leon Alsina, Kevin M | Syllabus | Course Materials | |||||
| Note: Dorsey Station: Classroom assignments are subject to change. Please view the electronic board in the hallway for your classroom assignment. | |||||||
| CYOP 310 | Reverse Engineering and Malware Analysis (3) | ||||||
Prerequisite: CYOP 200. A lab-intensive study of reverse engineering and malware analysis techniques. The objective is to recognize, dissect, and remediate infections caused by malicious code and malware using modern tools and methodologies. Topics include malware analysis, reverse engineering, common malware patterns, assembly language, debuggers and obfuscation, and packing techniques. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 3673 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Aus, Alex D | Syllabus | Course Materials | |||||
| CYOP 310 | Reverse Engineering and Malware Analysis (3) | ||||||
Prerequisite: CYOP 200. A lab-intensive study of reverse engineering and malware analysis techniques. The objective is to recognize, dissect, and remediate infections caused by malicious code and malware using modern tools and methodologies. Topics include malware analysis, reverse engineering, common malware patterns, assembly language, debuggers and obfuscation, and packing techniques. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 3836 | 6381 | 07 Jan 2026-03 Mar 2026 | Closed | Online | |||
| Faculty: Klein, Jamy D | Syllabus | Course Materials | |||||
| CYOP 310 | Reverse Engineering and Malware Analysis (3) | ||||||
Prerequisite: CYOP 200. A lab-intensive study of reverse engineering and malware analysis techniques. The objective is to recognize, dissect, and remediate infections caused by malicious code and malware using modern tools and methodologies. Topics include malware analysis, reverse engineering, common malware patterns, assembly language, debuggers and obfuscation, and packing techniques. |
|||||||
| 6708 | 7380 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Fuller, Jonathan | Syllabus | Course Materials | |||||
| CYOP 310 | Reverse Engineering and Malware Analysis (3) | ||||||
Prerequisite: CYOP 200. A lab-intensive study of reverse engineering and malware analysis techniques. The objective is to recognize, dissect, and remediate infections caused by malicious code and malware using modern tools and methodologies. Topics include malware analysis, reverse engineering, common malware patterns, assembly language, debuggers and obfuscation, and packing techniques. |
|||||||
| 6875 | 7381 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Klein, Jamy D | Syllabus | Course Materials | |||||
| CYOP 310 | Reverse Engineering and Malware Analysis (3) | ||||||
Prerequisite: CYOP 200. A lab-intensive study of reverse engineering and malware analysis techniques. The objective is to recognize, dissect, and remediate infections caused by malicious code and malware using modern tools and methodologies. Topics include malware analysis, reverse engineering, common malware patterns, assembly language, debuggers and obfuscation, and packing techniques. |
|||||||
| 7544 | 4520 | 07 Jan 2026-03 Mar 2026 | W | 6:30P-9:30P | Open | Odenton-Ft. Meade (Hybrid) | |
| Faculty: Heinen, Charles W | Syllabus | Course Materials | |||||
| CYOP 310 | Reverse Engineering and Malware Analysis (3) | ||||||
Prerequisite: CYOP 200. A lab-intensive study of reverse engineering and malware analysis techniques. The objective is to recognize, dissect, and remediate infections caused by malicious code and malware using modern tools and methodologies. Topics include malware analysis, reverse engineering, common malware patterns, assembly language, debuggers and obfuscation, and packing techniques. |
|||||||
| 9938 | 7382 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: | Syllabus | Course Materials | |||||
| CYOP 325 | Detecting Software Vulnerabilities (3) | ||||||
(Formerly SDEV 325.) Prerequisite: CYOP 300 or SDEV 300. An in-depth, practical application of techniques and tools for detecting and documenting software vulnerabilities and risks. The goal is to research, select, and use software to analyze code and isolate and prioritize application code and processes that could lead to failure or compromise data integrity or privacy. Topics include the top 25 software vulnerabilities, secure coding guidelines, static code analysis, and software assurance metrics. Students may receive credit for only one of the following courses: CYOP 325 or SDEV 325. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2156 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Donoho, Lucas M. | Syllabus | Course Materials | |||||
| CYOP 325 | Detecting Software Vulnerabilities (3) | ||||||
(Formerly SDEV 325.) Prerequisite: CYOP 300 or SDEV 300. An in-depth, practical application of techniques and tools for detecting and documenting software vulnerabilities and risks. The goal is to research, select, and use software to analyze code and isolate and prioritize application code and processes that could lead to failure or compromise data integrity or privacy. Topics include the top 25 software vulnerabilities, secure coding guidelines, static code analysis, and software assurance metrics. Students may receive credit for only one of the following courses: CYOP 325 or SDEV 325. |
