Quick Search
- Accounting
- Acquisition and Contract Mgmt
- Bioinformatics
- Biotechnology Studies
- Biosecurity and Biodefense
- Biotechnology Management
- Biotech Regulatory Affairs
- Cyber Comm & Leadership
- Doctoral Stds in Comm College
- Cloud Computing Systems
- Criminal Justice Management
- Cybersecurity Mgmt and Policy
- Cyber Operations
- Cybersecurity Technology
- Cybersecurity
- Data Analytics
- Doctor of Business Admin
- Database Systems Technology
- Decisive Comm & Leadership
- DE Policy and Management
- Distance Education Technology
- DE in Teaching and Training
- Digital Forensics & Cyber Inv
- Doctoral Stds in Comm College
- Education: Instructional Tec
- Education Teacher Preparation
- Emergency Management
- Environmental Management
- Financial Management
- Global Health Management
- Health Care Administration
- Health Informatics Admin
- Human Resource Mgmt and Devpm
- Homeland Security Management
- Informatics
- Information Assurance
- Intelligence Management
- Education: Instructional Tech
- Information Systems & Service
- Information Technology
- Learning Design & Technology
- Business Administration
- Management
- Marketing
- MS in Acct Financial Mgmt
- Strategic Communications
- Nonprofit Management
- Distance Education
- Project Management
- Software Engineering
- Systems Engineering
- Transformational Leadership
- Univ College Special Topics
2024 Spring: January 10 - June 25
Course | Class No. | Section | Start & End Date | Day | Time | Status | Location |
---|
2024 Spring: January 10 - June 25
Course | Class No. | Section | Start & End Date | Day | Time | Status | Location |
---|---|---|---|---|---|---|---|
COP 640 | Secure Software (6) | ||||||
Prerequisite: COP 630. Master secure design and operation principles by examining classes of well-known defects that lead to security vulnerabilities, and utilize both static and dynamic analysis tools to find those vulnerabilities. Apply secure design principles in a virtual environment. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20382 | 9040 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Ismail, Mohammad T | Syllabus | Course Materials | |||||
COP 670 | Cyber Operations Capstone (6) | ||||||
Prerequisite: COP 640. Assume the role of a cyber warrior. Apply reverse engineering techniques to analyze malware and system software, and implement cyber-offense techniques in a laboratory to penetrate and infect a system that lacks cyber defenses. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20383 | 9040 | 10 Apr 2024-25 Jun 2024 | Closed | Online | |||
Faculty: Cohen, Jason C | Syllabus | Course Materials | |||||
COP 670 | Cyber Operations Capstone (6) | ||||||
Prerequisite: COP 640. Assume the role of a cyber warrior. Apply reverse engineering techniques to analyze malware and system software, and implement cyber-offense techniques in a laboratory to penetrate and infect a system that lacks cyber defenses. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20397 | 9041 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Aus, Alex D | Syllabus | Course Materials | |||||
CST 610 | Cyberspace and Cybersecurity Foundations (6) | ||||||
Gain knowledge of the foundations of cybersecurity, and apply cyber methodologies to cyber architectures, services, protocols, algorithms, hardware and software components, and programming languages. Become familiar with the important role that business continuity planning, security management practices, security architecture, operations security, and physical security play in cybersecurity. Explore the impact of cyber terrorism and national security on cybersecurity. Gain hands-on, real-world experience with state-of-the-art tools and technologies in a lab-intensive environment. Students may receive credit for only one of the following courses: CST 610 or DFC 610. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20289 | 9040 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Harig, Paul E. | Syllabus | Course Materials | |||||
CST 610 | Cyberspace and Cybersecurity Foundations (6) | ||||||
Gain knowledge of the foundations of cybersecurity, and apply cyber methodologies to cyber architectures, services, protocols, algorithms, hardware and software components, and programming languages. Become familiar with the important role that business continuity planning, security management practices, security architecture, operations security, and physical security play in cybersecurity. Explore the impact of cyber terrorism and national security on cybersecurity. Gain hands-on, real-world experience with state-of-the-art tools and technologies in a lab-intensive environment. Students may receive credit for only one of the following courses: CST 610 or DFC 610. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20302 | 9041 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Plass, Mathias R | Syllabus | Course Materials | |||||
CST 610 | Cyberspace and Cybersecurity Foundations (6) | ||||||