|||||||
| 5266 | 7380 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Babcock, Mark A | Syllabus | Course Materials | |||||
| CYOP 325 | Detecting Software Vulnerabilities (3) | ||||||
(Formerly SDEV 325.) Prerequisite: CYOP 300 or SDEV 300. An in-depth, practical application of techniques and tools for detecting and documenting software vulnerabilities and risks. The goal is to research, select, and use software to analyze code and isolate and prioritize application code and processes that could lead to failure or compromise data integrity or privacy. Topics include the top 25 software vulnerabilities, secure coding guidelines, static code analysis, and software assurance metrics. Students may receive credit for only one of the following courses: CYOP 325 or SDEV 325. |
|||||||
| 6574 | 7655 | 11 Mar 2026-05 May 2026 | T | 6:30P-9:30P | Open | Dorsey Station (Hybrid) | |
| Faculty: Royal, Brandon R | Syllabus | Course Materials | |||||
| Note: Dorsey Station: Classroom assignments are subject to change. Please view the electronic board in the hallway for your classroom assignment. | |||||||
| CYOP 350 | Database Security (3) | ||||||
(Formerly SDEV 350.) Prerequisite: CMSC 320 or CYOP 200. A study of processes and techniques for securing databases. The objective is to design, build, and maintain databases to minimize risks and security attacks. Topics include privileges and roles, user accounts, encryption, authentication methods, and auditing. Students may receive credit for only one of the following courses: CYOP 350 or SDEV 350. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2165 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Haseltine, Reginald Yagel | Syllabus | Course Materials | |||||
| CYOP 350 | Database Security (3) | ||||||
(Formerly SDEV 350.) Prerequisite: CMSC 320 or CYOP 200. A study of processes and techniques for securing databases. The objective is to design, build, and maintain databases to minimize risks and security attacks. Topics include privileges and roles, user accounts, encryption, authentication methods, and auditing. Students may receive credit for only one of the following courses: CYOP 350 or SDEV 350. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 3080 | 6381 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Braun, Nathan L | Syllabus | Course Materials | |||||
| CYOP 350 | Database Security (3) | ||||||
(Formerly SDEV 350.) Prerequisite: CMSC 320 or CYOP 200. A study of processes and techniques for securing databases. The objective is to design, build, and maintain databases to minimize risks and security attacks. Topics include privileges and roles, user accounts, encryption, authentication methods, and auditing. Students may receive credit for only one of the following courses: CYOP 350 or SDEV 350. |
|||||||
| 5267 | 7380 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Haseltine, Reginald Yagel | Syllabus | Course Materials | |||||
| CYOP 350 | Database Security (3) | ||||||
(Formerly SDEV 350.) Prerequisite: CMSC 320 or CYOP 200. A study of processes and techniques for securing databases. The objective is to design, build, and maintain databases to minimize risks and security attacks. Topics include privileges and roles, user accounts, encryption, authentication methods, and auditing. Students may receive credit for only one of the following courses: CYOP 350 or SDEV 350. |
|||||||
| 5932 | 7381 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Braun, Nathan L | Syllabus | Course Materials | |||||
| CYOP 360 | Secure Software Engineering (3) | ||||||
(Formerly SDEV 360.) Prerequisite: CMSC 215 or CYOP 200. An in-depth study of the processes, standards, and regulations associated with secure software engineering. The objective is to plan, manage, document, and communicate all phases of a secure software development cycle. Topics include security requirements, secure software life cycle development, threat modeling, and Security Technical Implementation Guides (STIGs). Students may receive credit for only one of the following courses: CYOP 360 or SDEV 360. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2443 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Gabello, David P | Syllabus | Course Materials | |||||
| CYOP 360 | Secure Software Engineering (3) | ||||||
(Formerly SDEV 360.) Prerequisite: CMSC 215 or CYOP 200. An in-depth study of the processes, standards, and regulations associated with secure software engineering. The objective is to plan, manage, document, and communicate all phases of a secure software development cycle. Topics include security requirements, secure software life cycle development, threat modeling, and Security Technical Implementation Guides (STIGs). Students may receive credit for only one of the following courses: CYOP 360 or SDEV 360. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 3323 | 6381 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Woodson, Kevin T | Syllabus | Course Materials | |||||
| CYOP 360 | Secure Software Engineering (3) | ||||||
(Formerly SDEV 360.) Prerequisite: CMSC 215 or CYOP 200. An in-depth study of the processes, standards, and regulations associated with secure software engineering. The objective is to plan, manage, document, and communicate all phases of a secure software development cycle. Topics include security requirements, secure software life cycle development, threat modeling, and Security Technical Implementation Guides (STIGs). Students may receive credit for only one of the following courses: CYOP 360 or SDEV 360. |
|||||||
| 5270 | 7380 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Eyler, Carl W | Syllabus | Course Materials | |||||
| CYOP 360 | Secure Software Engineering (3) | ||||||
(Formerly SDEV 360.) Prerequisite: CMSC 215 or CYOP 200. An in-depth study of the processes, standards, and regulations associated with secure software engineering. The objective is to plan, manage, document, and communicate all phases of a secure software development cycle. Topics include security requirements, secure software life cycle development, threat modeling, and Security Technical Implementation Guides (STIGs). Students may receive credit for only one of the following courses: CYOP 360 or SDEV 360. |
|||||||
| 6938 | 7381 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Johnson, Kyle L | Syllabus | Course Materials | |||||
| CYOP 380 | Defensive Cyberspace Operations (3) | ||||||
Prerequisites: CYOP 300, CMIT 265, and CMIT 291. A hands-on, lab-intensive course in defensive cyberspace operations designed to guide learners on how to protect cyberspace capabilities from malicious activity and imminent threats. The objective is to defend cyberspace assets including data, systems, networks, and the Internet. Topics include threat intelligence and analysis, risk assessment and mitigation, intrusion detection and prevention, incident response and recovery, vulnerability management, network defense architecture, security information and event management (SIEM), cyber defense operations planning, and legal and ethical considerations in defensive cyberspace operations. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 7376 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Baca, Michael B | Syllabus | Course Materials | |||||
| CYOP 380 | Defensive Cyberspace Operations (3) | ||||||
Prerequisites: CYOP 300, CMIT 265, and CMIT 291. A hands-on, lab-intensive course in defensive cyberspace operations designed to guide learners on how to protect cyberspace capabilities from malicious activity and imminent threats. The objective is to defend cyberspace assets including data, systems, networks, and the Internet. Topics include threat intelligence and analysis, risk assessment and mitigation, intrusion detection and prevention, incident response and recovery, vulnerability management, network defense architecture, security information and event management (SIEM), cyber defense operations planning, and legal and ethical considerations in defensive cyberspace operations. |
|||||||
| 7377 | 7380 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Baca, Michael B | Syllabus | Course Materials | |||||
| CYOP 400 | Secure Programming in the Cloud (3) | ||||||
(Formerly SDEV 400.) Prerequisite: CYOP 300 or SDEV 300. A hands-on study of programming secure applications in the cloud. The goal is to design and build applications in the cloud while implementing appropriate security policies. Topics include cloud computing models, risks and security challenges of programming in the cloud, and data security. Students may receive credit for only one of the following courses: CYOP 400 or SDEV 400. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2507 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Poma, Craig A | Syllabus | Course Materials | |||||
| CYOP 400 | Secure Programming in the Cloud (3) | ||||||
(Formerly SDEV 400.) Prerequisite: CYOP 300 or SDEV 300. A hands-on study of programming secure applications in the cloud. The goal is to design and build applications in the cloud while implementing appropriate security policies. Topics include cloud computing models, risks and security challenges of programming in the cloud, and data security. Students may receive credit for only one of the following courses: CYOP 400 or SDEV 400. |
|||||||
| 5271 | 7380 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: De Los Santos, Ivan A. | Syllabus | Course Materials | |||||
| CYOP 400 | Secure Programming in the Cloud (3) | ||||||
(Formerly SDEV 400.) Prerequisite: CYOP 300 or SDEV 300. A hands-on study of programming secure applications in the cloud. The goal is to design and build applications in the cloud while implementing appropriate security policies. Topics include cloud computing models, risks and security challenges of programming in the cloud, and data security. Students may receive credit for only one of the following courses: CYOP 400 or SDEV 400. |
|||||||