Gain knowledge of the foundations of cybersecurity, and apply cyber methodologies to cyber architectures, services, protocols, algorithms, hardware and software components, and programming languages. Become familiar with the important role that business continuity planning, security management practices, security architecture, operations security, and physical security play in cybersecurity. Explore the impact of cyber terrorism and national security on cybersecurity. Gain hands-on, real-world experience with state-of-the-art tools and technologies in a lab-intensive environment. Students may receive credit for only one of the following courses: CST 610 or DFC 610. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20303 | 9042 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Panja, Biswajit | Syllabus | Course Materials | |||||
CST 610 | Cyberspace and Cybersecurity Foundations (6) | ||||||
Gain knowledge of the foundations of cybersecurity, and apply cyber methodologies to cyber architectures, services, protocols, algorithms, hardware and software components, and programming languages. Become familiar with the important role that business continuity planning, security management practices, security architecture, operations security, and physical security play in cybersecurity. Explore the impact of cyber terrorism and national security on cybersecurity. Gain hands-on, real-world experience with state-of-the-art tools and technologies in a lab-intensive environment. Students may receive credit for only one of the following courses: CST 610 or DFC 610. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20304 | 9043 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Basta, Alfred | Syllabus | Course Materials | |||||
CST 610 | Cyberspace and Cybersecurity Foundations (6) | ||||||
Gain knowledge of the foundations of cybersecurity, and apply cyber methodologies to cyber architectures, services, protocols, algorithms, hardware and software components, and programming languages. Become familiar with the important role that business continuity planning, security management practices, security architecture, operations security, and physical security play in cybersecurity. Explore the impact of cyber terrorism and national security on cybersecurity. Gain hands-on, real-world experience with state-of-the-art tools and technologies in a lab-intensive environment. Students may receive credit for only one of the following courses: CST 610 or DFC 610. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20305 | 9044 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Chow, Tsun S | Syllabus | Course Materials | |||||
CST 610 | Cyberspace and Cybersecurity Foundations (6) | ||||||
Gain knowledge of the foundations of cybersecurity, and apply cyber methodologies to cyber architectures, services, protocols, algorithms, hardware and software components, and programming languages. Become familiar with the important role that business continuity planning, security management practices, security architecture, operations security, and physical security play in cybersecurity. Explore the impact of cyber terrorism and national security on cybersecurity. Gain hands-on, real-world experience with state-of-the-art tools and technologies in a lab-intensive environment. Students may receive credit for only one of the following courses: CST 610 or DFC 610. |
|||||||
25318 | 7631 | 10 Apr 2024-25 Jun 2024 | W | 6:30P-9:30P | Open | Dorsey Station (Hybrid) | |
Faculty: Acholonu, Omogbemiboluwa I | Syllabus | Course Materials | |||||
Note: Dorsey Station: Classroom assignments are subject to change. Please view the electronic board in the hallway for your classroom assignment. | |||||||
CST 610 | Cyberspace and Cybersecurity Foundations (6) | ||||||
Gain knowledge of the foundations of cybersecurity, and apply cyber methodologies to cyber architectures, services, protocols, algorithms, hardware and software components, and programming languages. Become familiar with the important role that business continuity planning, security management practices, security architecture, operations security, and physical security play in cybersecurity. Explore the impact of cyber terrorism and national security on cybersecurity. Gain hands-on, real-world experience with state-of-the-art tools and technologies in a lab-intensive environment. Students may receive credit for only one of the following courses: CST 610 or DFC 610. |
|||||||
25319 | 1121 | 10 Apr 2024-25 Jun 2024 | T | 6:30P-9:30P | Open | College Park (Hybrid) | |
Faculty: Butler, William H | Bldg/Room: Hornbake Library (Undergrad) 0103 | Syllabus | Course Materials | ||||
CST 620 | Prevention of Cyber Attack Methodologies (6) | ||||||
Prerequisite: CST 610. Explore the theories and practices related to the prevention of cyber-attacks. Design, apply, and analyze technological solutions that address countermeasures, encryption, network access control methods, firewalls, intrusion detection/prevention, and secure systems development. Practice techniques such as software assurance, verification, and validation; virtual network and cloud computing security techniques; and physical security techniques. Examine the nation's complex critical infrastructure industries. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20247 | 9040 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Ratchford, Melba M | Syllabus | Course Materials | |||||