| 7540 | 7660 | 11 Mar 2026-05 May 2026 | W | 6:30P-9:30P | Open | Dorsey Station (Hybrid) | |
| Faculty: Nebhnani, Puran C | Syllabus | Course Materials | |||||
| Note: Dorsey Station: Classroom assignments are subject to change. Please view the electronic board in the hallway for your classroom assignment. | |||||||
| CYOP 400 | Secure Programming in the Cloud (3) | ||||||
(Formerly SDEV 400.) Prerequisite: CYOP 300 or SDEV 300. A hands-on study of programming secure applications in the cloud. The goal is to design and build applications in the cloud while implementing appropriate security policies. Topics include cloud computing models, risks and security challenges of programming in the cloud, and data security. Students may receive credit for only one of the following courses: CYOP 400 or SDEV 400. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 9473 | 6381 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: De Los Santos, Ivan A. | Syllabus | Course Materials | |||||
| CYOP 420 | Offensive Cyberspace Operations (3) | ||||||
Prerequisites: CYOP 310 and CYOP 380. A hands-on, deep dive into the tools, techniques and constraints associated with creating and executing an offensive cyberspace operations campaign. The goal is to target adversary cyberspace functions to impact high-valued targets within a controlled secure environment. Topics include reconnaissance and intelligence gathering, vulnerability analysis and exploitation, malware development and deployment, offensive tool development, social engineering, network exploitation, and legal and ethical constraints in offensive cyberspace operations. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 7378 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Heinen, Charles W | Syllabus | Course Materials | |||||
| CYOP 420 | Offensive Cyberspace Operations (3) | ||||||
Prerequisites: CYOP 310 and CYOP 380. A hands-on, deep dive into the tools, techniques and constraints associated with creating and executing an offensive cyberspace operations campaign. The goal is to target adversary cyberspace functions to impact high-valued targets within a controlled secure environment. Topics include reconnaissance and intelligence gathering, vulnerability analysis and exploitation, malware development and deployment, offensive tool development, social engineering, network exploitation, and legal and ethical constraints in offensive cyberspace operations. |
|||||||
| 7379 | 7380 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Smith, Travis | Syllabus | Course Materials | |||||
| CYOP 425 | Mitigating Software Vulnerabilities (3) | ||||||
(Formerly SDEV 425.) Prerequisites: CYOP 325 (or SDEV 325) and CYOP 360 (or SDEV 360). An in-depth analysis and evaluation of the mitigation of software vulnerabilities. The aim is to detect and mitigate software vulnerabilities by evaluating code. Topics include language-specific software vulnerabilities, mitigation, and input validation. Students may receive credit for only one of the following courses: CYOP 425 or SDEV 425. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2474 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Khan, Muhammad A | Syllabus | Course Materials | |||||
| CYOP 425 | Mitigating Software Vulnerabilities (3) | ||||||
(Formerly SDEV 425.) Prerequisites: CYOP 325 (or SDEV 325) and CYOP 360 (or SDEV 360). An in-depth analysis and evaluation of the mitigation of software vulnerabilities. The aim is to detect and mitigate software vulnerabilities by evaluating code. Topics include language-specific software vulnerabilities, mitigation, and input validation. Students may receive credit for only one of the following courses: CYOP 425 or SDEV 425. |
|||||||
| 6229 | 7380 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Waithe, Errol S. | Syllabus | Course Materials | |||||
| CYOP 460 | Software Security Testing (3) | ||||||
(Formerly SDEV 460.) Prerequisite: SDEV 425. A hands-on study of exploits, attacks, and techniques used to penetrate application security defenses and strategies for mitigating such attacks. The objective is to apply appropriate methodologies for software penetration testing to identify application weaknesses and logic flaws and to test and create scripts for exploitation and discovery. Topics include web architecture, application infrastructure, reconnaissance, discovery, mapping, and exploitation. Students may receive credit for only one of the following courses: CYOP 460 or SDEV 460. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 2508 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Johnson, Kyle L | Syllabus | Course Materials | |||||
| CYOP 460 | Software Security Testing (3) | ||||||
(Formerly SDEV 460.) Prerequisite: SDEV 425. A hands-on study of exploits, attacks, and techniques used to penetrate application security defenses and strategies for mitigating such attacks. The objective is to apply appropriate methodologies for software penetration testing to identify application weaknesses and logic flaws and to test and create scripts for exploitation and discovery. Topics include web architecture, application infrastructure, reconnaissance, discovery, mapping, and exploitation. Students may receive credit for only one of the following courses: CYOP 460 or SDEV 460. |
|||||||
| 6230 | 7380 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Woodson, Kevin T | Syllabus | Course Materials | |||||
| CYOP 460 | Software Security Testing (3) | ||||||
(Formerly SDEV 460.) Prerequisite: SDEV 425. A hands-on study of exploits, attacks, and techniques used to penetrate application security defenses and strategies for mitigating such attacks. The objective is to apply appropriate methodologies for software penetration testing to identify application weaknesses and logic flaws and to test and create scripts for exploitation and discovery. Topics include web architecture, application infrastructure, reconnaissance, discovery, mapping, and exploitation. Students may receive credit for only one of the following courses: CYOP 460 or SDEV 460. |
|||||||
| 6961 | 7381 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Eyler, Carl W | Syllabus | Course Materials | |||||
| CYOP 480 | Cyberspace Operations Automation (3) | ||||||
Prerequisite: CYOP 380. A project-based course exploring the efficient use of tools and techniques to automate tasks associated with cyberspace operations. The objective is to embrace and use technology, automation, and innovation to defend critical infrastructure and minimize the time required to deliver new capabilities. Topics include log file analysis, automation in threat intelligence, artificial intelligence (AI) in cyberspace operations, continuous monitoring and automated alerts, penetration testing and exploitation, vulnerability scanning and management, script development, infrastructure-as-code (IAC), and continuous integration/continuous delivery (CI/CD). |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 7380 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Cohen, Jason C | Syllabus | Course Materials | |||||
| CYOP 480 | Cyberspace Operations Automation (3) | ||||||
Prerequisite: CYOP 380. A project-based course exploring the efficient use of tools and techniques to automate tasks associated with cyberspace operations. The objective is to embrace and use technology, automation, and innovation to defend critical infrastructure and minimize the time required to deliver new capabilities. Topics include log file analysis, automation in threat intelligence, artificial intelligence (AI) in cyberspace operations, continuous monitoring and automated alerts, penetration testing and exploitation, vulnerability scanning and management, script development, infrastructure-as-code (IAC), and continuous integration/continuous delivery (CI/CD). |
|||||||
| 7381 | 7380 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Cohen, Jason C | Syllabus | Course Materials | |||||
| CYOP 495 | Cyber Operations Capstone (3) | ||||||
Prerequisite: 27 credits of Cyber Operations major coursework. A comprehensive project-driven study of cyber operations, network collection tactics, techniques, and procedures and reverse engineering and malware analysis with an emphasis on the proactive response to triggers or unusual activity. The objective is to use appropriate tools and techniques to monitor cyber operations. Topics include wireless and virtual networks, cryptography, network monitoring and intrusion analysis, threat hunting, and secure software engineering. |
|||||||
| Start date has passed. Please register for the next start date. | |||||||
| 3674 | 6380 | 07 Jan 2026-03 Mar 2026 | Open | Online | |||
| Faculty: Henry, Clayton Andrew | Syllabus | Course Materials | |||||
| CYOP 495 | Cyber Operations Capstone (3) | ||||||
Prerequisite: 27 credits of Cyber Operations major coursework. A comprehensive project-driven study of cyber operations, network collection tactics, techniques, and procedures and reverse engineering and malware analysis with an emphasis on the proactive response to triggers or unusual activity. The objective is to use appropriate tools and techniques to monitor cyber operations. Topics include wireless and virtual networks, cryptography, network monitoring and intrusion analysis, threat hunting, and secure software engineering. |
|||||||
| 6709 | 7380 | 11 Mar 2026-05 May 2026 | Closed | Online | |||
| Faculty: Nelson, Brian E. | Syllabus | Course Materials | |||||
| CYOP 495 | Cyber Operations Capstone (3) | ||||||
Prerequisite: 27 credits of Cyber Operations major coursework. A comprehensive project-driven study of cyber operations, network collection tactics, techniques, and procedures and reverse engineering and malware analysis with an emphasis on the proactive response to triggers or unusual activity. The objective is to use appropriate tools and techniques to monitor cyber operations. Topics include wireless and virtual networks, cryptography, network monitoring and intrusion analysis, threat hunting, and secure software engineering. |
|||||||
| 9565 | 7381 | 11 Mar 2026-05 May 2026 | Open | Online | |||
| Faculty: Pierre, David | Syllabus | Course Materials | |||||