CST 620 | Prevention of Cyber Attack Methodologies (6) | ||||||
Prerequisite: CST 610. Explore the theories and practices related to the prevention of cyber-attacks. Design, apply, and analyze technological solutions that address countermeasures, encryption, network access control methods, firewalls, intrusion detection/prevention, and secure systems development. Practice techniques such as software assurance, verification, and validation; virtual network and cloud computing security techniques; and physical security techniques. Examine the nation's complex critical infrastructure industries. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20278 | 9041 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Nance, Michael | Syllabus | Course Materials | |||||
CST 620 | Prevention of Cyber Attack Methodologies (6) | ||||||
Prerequisite: CST 610. Explore the theories and practices related to the prevention of cyber-attacks. Design, apply, and analyze technological solutions that address countermeasures, encryption, network access control methods, firewalls, intrusion detection/prevention, and secure systems development. Practice techniques such as software assurance, verification, and validation; virtual network and cloud computing security techniques; and physical security techniques. Examine the nation's complex critical infrastructure industries. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20279 | 9042 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Nziga, Jean-Pierre | Syllabus | Course Materials | |||||
CST 620 | Prevention of Cyber Attack Methodologies (6) | ||||||
Prerequisite: CST 610. Explore the theories and practices related to the prevention of cyber-attacks. Design, apply, and analyze technological solutions that address countermeasures, encryption, network access control methods, firewalls, intrusion detection/prevention, and secure systems development. Practice techniques such as software assurance, verification, and validation; virtual network and cloud computing security techniques; and physical security techniques. Examine the nation's complex critical infrastructure industries. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20288 | 9043 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Daniels, Jeffrey W | Syllabus | Course Materials | |||||
CST 620 | Prevention of Cyber Attack Methodologies (6) | ||||||
Prerequisite: CST 610. Explore the theories and practices related to the prevention of cyber-attacks. Design, apply, and analyze technological solutions that address countermeasures, encryption, network access control methods, firewalls, intrusion detection/prevention, and secure systems development. Practice techniques such as software assurance, verification, and validation; virtual network and cloud computing security techniques; and physical security techniques. Examine the nation's complex critical infrastructure industries. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20306 | 9044 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Richman, Steven H. | Syllabus | Course Materials | |||||
CST 620 | Prevention of Cyber Attack Methodologies (6) | ||||||
Prerequisite: CST 610. Explore the theories and practices related to the prevention of cyber-attacks. Design, apply, and analyze technological solutions that address countermeasures, encryption, network access control methods, firewalls, intrusion detection/prevention, and secure systems development. Practice techniques such as software assurance, verification, and validation; virtual network and cloud computing security techniques; and physical security techniques. Examine the nation's complex critical infrastructure industries. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20307 | 9045 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Wang, Yongge | Syllabus | Course Materials | |||||
CST 620 | Prevention of Cyber Attack Methodologies (6) | ||||||
Prerequisite: CST 610. Explore the theories and practices related to the prevention of cyber-attacks. Design, apply, and analyze technological solutions that address countermeasures, encryption, network access control methods, firewalls, intrusion detection/prevention, and secure systems development. Practice techniques such as software assurance, verification, and validation; virtual network and cloud computing security techniques; and physical security techniques. Examine the nation's complex critical infrastructure industries. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
25320 | 7631 | 10 Apr 2024-25 Jun 2024 | W | 6:30P-9:30P | Open | Dorsey Station (Hybrid) | |
Faculty: Smith, Candice E. | Syllabus | Course Materials | |||||
Note: Dorsey Station: Classroom assignments are subject to change. Please view the electronic board in the hallway for your classroom assignment. | |||||||
CST 620 | Prevention of Cyber Attack Methodologies (6) | ||||||
Prerequisite: CST 610. Explore the theories and practices related to the prevention of cyber-attacks. Design, apply, and analyze technological solutions that address countermeasures, encryption, network access control methods, firewalls, intrusion detection/prevention, and secure systems development. Practice techniques such as software assurance, verification, and validation; virtual network and cloud computing security techniques; and physical security techniques. Examine the nation's complex critical infrastructure industries. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
25322 | 1121 | 10 Apr 2024-25 Jun 2024 | T | 6:30P-9:30P | Open | College Park (Hybrid) | |
Faculty: Burton, Barbara E. | Bldg/Room: Hornbake Library (Undergrad) 0105 | Syllabus | Course Materials | ||||
CST 630 | Advanced Cyber Exploitation and Mitigation Methodologies (6) | ||||||
Prerequisite: CST 620. Practice intrusion detection and prevention, exploitation, and mitigation in cyberspace. Employ technological solutions that identify, resolve, prevent, and mitigate cyber attacks Utilize network security techniques, monitoring, auditing, intrusion detection and prevention, and ethical penetration testing. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20248 | 9040 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Awuah, Lawrence | Syllabus | Course Materials | |||||
CST 630 | Advanced Cyber Exploitation and Mitigation Methodologies (6) | ||||||
Prerequisite: CST 620. Practice intrusion detection and prevention, exploitation, and mitigation in cyberspace. Employ technological solutions that identify, resolve, prevent, and mitigate cyber attacks Utilize network security techniques, monitoring, auditing, intrusion detection and prevention, and ethical penetration testing. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20282 | 9041 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Schweigert, Chris J | Syllabus | Course Materials | |||||
CST 630 | Advanced Cyber Exploitation and Mitigation Methodologies (6) | ||||||
Prerequisite: CST 620. Practice intrusion detection and prevention, exploitation, and mitigation in cyberspace. Employ technological solutions that identify, resolve, prevent, and mitigate cyber attacks Utilize network security techniques, monitoring, auditing, intrusion detection and prevention, and ethical penetration testing. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20284 | 9042 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Bailey, Michelle D | Syllabus | Course Materials | |||||
CST 630 | Advanced Cyber Exploitation and Mitigation Methodologies (6) | ||||||
Prerequisite: CST 620. Practice intrusion detection and prevention, exploitation, and mitigation in cyberspace. Employ technological solutions that identify, resolve, prevent, and mitigate cyber attacks Utilize network security techniques, monitoring, auditing, intrusion detection and prevention, and ethical penetration testing. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20309 | 9043 | 10 Apr 2024-25 Jun 2024 | Open | Online | |||
Faculty: Tung, Ye | Syllabus | Course Materials | |||||
CST 630 | Advanced Cyber Exploitation and Mitigation Methodologies (6) | ||||||
Prerequisite: CST 620. Practice intrusion detection and prevention, exploitation, and mitigation in cyberspace. Employ technological solutions that identify, resolve, prevent, and mitigate cyber attacks Utilize network security techniques, monitoring, auditing, intrusion detection and prevention, and ethical penetration testing. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
Start date has passed. Please register for the next start date. | |||||||
20310 | 9044 | 10 Apr 2024-25 Jun 2024 | Closed | Online | |||
Faculty: McMahon, Margaret M | Syllabus | Course Materials | |||||
CST 630 | Advanced Cyber Exploitation and Mitigation Methodologies (6) | ||||||
Prerequisite: CST 620. Practice intrusion detection and prevention, exploitation, and mitigation in cyberspace. Employ technological solutions that identify, resolve, prevent, and mitigate cyber attacks Utilize network security techniques, monitoring, auditing, intrusion detection and prevention, and ethical penetration testing. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
25323 | 7641 | 10 Apr 2024-25 Jun 2024 | Th | 6:30P-9:30P | Open | Dorsey Station (Hybrid) | |
Faculty: Lucas, Diana | Syllabus | Course Materials | |||||
Note: Dorsey Station: Classroom assignments are subject to change. Please view the electronic board in the hallway for your classroom assignment. | |||||||
CST 630 | Advanced Cyber Exploitation and Mitigation Methodologies (6) | ||||||
Prerequisite: CST 620. Practice intrusion detection and prevention, exploitation, and mitigation in cyberspace. Employ technological solutions that identify, resolve, prevent, and mitigate cyber attacks Utilize network security techniques, monitoring, auditing, intrusion detection and prevention, and ethical penetration testing. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience. |
|||||||
25324 | 1111 | 10 Apr 2024-25 Jun 2024 | M | 6:30P-9:30P | Open | College Park (Hybrid) | |
Faculty: Pak, Charles | Bldg/Room: Hornbake Library (Undergrad) 0103 | Syllabus | Course Materials |
Page 1 2 3 4 5 (6) 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 |